Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

InfoSecurity Europe

Register here for free
  • Date: 04 June 2019 – Tuesday
    05 June 2019 – Wednesday
    06 June 2019 – Thursday
  • Location:Olympia London,
    Hammersmith Rd,
    London W14 8UX
  • Duration: full day
  • Attendance: In Person
  • Fee: Free

Overview

What is Infosec?

Infosecurity Europe is the sourcing and knowledge hub for Europe’s information and cyber security community. Featuring an interactive exhibition floor with over 400 cutting-edge suppliers, a far-reaching conference programme and a host of networking opportunities, the event brings information and cyber security to life.

 

Why is Cisco at InfoSec?

Our theme at InfoSec this year is helping you to go from "Sitting Duck to Crouching Tiger". If being overwhelmed by Security alerts or constantly being on back foot sounds familiar, please come and talk to us about how to take your Endpoint, Email, Cloud and Network Security to the next, automated and effective level.

Agenda 2019

Tech Talk Sessions:

Tech Talk 1: Tues 4th June
Is that really you? The importance of identity in breach readiness and response
Richard Dean

Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cyber security.  But what if you’re facing a deliberate attempt to steal your users’ identities in order to take advantage of these privileges? In this talk, you’ll learn how to manage identity effectively

 

Tech Talk 2: Weds 5th June
The anatomy of a cyber attack: DNSpionage
Martin Lee

Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. This attack included information stealing malware, the tampering with organisations’ DNS records, and the use of the compromised DNS to register valid TLS certificates. In addition to presenting what this attack reveals about the capabilities of threat actors, Martin will review how organisations can protect themselves against similar attacks in the future.

 

Tech Talk 3: Thurs 6th June
How to detect malware in encrypted traffic, without decrypting it, using Artificial Intelligence
Mustafa Mustafa

Encryption enables greater privacy and security, which is particularly necessary for mobile, cloud, and web applications. However, attackers are also using encryption to conceal malware and evade detection by traditional security products. Find out how you can detect threats in encrypted traffic WITHOUT having to decrypt the data – using Artificial Intelligence.

 

Workshop: 

 

Tuesday, June 4th and Wednesday, June 5th, 2pm – 4pm- Discover the secrets of the SOC, and how to build a threat hunting team, By Simon Crocker and Martin Lee

In the first half of this interactive workshop, we’ll give you an insight into what goes into making a SOC work effectively.  As well as providing the core monitoring and incident response function, SOCs can end up providing a wide range of functions, from ensuring that security basics are in place such as vulnerability management and security awareness, through to proactive, advanced threat hunting.

In the second half, we’ll look at threat hunting in more detail with one of our Cisco threat intelligence experts.

 

 

Wednesday, June 5th: 10am-12pm- Is AI the Answer to Reducing Cyber-Attack Risks? By Dhia Mahjoub

The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? We’ll go beyond the hype and show you real-world examples of algorithms that help us keep our customers safe on the internet, anywhere their users go.

 

Geek Street Session:


Tuesday, June 4th, 2:15pm – 3:00 pm- Cybercriminal Abuse in European IP Space By Dhia Mahjoub

Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business models of bulletproof hosters that shelter ransomware, trojans, phishing, cybercrime forums, stolen credentials shops and other toxic content.

 

