Forrester senior analyst Tope Olufon discusses how CISOs face the challenge of shadow IT with generative AI. CISOs need to approach AI as they would any other technology, he says. "Create a threat model, not just based on best practices, but for your organization, and then build security for that."
The ransomware industry has matured. Tim West, director of threat intelligence at WithSecure, warned about the modern ransomware ecosystem, which features an established marketplace of tools and services that can be used in ransomware attacks, and how it has lowered the bar for attackers.
Adi Bleih and Daniel Pigeon of Cyberint discuss the evolution of cyber operations in recent conflicts, the rise of hacktivist groups, the targeting of critical infrastructure and supply chains and the need for new defense strategies.
William Wright, CEO of Closed Door Security, shares the significance of enabling SMB signing to prevent NTLM relay attacks, a common vector exploited by ransomware groups. He also shared mitigation strategies identified during penetration testing with various organizations.
Ransomware tactics have shifted. Martin Zugec, technical solutions director at Bitdefender, discusses the evolution of ransomware threats. Zugec points out that attackers have moved to opportunistic targeting and details the rise of automation in initial compromises.
Jon France, CISO at ISC2, outlines how CISSP certification has adapted over 30 years, emphasizing its critical role in cybersecurity. He explains the changing responsibilities of CISOs, who must now integrate business acumen with technical expertise.
Healthcare organizations are particularly vulnerable to ransomware, risking significant data loss. Steve Stone, head of Rubrik's Zero Labs, outlines why healthcare faces higher risks and how organizations can strengthen their defenses against these disruptive threats.
The CyberEdBoard will host a panel discussion on June 26 that will explore the cybersecurity complexities in the financial services sector, highlighting the industry's unique security concerns, emerging threats, regulatory requirements and operational challenges.
Christiaan Beek of Rapid7 reveals alarming trends in zero-day exploits, especially against network appliances. The financial rewards of ransomware are enabling threat actors to buy zero-days. He urges firms to enhance detection and patching strategies.
Security leadership has evolved significantly in recent years, moving beyond technical expertise to strategic partnerships within organizations. Security professionals now articulate business value and align with organizational objectives, said Paul Watts of Information Security Forum.
Implementing governance, risk and compliance in a global organization comes with challenges. The complexity increases with sophisticated cyberthreats and an evolving geopolitical landscape. Organizations must stay one step ahead, said Purvi Kay, head of cybersecurity GRC at BAE Systems.
Cybercriminal campaigns aided by generative AI and political misinformation campaigns by nation states are just two of the latest risks organizations are facing. That's why cyber risk management has become a focal point for CISOs, said Jon Clay, vice president of threat intelligence, Trend Micro.
The increasingly regulated landscape of cybersecurity is changing across Europe, America and Asia. Rohan Massey, partner at Ropes & Gray, speaks about the complexities organizations face and the importance of strategic prioritization to comply with regulatory challenges effectively.
The latest ransomware attack that led to pathology service outages at multiple London hospitals underscores the need for more robust healthcare sector security and resilience measures, including threat hunting, said Andrew Cooke, director of information security services at Acacium Group.
Third-party vendors should be supervised rigorously to prevent data breaches and ensure transparency across all organizational levels, according to Jonathan Armstrong, partner, Punter Southall Law. CISOs have to educate their boards on systemic risks, he said.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.