Artificial Intelligence and Machine Learning, Fraud Management and Cybercrime, Leadership and Executive Communication
Experts highlight proactive security measures and resilience to mitigate threats
Pooja Tikekar (@PoojaTikekar) •
September 26, 2023
Information Security Media Group recently concluded the Cybersecurity Summit: London. The summit brought together industry leaders for his one-day informative sessions covering a variety of important cybersecurity topics.
Related item: Live Webinar | Cyber Resilience: Recovering from Ransomware Attacks
Helen Raab, CISO at the BBC, gave a keynote speech during the ‘CISO One-on-One’ segment, highlighting the transformative power of technology, particularly in the context of artificial forces, honing team skills and being effective. focused on leadership and incident response. Intelligence. Mr. Raab also emphasized the need to align security with business outcomes and communicate security strategy across all levels of the organization.
Featured speakers include Milos Pesic, CISO, ABB Accelleron. Quentin Taylor, Canon’s Senior Director, Europe, Middle East and Africa, Information Security and Global Affairs. Don Gibson, CISO, Kinley. John Stone, Director, Google Cloud CISO Office. Tai Alad, Director of CyberGRX EMEA Solutions Engineering.
AI and Cybersecurity
AI was a prevalent theme throughout the summit due to its growing importance in cybersecurity.
“The security experts who make up our ‘Navigating the Technical Landscape of AI’ panel look beyond the FUD elements of fear, uncertainty, and doubt to explore the most promising applications of AI/ML, “We detailed the risks posed by adversarial AI and shared the challenges and challenges we face in implementing today’s AI-driven systems,” said Matthew Schwartz, DataBreachToday Editor-in-Chief at ISMG. Masu. “They all seemed enthusiastic about the security and privacy benefits offered by civilian generative AI models.”
The discussion also explored the adoption of AI in organizations, the challenges it poses, and the importance of training security teams to use AI effectively. Stone describes Google’s Secure AI Framework, which is designed to reduce risks inherent to AI systems, such as model theft, data poisoning, malicious input, and the extraction of sensitive information from training data. SAIF) was investigated in detail.
Ransomware response exercise
The solution room session titled “From Attack to Recovery: Incident Response in Ransomware Scenarios” will explore the persistent and high-stakes nature of ransomware threats faced by cybersecurity leaders, regardless of their organization’s security architecture. was emphasized. The discussion highlighted that attack vectors are increasing, including internal missteps, supply chain vulnerabilities, and human error, all of which increase the risk of ransomware attacks.
“I especially enjoyed the solution room scenario where everyone participated in networking and collaborating on a tabletop exercise for ransomware incident response. This highlighted the need to prepare in advance to minimize the risk of disruption,” said Tony Maubin, Executive News Editor, ISMG EU. “The importance of well-thought-out and practiced response strategies was highlighted, including how information needs to be communicated proactively and updated regularly to deal with changing threats and situations. .”
The Solution Room session served as a precursor to an interactive incident response workshop, where industry leaders shared their first-hand experiences in facing and defending against ransomware attacks.
Important points
- CISOs and CIOs are increasingly vulnerable to executive liability, especially in the case of data breaches and security incidents.
- Proactive measures, crisis management protocols, and analysis of past incidents are key to mitigating future ransomware threats.
- Effective leadership can help prevent burnout among cybersecurity teams.
Join ISMG Cybersecurity Summit: Financial Services Discover cutting-edge strategies and insights from industry experts to protect your organization from evolving cyber threats.