search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
IT-SA EVENTS


cybersecurityeurope PAGE 20


Highlights from day two of it-sa 2018’s Supporting Programme provide a fl avour of the comprehensive topic coverage available.


IT-SA PROGRAMME OVERVIEW – WEDNESDAY 10 OCTOBER 2018 CONTINUED


I10 EDITOR’S PICK - Building a threat intelligence driven cyber security practice 11:40AM - 12:00PM


Cyber Threat Intelligence (CTI) has been around in the security industry for years. Yet organisations struggle to grasp what a CTI practice actually entails, and how to get the most value out of it. This presentation provides an insight why CTI is one of the most valuable and eff ective security practices an organisation can implement. Presentation also explains why organisations need to look beyond Indicators of Compromise. Speaker: Jörg Abraham, Senior Threat Analyst, EclecticIQ Fusion Center / EclecticIQ B.V.


T9 EDITOR’S PICK - Encrypt Everything - Data security through encryption? 2:15 - 2:30PM


According to the Ponemon Global Encryption Trends Study 2018, 43% of respondents worldwide use a company-wide encryption strategy. In Germany, the proportion is as high as 67%. Compliance is one of the main reasons for the extensive use of encryption. This presentation discusses how encryption technologies help to secure perimeter protection, and demonstrates that the use of encryption makes IT security more robust and error-tolerant. The speaker will explain the benefi ts of latest encryption solutions, and how these technologies can be implemented in the form of an enterprise-wide encryption strategy. Learn how to take responsibility for the security of your data, and how to maintain control over data security, regardless of whether the data is stored locally, remotely, or in the cloud. Speaker: Michael Loger, Senior Sales Engineer / Thales


T10 EDITOR’S PICK - Advanced SIEM and Threat Hunting 10:15 - 10:30AM


This presentation shows that the multitude of functions can be harmonised, orchestrated and automated by the IBM intelligent security platform, IBM QRadar. In simple interaction with the intuitive analysis software i2 and the IBM Incident Response Platform, this presentation will show that such solutions can meet all the demands placed on a company’s security functions eff ectively and cost-effi ciently. Speaker: Justus Reich, Security Solutions Architect & Trusted Advisor / IBM Deutschland GmbH


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58