AGENDA 2024
20.3.2024
Starting 9AM EET - Helsinki Time
9:00
Welcome
9:05
Building a Cybersecurity Vision for the Organization
-
Assessing current cybersecurity maturity
-
Setting long-term cybersecurity goals aligned with business objectives
9:25
Roadmap to Resilience: Crafting a Strategic Security Plan
-
Key components of an effective cybersecurity strategy
-
Adapting the roadmap to emerging threats and business changes
9:45
Successes and Lessons Learned in Strategic Cybersecurity Leadership
-
Insights from organizations that have excelled in cybersecurity strategy
-
Lessons from failures and how they shaped future strategies
10:05
Networking Break
10:40
Fileless and Living-off-the-land Attacks
-
The shift from malware-based to fileless techniques
-
Understanding the use of legitimate tools for malicious purposes
-
Mitigating risks and monitoring for such threats
11:00
The Threat Landscape in Cloud Computing
-
Cloud misconfigurations: A goldmine for attackers
-
Recent cloud breaches and their causes
-
Security best practices for cloud environments
11:20
IoT Vulnerabilities and their Growing Significance
-
The increasing role of IoT devices in cyber-attacks
-
Case studies: Recent IoT-based attacks
-
Frameworks for securing IoT ecosystems
11:40
Mobile Threats: The Silent Attack Vector
-
Evolving mobile malware and its impact
-
Mobile phishing: How it's different and why it's effective
-
Hardening mobile devices against emerging threats
12:00
Lunch Break & Networking
13:15
Ethical Questions and Privacy Concerns in AI
-
Who is responsible when an AI-based security system fails?
-
How can AI decision-making be monitored and evaluated?
-
Ensuring data privacy in ML models for cybersecurity
-
Differential privacy and federated learning for cybersecurity applications.
13:35
AI in Phishing Detection and Prevention
-
Detecting phishing websites using ML techniques
-
Email filtering and phishing email recognition with AI
13:55
Utilizing AI in Attacks
-
AI-based malware and automated attacks
-
Using AI in data mining and malware distribution
14:15
Networking Break
14:50
Busting Cyber Security Myths
Etay Maor, Senior Director Security Strategy, Cato Networks
-
What are the top 3 dangerous cybersecurity myths and examples from recent attacks of why they are wrong
-
Understand threat actors TTPs when it comes to modern enterprise architectures
-
Strategic, operational, and tactical approaches to countering these challenges
15:10
AI-powered Threat Detection and Using AI in Defense
-
Anomaly detection in network traffic using ML.
-
Real-time malware classification with deep learning
-
Predictive analysis for emerging threats
-
Real-time anomaly detection and response
-
Systems learning and improving against constantly evolving threats
15:30
AI in Vulnerability Management
-
Predicting vulnerability exploit likelihood with ML
-
.ML-Based patch management and optimization
15:50
End of the Day