We’re back for the second and final day of #CyberSecure. If this is the first time you’re hearing of this cybersecurity conference, there’s still time to attend:
If you’re an attendee watching the conference from your computer, we want to hear from you. Share your thoughts and questions by also using the #CyberSecure and #TechReviewEvents hashtags.
Yesterday’s theme was a ransomware response. Today’s is an action plan for resiliency. Ready? Let’s do this. #CyberSecure
The European Union and the European Cybercrime Centre have lessons for businesses inside and outside the EU. In this first block of sessions, we’ll take a deep dive into what they have to offer. #CyberSecure
Europe — like much of the world— continues to see increasingly sophisticated attacks coming from both inside and outside the EU. Discussing key findings from the EC3’s annual report is @Raj_Samani of @McAfee. #CyberSecureeuropol.europa.eu/activities-ser…
GDPR is a postive from a privacy perspective, but some things we're introducing, cybercriminals are taking advantage of, Samani says. #CyberSecure
Covid-related cyberthreats are on the rise as the pandemic has carried on, he says. The challenge became making sense of the volume of threats. #CyberSecure
The amplification of covid misinformation earlier in the pandemic started from legitimate accounts, Samani says.
Is it misinformation or miseducation? #CyberSecure
Cybercriminals have absolutely no fear about carrying out crime, Samani says. #CyberSecure
Cybercriminals Samani spoke to are not worried about being arrested. #CyberSecure
There has to be a third choice when it feels like the options are "pay criminals" or "lose everything." #CyberSecure
Next up is @a_malatras of @enisa_eu. He’s unmasking the European cyber-threat landscape with ENISA’s latest report. Come away with actionable insights to prepare your organization for combating emerging cyber threats and challenges. #CyberSecureenisa.europa.eu/topics/threat-…
Introducing The #ExtortionEconomy, a 5-part podcast series with @propublica that looks at the money, people, and technology behind the explosion of ransomware that is delivering hundreds of millions of dollars to cybercriminals around the world.
@propublica This is a podcast about ransomware... but it's not really about ransomware.
@propublica It's not about securing your password, and it's not about enabling two-factor authentication. It's not your IT manager telling you how to avoid a phishing attack.
Cyberattacks are becoming a “when, not if” reality. In the final block of sessions at #CyberSecure, we'll be providing you with strategies to help your organization fix security vulnerabilities and take the critical first steps after a breach happens.
First up is Alex Jones of @cobalt_io. He's discussing how your organization can reinforce its security strategy to better identify and address security vulnerabilities. #CyberSecure
He's discussing five themes:
-It's not a zero sum game
-It's not a technology problem (it's a people problem)
-The solution requires people and process innovation (the tech is there already)
-It's complicated, but not impossible
-We're all in this together
Cybercriminals exploit the lack of international cybercrime mandates and the existence of unregulated financial systems that enable anonymous transfer of funds. In this special programming break at #CyberSecure, @MarietjeSchaake explores the changes necessary to stem the tide.
We're seeing an interrelationship between misinformation campaigns and traditional cyberattacks. #CyberSecure
"When it comes to ransomware, the accountability needs to be closed ... That makes it too easy for maligned attackers to gain ground" - @MarietjeSchaake
at #CyberSecure
Holding cybercriminals accountable requires cooperation across country lines. That's because the current situation stretches internationally. In this next block of #CyberSecure sessions, we explore how.
As we dive into this topic, we have a special surprise for you. Stay tuned #CyberSecure.
🚨 Podcast Premiere 🚨: In this project with @propublica, we look at the money, people, and technology behind the explosion of ransomware that is delivering hundreds of millions of dollars to cybercriminals around the world. #CyberSecure
Machine learning-based cybersecurity is only as good as the detection models it’s based on. This #CyberSecure session with Ignacio Arnaldo of @corelight_inc looks at requirements and best practices.
In the previous block of sessions, we touched on how, in 2018, @Darktrace showed that unsupervised-learning models can spot hackers who have already broken in. technologyreview.com/2018/11/16/139…
We also threw cold water on AI for cybersecurity, reporting on how hackers could foil these security algorithms by targeting the data they train on and the warning flags they look for. #CyberSecuretechnologyreview.com/2018/08/11/141…
In this next block of sessions at #CyberSecure, we’re learning about the latest cybersecurity technologies, including how artificial intelligence is being used to unearth vulnerabilities.
There are benefits and drawbacks to using artificial intelligence for cybersecurity. There are also a whole host of other emerging technologies that can defend against disinformation and computational propaganda. Providing an overview at #CyberSecure is @LUMKatrusya.
We’ve written a bit about how AI is being used to detect hackers.