The ISACA dinner 25 November will start with a live IoT hacking session with Jo Dalton, Associate Partner, Pen Test Partners. https://www.linkedin.com/posts/isaca-sweden-chapter_breaking-news-the-isaca-dinner-25-november-activity-6866362477664370688-UKEB/
Tramshed Cardiff
Clare Rd, Cardiff, Glamorgan, United Kingdom
Pwning 10^7 devices in 10^1 minutes across 10^2 endpoints Vangelis will cover in 10 one-minute slides how anyone could control 10^7 (that’s 10 million) devices by exploiting a series of simple yet critical API flaws that were typical “rush to market” flaws that can allow an attacker to control and even use them as […]
Vangelis Stykas will be presenting: Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical “rush to market” problems that can potentially allow a remote attacker to control them. This could […]
Spielboden Dornbirn
Färbergasse 15, Dornbirn, Austria
Ken Munro will be presenting: We need to talk about sex toys and cyber security Tickets: https://www.universe.com/events/tedxdornbirn-26022022-tickets-GXC1W6
In this session we will look at how modern hackers gain access to your customers data, we will explore the how ransomware operators work, how they obtain access, be that from staff selling VPN credentials to your staff’s terrible passwords. We will show how your room occupancy monitors and meeting room products could lead to […]
Millennium Gloucester Hotel
4-18 Harrington Gardens, London, United Kingdom
Cyber risks and Railways. Fixing OT to keep the hackers out OT / ICS / IIoT are relatively niche technology areas, but share a common purpose; to enable industrial ‘things’. Gartner’s description of OT nails it “…hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, […]
How should your business prepare and respond to a cyber attack? Staying cyber-resilient remains top-of-mind for all business leaders, and the cyber risk landscape continues to challenge companies. Cyber insurance is verging on the unaffordable, if indeed firms can even obtain cover. The threats of ransomware, social engineering, nation-state attacks and disinformation are constantly evolving. […]