In this new era of threat, sophisticated cyber-attacks are getting harder to detect. This presentation will explain Darktrace’s new approach to cyber defense, inspired by the human immune system. The Enterprise Immune System is unique in its ability to detect emerging cyber threat in real time, within the network. Darktraces self-learning technology learns normal and abnormal behaviors of individuals and devices within an enterprise, in order to detect anomalous and potentially threatening events.
From Sopra Steria (35000 people, 20 countries) knowledge and day-to-day surveillance from its cybersecurity datacentres, cyber-risks are amplifying. Cyber-threats (mainly Advanced Data leakage) are increasing including new type of risks such as data destruction and ransomware approach. APT1 report, Aaramco and last Davos 2015 report illustrate this situation.
Breaches like the ones at Target in US and South Korean banks have proven that simply passing a PCI audit doesn't mean customer data cannot be compromised. Being compliant is important, but it's not enough to mitigate probable attacks and protect critical information. Organizations need to focus on securing the business first, then documenting the process to prove compliance, not the other way around. In order for organizations to move from a compliance-focused to a risk-focused security program, they need to think like an attacker (not an auditor) and understand the threat landscape.
Get a critical insight on how some of the major data centres safe-keep, audit and manage their data security through the deployment of key management system. Gain firsthand clarity on how you can increase security access by integrating the electronic key management system to building management system thereby preventing keys being brought out of the data centres. Find out also how interoperability of different application systems can be enhanced with the seamless integration of our system with third party access systems.
The ISF has published a report about the experiences of several ISF members related to awareness campaign. InfoSecure has developed answers to most of the problems and bad experiences that are found during ISF survey. Wilbert Pynenburg will summarise the ISF learnings and explain the best practises for a successful awareness campaign in big organizations.
Due to mass usage of mobile telephony all across the globe mobile networks have become nation critical infrastructure. The loss of communication can lead to numerous events. On the other hand the information gathered from these networks can provide new insight in traffic and densities. The LIMA Protect product suite provides solutions to cover situations like high profile events, disasters and border control.
Many incident response (IR) professionals in security operation centers (SOCs) are faced with challenges to make sense out of a high volume of alerts and work flow processes. Many organisations are plagued with lack of resources and IR professionals. Given the ever-increasing number and complexity of cyber threats, how do IR pros achieve their goal of responding to ‘every’ alert in today’s world of continuous compromise?
Mr Steve Ingram will be introducing the Global State of Information Security Survey (GSISS) report, recently released by PwC. This survey draws its results from executives of leading organisations across various industries around the world, and provides a picture of the current cyber landscape. Mr Ingram will discuss the significant increase in both frequency of cyber-attacks and their financial impact; while security spending globally remain a static percentage of IT budgets.
Changing technology, public opinion and new evasion techniques threaten to make law enforcement agencies blind in the internet age, new technology and new products from internet companies, phone and computer makers and others are all cause for concern while privacy activists are driving a skewed public opinion. How can law enforcement understand and operate effectively in this difficult and changing environment? In this talk, you will hear from a senior officer at hacking team, the world leader in offensive lawful surveillance.
Cyber incidents and data breaches are increasing at an alarming rate as attackers continue to evade perimeter security solutions. The emphasis on reducing the sale of an incident has never been greater as finite investigative resources attempt to reduce the time between the incident and containment. This session brings context to your incident response investigations, we will harness the power of visualizations and relationship analytics to support the rapid autopsy of a data breach, quickly drawing out the key forensics artifacts to the user.