The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
The modern digital economy is built on a foundation of trust, which is becoming increasingly more fragile and vulnerable to risks that we are just starting to understand. Digital technologies are a force for progress. Yet, they are also a source of distrust in the very technology that is intended to drive that...
According to the 2019 Cyberthreat Defense Report, nearly eight out of 10 organizations were victims of at least one successful cyberattack in 2018.
While corporate strategies around digital transformation are driving measurable business outcomes, they are - at the same time - creating new security risks through the...
Creating effective strategies for securing digital India's assets is challenging. For example, the growth of the cashless economy and increase in digital transactions have made consumers' data more vulnerable to cyberattacks, creating a more urgent need to protect digital assets.
This session discusses:
The...
To meet India's ambitious goal of growing the cybersecurity market as much as $35 billion and creating 1 million new jobs by 2025, academia need to play a critical role. Various stream of dimensions and disruptive technologies such as IoT, 5G, blockchain and issues around privacy has a huge impact on information...
Digitization across sectors has led to data proliferation, and organizations are struggling to handle the sheer volume of data. The abundance of valuable information has captured the attention of subversive elements, while cybercriminals have breached networks and compromised billions of records, not only causing...
This session features a dialogue among a CISO, a CIO and a CTO on the challenges they face in executing large projects where security becomes a business enabler. How can the security team navigate and negotiate to gain buy-in from senior executives in all departments? This panel will address the cross-functional...
Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
Emerging threats
IoT vulnerabilities
How defenders and defenses must adapt
In this exclusive one-on-one discussion, we will hear from Chris Calvert, Co-Founder and Product VP for Respond Software, to get his insights on:
Is AI falling short?
How do we successfully balance human and machine approaches to security?
How do we get on the right path?
For the Nation to survive and flourish in the 21st century, where hostile actors in cyberspace are assumed and technology will continue to dominate every aspect of our lives, we must develop trustworthy, secure systems that are cyber resilient. Cyber resilient systems are systems that have security measures or...
The new 5G mobile networks are coming, and with them comes the promise of people, industries and things connecting on an unprecedented scale. And also with 5G come significant security concerns about secure infrastructure, connected devices and a new multifaceted attack surface. Telecommunications giant Huawei is one...
Whether you're a large enterprise that has experienced a headline data breach or a midmarket organization that has just been paralyzed by ransomware, you share points in common. Which law enforcement agency do I call after the incident has been discovered? When do I involve legal counsel? What resources are available...
In today's digital environment, protecting sensitive information and sales transaction data is of critical importance. Tim Horton of First Data explains the concept of "devaluing" data so it's worthless in the event of a breach.
"Zero trust" is arguably the cybersecurity buzzword of 2019, but what exactly is it? Is it a tool? Is it a capability? Is it a philosophical journey with no endpoint? Or is it all of the above?
In this exclusive fireside chat, Jack Koons, Chief Cybersecurity Evangelist at Unisys Corporation, will draw upon his...
Ongoing digital transformation has disrupted security teams. While they are busy securing both legacy and new infrastructure, they're also facing evolving, large-scale cyber attacks. For many security teams, this may have caused a dip in confidence, which isn't necessarily appreciated by the wider business.
Nominet...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.