Credits: None available.
Credits: None available.
Credits: None available.
Credits: None available.
Credits: None available.
Credits: None available.
Credits: None available.
Join key influencers, policy makers and thought leaders from around the globe to hear their perspectives on regional cybersecurity issues impacting all corners of the world. Seize the opportunity to get answers to your questions from our featured guests. In an increasingly interconnected world, the role of securing cyberspace has never been more important. Studies show, however, that the number of trained professionals that can perform this critical role does not align to the current and future needs of the industry. The workforce gap is currently around 350,000 and expected to widen over the next three years. This session will explore the challenges that organizations face in developing skilled cybersecurity teams and examines the power of diversity in the workforce. Hear about successful strategies that have been used in the European Union to address the cyber workforce gap such as talent development schemes like the European Cybersecurity Skills Framework, collaboration between academia and industry and continuous learning. Attendees will gain insights into future trends, the importance of overcoming obstacles, and the imperative of nurturing a workforce poised to defend against evolving cyber threats.
Credits: None available.
The dark web conjures up visions of bad actors in black hoodies working in a dark, smelly basement (and sure, there’s some of that). But the reality is, the dark web is a multibillion-dollar marketplace that funds some of the most powerful digital crime organizations on the planet. Ransomware, phishing kits, DDoS attacks — almost anything you can imagine — is for sale. How do these markets affect your organization on a day-to-day basis? What can you do to help mitigate their impact? We’ll discuss the tools you can use in defense.
Credits: None available.
Managing risk and incident response in OT is complex. It begins with asset inventory, vulnerability management and risk measurement. Learn what an adequate inventory looks like and how to round out a “normalized risk score” with temporal risk factors. We’ll explore the art of incident response in OT, and how to use a hierarchal SOC structure to better manage events and report risk status to executive leadership. You’ll learn how to maximize the functions of central SOC and subordinate SOCs.
Credits: None available.
This session will answer the common question, “How do I find a job in cybersecurity?” Whether you want to break into cybersecurity or land your next job, you can use hacker skills to make it happen. You’ll learn the three traits of a well-rounded cybersecurity professional and three areas for balanced learning. Steps for hacking your career include visualizing your goals, knowing the best path for you, social engineering your next boss, active learning and keeping your skills sharp. There is no single correct cybersecurity career path — learn how to find your own road less traveled.