
11:50AM - Day 2
Protecting AI programs and ML algorithms from cyber security...
No talk associated with this Speaker.
Laveena Shetty
Manager, Information Security - Product Lifecycle Management, Supply Chain
Philip Morris International

11:00AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Panel: Never trust, always verify: The Zero-Trust approach

10:15AM - Day 2
Incorporating IAM elements into the program such as MFA,...
View Presentation: Making your Cyber Security Program Effective in 2023

11:50AM - Day 2
Protecting AI programs and ML algorithms from cyber security...

11:00AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Panel: Never trust, always verify: The Zero-Trust approach

12:00PM - Day 1
Creating information security policies which are transparent and commonly...
View Panel: How to maintain a culture of security in the workplace

11:50AM - Day 2
Protecting AI programs and ML algorithms from cyber security...
No talk associated with this Speaker.
Dr. Vasileios Karagiannopoulos
Associate Professor in Cybercrime and Cybersecurity, and Co-Director, Centre for Cybercrime and Economic Crime
University of Portsmouth
No talk associated with this Speaker.
No talk associated with this Speaker.

12:00PM - Day 1
Creating information security policies which are transparent and commonly...
View Panel: How to maintain a culture of security in the workplace

04:10PM - Day 1
Complying with financial crime, cyber security, and data protection...
View Panel: Cyber security & compliance in financial services

11:00AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Panel: Never trust, always verify: The Zero-Trust approach

04:55PM - Day 1
Revealing current statistics of the overall cyber security staff...
View Presentation: The cyber security skills gap: Fact or fiction?

02:55PM - Day 1
In this session, attendees will will learn how to:...
View Presentation: Leveraging CNAPP to close the cloud security expertise gap

11:15AM - Day 2
The SecOps world has changed and AI is here....
View Presentation: Ontinue: Using AI For Effective SecOps Collaboration

05:05PM - Day 1
End of Day 1 - Chairperson's closing remarks.

10:50AM - Day 2
DDoS has entered a new era: less spoofed traffic,...

04:10PM - Day 1
Complying with financial crime, cyber security, and data protection...
View Panel: Cyber security & compliance in financial services

10:35AM - Day 1
It’s scary out there — with a sharp rise...
View Presentation: Stop the scramble for cloud security — Automation can help

12:45PM - Day 1
From the murky depths of foreign espionage to the...

03:20PM - Day 2
End of Day 2 - Chairperson's closing remarks.

02:45PM - Day 2
Overlay mesh networks are rapidly gaining popularity and replacing...
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.