Log in to bookmark your favorites and sync them to your phone or calendar.
Welcome from the C...
THE QUESTION IS NO LONGER IF, BUT WHEN WE... 09:10 - 09:50
KEYNOTE PANEL: WHERE IS THE MARI... 09:50 - 10:20
CASE STUDY: DEVELOPING GREATER CYBER RESIL... 10:20 - 11:00
NETWORKING COFFEE AND TEA 11:00 - 11:30
PROJECT SAURON: SCALABLE MULTIDIMENSIONAL... 11:30 - 12:10
PANEL: ADDRESSING THE RISK OF INTEGRATING... 12:10 - 12:50
NETWORKING LUNCH 12:50 - 13:50
THE NIS DIRECTIVE AND CYBERSECURITY IN MAR... 13:50 - 14:30
INTERPRETING EU AND IMO MARITIME CYBER SEC... 14:30 - 15:10
NETWORKING COFFEE AND TEA 15:10 - 15:40
CYBER SECURITY ACROSS THE MARITI... 15:40 - 16:10
CYBERSECURITY CHALLENGES FROM A SHIP MANAG... 16:10 - 16:50
PANEL: UNPACKING CYBER SECURITY STANDARDIZ... 16:50 - 17:30
End of Day One
WELCOME BACK FROM...
THREAT DETECTION IN THE CHANGING... 09:10 - 09:40
GPS VULNERABILITY MASTERCLASS 09:40 - 10:10
SECURING THE MARITIME SECTOR 10:10 - 10:40
PANEL: SUPPLY CHAIN CYBER SECURI... 10:40 - 11:10
NETWORKING COFFEE AND TEA 11:10 - 11:40
Presentation from the NCSC 11:40 - 12:10
CASE STUDY: CYBER SECURITY AND T... 12:10 - 12:40
"THE HUMAN ELEMENT” - THE CRITIC... 12:40 - 13:10
NETWORKING LUNCH 13:10 - 14:10
DECISION SUPPORT FOR CYBER SECUR... 14:10 - 14:40
CYBER RISK MANAGEMENT AND TRANSF... 14:40 - 15:10
PANEL: THE CYBER RISK FOR INSURA... 15:10 - 15:40
NETWORKING COFFEE AND TEA 15:40 - 16:10
DEVELOPING A GLOBAL SYSTEM FOR A... 16:10 - 16:40
SPACE INVADERS – TRACKING, TARGE... 16:40 - 17:10
End of Conference