Browse Event Presentations
![]() | Building a More Secure Cloud Architecture |
![]() | SSL/TLS Then and Now - Joe Dietz |
![]() | A Hackers Perspective, where do we go from here - Chris Roberts |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling - Andreas Könen |
![]() | Digital Transformation Requires Security Transformation - Neil Thacker |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market - Dr. Udo Helmbrecht Organisations, manufacturers or providers involved in the design and development of ICT products, ICT services or ICT processes should be encouraged to imple... Request to download |
![]() | Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx |
![]() | What’s up with data breach notifications under the GDPR - Dorotea Alessandra De Marco |
![]() | Microservice Programming, the New Era - Vrettos Moulos |
![]() | The European Cloud Certification Scheme: Forward Together - Prof. William Ochs |
![]() | How to scale Vendor Security Management - Jenny Gershkovich |
![]() | Taking Control of IoT: An Enterprise Perspective - Hillary Baron |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment - Michael Jamrosy |
![]() | Works councils, your best friends (really!) - Mark Wijnhoven |
![]() | The Community Draft of the Revised C5 - Dr. Patrick Grete |
![]() | 7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito |
![]() | CSA Security Trust Assurance and Risk (STAR) - Daniele Catteddu |
![]() | Cloud computing security in the NIS Directive - Dr. Marnix Dekker |
![]() | Defying the Greatest Cloud Security Myths - Dr. Carlo Gebhardt |
![]() | Transitioning, Enhancing, and Innovating in the Cloud - John Yeoh |