Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.
Jonathan Andresen, Senior Director, Marketing and Products, Asia Pacific and Japan, Bitglass examines the shift to Secure Access Service Edge (SASE) architecture in response to evolving cyber threats like the SolarWinds breach. Learn about modern breach trends, SASE's key pillars, and the cost-benefit analysis of SASE protection versus data breaches.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Avinash Narasimhan explores strategies to secure file transfers, a critical yet vulnerable aspect of business operations. Learn to combat threats with layered protection, deep CDR technology in a zero trust framework, and next-gen sandboxing tools to safeguard files in transit and at rest.