A major Australian broadcaster recently was hit by ransomware – just the latest strike against organizations of all sizes and sectors. The trend is clear: Attacks are only becoming more common and brazen. Does this call for a different type of defense or response?
Briefly, this presentation discussed the emerging threats of different types of disruptionware attacks and potential defenses to protect yourself. We will discuss may of the tools that make up the disruptionware tool kit and how these tools work. We will also talk about how disruptionware attacks work and their...
New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only...
In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner. That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and...
If there's anything we've learned over the course of the pandemic, it's that cyber criminals are eager to exploit current events to advance their goals. Over the course of this session we will look at some of the trends that have emerged over the past year with malicious campaigns related to the headlines of the day.
As a U.S. Congresswoman, Rep. Robin Kelly of Illinois was the main force behind the bipartisan IoT Cybersecurity Improvement Act, which was signed into law late last year. The law addresses the supply chain risk to the federal government stemming from insecure IoT devices by establishing minimum security requirements...
The old risk models no longer work. Today you have employees permanently assigned to home offices, under stress, in conditions that are ripe for malicious insiders who want to cause harm, as well as well-intentioned employees who make costly mistakes. How do you mitigate your new insider risks? Join this panel for a...
The shift towards DevOps makes it clear that organizations are adopting this model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements,...
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Part of the...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:
The state of connected device security
Where the cybersecurity needle is...
IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature...
Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:
Archaic engineering principals
Threat modeling
Education...
From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.
Join this expert panel for a discussion about understanding and remediating the risks from connected devices,...
By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.