8th Infocom Security Conference: NSS, Boldon James, CyberArk and Sophos will show you the future of cybersecurity
NSS, along with Boldon James, CyberArk and Sophos will show you the future of cybersecurity at the Infocom Security Conference, on 18th and 19th of April – Dais Conference Center.
The 8th Infocom Security event coincides with the “year of GDPR”, as many call 2018, because of the imminent application -on March 25- of the well-known European General Data Protection Regulation (GDPR).
This regulation compels all organizations and businesses to comply with a new framework of technical and organizational measures for the protection of personal data, and fines especially high amounts in cases of data breach and loss. Another significant development is the official establishment of the Data Protection Officer (DPO) position.
However, the most essential and important change that GDPR brings, is that through its obligatory application, it sets the foundation for the creation of a really secure IT infrastructure in organizations and businesses.
So, businesses should grab this opportunity and look to the day after, in relation to digital security and the protection of their IT systems and the data they manage. A day after when digital security professionals and specialists, are called upon to significantly contribute in guiding their organizations, in order to optimize important procedures, like:
- Risk assessment
- Security policies
- Security penetrations
- Users training
- Adoption of technology-based solutions and services
As such, the 8th Infocom Security Conference, on 18 and 19 April, will focus on the immediate and necessary adjustments that businesses and organizations have to make, in order to comply with all aspects of GDPR, while looking to the day after and at the big picture, of information security.
The main feature of the conference, this year as well, will be the multitude of subject content, combining a business approach to IT Security, along with a wider scientific and technological interest about cyber-security.
Infocom Security will once again be an opportunity for you to keep informed about the evolution of digital threats, find out about trends and strategies developed in the sector of information security, get to know new data protection technologies and solutions, as well as meet up with people of this industry, from Greece and other countries, including peers, specialized scientists and researchers in this field.
NSS is a proud sponsor and will participate at the 8th Infocom Security Conference, on 18 and 19 April with three foreign cybersecurity experts and presenters from Boldon James, CyberArk and Sophos.
1st Day Schedule – Wednesday 18/4
09:00 – 09:30 – Gathering – Registration
09:30 – 10:00 – Commencement – Introductions
10:00 – 12:00 – 1st Section: Security as Enabler in the Digital Era
It’s a fact that the digital age has completely transformed the way businesses and organizations work, while having created a series of new and constantly evolving challenges and risks, associated with data protection. The moving force in today’s digital age is undoubtedly security. During the 1st day’s 1st section of the conference, managers of Risk Management and Digital Security Services companies, as well as Integrators of such projects, will talk to us about modern challenges of this new digital age, highlight optimal risk management practices, and develop a roadmap to safely adopt new trends (IoT, cloud, mobility, etc.) and comply with GDPR.
11:00 – 12:00 | WORKSHOP/ HALL D1-A1: Sophos Synchronized Security in Action – Live Demo of an attack with Sophos security expert Malay Upadhyay
12:00 – 12:30 – Break
12:30 – 14:30 – 2nd Section: How to Predict, Detect, Respond & Prevent
The new generation of attackers plays for keeps. They invade corporate networks not just to prove they are able to, but to grab valuable data and ransom money, among other things.
Various versions of ransomware attacks and other threats that cropped up in the last year, have had serious impact on way too many businesses and organizations. The quartet of prediction, detection, response and finally prevention of such attacks, is the base on which to implement every business solution of digital security, today. Experts from Greece and abroad will talk to us in the 2nd section about technologies developed to enhance network and endpoint security, battling current and future threats, effectively.
12:30 – 13:30 | Get your enterprise ready for GDPR with CyberArk
David Kellerman – Technical Advisor, Customer Success, Cyberark
13:30 – 14:30 | Bringing data protection to life with Data Classification
Luke Shutler – EMEA Channel Director, Boldon James
13:30-14:30 | WORKSHOP/ HALL D3-A3: Detect and response to a breach in 72 hours through CyberArk Privileged Account Security with David Kellerman, Technical Advisor – Customer Success, CyberArk.
14:30 – 16:00 – 3rd Section – Data Protection and New Privacy Challanges
Personal data protection and privacy issues in general, are the subject of an increasing number of organizations that manage critical corporate data, as well as businesses of any activity and size, citizens, countries and society. The GDPR and the establishment of a Data Protection Officer, creates a truly new situation and a new age for all. Scientists, academics, researchers, and people of technology, will talk to us in this section about challenges that have come up concerning issues of privacy and data protection, policies and technological tools developed to address the increasing needs.
2nd Day Schedule – Thursday 19/4
09:00 – 09:30 – Gathering – Registration
09:30 – 10:00 – Commencement – Introductions
10:00 – 12:00 – 1st Section: Choosing and Implementing the Right Information Security and Risk Management Strategy
Conditions are now mature for a new strategy about data protection, and the GDPR comes to give a push even further towards this direction. A great opportunity opens up, for businesses and organizations to select and implement a new plan of digital security and risk management, customized to their own needs, while keeping in mind the compliance requirements, as well as the whole landscape of creeping risks. Companies that consult on, control and implement digital security projects, play a very important role in the selection, shape and implementation of this one plan that will deal effectively with every breach incident. Representatives of these companies, as well as IT department managers, will highlight in this section, the ways to select and implement such plans.
12:00 – 12:30 – Break
12:30 – 14:30 – 2nd Section: Smarter Cyber Defence against Advanced Cyber Threats
Definitions such as: Artificial Intelligence, Cyber Threat Intelligence, Machine and Deep Learning, IoT, Smart and Next-Gen Security, are now a proper part of our lives, especially when it comes to digital security. In what degree do these definitions essentially affect digital security and are not just another marketing tool? How far apart are theory and practice for a really “smart” defense against evolved threats and updated ransomware attacks? Just how smart new solutions developed by manufacturers actually are, and how well can they help comply with the GDPR? Corporate managers from Greece and abroad, specializing in the development of technological solutions about security, will answer all of these questions for us, in this section.
13:00 – 14:30 | NSS and Sophos invite you to “Seeing the Future: Sophos Introduces Deep Learning into its Synchronized Security Portfolio” presentation with Sophos security expert Malay Upadhyay in the Plenary Hall on 19th April.
14:30 – 16:00 – 3rd Section: The Rising Face of Cyber-Crime
Cybercrime changes shapes all the time. Attackers and malicious hackers constantly invent new ways to penetrate corporate networks. Ransomware attacks, the Dark Web, cyber-warfare, online organized crime, social engineering, phishing, as well as issues concerning security in social media, fake news and BitCoin, are high in the current agenda. So, in which way does the rising face of cybercrime affect today’s landscape? How ready are we to deal with these challenges? Speakers in the conference’s closing section, will highlight all critical aspects of cybercrime and talk to us about ways to fight it, penetration testing methods and the role of ethical hackers in enhancing defense mechanisms.