In this session we will talk about why attackers don't need to use brute force attacks and why bring your own device (BYOD) can be a real problem. You will learn where attackers gain access to organisations and why it is really easy for them to breach your perimeter. We will show you selected stores with credentials and you will learn how devices can be infected, how attackers gain access and much more.
Do you know what's happening on your network? Who are your users talking to, what applications are running and what devices are connected? And do you have a recovery network in place? Visualising network communications isn't a rocket science when you use the latest detection platform powered by artificial intelligence and machine learning. Using real examples, we'll show you how NDR can help resolve a variety of incidents and uncover vulnerabilities that traditional tools can't.
Modern cyberattacks are becoming increasingly sophisticated. Cybersecurity budgets are limited, and on the top of it there’s a shortage of qualified specialists. If you’re facing these challenges, to outsource the security specialists could be the solution. This presentation will showcase a real attack on an ESET client and demonstrate how a combination of cutting-edge security technologies and experienced specialists ensures uncompromising protection, including the defense against ransomware.
With growing cyber security threats, data protection has become a critical priority for organisations worldwide. This presentation focuses on the practical use of quantum key distribution (QKD) to secure data centre connections. The key advantage of quantum security is its ability to detect any attempt to eavesdrop on communications, thanks to the fundamental principles of quantum physics. It offers an unprecedented level of protection for data communications and is a vital investment in securing data against tomorrow's threats.
An overview of ransomware attacks, including their solutions, prevention strategies, procedures and objectives.
Data backups are a cornerstone not only of cybersecurity, but also of ensuring business continuity. In an era of increasing threats such as ransomware, targeted attacks and insider threats, backups can mean the difference between rapid recovery and catastrophic loss. This presentation will focus on current risks, backup best practices (including the 3-2-1 rule), and practical examples of how a well-designed backup strategy can protect businesses. We will also discuss techniques for securing backups against modern attacks and why backup security should be an integral part of every organisation.
As IT security continues to evolve, becoming more sophisticated and agile, what about OT (Operational Technology) security? It is just as critical and plays a pivotal role in securing the future. In this presentation, we'll take you beyond the factory gates to explore how to protect industrial systems from digital vandals. We'll present practical and applicable security controls and show that even control systems need to be protected. OT security is what really matters!
What legislative changes can we expect in 2025 and how can we prepare for them? What is in store for the Digital Decade 2030? This presentation will explore the implications of NIS 2 and the Data Act, explaining why there's no need to fear new regulations and how to navigate them calmly and effectively.
Using a replicable case study from Creditinfo, this presentation offers insights from both a CTO and consultant perspective. You'll learn how to translate "legalese" into business terms and understand how this process influences business decisions and long-term strategy. Gain practical tips and proven experience that you can apply immediately in your own organisation.
Cyberattacks today? Not sci-fi, but an everyday nuisance. Hackers no longer crawl through air ducts with laser-eyed precision – all they need is a phone call or a few emails, and you might willingly hand over the keys to your company’s vault.
Phishing, ransomware, fake invoices, spoofed voices, forged signatures, and forged everything. While you believe you have it all under control, attackers know they can exploit a gap – whether in your technology or in your people. There are always people who click where they shouldn’t or answer a call they shouldn’t.
So, what can you do about it?
Don’t expect it "just sorts itself out." In this discussion, we’ll uncover the most common tricks attackers use and explain why your company might be a bigger target than you think. We’ll not only discuss preventative measures but also explain what to do when an attack happens, and you’re facing a full-blown crisis.
There are two certainties in life: taxes and cyberattacks. We can’t help you with the former, but we’ll try with the latter.