Cyber Security & Cloud Congress North America 2024 is set to open its doors on June 5-6, marking a pivotal moment for cybersecurity and cloud computing professionals worldwide. Hosted in the vibrant tech hub of Santa Clara, California, this prestigious event promises an unparalleled gathering of industry professionals, thought leaders, and innovators.

 

Renowned speakers from diverse backgrounds will grace the stage, including:

  • Grant Dasher, Architecture Branch Chief, CSD – CISA – Cybersecurity and Infrastructure Security Agency

  • Sharan Ram, Executive Director – Cybersecurity – JPMorgan Chase & Co.

  • Alissa “Dr Jay” Abdullah, Deputy Chief Security Officer – Mastercard

  • Benjamin Benhan, Global Privacy Attorney – eBay

  • Hardik Mehta, Head of Cyber Risk Management – UBER

  • Pranusha Soma, Senior Security Engineer – Lark Health

  • Animesh Singh, Executive Director, AI and Machine Learning Platform – LinkedIn

  • Shams Zawoad, PhD, CISSP, Director, Threat Analytics & Research – Visa

More distinguished speakers can be found on the Cyber Security & Cloud Congress Speakers website here: https://www.cybersecuritycloudexpo.com/northamerica/speakers/.

 

This year’s conference will explore its themes over the span of two days, dedicated to the realms of cybersecurity and cloud computing. Crafted to captivate audiences from both industries, the attendees include cybersecurity experts, CISOs, CTOs, CIOs, cloud specialists, cloud architects, cloud migration engineers, and many more.

The meticulously curated agenda aims to disseminate the latest insights and discourse on prevailing cybersecurity and cloud computing issues across the following days:

 

Cyber Security Itinerary:

Cloud Computing Itinerary:

 

Hosted by TechEx, a prominent entity within the conference and exhibition domain, this event is slated to convene over 7,000 attendees from diverse industry sectors. From government to automotive, healthcare to retail, and beyond, participants will explore the entire spectrum of future cyber challenges and solutions – from AI-driven threat detection to secure-by-design principles.

Stephen Downing, TechEx’s Head of Delegates & Group Operations Manager, commented, “TechEx prides itself on its unique ability to foster informed debate and discussion among experts from the private sector, enterprises of all sizes, and governmental bodies. We’re thrilled to bring together distinguished colleagues and experts from across the globe to Santa Clara, a city renowned for its innovation, to deliberate on enhancing our collective resilience.”

During the Cyber Security & Cloud Congress, participants will have the opportunity to engage with industry leaders exhibiting at this year’s expo, including such companies as IBM, Google Cloud, Nettitude, NinjaOne, Rapid7, Otterize, Security Compass, KeepIt, and many more under one roof at TechEx. The full exhibitors list can be found here: https://www.cybersecuritycloudexpo.com/northamerica/exhibition/

Moreover, ample networking opportunities await, providing attendees with a chance to forge meaningful connections with industry peers, speakers, sponsors, and exhibitors. The evening after Day 1 of the event will feature a networking event at the Terra Courtyard at the Hyatt Regency Santa Clara from 6:00 pm to 10:00 pm. This exclusive gathering offers Gold and Ultimate pass holders, Speakers, Sponsors, Exhibitors, and Press Representatives the chance to connect with prominent industry figures. More information here: https://www.cybersecuritycloudexpo.com/northamerica/networking-party/.

For detailed information on the event’s program, exhibitors, speakers, and sponsors, visit the Cyber Security & Cloud Congress page here: https://www.cybersecuritycloudexpo.com/northamerica/

Visit us on social media:

Facebook

Twitter

LinkedIn

Instagram

 

YouTube

 

The post Introducing the Cyber Security & Cloud Congress North America 2024, just 10 weeks away! appeared first on Cybersecurity Insiders.

Poland is getting ready for the upcoming Presidential elections in August 2023 amidst a turbulent geopolitical and economic environment. The war in Ukraine has placed the country in the epicenter of the events, becoming home to more than 3.5 million refugees. The unprecedented energy crisis with prices soaring every day threaten to destabilize local economy. […]… Read More

The post The State of Security: Poland appeared first on The State of Security.

With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers […]… Read More

The post A Traveller’s Guide to Staying Cyber safe appeared first on The State of Security.

WhatsApp is ranked as the most popular mobile messenger app in the world.  In fact, there are two billion active users on the app. This is an incredibly large audience. Unfortunately, it is also a huge number of potential victims for criminals to target. Cybercriminals are increasingly using WhatsApp as the medium for their attacks, […]… Read More

The post WhatsApp Scams in 2022: What to Look out for appeared first on The State of Security.

