AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
This year's Black Hat Europe conference in London features dozens of briefings touching on a wide variety of topics, including exploiting contactless payment and Bluetooth vulnerabilities, identifying vulnerable OEM IoT devices at scale and running false-flag cyberattacks.
in this session we'll first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We'll then dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world...
The unstoppable App economy is obsessed with the User experience. They'll unceasingly recruit your Users & suck more services out of I.T. & into their Clouds. IoT will explode from 7 billion objects today, saturating enterprises with over 21 billion objects in the next five years, stretching the IoT economy from $151B...
National security, cyber incident response, and cyber security risk management experts analyze the current state of fraud within political campaigns. This includes current challenges campaigns are facing and how best to address those challenges. Join experts from the US CyberDome to learn how to ensure free speech...
As new prevention technologies are deployed, Fraudsters are forced to change their approach, develop new tools, and uncover new ways to monetize their activities. In this way, Fraud Protection has been a perpetual cat-and-mouse game.
We'll see a real story about a phishing attack that could involve each bank's...
IoT, the cloud, advancements in AI, regulatory fines, third-party risk, cyber fraud - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But how about the new demands on cybersecurity leaders? What new skills, tools and strategies are needed to understand, quantify and manage...
While there is little doubt that cybersecurity audits provide an additional layer of assurance, security practitioners often question their effectiveness. So, what are the ways to ensure the relevance of these audits?
The cross-functional groups across enterprises need to be held equally accountable for cybersecurity, viewing security is a business enabler. That was the consensus of a CISO, CTO and a CIO who participated in a panel discussion at ISMG's recent Cybersecurity Summit in Mumbai.
This session features a dialogue among a CISO, a CIO and a CTO on the challenges they face in executing large projects where security becomes a business enabler. How can the security team navigate and negotiate to gain buy-in from senior executives in all departments? This panel will address the cross-functional...
India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches and to have better data protection mechanisms in place. The move could help fast-track cybercriminal investigations. But will data localization lead to improved data security or will it result in major...
Organizations that are relatively well-resourced and committed to cybersecurity stand to benefit from cybersecurity audits.
Cybersecurity audits provide an additional layer of assurance that an organization is safeguarding the data that has become increasingly essential in driving and transforming virtually every...
Many high-profile breaches have grabbed headlines this year, including those at Wipro, Toyota and Capital One. What lessons can CISOs learn from this year's big breaches as they develop risk mitigation strategies for 2020?
This session addresses:
Top priorities for CISOs next year;
Important lessons to be learned...
Digital transformation to the cloud has resulted in increased dependency on third-party vendors to manage security tasks. This means managing the security risks involved is becoming a bigger challenge. Many organizations still have a long way to go in strengthening governance when it comes to vendor management as they...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.