Early-bird Discount
expires in
Register Now

Blog

cyberevolution 2024 Blog

Read the latest news and updates

Security in the Era of Rapid Digitalization in Operational Technology Environments
As digitalization accelerates in industrial and operational settings, Operational Technology (OT) environments have become more interconnected with enterprise IT and even cloud infrastructures. The increased connectivity often can provide more efficiency and new capabilities, but it also introduces complex security challenges. Protecting OT and IoT environments is critical but complicated due to the differences in functions and approaches to securing IT vs. OT infrastructures.
John Tolbert
Nov 28, 2024
Redefining Cybersecurity: Facing the Next Generation of Threats
Trust in the digital age is under siege—explore how innovative cybersecurity measures can turn the tide against increasingly sophisticated attacks.
Nitish Deshpande
Nov 20, 2024
Digital Divide: The US-China Struggle for Cyberspace
The blog discusses the evolution of international relations as once-promised liberal democratic supremacy gives way to a multipolar world. This shift is mirrored in cyberspace, where control over digital infrastructure and data flows has gained importance akin to past territorial rivalries. The strategic competition between major powers, particularly the U.S. and China, spans undersea cables, semiconductors, and competing visions of Internet governance.
Alejandro Leal
Nov 11, 2024
From Stress to Security: Building a Focused, Resilient Workforce
Discover how mindfulness practices can strengthen cybersecurity by reducing human vulnerabilities to phishing and social engineering attacks. In this insightful interview, learn how integrating mental clarity and focus into security culture helps organizations build resilience and combat cyber threats. Watch to gain actionable tips on fostering a mindful, proactive cybersecurity approach.
Oct 31, 2024
Tackling AI-Driven Cyber Risks: A Look at New Security Regulations
This blog previews Dennis-Kenji Kipker’s cyberevolution 2024 session on AI in cybersecurity and regulations like the EU AI Act. Watch the interview for insights into AI-driven threats and proactive defense strategies.
Oct 21, 2024
Guardians Under Pressure: Mental Health in the World of Cybersecurity
Trust in cybersecurity extends beyond just technical defenses—explore the unseen mental toll on professionals and the essential strategies to foster their well-being in this blog post and at cyberevolution 2024.
Warwick Ashford
Oct 14, 2024
Adapting to Europe’s Latest Cybersecurity Laws: A Legal Perspective
This interview with Stefan Hessel, Senior Legal Advisor at ER Secure, explores the impact of new regulations like the EU AI Act on cybersecurity. Learn how businesses can navigate compliance and strengthen their defenses against AI-driven threats.
Oct 07, 2024
Mastering NIS2 and DORA Compliance
Robust cybersecurity measures are crucial as organizations face escalating digital threats. This blog examines the impact of regulations like NIS2 and DORA and provides vital strategies to bolster your defenses. Learn from real incidents and ensure your organization is prepared for the future.
Mike Small
Oct 07, 2024
Zero Trust Beyond Identity: A Holistic Approach to Cybersecurity
The Zero Trust security model enhances cybersecurity by requiring strict verification for every access request. It encompasses measures across identity, devices, networks, applications, and data to achieve a more resilient cybersecurity posture.
Alejandro Leal
Sep 30, 2024
Understanding the Opposition
Dive into strategic insights on how to prepare for upcoming cybersecurity threats and understand your opposition in the ever-evolving digital battleground.
Anne Bailey
Sep 24, 2024
Offensive Security: Identifying Vulnerabilities Before Attackers Do
As cyber threats grow more sophisticated, organizations must adapt their defense strategies. Offensive security, which focuses on identifying and addressing vulnerabilities before attackers exploit them, is key to modern cybersecurity.
Sep 17, 2024
AI in Cybersecurity: Risks and Opportunities
Discover how you can leverage advanced AI techniques without falling for the hype. Learn about practical use cases and the importance of human oversight to keep your digital defenses robust. This blog will provide you with critical insights to navigate the complex intersection of technology, risk, and trust.
Alexei Balaganski
Sep 17, 2024
Protecting Cloud Environments at Scale
Trust in cloud security is under siege! Stay ahead of evolving threats with expert strategies and insights at cyberevolution 2024, featuring Siemens AG's Cybersecurity Architect, Dominik Sowinski.
Sep 11, 2024
Cloud Security - Problem Solved? No!
Trust in cloud computing is fragile, but essential. Navigate the complexities of cloud security and stay ahead of cyber threats with this take on the greatest challenges and solutions for 2024.
Osman Celik
Sep 10, 2024
SOAR Platforms and Generative AI: Building an AI-Skilled Workforce
Trust in technology has evolved from smashing machines to mastering AI. Discover the journey, challenges, and opportunities that lie in the integration of AI within cybersecurity, and how to stay ahead in this rapidly changing landscape.
Alejandro Leal
Sep 02, 2024
The Anatomy of Cyber Resilience
In the context of business, cyber resilience pertains to an organization's capacity to sustain operations and deliver desired outcomes in the event of a cyber threat or incident. It involves the ability to not only prevent and protect against cyber threats but also to detect, respond to, and recover from them in an effective way.
Osman Celik
Aug 23, 2024
Software Supply Chain Security: Are You Importing Problems?
Trust in software can be your greatest asset - or your biggest downfall. Dive into the world of Software Supply Chain Security and learn how to rethink responsibilities and adopt a comprehensive risk management approach that aligns with modern regulatory requirements.
Alexei Balaganski
Aug 02, 2024
Trust in an AI Interconnected World
With the rise of Artificial Intelligence in numerous online systems and applications, interactions become even more distant and unknown, posing further challenges to human trust. How can we rely on interactions with AI (and those mediated by AI) when we are uncertain about what to anticipate from it?
Scott David
Jul 22, 2024
Identity Security
Identity and access management is increasingly important due to the rise in cyber-attacks using digital identities. This has led to greater emphasis and spending on IAM solutions, including modular options for authentication, authorization, access management, and identity governance delivered as cloud-hosted services.
John Tolbert
Jul 05, 2024
Almost Ready to Join the cyberevolution 2024?
Reach out to our team with any remaining questions
Get in touch