Welcome to Information Security Media Group's Infosecurity Europe 2024 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs, government leaders and more. Inside this 30-page guide, you'll find links to dozens of videos created by ISMG.Studio.
In the current economic climate, CISOs must shift priorities to ensure company survival. Don Gibson, CISO at Kinly, advises security leaders to reevaluate their strategies, optimize resource allocation and leverage existing tools to increase their return on investment.
Cloud security is becoming a major challenge for security leaders. Kevin Kiley, chief revenue officer at Lacework, explains why traditional security methods fall short in cloud environments and how data-driven approaches offer better protection against new and complex threats.
Aman Sood began his career in cybersecurity as a help desk analyst, handling tasks such as resetting user passwords and providing technical support. He shares his journey from analyst to cybersecurity vice president, discusses the challenges and offers advice to aspiring security professionals.
Brian Honan, CEO of BH Consulting, discusses the need for robust logging capabilities in Microsoft 365 to prevent security breaches. He called for security features to be standard, highlighting issues from a recent intrusion and the risks associated with technologies such as Microsoft's Copilot.
Like security practitioners, cybercriminals want AI too. But in the AI-versus-AI cyber battle, the barrier for malicious actors "keeps getting lower and lower, while the barrier for defenders is getting more complex and more difficult," said Rick Holland, field CISO, ReliaQuest.
Generali Poland’s innovative approach to cyber insurance includes an anti-phishing initiative and market education efforts to enhance cyber resilience. Learn how these measures aim to support small and medium-sized businesses in Poland - and bridge the knowledge gap in cybersecurity.
Crisis management is a crucial skill for organizations and CISOs. It starts with understanding the business and tailoring plans to its needs, according to Stuart Seymour, group CISO and CSO, Virgin Media O2. He recommends rehearsing plans with leadership and regularly updating them.
Small and medium-sized businesses face mounting cybersecurity threats from AI-generated malware. Troy Leach, chief strategy officer at the Cloud Security Alliance, advises SMBs to implement continuous monitoring and automation to effectively mitigate risks.
The U.K. cyber sector has grown significantly, but cyberattacks continue to increase. Fostering collaboration among industry, startups and academia is critical to drive cybersecurity innovation, develop skills and strengthen cyber resilience, said Saj Huq, chief commercial officer at Plexal.
Paul Peters, detective superintendent and managing director at The Cyber Resilience Center for Wales, outlines strategies to enhance cyber resilience, particularly for SMBs and micro-businesses. Organizations must focus on preparedness, partner collaboration and basic security measures, he says.
Forrester senior analyst Tope Olufon discusses how CISOs face the challenge of shadow IT with generative AI. CISOs need to approach AI as they would any other technology, he says. "Create a threat model, not just based on best practices, but for your organization, and then build security for that."
The ransomware industry has matured. Tim West, director of threat intelligence at WithSecure, warned about the modern ransomware ecosystem, which features an established marketplace of tools and services that can be used in ransomware attacks, and how it has lowered the bar for attackers.
Adi Bleih and Daniel Pigeon of Cyberint discuss the evolution of cyber operations in recent conflicts, the rise of hacktivist groups, the targeting of critical infrastructure and supply chains and the need for new defense strategies.
William Wright, CEO of Closed Door Security, shares the significance of enabling SMB signing to prevent NTLM relay attacks, a common vector exploited by ransomware groups. He also shared mitigation strategies identified during penetration testing with various organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.