As digital business transformation pervades the enterprise and “digital” becomes essential to get every job done, security and risk leaders must become the change agent driving secure digital transformation. No longer focused solely on defense, the security organization becomes a proactive business partner, anticipating and managing security risks in pursuit of enterprise excellence. Gartner Security & Risk Management Summit helps security and risk management leaders and practitioners to continuously improve the flexibility and responsiveness of … More
The rapid digitalization of the manufacturing sector has left our organizations open to an increasing number of attacks. Manufacturers have become the top targeted industry by cyberattackers in Europe, with ransomware attacks on industrial infrastructure doubling in 2023. These cyber threats have led our organizations to face an expanded attack surface caused by increased connectivity, with both state sponsored actors and criminal gangs responsible, with attacks heightened in light of Russia’s invasion of Ukraine. Consequently, … More
The conference aims to bring together 500+ pre-qualified CISOs, CIOs, heads of cybersecurity, digital transformation, IT infrastructure, information and communication technologies, and other experts in this domain to discuss the potential and recent trends of cybersecurity. This summit will feature keynote presentations and panel discussions with top security experts from various industries covering a range of topics, including cybersecurity innovations, data privacy & security, risk management, network security, threat detection & intelligence, and vulnerability management.
BSidesZagreb is a free, non-profit, community-driven conference for information security experts and enthusiasts to meet, share ideas and collaborate. Topics of interest include the following (but are in no way limited to), preference given to talks that provide solutions as well as insights into problems: Defensive and offensive security and advanced methods Application and Web security Governance Cryptography and Cryptanalysis Incident Response and Forensics Data Privacy and Law Cyber Warfare, Botnets and advanced Cyber-Munitions Physical … More
In a world where the traditional corporate network perimeter has become obsolete — the identity infrastructure has become the new battleground for bad actors. Identity and access management (IAM) models that rely on legacy approaches to manage identities of users and machines across growing lists of applications and environments have become complex and ill-equipped to adapt to changing needs of business and technological advancements. Security leaders must evolve their IAM toward an identity-first approach that … More
This fully in-person summit will offer a platform for up to 750 security and privacy professionals from around the world to discuss important issues on how we securely live, work, and play as the move to digital platforms accelerates. Through riveting keynote sessions, interactive workshops, and collaborative panels, this event promises to unravel the complexities, challenges, and opportunities that define our digital age.
SO-CON 2024 is a one-day summit followed by adversary and fundamentals training courses. Attendees will get to: Explore new approaches, tools, and techniques to combat identity-based attack paths. Discover the latest trends, research from frontline practitioners, case studies and firsthand experiences. Gain in-depth knowledge into how to attack, defend, and harden enterprise environments against advanced threat actors from our in-the-field experts. Connect in-person on the latest in the industry. Immerse yourself in interactive sessions, gain … More
EU Cyber Acts Conference will showcase a series of discussions, interactive workshops, and networking opportunities that will help participants prepare for developing new cybersecurity frameworks and market fragmentation across borders. Panels: Cybersecurity professionals and thought leaders will engage in panel discussions on emerging cyber threats, technological advancements, and the role of international collaboration in mitigating cyber risks. Workshops: Attendees will be able to participate in hands-on workshops, gaining insights into the latest cybersecurity tools, techniques, … More
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety. Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. This directive supersedes Homeland Security Presidential Directive 7. … More
Develop in-demand cybersecurity skills in technical Trainings taught by expert instructors from around the world. From infrastructure hacking to mobile application hacking, there’s a course for individuals of all experience levels. Black Hat Trainings span a range of technical topics, offering opportunities for beginner to advanced practitioners to up their skillset.
Since its inception in 2017, Cybertech Latin America has been the conduit connecting the region’s foremost cyber, business, and innovation ecosystems. This event, held in collaboration with the Embassy of Israel in Panama, the City of Knowledge, SENACYT, AIG, and other esteemed regional partners, is your gateway to an exclusive gathering. You’ll find government officials, industry luminaries, scholars, established corporations, and dynamic startups under one roof. What sets Cybertech Latin America apart is its unique … More
In today’s interconnected and rapidly evolving digital landscape, cybersecurity resilience underscores the critical importance of adapting and fortifying your business defenses against an array of cyber threats. As our reliance on technology deepens, organizations and cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware. Gartner Security & Risk Management Summit brings together experts, thought leaders and innovators to explore the evolving landscape of digital … More
- Microsoft begins broadening free cloud logging capabilities
- Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708)
- A step-by-step plan for safe use of GenAI models for software development
- Wire fraud scams escalate in real estate deals
- VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)