From 50 Gbps in 2013 to 1.7 tbps today, DDoS attacks have, in just five years, exponentially grown in size, frequency and complexity. We need to take a closer look at how the cyber-threat landscape has changed, and understand the reasons behind our challenge in defending against advanced attacks. This session...
Understanding the early signs of breach to respond accurately and in time is important to secure the most critical assets. Maintaining basic cyber hygiene goes a long way in helping organizations with breach preparedness is to unite business risks and IT risks with a common language and framework to help identify and...
The exploitation of vulnerabilities is the root cause of most data breaches today and as such, the remediation or mitigating vulnerabilities can be one of the single most effective means of protecting your organization from attack.
Addressing the sheer volume of vulnerabilities that are present in most organizations...
The cybersecurity landscape is morphing at a rapid pace today - faster than ever before. Hundreds of sophisticated hacking campaigns and reckless proliferation of sophisticate malware threats over the last few years has left security teams struggling to contain these threats and protect the organization in a...
The Cyber threat landscape has evolved leaps and bounds over the last few years. The discussion on breaches, now at the board room level, is focused on preparedness, predictive intelligence and effective incident response. Leveraging a credible source of threat intelligence is foundational-in addition to its...
Security has always been a price sensitive market, and there are many vendors who meet some of the parameters of managed security services providers' and customers' requirements. But in some cases organizations choose solutions by compromising the features over price. What is the correct balance between the two and...
Sophisticated attacks comprise of a combination of delivery of exploit techniques, cryptojacking and exploiting user ignorance, enough to run the wrong program. Next generation threats routinely exploit legacy technologies which fail to identify and response to these threats. Way forward is Next Gen technologies,...
The Cambridge Analytica debate throws up tough questions around the need for a strong data protection and privacy regime in India. In an age where privacy regime around the world are being strengthened and becoming more mature, the Indian approach to privacy and data protection remains a non-starter, with a data...
The keynote kicks off the summit with a review of the threat landscape, highlighting the state of cybersecurity solutions and services, as well as the contemporary technologies that could impact the industry. The industry is likely to witness new attack trends, including newer forms of mobile attacks, wipers deployed...
As fraudsters continually refine their techniques to steal customers' credentials, organizations have found new ways to fight back with new tools that use behavioral biometrics and cognitive fraud detection.
It is critical to know how cognitive abilities would help in managing risks, compliance and governance as...
Aadhaar - the largest biometric-based unique identification system in the world - holds the sensitive personal data of over 1.2 billion Indian citizens. With repositories of personal data held by both private companies and government, Aadhar has come under the lens for frequent data security lapses, and critics have...
Payments technology changes rapidly, and cybercriminal techniques are having no trouble keeping pace. As the use of stolen data and fraudulent cards become more difficult, criminals are shifting their focus and innovating to access customer payment transaction data. The risk of data theft is very real. To stay ahead,...
According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The question all security and fraud practitioners across...
While encryption, data loss prevention and web filtering technologies will continue to be important, Cloud Access Security Brokers will play a critical role in improving cloud security.
CASB, which is a next-generation firewall, helps CISOs gain the necessary visibility, map risks and detect external and internal...
Critical infrastructure - energy, defense and transportation among the components - forms the backbone of a nation's economy, security and health. Hence, it is imperative to secure critical infrastructure elements, such as power grids, communication and finance.
State-sponsored attacks are gaining momentum and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.