Intelligence-based cybersecurity presented at ecrime&cybersecurityBenelux 2018

by Gal Messinger,

Summary : Why do we need cyber threat intelligence in a commercial entity?What exactly is cyber threat intelligence?Where should we position it in a company?Who should be running it?A use case Beyond Security: Zero Trust - Making the perimeter less lonelyRichard ArchdeaconN/AN/AConcept of zero trust or the BeyondCorp modelWhy a zero trust model will reduce risk?Key elements in implementing a zero trust approach A New Era of Cyber Threats: The Shift to Self Learning, Self Defending NetworksElisabeth EntjesN/AN/ALeveraging AI algorithms to defend against advanced, never-seen-before, cyber-threatsHow new immune system technologies enable you to pre-empt emerging threats and reduce incident response timeHow to achieve 100% visibility of your entire business including cloud, network and IoT environmentsWhy automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower riskReal-world examples of subtle, unknown threats that routinely bypass traditional controls Fast and Accurate Issue ResolutionSandrine Kubach and Rob Earley N/AN/AThe cost of Network and Security issuesBeing prepared for a potential breachThe Various approaches to breach detectionUsing the right tools for the job GDPR and the Internet of Medical Things Ferdinand Uittenbogaard and Conrad Veerman N/AN/AThe Internet of Things, particularly the Internet of Medical Things, can prove valuable for both employers and employees, yet there are significant risks associated with such devicesIoT brings challenges for privacy by design and GDPRHow we can make sure that organisations and employees benefit from such devices, whilst also staying safe and secure?