Attackers leverage asymmetry in the economy of attacks to their benefit but good intelligence and automated rapid response can stop an attack in its tracks. If we set a sufficient number of effective roadblocks for attackers to overcome to reach their target, sooner or later their illicit activities will cease paying off and they will be forced to seek other targets or new jobs.
It’s harder than ever to secure the enterprise network, confirmed by the continuing string of high profile data breaches. While being attacked and possibly breached is not going to change, what can change is how we perceive cyber security and how to defend your organization’s network. This session will focus on some of the key contributors to successful data breaches and what an enterprise can do to break the cycle of attack, breach and spend.
Threat intelligence and malware defense in the 3rd Platform era. Moving beyond signature-based protection to incorporate next-generation security solutions into the evolving architecture.
Modern malware attacks aim increasingly at the weakest spot, the endpoint. Such attacks frequently result in a violation of personal data protection regulations (GDPR). In our presentation, we will show a few real-life case studies and outline a possible comprehensive solution leveraging CheckPoint tools (such as SandBlast Agent and Endpoint Security).
Working with various IT and security managers, we have found out that one of the biggest issues they currently face is user endpoint security and effectiveness of employees who use mobile devices. Everyone uses a mobile phone many times every day and how many of us have sometimes made our lives simpler by copying work documents to a public cloud storage. Wouldn’t it be much better to have current versions of corporate documents always safely available anywhere you go, to be certain that corporate data do not lie around public clouds, to get smart phones under control and secure them at the same level as any other part of the infrastructure, and, last but not least, be protected against increasingly frequent ransomware attacks and harmful conduct by employees (whether intentional or accidental)?
Identity is already the new perimeter – is your organization dealing with it? The rise of biometrics and the demise of BYOD; multi-factor authentication as a bare minimum and a mobile workforce enabler.
Protecting data is a management and security journey that takes in access controls and privileged user management, encryption and obfuscation, policy and compliance, and the company’s security culture.
With the dramatically increasing number of attacks on simple devices IOT wonders what is the motivation for attackers, and what are the other trends. Methods are becoming more sophisticated and longer did not constitute a threat to the home.
Security in the cyberspace cannot be divided into separate sectors. It is complex, interconnected, dynamic and adrenaline-inducing.
Cyberspace, too, is governed by criminal laws – the Act on Criminal Liability of Legal Entities that is based on GDPR as well as the Cybersecurity Act and other regulations.
eIDAS is an EU regulation on electronic identification and trust services for electronic transactions in the internal market, coming into full force and effect in 2018. The regulation obviously applies to the Czech Republic as well. How is the government sector getting ready? How is the commercial sector gearing up? Are we going to make it by the deadline? What business opportunities does the regulation bring about? Are we going to become a digital tiger or will we remain a digital chicken?
A discussion of the intrusion response and investigative value of public-private partnerships in addressing cyber threats, with a focus on preserving information to assist in the identification and pursuit of the criminals behind the keyboard.