Cyber Security Festival 2021

With many staff now working remotely, organisations have had to adjust their IT strategies to cope . Cyber strategies have had to adapt too, with new vulnerabilities coming to the fore. According to recent research from Computing , 53 per cent of organisations have suffered social engineering attacks which play on the uncertainties created by the pandemic, and 44 per cent have seen increased malware attacks. The same number feel that they are more vulnerable to malware now than at the start of 2020.

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i


OTHER PAST CONFERENCES

Threat Management Practitioner MicroSummit

January 24, 2024 | UK

Attackers employ a variety of threats with the goal of deliberately infiltrating, disrupting, exposing, damaging or stealing from their intended targets. These cyberattacks come in many forms, understanding the various types of cyberthreats and how to properly defend against them is imperative for enabling secure and successful business growth. Following the success of our inaugural Practitioner MicroSummit in December we will be hosting our second event in January. Join us for an afternoon of technical insights where we will look at how the network, endpoint and cloud all provide the necessary information to effectively identify, protect, detect and respond to these threats and Unit 42 - our class-leading Threat Intelligence and consultancy services arm - will bring these data-points into line with the essential processes needed to effectively recover from an attack. Post Summit, join the team for an informal evening reception whilst admiring the best views of London on the 55th floor of our flagship London office at 22 Bishopsgate.

innovate cybersecurity summit 2024

February 25-27, 2024 | USA

Powered by the collected knowledge of hundreds of experts whose decades of expertise cross a wide variety of industries, Innovate is the premier resource for CISO education & collaboration.

IT Security Insights 2024

January 31, 2024 | Sweden

Welcome to the 8th Edition of the IT Security Insights Conference, which will bring together key stakeholders in the cybersecurity marketplace in Sweden. These key stakeholders include IT security practitioners, technology providers, start-ups, and academics, all of whom work with information security and cybersecurity matters. The purpose of this conference is to discuss current IT Security challenges faced by leading Nordic and global organizations. On the 31st of January, 2024, the event will take place at the Hotel Birger Jarl in Stockholm, Sweden, and will utilize a hybrid format with both online and in-person participation.

Nordic IT Security Event

May 23, 2024 | Sweden

The most reputable cyber security summit in Scandinavia, Nordic IT Security, has been around for 17 years acting as a steering wheel for navigation through the Nordic’s “cybersecurity watch-out” scheme. With its notable speakers and partners the summit provides a platform for seasoned industry professionals to come together and discuss business critical topics. Covering the latest cutting-edge technology the event is designed to secure all the aspects of the 21st century’s global communities challenges. Our research has shown that a great majority of businesses and companies across all industries are likely experiencing the same or similar pain points, so let’s all come together this May in Stockholm and discuss the root causes of these pain points and find the Best solutions.

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

resources