P.O. Box 204
Gladwyne, PA 19035
610.896.9715
Deepfake technology works, and the various ways it may be used by threat actors to carryout financial crimes, sway elections, launch misinformation campaigns and cause reputational harm for individuals and organizations. We will also explore emerging technology that may help identify DeepFake technology and ways the cyber insurance underwriting community will need to prepare for potential DeepFake claims in the future.
Attendees will learn how Exposure Management, a new cybersecurity trend, helps organizations mitigate risk on their path to cyber resilience by visualizing the attack paths a threat actor would take to get access to their most critical IT assets.
One way that risk managers and cyber insurance leaders can mitigate many of the existing and emerging cyberattacks is to focus on an often-overlooked target--an enterprise’s domain security. By focusing on key areas: visibility and awareness, monitoring and Intelligence, and layered defense-in-depth strategy, organizations can strengthen the foundation of their online presence, mitigate the risk of phishing attacks, and protect their brand reputation.
While post-breach problems are many, the solutions are numerous. By highlighting three challenges routinely found in post-breach matters and presenting three useful solutions, this session explores options that a company can employ to help establish their record of reasonableness and defensibility.
Resilience is briefly defined as the capacity to withstand or to recover quickly from difficulties. This session will focus on defining what these difficulties may entail and how to efficiently recover post-attack. With a deep dive into three specific methodologies, the panel will discuss the various roads an organization might take and how these can influence the end-result.
Learn about the evolving ransomware landscape and attack vectors/methods. Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.
This is a follow up to the presentation John Donald made called “35 views of cyber risk” at the virtual Net Diligence event in 2020. Here, in Part Two of the 35 Views series, he focusses on the concepts from life sciences that help us to understand and model cyber risk. Using a murmuration of starlings as the central metaphor for systemic risk, he shows how we should look to biology rather than physics to comprehend cyber – the science of animate objects rather than inanimate ones.
The fun never ends at Miami Beach! Join the revelries at this mid-conference on-site event on the Loews' Great Lawn, featuring live DJ, food & drinks, and seating, plus ping-pong, cornhole, and table top games.
Event Hosted by Alvaka, Booz Allen Hamilton, Kivu, Pondurance, Trans Union & Trend Micro. Supported by Kroll & Surefire Cyber.
© 2024 NetDiligence All Rights Reserved.