Cybersecurity Summit 2024: Identities are the new vulnerabilities.
AI and Co-pilots assistance are appearing nowadays in many technologies. During a Fireside chat, Hunters is going to take a look at how AI plays in the modern SOC. We are honored to host three highly experienced Cyber experts, and hear about their experience using AI and the opportunities and risks.
With:
Risk based vulnerability management has taken huge strides forward from the old days of remediating CVSS 7+ to a modern and threat centric approach, but with so many flaws and attack surfaces still available, we need to contextualise further to focus resources on mitigating exposures. Join Gavin Millard, Tenable’s Deputy CTO and Vice President Of Product Management for VM, as he explores the benefits of contextualising vulnerabilities with identity and other third party information to identify and remove the threat actors next step in the attack path.
De enorme wildgroei aan APIs, gestuwd door de opkomst van GenAI, laat veel organisaties achter de feiten aan lopen. Welke APIs heb ik eigenlijk? Wat doen ze? Wat voor data stuur ik naar buiten? En wie helpt me ervoor zorgen dat mijn ontwikkelaars op de juiste manier APIs bouwen en in productie zetten, zonder de deur wagenwijd open te zetten voor hackers? In deze sessie zal Salt Security inzicht geven hoe een solide Posture Governance strategie te implementeren en ook daadwerkelijk uit te voeren, rond het gebruik en beschikbaar stellen van APIs. Waarschuwing; deze sessie bevat live demos!
Organisations rely on an increasing number of third parties for business operations. In this session, you will discover how to:
Today’s adversaries are operating with unprecedented stealth. They continue to discover new methods to hide in plain sight, making it difficult for defenders to differentiate between normal user activity and a breach.
Stopping breaches requires an understanding of adversaries’ motivations, techniques and targets. In the latest edition of our CrowdStrike’s 2024 Global Threat Report CrowdStike uncovers notable themes, trends and events across the cyber threat landscape. Learn how Scattered Spider, Bitwise Spider and Cascade Panda hide in plain sight and how to stop breaches!
Join Delinea as they explore the critical landscape of Privileged Access Management (PAM) Maturity. In a world where cyber threats continually evolve, understanding the journey to fortify your digital citadel becomes paramount.
Gain valuable insights from industry experts, understand the evolving landscape of cybersecurity, and learn practical strategies to enhance your organization’s security posture.
What will you learn?
Get answers to these important questions:
· Beyond Secret Server, what other PAM controls are essential?
The cybersecurity landscape is always evolving, and in 2023 Cofense saw the volume and variety of threat campaigns once again develop exponentially. Join us to take a look at the latest threat tactics developing and why your people are still vital in the protection of your organisation.
A lost/stolen credential can be used as a starting point of an attack, leaving traditional preventive capabilities inefficient. This is where AI driven identity detection and response comes into the picture.
Threat actors are targeting mobile devices more aggressively to compromise employee accounts and quietly gain access to your cloud infrastructure – making it critical to understand emerging mobile threats and how tactics are rapidly changing.
In this session, Lookout Security Experts will dissect newly discovered threats, highlight trends across the threat landscape, and explain what you can do to protect your organization. You’ll learn about:
Ronald en Richard nemen de dag nog eens met je door en gaan kijken of alle vragen beantwoord zijn:
Hoe veilig zijn je gedachten? Jochem Nooyen sluit de Access42 Cybersecurity Summit af. Hij neemt je mee in een wereld waarin privacy een illusie is. Veel mensen zeggen dat ze niks te verbergen hebben, maar wat heb je te beschermen? Alles wat wij online doen is te volgen en te achterhalen maar je gedachten zijn veilig….toch?!