5G - New Risks, New Solutions
Over the past decade, IoT has revolutionized the world and it will continue to do so even more with the introduction of 5G technology to the market. The rise of 5G is expected to lead to more sophisticated devices and a wider range of services, drastically changing the reach of IoT and fundamentally changing the communications industry. Join this session to learn about the new risks and solutions the 5G technology will bring, mainly in the communications sector.
Finance in the IT Era
The banking and financial sector is at the forefront of cyberspace. Cyber technologies allow the financial sector to improve operational effectiveness, efficiency and service, while sharing information worldwide. However, the banking and financial sector faces increasing threats. Financial institutes may lose not only money but more importantly, their reputation as they fail to protect the privacy of their customers. Join this special event to analyze the roles and responsibilities of financial institutes and stakeholders when it comes to technology adoption, cybersecurity, and possible cyber incidents.
Cyber Influence (Intelligence, Elections, Deep-fake)
This session will explore the available technology in exert influence over citizens citizens while allowing foreign actors to engage in cyber espionage and collect intelligence. The session will also cover the ways in which deepfake technology causes confusion spreads disinformation, especially in the context of global politics, yet may be extremely hard to detect. Political parties and election processes themselves are increasingly vulnerable to local and foreign hacking. This session will provide examples of protocols and initiatives established by countries around in order to deal with cyber challenges affecting cyber intelligence.
When the Reporters Become the Story: Media’s Protagonist role in Cybersecurity
Large media organizations are not immune to cyber attacks. The sector itself can serve as a vector for launching attacks, due to the large number of people who use its services. This session will explore the ways in which enterprises can protect their data and IP, fight against hacks that manipulate news sources and have the ability to spread misinformation, propaganda and influence public opinion. It will also explore social engineer hacks and phishing schemes that prompt users to hand over sensitive information.
Cyber for Retail
Retailers are boosting sales and improving customer satisfaction with data-driven technology to optimize purchases while offering additional services (such as healthcare and pharmacy that require sensitive data collection). Retailers have developed e-commerce platforms and websites, mobile applications, and rely on online payment technologies, which are all assets vulnerable to cyberattacks. This session will discuss the particularities of the retail industry (including: inside threats, outsourcing to third parties, point of sale system vulnerabilities, payment cards, etc.), and will address new approaches for retailers in the cyber era.
Give Healthcare a Fighting Chance: Cyber Security for Healthcare & Pharmaceuticals
Cyber threats to the healthcare industry are not just hypothetical anymore. The rapid technology adoption by the healthcare industry, adding to the outdated legacy systems run by most entities and the human risk factor, make hospitals and other health organizations vulnerable to cyber attacks. Ransomware, DDos attacks, phishing, and medjacking, are some of the examples of cyberattacks suffered by the healthcare industry in the last few years, and it is evident that the number will increase. Consequences on the pharmaceutical industry range from stolen IP, interruption of clinical trials, litigation and lost revenue. Join this session to review the top cyberattacks suffered by healthcare entities, learn from them, and discuss ways of mitigating the risk.
Cyber on the Move: Cybercrime, Challenges and Opportunities for Transportation
The transportation industry is increasingly susceptible to cybercrime. The digitization of logistics information, internet-based operational processes, outdated technological systems, and a heavily dispersed mobile workforce create optimal conditions for cybercriminals. In this session, hear from industry experts on the ways in which companies big and small can protect themselves from critical business risks and explore the opportunities and challenges in this new era of transportation and logistics.
Internet connectivity has changed the way critical infrastructure is controlled and secured. Operations now rely on their interaction with the information technology department to work efficiently, making integration and convergence, the key to success. Therefore, nowadays the Operation Technology (OT) and Information Technology (IT) are seen working hand-to-hand to secure critical infrastructures and essential business processes, despite their vast differences. This session will explore the differences when securing OT and IT domains, and address the role of awareness, education and training when preventing insider threat.