The threat landscape has changed tremendously. What are the major threats impacting enterprises globally? What are some significant changes and challenges cybersecurity leaders face? IS it good to depend on AI and ML for every problem?
This session will discuss:
How to evaluate a good feed
How to set the right...
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as...
Did you know that 80% of CISOs say that software projects have been hindered by concerns over inevitable security issues? Vulnerabilities don’t need to slow you down. Join HackerOne for a discussion on "Why the future of DevOps Needs Hackers."
In this session, you’ll learn:
How organizations collaborate with...
A major Australian broadcaster recently was hit by ransomware – just the latest strike against organizations of all sizes and sectors. The trend is clear: Attacks are only becoming more common and brazen. Does this call for a different type of defense or response?
Briefly, this presentation discussed the emerging threats of different types of disruptionware attacks and potential defenses to protect yourself. We will discuss may of the tools that make up the disruptionware tool kit and how these tools work. We will also talk about how disruptionware attacks work and their...
New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only...
In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner. That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and...
As a U.S. Congresswoman, Rep. Robin Kelly of Illinois was the main force behind the bipartisan IoT Cybersecurity Improvement Act, which was signed into law late last year. The law addresses the supply chain risk to the federal government stemming from insecure IoT devices by establishing minimum security requirements...
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Part of the...
The shift towards DevOps makes it clear that organizations are adopting this model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements,...
The old risk models no longer work. Today you have employees permanently assigned to home offices, under stress, in conditions that are ripe for malicious insiders who want to cause harm, as well as well-intentioned employees who make costly mistakes. How do you mitigate your new insider risks? Join this panel for a...
If there's anything we've learned over the course of the pandemic, it's that cyber criminals are eager to exploit current events to advance their goals. Over the course of this session we will look at some of the trends that have emerged over the past year with malicious campaigns related to the headlines of the day.
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:
The state of connected device security
Where the cybersecurity needle is...
Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:
Archaic engineering principals
Threat modeling
Education...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.