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for “about a month before it becomes a problem”. Can you imagine that now? A month without email? Emails are […]… Read More

The post Email and cybersecurity: Fraudsters are knocking appeared first on The State of Security.

A new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which uses a romance scam script, but with an investment spin on it, where victims are groomed to invest large sums of money, often on fake crypto apps. Behind the scenes of these scams are scam centers run […]… Read More

The post 5 tips for spotting and avoiding Pig butchering scams appeared first on The State of Security.

Cybersecurity is becoming more of a common term in today’s industry. It is being passed around executive meetings along with financial information and projected marketing strategies. Within the cybersecurity lexicon, there are some attack methods that are repeated enough to become part of a “common tongue”. These terms are infrastructure agnostic; it does not really […]… Read More

The post 3 Types of Network Attacks to Watch Out For appeared first on The State of Security.

By Dan Conrad, AD Security and Management Team Lead at One Identity

Authentication is one of the hottest topics in cybersecurity right now. As biometrics, MFA, and a range of other authentication methods continue to threaten the password’s supremacy, we thought it was worth finding out what industry professionals thought about it all.

So that’s what we did. At InfoSecurity Europe 2022, One Identity surveyed more than 100 security and IT professionals to get a picture of how businesses and their employees approach passwords and authentication.

When asked what they consider the biggest security threat to their business and 56 percent of respondents said they believed it to be users sharing passwords for admin tasks. If that isn’t an argument for passwordless authentication, we’re not sure what is. This was followed by 25 percent of respondents believing that the biggest security threat was users clicking on malicious links or opening rogue attachments. Collectively, this means that 80 percent of respondents believe that human error poses the largest threat to an organization’s security.

Interestingly, while the majority (62 percent) viewed educating staff as the most important factor in preventing cyber-attacks, a rapidly growing segment (30 percent) stated that adopting a zero-trust model was more important.

Moving on to multifactor authentication, we are met with some heartening statistics. 99 percent of respondents told us that their company had adopted MFA for remote access and 97 percent said that it was mandated. This confirms what we already knew – that the password as a standalone authentication method is obsolete.

When looking into users’ connections to passwords, we see some interesting results. While just over a quarter of respondents had an emotional connection to a password (28 percent), the majority said they had a favorite password (84 percent). We can infer from this that while most people don’t reuse passwords for sentimental reasons, they likely do for practical reasons. It is concerning that IT and security professionals, people who are more aware than anyone of the dangers of reusing passwords, persist in this bad habit.

This is yet another mark against the use of traditional passwords – if those in the know aren’t following best practices, how can we expect the layman to? The reality is modern users have so many accounts that it is no longer practical to create and remember a new password for everyone they set up. We’ll chalk this one up as another point in support of modern authentication methods, which eliminate these problems.

While it’s clear that users are reusing passwords, it turns out that most respondents are at least adding complexity to their passwords depending on a system’s importance (96 percent). Perhaps unsurprisingly, 76 percent saw banking or financial services as requiring a top tier password, but only 7 percent thought that work emails were deserving of the same protection. This may be an understandable perspective but doesn’t bode well for organizations that routinely share sensitive information through email.

Finally, we make it to how IT and security professionals are storing their passwords. Here, at least, we get some more heartening statistics:

  • 65 percent of respondents said they used passwords managers, which is generally regarded as the safest and most convenient way to keep passwords
  • 23 percent said they wrote their login details down somewhere, which, while not ideal, is safer than using one password across multiple accounts

We did, apparently, come across some cyber-savants claiming they could remember all their login details, but if anything, this suggests that they are reusing passwords for an alarming number of accounts.

The key takeaway here is that the password is on the way out. These results serve as further proof that traditional passwords by themselves are no longer fit for purpose – even leaders in the IT security space fail to follow best practices simply because it isn’t convenient. We’ve seen that businesses are implementing and mandating alternative authentication methods en masse, and it won’t be long before this trend trickles down to the rest of society.

 

The post Guest blog: The death throes of the password? Key takeaways from the One Identity Infosecurity Europe survey appeared first on IT Security Guru.

With how much of our personal and professional lives take place online, it becomes more important each day for us to understand our vulnerability to cyberattacks. Cybercriminals target emails, domains, and accounts in order to impersonate identities and scam consumers and businesses alike. In 2021 alone, email spoofing and phishing increased by 220% and caused […]… Read More

The post Email Fraud in 2022: What you Need to Know appeared first on The State of Security.

Malware – what are the threats? Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’. The key target is your data. Data is valuable, and organisations have paid at least $602 […]… Read More

The post Malware on IBM Power Systems: What You Need to Know appeared first on The State of Security.