How to Hack a Bank, London, UK, June 8, 2016

From the first phishing email to the complete compromise of an organisation's IT infrastructure, this talk is based on controlled attacks performed on organisations and highlights the ever increasing need for technical security controls and awareness.

Go to the profile of IET Events
Jun 08, 2016
0
0
Upvote 0 Comment

From the first phishing email to the complete compromise of an organisation's IT infrastructure, this talk is based on controlled attacks performed on organisations and highlights the ever increasing need for technical security controls and awareness.


Date and Time


08 June 2016 - 18:00-20:30

Location

London, United Kingdom - London - IET London: Savoy Place icon_popup (See map)

Organiser

Organised by the UK - London local network.

About this event

This lecture will unveil how the exploitation of technologies, processes and people contribute to successfully gaining persistent access to an organisation's network. From the first phishing email to the complete compromise of an organisation's IT infrastructure, this talk is based on controlled attacks performed on organisations (largely financial) and highlights the ever increasing need for technical security controls and security awareness. Why are monitoring solutions failing? When do incorrect assumptions result in the compromise of a network?

Both technical and non-technical content will be covered and should be suitable for all audiences. The lecture will be followed by a networking reception open to all.

About the speakers

Julian Storr and David Cash are senior and principal consultants at NCC Group. Julian has a degree in “Ethical Hacking and Countermeasures” and both hold numerous additional “hacking” qualifications including CCT (Crest Certified Tester), CCSAS (Crest Certified Simulated Attack Specialist) and CCSAM (Crest Certified Simulated Attack Manager), the latter two designed for realistic simulated attacks. NCC Group frequently undertake work for both Government and financial sector clients.

Programme

18:00 Registration starts

18:30 Lecture begins

19:30 Q&A

20:00 Networking reception

Reasons to attend


To learn about controlled cyber attacks performed on organisation’s IT systems and identify ways to overcome these.

Continuing Professional Development

CPD logo declaring this event can contribute 1 hours towards your Continuing Professional Development


This event can contribute towards your Continuing Professional Development (CPD) as part of the IET's CPD monitoring scheme.

Go to the profile of IET Events

IET Events

Cyber security events, The Institute of Engineering and Technology

Delivering premium content across a broad range of subjects, IET events deliver insight and debate into the hot topics affecting engineers and technicians across the globe. Featuring first class speakers, hand-picked for their expertise and industry knowledge, our annual range of over 1200 seminars, conferences, technical visits, courses, lectures and webcasts are guaranteed to both challenge and inspire.

No comments yet.