News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS18 - Dissecting Blockchain for the Practical Application to Identity
#IMOS18 - Dissecting Blockchain for the Practical Application to Identity
Webinar
19:45 —
20:15, 12 September 2018
Speakers
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Damian Starosielsky
CTO and Co-Founder, Evident ID
Why Not Watch?
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
21:45 —
22:15, 12 September 2018
#IMOS18 - CISO Interview; Paul Watts, Dominos
11:45 —
12:15, 11 September 2018
#IMOS18 - Time to Stop Blaming the User: Making Security Usable
20:30 —
21:30, 12 September 2018
#IMOS18 - CISO Interview; Heath Renfrow, Leo Cybersecurity
18:15 —
18:45, 12 September 2018
You may also like
Keeping Your Crypto Wallet Safe
Next-Gen
3 August 2020
Blockchain Startups Move From Coin Offerings to Investment for Funding
News
30 April 2020
Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable
Opinion
16 July 2018
Let's Steal a Coin
Next-Gen
2 July 2018
Cryptocurrency Hacking Raises Threats of Financial Vulnerability
Opinion
26 March 2018
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Malware Discovered in 19 Visual Studio Code Extensions
News
11 December 2025
1
Google Releases Critical Chrome Security Update to Address Three Zero-Days
News
11 December 2025
2
Pro-Russia Hackers Target US Critical Infrastructure in New Wave
News
10 December 2025
3
Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025
News
10 December 2025
4
UK NCSC Raises Alarms Over Prompt Injection Attacks
News
9 December 2025
5
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
6
Gartner Calls For Pause on AI Browser Use
News
9 December 2025
1
China-Linked Warp Panda Targets North American Firms in Espionage Campaign
News
5 December 2025
2
Hacker-Tested, Security-Leader Approved: Five Steps to Stop Modern Fraud
Opinion
5 December 2025
3
React2Shell Under Active Exploitation by China-Nexus Hackers
News
8 December 2025
4
Pro-Russia Hackers Target US Critical Infrastructure in New Wave
News
10 December 2025
5
Log4Shell Downloaded 40 Million Times in 2025
News
10 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
2
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
3
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
4
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
5
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6