Keynote: Optimising Threat Detection and Response in Light of Increased Automation
How to create a Resilient Software Supply Chain
Securing Critical Infrastructure
Panel Discussion: How to Stay Ahead of Insider Threats
Mesh Architecture – Creating a New Line of Defence
Panel Discussion: Securing the IoT: An Evolving Concern
Afternoon Keynote: The Evolution of Ransomware Attacks and How to Prevent Them
Why a Zero-Trust Approach Is the Key to Optimal Security