Browse Event Presentations
Caterpillar in the Cloud | |
Blockchain Evolution | |
Rethinking Application Security for Cloud Deployments | |
Building a More Secure Cloud Architecture | |
SSL/TLS Then and Now - Joe Dietz | |
A Hackers Perspective, where do we go from here - Chris Roberts | |
Transitioning, Enhancing, and Innovating in the Cloud - John Yeoh | |
Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling - Andreas Könen | |
Digital Transformation Requires Security Transformation - Neil Thacker | |
How Cybersecurity Certification can Foster the EU Cybersecurity Market - Dr. Udo Helmbrecht Organisations, manufacturers or providers involved in the design and development of ICT products, ICT services or ICT processes should be encouraged to imple... Request to download | |
Taking Control of IoT: An Enterprise Perspective - Hillary Baron | |
Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx | |
What’s up with data breach notifications under the GDPR - Dorotea Alessandra De Marco | |
Works councils, your best friends (really!) - Mark Wijnhoven | |
Microservice Programming, the New Era - Vrettos Moulos | |
The European Cloud Certification Scheme: Forward Together - Prof. William Ochs | |
Leveraging Automation to Achieve Security in a Multi-Cloud Environment - Michael Jamrosy | |
How to scale Vendor Security Management - Jenny Gershkovich | |
The Community Draft of the Revised C5 - Dr. Patrick Grete | |
7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito |