Las amenazas que supone el trabajo híbrido para los datos corporativos
Speaker Corner 1
15m
PLACE OF CELEBRATION
Speaker Corner 1
DURATION
15m
DESCRIPTION
Sponsor: SealPath
Oficina Técnica de Ciberseguridad y Cumplimiento: cobertura normativa y de regulación integral
Speaker Corner 3
15m
PLACE OF CELEBRATION
Speaker Corner 3
DURATION
15m
DESCRIPTION
Sponsor: ISECauditors
Ingram Micro
Speaker Corner 2
15m
PLACE OF CELEBRATION
Speaker Corner 2
DURATION
15m
DESCRIPTION
Sponsor: Ingram Micro
Cómo eliminar el fraude de identidad para siempre
Speaker Corner 1
15m
PLACE OF CELEBRATION
Speaker Corner 1
DURATION
15m
DESCRIPTION
Sponsor: VU
Redefiniendo el SOC. Nuevos retos para la protección de las empresas.
Speaker Corner 3
15m
PLACE OF CELEBRATION
Speaker Corner 3
DURATION
15m
DESCRIPTION
Sponsor: Sofistic
Avanzando en el modelo de Seguridad Gestionada: del SIEM as a Service al CSIRT as a Service soportado sobre IBM QRadar
Speaker Corner 2
15m
PLACE OF CELEBRATION
Speaker Corner 2
DURATION
15m
DESCRIPTION
Sponsor: Nologin
Mejorando capacidades con ejercicios de simulación de respuesta a incidentes
Speaker Corner 1
15m
PLACE OF CELEBRATION
Speaker Corner 1
DURATION
15m
DESCRIPTION
Sponsor: BASE4 Security España SL
Adapting security to the threats of SMEs
Speaker Corner 3
15m
PLACE OF CELEBRATION
Speaker Corner 3
DURATION
15m
DESCRIPTION
Sponsor: CYBERGUARDIAN
360 security of digital certificates
Speaker Corner 2
15m
PLACE OF CELEBRATION
Speaker Corner 2
DURATION
15m
DESCRIPTION
Sponsor: Redtrust a Keyfactor company
Work From Anywhere
Speaker Corner 1
15m
PLACE OF CELEBRATION
Speaker Corner 1
DURATION
15m
DESCRIPTION
Sponsor: Fortinet