Culture and Education session
Uneducated staff are a major point of weakness for hackers. We help you build a training programme that works with your staff’s daily operations, and showcase the best way to get the Board on your side.
Identity and Access management session
Managing the identities of proliferating connected devices, and access for an increasingly complex hierarchy of outside parties, grows ever more vital. Talk with our experts about overcoming the challenges of securing access management in the extended enterprise, and how to control the Identity of Things.
Data & Technology session
The increasing number of connected devices massively increases the vulnerability of a corporate network. Join this stream to learn best practices for managing security processes in the Internet of Things, prepare for the challenges of data management in the light of new regulations (especially the GDPR), and how data analytics can be used to monitor for attacks.
Certified Penetration Testing Engineer at Metrix Cloud LTD
Ethical hacking | Cyber security | Social engineering | Hacking | Vulnerabilities