top of page
CyberSecurity_logo_yleinen_2_nega.png

AGENDA 2024

20.3.2024

Starting 9AM EET - Helsinki Time

9:00 

Welcome

 

9:05

Building a Cybersecurity Vision for the Organization 

  • Assessing current cybersecurity maturity

  • Setting long-term cybersecurity goals aligned with business objectives

9:25

Roadmap to Resilience: Crafting a Strategic Security Plan

  • Key components of an effective cybersecurity strategy

  • Adapting the roadmap to emerging threats and business changes

 

9:45

Successes and Lessons Learned in Strategic Cybersecurity Leadership

  • Insights from organizations that have excelled in cybersecurity strategy

  • Lessons from failures and how they shaped future strategies

10:05

Networking Break

10:40

Fileless and Living-off-the-land Attacks

  • The shift from malware-based to fileless techniques

  • Understanding the use of legitimate tools for malicious purposes

  • Mitigating risks and monitoring for such threats

 

11:00

The Threat Landscape in Cloud Computing

  • Cloud misconfigurations: A goldmine for attackers

  • Recent cloud breaches and their causes

  • Security best practices for cloud environments

 

11:20

IoT Vulnerabilities and their Growing Significance

  • The increasing role of IoT devices in cyber-attacks

  • Case studies: Recent IoT-based attacks

  • Frameworks for securing IoT ecosystems

 

11:40

Mobile Threats: The Silent Attack Vector

  • Evolving mobile malware and its impact

  • Mobile phishing: How it's different and why it's effective

  • Hardening mobile devices against emerging threats

 

12:00

Lunch Break & Networking

13:15

Ethical Questions and Privacy Concerns in AI

  • Who is responsible when an AI-based security system fails?

  • How can AI decision-making be monitored and evaluated?

  • Ensuring data privacy in ML models for cybersecurity

  • Differential privacy and federated learning for cybersecurity applications.

13:35

AI in Phishing Detection and Prevention

  • Detecting phishing websites using ML techniques

  • Email filtering and phishing email recognition with AI

 

13:55

Utilizing AI in Attacks

  • AI-based malware and automated attacks

  • Using AI in data mining and malware distribution

14:15 

Networking Break

14:50

Busting Cyber Security Myths

Etay Maor, Senior Director Security Strategy, Cato Networks

  • What are the top 3 dangerous cybersecurity myths and examples from recent attacks of why they are wrong

  • Understand threat actors TTPs when it comes to modern enterprise architectures

  • Strategic, operational, and tactical approaches to countering these challenges

15:10

AI-powered Threat Detection and Using AI in Defense

  • Anomaly detection in network traffic using ML.

  • Real-time malware classification with deep learning

  • Predictive analysis for emerging threats

  • Real-time anomaly detection and response

  • Systems learning and improving against constantly evolving threats

​15:30

AI in Vulnerability Management

  • Predicting vulnerability exploit likelihood with ML

  • .ML-Based patch management and optimization

15:50

End of the Day

Did the agenda peak your interest?

Main Stage Agenda
bottom of page