This is a preliminary program and is subject to changes in timings and content.
Registration is set to begin at 8AM sharp so we kindly ask all attendees to show up on time. Thank you
Dive into the intricacies of a significant hack, dissecting its magnitude and significance. Best practices for incident management
• Optimal responses and key takeaways
• Challenges encountered by security professionals
Cyber criminals target businesses of all sizes. How to protect your business?
• Implement cybersecurity basics to reduce the risk of cyber attacks & train your employees
• Implementing measures to protect privacy & IP assets from theft or unauthorized access by cybercriminals
• Prevention and Incident Response Planning
• Identity Security, Endpoint Security, and Database Protection
Moderator: Sanja Kekić, President, Women4Cyber Serbia
Jasmin Azemović, CISO, HTEC Group
A chance for all attendees to meet up, chat and exchange their experiences.
Explore the heightened vulnerability of Fintech organizations to outsider threats
• Strategies for Identifying Primary Risk Sources
• Cloud Ecosystem: Effective Third-Party Risk Management
• E-banking and Mobile app security/evaluation and testing
The role of machine learning algorithms in threat detection and response, the ethical implications of AI in cyber operations, and strategies for bolstering cyber resilience in the face of sophisticated AI-enabled threats.
• Analyzing the industries targeted by over 50% of ransomware attacks: banking, retail, and utilities, alongside the broader impact on other sectors
• Assessing best practices in different industries to combat ransomware threats
• Defining liability boundaries: Where do responsibilities lie in ransomware scenarios?
• Examining societal implications: Considerations beyond financial impact in dealing with ransomware incidents
As cyber threats evolve, social engineering emerges as a potent weapon exploited by cybercriminals to exploit vulnerabilities within organizations. Join us to delve into the rise of social engineering tactics, specifically phishing attacks, and understand why vigilance is paramount in today’s cybersecurity landscape.
• Unveiling Social Engineering Attacks: Exploring the landscape of social engineering and the deceptive techniques employed by cybercriminals to exploit human vulnerabilities.
• The Anatomy of a Phishing Attack: Understanding how phishing attacks leverage trust, imitating credible sources, and employing persuasive scenarios to deceive individuals into divulging sensitive information.
• The Human Element in Cybersecurity: Recognizing that not all hacks involve keyboards, emphasizing the role of human error as a significant factor in successful social engineering attacks.
• Strategies for Prevention: Exploring proactive measures and best practices to prevent and mitigate social engineering attacks, including user education, robust security protocols, and technological solutions.
Ina Poljak, Psychologist, Consultant & Author
A chance to get some food and keep the networking going.
• The fusion of humanity and technology: Implications for security evolution
• Attention on developing tools to detect and mitigate the impact of deepfakes
Dragan Pleskonjić, Founder, Glog AI
Jasmin Azemović, CISO/University Professor, HTEC Group
This panel offers a comprehensive exploration of cybersecurity from a legal perspective, covering crucial aspects:
• Laws and Regulatory Frameworks: Examine the evolving legal landscape governing cybersecurity. Gain insights into NIS2 regulative and national laws addressing cybercrime, data breaches, and cross-border data flow.
• Privacy in the Digital Era
Senad Džananović, Director of Cybersecurity, Zira
Another chance to get to know other attendees and get some refreshment.
Unlocking the potential of hyperscale cloud providers such as AWS, Azure, and GCP offers rapid product deployment. However, the challenge remains in striking a balance between speed and adhering to compliance, managing risks, and combating a growing array of security threats. Can CNAPP pave the way for simplified cloud-native cybersecurity?
• Uncovering obstacles to achieving cloud-native security
• Evaluating the effectiveness of various cybersecurity tooling strategies: CSPM, KSPM, CIEM,
CWPP, IaC, EDP, HIPS, and the emerging CNAPP
• The struggles and barriers for Cyber Security Teams within the standard DevOps framework
• Strategic Positioning: Discussing comprehensive strategies and solutions for securing digital transformation addressing complex challenges in modern infrastructure.
Time to wrap up the Cyber security Summit with a few closing remarks.
This is a preliminary program and is subject to changes in timings and content.
Cyber Security Summit© 2024 All Rights Reserved.