
12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

09:45AM - Day 1
Cyber Trends and Insights: Actors and methods observed in...
No talk associated with this Speaker.

11:45AM - Day 1
Improving your cyber readiness in advance of cyber insurance...
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy

11:45AM - Day 1
Improving your cyber readiness in advance of cyber insurance...
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy

10:45AM - Day 1
Understanding various cloud computing services and how they are...
View Fireside Chat: Cloud Vulnerabilities and Cyber Resilience
No talk associated with this Speaker.

02:20PM - Day 2
How cyber security leaders join different parts of the...
View Presentation: Tying the Room Together as a Cyber Security Leader

11:05AM - Day 2
Challenges with multiple solutions historically evolved. What are the...
View Presentation: Software Bill of Materials: Use Cases in Medical Device Manufacturing

03:50PM - Day 1
Creating information security policies which are transparent and commonly...
View Panel: How to Maintain a Culture of Security in the Workplace
No talk associated with this Speaker.

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

03:50PM - Day 1
Creating information security policies which are transparent and commonly...
View Panel: How to Maintain a Culture of Security in the Workplace

10:05AM - Day 2
As technology continues to evolve at an unprecedented pace,...
View Presentation: Securing the future: The Intersection of Future Technologies and Cybersecurity

01:00PM - Day 2
The more complex a risk is, the more eager...
View Presentation: Do not insure cyber risk. Let’s have a salad.

11:45AM - Day 1
Improving your cyber readiness in advance of cyber insurance...
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy

03:50PM - Day 1
Creating information security policies which are transparent and commonly...
View Panel: How to Maintain a Culture of Security in the Workplace

01:15PM - Day 1
So you’re an aspiring cyber criminal. You want to...
View Presentation: AI Cybercrime: Levelling the Playing Field for the Common Criminal

11:45AM - Day 1
Improving your cyber readiness in advance of cyber insurance...
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

12:40PM - Day 2
Rebooting an outdated security strategy – how far should...
View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2
Rebooting an outdated security strategy – how far should...
View Panel: Strong to the core: Security for digital transformation

03:10PM - Day 1
How communication plays a role in Information Security How...
View Communicating information security: Translation mechanisms for awareness retention and buy-in

10:45AM - Day 1
Understanding various cloud computing services and how they are...
View Fireside Chat: Cloud Vulnerabilities and Cyber Resilience
No talk associated with this Speaker.
2022 Speakers

10:10AM - Day 2
IT vs OT: Key differentiators. Why Architecture vs Design...
View Presentation: IT/OT Convergence – A Cyber Security Approach

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...
No talk associated with this Speaker.

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

10:15AM - Day 1
Snyk surveyed hundreds of cloud engineering and security professionals...
View Presentation: Insights Into Cloud Native Threats and Security Trends

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

03:40PM - Day 2
In this session you will discover 3 practical ways...
View Presentation: Accelerating Digital Transformation with Cloud

03:20PM - Day 2
Many organisations have successfully moved their businesses to a...
View Presentation: 5 Facts every Data Defender should know to Secure the Future

12:50PM - Day 1
Can I trust my IT-Hardware Vendors? What is the...
View Presentation: Zero Trust Hardware, What is it and How Do I get it?

04:10PM - Day 1
The presentation will aim at discussing the broad challenges...

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

12:00PM - Day 2
This session will discuss... The urgent need for dynamic...
View Presentation: Identity First Security – The Way Ahead to Building a Zero Trust Future

11:30AM - Day 2
Join us on this session and get latest updates...

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

05:00PM - Day 1
Don’t become another statistic! Being affected by Ransomware is...

05:10PM - Day 1
Session Content To Follow Soon...
View Presentation: Offensive clouds – How peirates sail through the stormy sky

12:50AM - Day 2
In this fireside chat, Marvin Ngoma from the Global...

12:50PM - Day 2
The inherent benefits of cost savings and improved overall...
View Presentation: How Safe is Your Cloud? Deciphering Cloud Threats and Security Models

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

12:30PM - Day 2
This Session Will Explore... How to implement an OT...

01:00PM - Day 1
What is Continuous Cloud Compliance? How to discover anomalies...

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

02:30PM - Day 1
In this session, Driving your Cloud Security Forward to...
View Presentation : Driving Your Cloud Security Forward – Be Ready for the Future

03:10PM - Day 1
As apps and data move to the cloud to...
View Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce

11:40AM - Day 1
Content To Follow Soon...
View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

01:50PM - Day 1
- Global Trends in IT Security - Challenges in...
View Presentation: IT Security Landscape – Past Present and Future

01:15PM - Day 1
So you’re an aspiring cyber criminal. You want to...
View Presentation: AI Cybercrime: Levelling the Playing Field for the Common Criminal

04:40PM - Day 1
Content To Follow Soon...
View VIRTUAL PRESENTATION: Identifying Risk in Cloud Environments

04:40PM - Day 1
Security at the speed of cloud is hard. Cloud-native...
View Presentation: Anatomy Of Cloud Breaches And How To Prevent Them

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

03:10PM - Day 2
An all-too-common belief is that to move fast you...
View Presentation: How SaaS Companies are Successfully Scaling Security Age

12:30PM - Day 1
Outlining best practices and compliance standards is a good...

03:40PM - Day 1
The session will examine trends in Malware use, distribution,...
View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

11:45AM - Day 1
Improving your cyber readiness in advance of cyber insurance...
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy

02:20PM - Day 1
Privileged Credentials are considered the "keys of the kingdom",...
View Presentation: Trends in the PAM Market According to Gartner

02:10PM - Day 2
There’s a human element to modern AppSec that can’t...
View Presentation: Security Champions – The Human Side of DevSecOps

11:00AM - Day 2
The days of security as a “nice to have”...

01:20PM - Day 2
The worldwide cyber talent shortage is real and growing....
View Presentation: Staying Secure in the Midst of the Talent Crisis

09:45AM - Day 1
What are the main cyber risks which we are...
View Presentation: Assessing Cyber Security and Risk in a Modern Landscape