Summit Tracks

February 21, 2017

Security strategies are evolving at a fast pace. Join this track to get a view of the technologies driving the…

February 22, 2017

The world is gearing itself for cyber security to be primarily automated and driven by AI. Hear predictions for the…

February 23, 2017

The leading technology and methods that help you to investigate, control and resolve incidents affecting your organization.

Featured Presenters

Ann Barron-DiCamillo headshot

Ann Barron-DiCamillo

VP Cyber Threat Intelligence & Incident Response

American Express

Ian Glover

President

CREST

Mark Weatherford headshot

Mark Weatherford

Chief Cybersecurity Strategist

vArmour

Peter Wood

CEO

First Base Technologies

Simon Crosby headshot

Simon Crosby

CTO

Bromium

Recent Webinars

February 21, 2018 5:17am EST

Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they…

March 2, 2017 10:00am EST

Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will…

February 23, 2017 5:00pm EST

With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached…

February 23, 2017 4:00pm EST

Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure. You might think…

February 23, 2017 2:00pm EST

New research from Cyphort and the Ponemon Institute puts the spotlight on many significant pain points affecting the productivity and…

February 23, 2017 1:00pm EST

Join us in discussing the state of cyber security in 2017. What are current threats, pitfalls, and the myths hindering…

February 23, 2017 1:00pm EST

Get insights into the threat landscape. Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based…

February 23, 2017 12:00pm EST

Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a…

February 23, 2017 11:00am EST

Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that…

February 23, 2017 10:00am EST

Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable…

February 23, 2017 7:00am EST

Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it’s no wonder that most organizations struggle…

February 23, 2017 6:30am EST

Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that…

February 23, 2017 6:00am EST

The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six…

February 23, 2017 4:00am EST

Warning – this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive…

February 22, 2017 5:00pm EST

You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks….

February 22, 2017 4:00pm EST

Machine learning is both cool and valuable, but to apply it effectively requires that we disregard the former in order…

February 22, 2017 3:00pm EST

Once breached at the endpoint, what does an attacker do? Where is he going? What does he want? The truth…

February 22, 2017 1:00pm EST

2016 has been yet another record breaking year in many aspects of the cyber security and malware world. We will…

February 22, 2017 12:00pm EST

Today’s attack surface is expanding and the network is becoming increasingly complex thanks in large part to the ephemeral nature…

February 22, 2017 11:00am EST

Artificial Intelligence and Machine Learning are becoming more pervasive in the cybersecurity space, but it is not the panacea everyone…

February 22, 2017 8:00am EST

From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced…

February 22, 2017 7:00am EST

In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged…

February 22, 2017 6:00am EST

A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber…


February 21, 2017 4:00pm EST

Cyber criminals are leveraging automation to launch more efficient and effective campaigns. Manual defense solutions will never be able to…

February 21, 2017 3:00pm EST

Ransomware was the #1 cybersecurity threat in 2016. Phishing continues to thrive as the #1 attack vector used by hackers…

February 21, 2017 2:00pm EST

Seamlessly integrating AppSec testing into CI processes earlier in the SDLC has become the holy grail of DevOps and security…

February 21, 2017 1:00pm EST

The rise of Artificial Intelligence (AI) is helping to fuel the fire to build Quantum Computers because they will be…

February 21, 2017 12:00pm EST

Join as we help you defeat those ransomware hoodlums lurking in the dark cyberspace. Learn preventative measure from VIPRE: -…

February 21, 2017 11:00am EST

Discover the latest trends in cyber attacks and how they are shaping the security strategy across industries and on a…

February 21, 2017 6:00am EST

Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive,…

February 21, 2017 4:00am EST

These days it’s not a matter of if you’ll be breached, but when. Security teams in the modern enterprise must…

Summit Sponsors

Related Summits

See all

December 11, 2018

Analytics has become more and more prevalent in every aspect of business and with that comes adoption of and innovation…

December 10, 2018

Disruptive cyber attacks are on the rise and all industries are at risk. Enterprises and small businesses are scrambling to…

December 4, 2018

IT infrastructure is mission-critical to the success of the enterprise. Yet CIOs are struggling to improve the productivity of both…