Where does cybercrime attack from and how can you protect your company?
Managing Director of Monetary Authority of Singapore, Ravi Menon warned that while emerging technologies help reduced risks in financial sectors, it may pose some risks and create new ones via cyberattack or runway algorithms.’
In the past, the threat of cyber-attacks was a tactic by cybersecurity vendors to sell their products to consumers and businesses. However, 2016 saw a number of high-profile cybercrime incidents that could have happen to any unknowing bank or other businesses. The most notable cases include the Bangladesh bank heist, the BitFinex hack, Yahoo’s mega-breach, and the DNC breach. Cyberattacks has already cost Asian companies’US$81 billion’in 2015, and it would be unsurprising to see the 2016 figure jump significantly.’
To limit these damages and be able to withstand attacks, companies must understand how these attacks work and what one can do to protect.’
—‘
Workshop Overview This 2-day Cyber-Attack Detection for Mobile and Web Technology is specifically designed to help delegates gain strategic understanding of cyber-attack and how one can protect his/ her organisation from being victim of such attack. ‘Equipped with a total of 5 live technical demonstrations, Delegates will have the opportunity to develop the necessary skills to identify the possible paths and attempts of a cyber-attack and most importantly how to recover from such attack in a timely manner.
There will be LIVE demonstrations on:’
- Blockchain
- Sniffing and hacking IoT
- Social engineering attack, including system take over (or ransomware)
- Network detection
- Memory and network forensics’
Attendees will also examine a case that will simulate a cyber-attack, from phishing to remote access.’
- Chief Data Officers
- Chief Digital Officers
- Chief Information Officers
- Chief Technology Officers
- Digital and Innovation Leads
- Financial Crime and Strategic Intelligence Leads
- Fraud and Security Unit
- Cyber Crime Unit
- Cyber and Data Security Unit
- Network Security Unit
- Identity and’Access Management
- Incident Response and Advanced Threat
- Information Sharing and Intelligence
- Privacy, Data Protection and Intellectual Property
- Risk and Resilience Professionals
For more information, please visit our website or contact our marketing personnel’Katie at dm1@openforum.sg.’
Thank you