Information Security Day 2

Background
09:00 remove 09:45
keyboard_arrow_down
Background

How well cyber protected is your business? How protected should it be?

Thumbnail Steve Jump

It is easy to assume that your business is under threat of cyber attack. And you would be absolutely correct in that assumption! But have you stopped to think about what really matters to your business in terms of risk? Where does your revenue and profit come from? How does that create value? What technologies are you using to create value, and what are you planning for the future? Where would cyber criminals look first if they wanted to destroy your value? Simple cyber attack, theft of information, ransomware, email compromise, data model poisoning, intellectual property theft? How would that affect your customers, your future growth, your operating license, your shareholders? And how well is your business risk managed by the security technology and security processes you have deployed to date? Is your development secured in the best ways? How resilient are your AI solutions? How flexible are your detection and response capabilities? To those who have heard of the 80:20 rule, can you show that your cost of security is protecting the 80% of your value? If you are in the Technology Chief responsible for building cyber security solutions to protect the business, or if you are the business who expects to be protected, please join me to find out if you are already on the right page, or if you might need to look for a new book.

09:45 remove 10:30
keyboard_arrow_down
Background

Ransomware Defense Strategies: Prevention, Detection, and Recovery

Thumbnail Jason Oehley

Ransomware attacks continue to pose significant threats. Defense strategies involve a combination of preventive measures, early detection, and robust recovery plans to minimize the impact of ransomware incidents.

10:30 remove 11:00
keyboard_arrow_down
Background

Coffee/ Tea Break

11:00 remove 11:45
keyboard_arrow_down
Background

Secure Software Development Practices: Building Resilient Applications

Building secure software requires adopting best practices throughout the development lifecycle. This includes secure coding standards, regular security assessments, and continuous monitoring to identify and address vulnerabilities.

11:45 remove 12:30
keyboard_arrow_down
Background

Secure Data Analytics: Privacy-Preserving Techniques for Big Data

As organizations analyze large datasets, ensuring privacy becomes crucial. Privacy-preserving data analytics involves employing techniques like differential privacy to extract valuable insights without compromising individuals’ sensitive information.

12:30 remove 13:30
keyboard_arrow_down
Background

Networking Lunch Break

13:30 remove 14:15
keyboard_arrow_down
Background

Privacy and Security in Mobile Computing: Challenges and Solutions

Thumbnail Mandla (Basani) Mbasane

Mobile devices are ubiquitous, and securing them involves addressing challenges such as device theft, data leakage, and secure communication. Solutions include encryption, secure authentication methods, and mobile device management.

14:15 remove 15:00
keyboard_arrow_down
Background

Cyber Threat Intelligence: Gathering, Analysis, and Sharing Best Practices

Thumbnail John Bosco Arends

Cyber threat intelligence involves collecting, analyzing, and sharing information about potential threats. Sharing best practices ensures that organizations are well-informed and can proactively defend against emerging cyber threats.



    By subscribing to this newsletter, you agree to our Privacy Policy.


    The Professional Development Hub


    Background