Cybersecurity Innovation Night 2018 - Machine Learning & Deep Learning for Secure Future Dec 20, 2018
Martin Kuppinger - User Behaviour: The Link between CyberSecurity and Identity Management Dec 18, 2018
Dr. Frank Dudek - Accelerating Cybersecurity – Is Your Information Security Program Up to Speed? Dec 18, 2018
Dr. Michael von der Horst - The Current Threat Landscape: A 360° View and Effective Remediation Strategies Dec 18, 2018
Dragan Pendic - Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional Dec 18, 2018
Martin Kuppinger - User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right? Dec 18, 2018
Gal Helemski - How a Policy Based Approach Dramatically Improved Access Control and Authorization Dec 18, 2018
Peter Gyongyosi - Can You Trust UBA? -- Evaluating Machine Learning Algorithms in Practice Dec 18, 2018
Alexei Balaganski - The Sorry State of Consumer IoT Security and How Can We Possibly Fix it Dec 18, 2018
Peter Dornheim - Build Up a Security Operation Center and Provide Added-Value to Business Operations Dec 18, 2018
Mans Hakansson - Beyond OAuth: Securing APIs with Policies & Attribute-Based Access Control Dec 18, 2018
Tom Hofmann - Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect Dec 18, 2018
H. Huetter, B. Peeters and D. Roeper - Managing Complexity in a CIAM Migration Project - A Case Study of th... Dec 18, 2018
Dr. Rachel Suissa - Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber L... Dec 18, 2018