"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? Join this session to hear our expert offer:
The latest research on insider...
This session looks at two real-life case studies, with different outcomes from the same initial starting point for two companies. The first led to £140k loss due to malicious invoicing; the second led to data exfiltration and reputational damage (as well as ICO reporting due to GDPR).
Malicious actors use common...
This lively, hard-hitting and engaging one-hour workshop is full of practical examples for staff at all levels, offering valuable tips for safe online behavior at work and at home to reduce data breach risks and avoid reputational harm.
Our presenter is Mark Johnson, a seasoned former military intelligence officer,...
In the modern age of technology, in which both organizations and individuals have embraced the wired world, we have also evolved and accepted the "unknown unknown" risk of the corporate and individual subliminal digital footprint, which is open to exploitation, leading to the potential compromise of the end target. It...
Smart buildings utilize a wide range of technology - everything from fire alarms to thermostats to CCTV cameras. Traditionally, all these technologies have been separated by the types of cables and management station, but now with advances in IoT, many of these technologies have converged onto the corporate network....
In this presentation, hear about the recent history and the future of technology and consumer patterns and drivers. This session explores the continued proliferation of social media, IoT and artificial intelligence and the implications of this technology. The huge rise in cybercrime and fraud highlights the challenges...
Opening session sets the tone for the Summit with an overview of key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
Emerging threats
IoT vulnerabilities
How defenders and defenses must adapt
Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify...
The U.K.'s National Cyber Security Center incident response teams have investigated more than 1,000 significant incidents in the past two years, the majority of which trace to nation-state attackers, officials say.
Building Security in Maturity Model, BSIMM: What is it and How Your Organization Can Leverage the Data
Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts...
Several days after the Port of San Diego was hit by a crypto-locking ransomware attack, incident response efforts remain underway and many port systems remain offline. Port officials say the attacker has demanded a ransom, payable in bitcoin, for the promise of a decryption key.
Online retailer Newegg is investigating a malware attack that may have stolen customers' payment card details for more than a month. Security firms have traced the heist to Magecart, a loose affiliation of cybercrime gangs also tied to payment card data breaches at British Airways and Ticketmaster.
How product managers conceive, develop, and market products and services is a defining quality of the technology industry. Indeed, PMs have an outsized responsibility for success of today's SaaS apps and other digital businesses. Their challenging role requires an unusual set of technical, strategic, organizational,...
Explore the state of DDoS attacks as observed by network and security professionals directly responsible for operating and securing global networks. This session covers a range of issues from threat detection and IR to managed services and staffing . Hear about the daily operational challenges, as well as strategies...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.