Skip to content Skip to footer

caisec '23
TOPICS

caisec '23
Topics

Hottest Cybersecurity Technology Trends : Thousands of vendors and service providers launch new products every day. We shall hear about the latest trends and tips on how to determine which technologies are best to secure your enterprise.

A CISO’s Experience in Adopting Cybersecurity Technologies

Enterprises are struggling to secure an existing variety of endpoint and user-owned mobile devices, significantly on the rise because of the work-from-home policies are becoming dominant CISOs have to rethink their security strategies on an enterprise scale. What are the recommendations to build a strategy across physical and virtual devices?

Securing the Hybrid Workforce

Most enterprises already have a wide range of security products installed. Accordingly, an experienced CISO discusses the best approach to integrate fresh technologies into existing security environment to best bolster defenses.

Protecting Cloud Assets

Cloud-based technologies for many, led to vulnerabilities and a new wave of threats. How can we expand the use of the cloud without exposing ourselves to new vulnerabilities? Let’s take a look at emerging cloud security technologies and threats that target cloud-based services.

The Next Generation SOC

SOCs are evolving at a rapid pace, and while many are adding capabilities such as threat hunting, tools such as orchestration and XDR, the way security teams collect nd analyze threat data is also changing. In this session, we shall learn how SOC analysts are improving data security

Rethinking Authentication: A World Without Passwords

Cyber attackers can level organizations with a DDoS attack. Data protection requires stronger authentication. What is beyond passwords? What are the strategies around authentication and authorization? What kind of tools and technologies are in place to help enterprises move past passwords? understand the challenges of rolling out new authentication technologies.

Security Planning: Ask the Right Questions

Are you asking the right questions about potential scenarios when thinking about disaster recovery and business continuity? Rather than approach security from a reactive perspective, we should always be planning for the future by asking questions as: What could go wrong? What could happen if an earthquake demolished your building? What if a country invaded yours? We need to take note and start answering the questions.

Confidential Computing: A New Approach to Security

Chip makers are providing hardware for "Confidential Computing", a concept that secures data through protective vaults and encryption layers. This prevents hackers from attacking the hardware. In financial services, confidential computing allows secure data processing and analytics from multiple sources without compromising customer information. Detecting fraud and monitoring money movement is made safe and efficient with this technology.

Defining XDR

Security professionals Cannot agree on a definition of XDR, and analysts and vendors have wildly differing views on what it truly is. This session addresses questions as: What is XDR reality and what is just hype? When to consider XDR technology in an enterprise security stack? And what to expect from security vendors

How to Start a Successful SASE/SSE Migration Plan

SASE solutions adoption is growing rapidly. Security leaders must build a migration plan from traditional security solutions to SASE. By 2025, 80% of enterprises are expected to adopt a unified access management strategy with SASE, up from 20% in 2021. Our session will provide insights and a gap analysis on the current and future state of SASE and SSE solutions.

Are AI-driven Natural Language Processing Tools a Security Threat?

ChatGPT as a perfect example of what’s to come, with human-like abilities has taken the Internet by storm and has set a number of industries on the edge of extinction. The cybersecurity industry has been skeptical about potential implications of modern AI, with concerns that ChatGPT could be abused by hackers with limited resources and zero technical knowledge. Will such chatbots help cybercriminals write malicious code? Will hackers with little or no technical skills leverage chatbot AI smarts for malicious purposes?

Post-Quantum Cryptography

Large-scale quantum computers can compromise the security of digital communications. Post-quantum cryptography provides secure cryptographic systems against quantum and classical computers, interoperable with existing networks. We must prepare our information security systems now to resist quantum computing, as it may be built to break almost all public key schemes in the near future.

The Changing Economics of Cybercrime

Cybercrime is a high-profit opportunity, with ransomware being the most popular means of monetizing it. The digital nature of cybercrime is attractive because of cryptocurrency use, lack of fear of getting caught, and spending on digital transformation. These factors impact the economy, with investments needed in cyber resilience and insurance against such crimes. The impact on digital transformation and corporates is significant.

Blockchain and Digital Base Money from a Security Perspective

Blockchain is considered as an evolving technology, like the internet in the 1990s but with potential to disrupt many businesses in the future. However, blockchain suffers many setbacks caused by security concerns coming, not only from distributed/decentralized computing issues or cryptography algorithm issues, but also rom some unexpected field tools. In this session, we shall try to classify the security concerns for blockchain-based technologies and services and what challenges digital currencies face.

Stay ahead of cybercrime with thought provoking solutions from the industry leaders at caisec!