Economic uncertainties and technological advancements are transforming the cybersecurity landscape. The recent breaches and the use of automation and AI by adversaries have intensified the need for robust security measures, said Alberto Yépez, co-founder and managing director of Forgepoint Capital.
AI's integration into cybersecurity demands a strong foundational approach. Many companies seek advanced AI solutions but struggle with basic cybersecurity practices such as managing assets and patching vulnerabilities, said Michael Thiessmeier, executive director of U.S. NAIC-ISAO.
Illegal gambling operations depend on trafficked individuals to perform cybercriminal activities. Threat researchers at Infoblox explain how cybercriminals use trafficked people for operations such as pig-butchering scams and leverage European sports sponsorships to boost illegal gambling websites.
Maricopa County CISO Lester Godsey highlights the growing threat of misinformation and its impact on election security. He explains how his team is integrating cybersecurity frameworks to address both digital and physical risks, focusing on disinformation campaigns and election integrity.
RedSense's Yelisey Bohuslavskiy and Marley Smith believe ransomware is declining but caution that it still poses a significant threat. While attackers recycle old methods, they're taking desperate measures to target vulnerable groups such as cancer centers and to stoke fears in the marketplace.
Accenture Global Cyber Resilience Lead Robert Boyce outlines why organizations must assess the stability of ransomware groups before deciding how to respond to extortion threats. He outlines how trustworthiness of ransomware gangs can affect the likelihood of receiving decryption keys after payment.
Thijs Alkemade, security researcher at Computest Sector 7, discusses significant vulnerabilities in electric vehicle chargers. His findings highlight how attackers can exploit these flaws to remotely execute code, posing severe risks to EV infrastructure.
Shachar Menashe, senior director of security research at JFrog, discusses critical security risks in MLOps platforms - including code execution vulnerabilities in machine learning models - and why organizations must treat ML models as potentially malicious code to mitigate these inherent risks.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The ability to create real-time deepfakes of trusted figures has transformed the landscape of corporate security threats. Brandon Kovacs, senior red team consultant at Bishop Fox, details how attackers can now clone voices and video in real-time, enabling new forms of social engineering and fraud.
Europe faces unprecedented security challenges as organizations embrace digital change. That's why ENISA is focusing on critical areas to bolster Europe's digital defenses - supporting member states by enhancing their cybersecurity programs through legislation, exercises and comprehensive reports.
The SolarWinds case has redefined cybersecurity disclosure obligations, especially for chief information security officers. The SEC's novel theories in this case have set a precedent for how organizations must present their cybersecurity practices, said Jennifer Lee, partner at Jenner & Block.
Hardware security remains a critical concern for IoT and embedded devices. NCC Group's Alex Plaskett, security researcher, and Robert Herrera, senior security consultant, discuss critical vulnerabilities in Sonos devices and best practices for safeguarding hardware and software.
Brandon Pugh of R Street Institute discusses Congress' struggle to balance AI innovation and regulation, the U.S. approach compared to the EU, and the urgent need for privacy laws to protect AI-driven data. He emphasizes education on AI technologies and the ongoing challenge of defining key terms.
The security of a large enterprise starts at the top, but members of the C-suite often have conflicting priorities and a lack of understanding about the role their part of the organization plays in keeping the business running, said Theresa Lanowitz, chief evangelist at LevelBlue.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.