Infosecurity Europe 2019 Theater Schedule

Tuesday 4th June

Times Session Titles
10:00 - 10:20 Malicious Cryptomining is Exploding. Are you at risk?
10:20 - 10:40 Is that really you? The importance of Identity in Cybersecurity
10:40 - 11:00 The secure internet gateway: security re-imagined in the cloud
11:00 - 11:20 DNSpionage
11:20 - 11:40 Anatomy of an attack
11:40 - 12:00 Click with Caution: The latest insights on email threats
12:00 - 12:20 Cisco Umbrella Threat Intelligence - Investigate Attacks Like Never Before
12:20 - 12:40 Duo Security (Will add details asap)
12:40 - 13:00 Cisco cloud security: stepping into cloud with confidence
13:00 - 13:20  
13:20 - 13:40  
13:40 - 14:00 Cisco Meraki (Will add details ASAP)
14:00 - 14:20 Malicious Cryptomining is Exploding. Are you at risk?
14:20 - 14:40 Is that really you? The importance of Identity in Cybersecurity
14:40 - 15:00 The secure internet gateway: security re-imagined in the cloud
15:00 - 15:20 Click with Caution: The latest insights on email threats
15:20 - 15:40 Anatomy of an attack
15:40 - 16:00 Cisco Umbrella + Meraki MR: a match made in the cloud
16:00 - 16:20 Cisco Umbrella Threat Intelligence - Investigate Attacks Like Never Before
16:20 - 16:40  
16:40 - 17:00 Cisco cloud security: stepping into cloud with confidence
17:00 - 17:20  

Sorry, no results matched your search criteria(s). Please try again.

Wednesday 5th June

Times Session Title
10:00 - 10:20 DNSpionage
10:20 - 10:40 Cisco Umbrella + Meraki MR: a match made in the cloud
10:40 - 11:00 Is that really you? The importance of Identity in Cybersecurity
11:00 - 11:20 Malicious Cryptomining is Exploding. Are you at risk?
11:20 - 11:40 Are you still ahead in the Phishing race?
11:40 - 12:00 The secure internet gateway: security re-imagined in the cloud
12:00 - 12:20 Anatomy of an attack
12:20 - 12:40 Click with Caution: The latest insights on email threats
12:40 - 13:00  
13:00 - 13:20 Cisco Umbrella Threat Intelligence - Investigate Attacks Like Never Before
13:20 - 13:40 Cisco Meraki (Will add details ASAP)
13:40 - 14:00 Cisco cloud security: stepping into cloud with confidence
14:00 - 14:20 Is that really you? The importance of Identity in Cybersecurity
14:20 - 14:40 Malicious Cryptomining is Exploding. Are you at risk?
14:40 - 15:00 Duo Security (Will add details asap)
15:00 - 15:20 The secure internet gateway: security re-imagined in the cloud
15:20 - 15:40 Malicious Cryptomining is Exploding. Are you at risk?
15:40 - 16:00 AMP-Umbrella - Protecting users and devices 
16:00 - 16:20 Are you still ahead in the Phishing race?
16:20 - 16:40 Cisco Umbrella Threat Intelligence - Investigate Attacks Like Never Before
16:40 - 17:00 Click with Caution: The latest insights on email threats
17:00 - 17:20 Cisco cloud security: stepping into cloud with confidence

Sorry, no results matched your search criteria(s). Please try again.

Thursday 6th June

Times Session Title
10:00 - 10:20 The secure internet gateway: security re-imagined in the cloud
10:20 - 10:40 Are you still ahead in the Phishing race?
10:40 - 11:00 Cisco Umbrella + Meraki MR: a match made in the cloud
11:00 - 11:20 Cisco Meraki (Will add details ASAP)
11:20 - 11:40 Cisco cloud security: stepping into cloud with confidence
11:40 - 12:00 Malicious Cryptomining is Exploding. Are you at risk?
12:00 - 12:20  
12:20 - 12:40  
12:40 - 13:00  
13:00 - 13:20 Cisco cloud security: stepping into cloud with confidence
13:20 - 13:40 Malicious Cryptomining is Exploding. Are you at risk?
13:40 - 14:00 How to find threats in encrypted traffic using articifial intelligence
14:00 - 14:20 The secure internet gateway: security re-imagined in the cloud
14:20 - 14:40 Are you still ahead in the Phishing race?
14:40 - 15:00 Anatomy of an attack
15:00 - 15:20 AMP-Umbrella - Protecting users and devices 
15:20 - 15:40  

Sorry, no results matched your search criteria(s). Please try again.

 

 

Location

Zentrum Paul Klee, Monument im Fruchtland 3, CH-3000 Bern 31, Switzerland