Menu Close
webheader_virtual_16july

Programme

How have consumer attitudes towards fraud change? What factors are driving these changes?  Pieter will explore how these changes are adding new operational risk to e-commerce merchants and share his thoughts on the long-term impact this will have on the online payments industry.

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session

The war on ransomware is real. Today’s organisations need to have a strong, multi-layered defence and strategy to address ransomware. Veeam will provide organisations with practical steps they can take to protect data and avoid being in a situation where data loss or ransom payment are their only options.

Please take time to visit all our sponsors in the networking area

Grab yourselves a bite to eat and come and network with peers. Also say hello to our live sponsors who are waiting to answer any questions.

Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it.

These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises – How can organizations protect themselves in today’s crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.

In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.

.

We are in the midst of a global workplace shift that’s causing a major impact on every IT organisation: Rapid adoption of a “work from home” (WFH) policy. This situation is dramatically increasing pressure on existing IT systems that were never designed for this scenario. And economic uncertainty is driving an ever-increasing focus on cost containment across every industry.

To be successful, organisations need to learn how to:

  • Keep running their business fast in the shift from LAN to WAN
  • Stay secure as the organisation turns outside-in
  • Do more with less
  • Have the ability to adapt quickly and securely

James Easton, Senior Solutions Engineers, Gigamon will share insights to assist your business in remaining agile and secure in the times of change.

Please take the time to visit our sponsors and visit our networking lounge.

  • Enterprise spending on cybersecurity continues to go up, yet they keep getting infected again and again and again.
  • Digital transformation is accelerating the adoption of cloud based apps and services, rendering legacy security architectures obsolete.
  • How we need to invert our thinking from being app/data centric to a cloud-based, user centric approach.
  • Can we move beyond good vs. bad and “almost safe” to Zero Trust?

Annie Machon will discuss what she calls the Dark Triad of state, corporate, and criminal hacker threats facing those who want to protect data and protect privacy.

Most people are aware of the criminal element; increasing numbers are concerned about the corporate harvesting of data; far fewer realise the overlap between these and state level actors such as spy agencies.

Now, post-pandemic and with the realignment of the geopolitical axis between East and West, all these aspects of cyber-security are going to become much more meshed and much more prominent. Businesses need to be aware, and be seen to be aware, of these threats both for ethical reasons and reputational gains.

Please join us in the networking lounge

0
Booked delegates so far
Days
Hours
Minutes
Seconds

Sponsors

Community Area

Books

Home Workouts

Recipe

spaghetti Bolognese
Days
Hours
Minutes
Seconds