Vangelis Stykas will be presenting: Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical “rush to market” problems that can potentially allow a remote attacker to control them. This could […]
Spielboden Dornbirn
Färbergasse 15, Dornbirn, Austria
Ken Munro will be presenting: We need to talk about sex toys and cyber security Tickets: https://www.universe.com/events/tedxdornbirn-26022022-tickets-GXC1W6
In this session we will look at how modern hackers gain access to your customers data, we will explore the how ransomware operators work, how they obtain access, be that from staff selling VPN credentials to your staff’s terrible passwords. We will show how your room occupancy monitors and meeting room products could lead to […]
Millennium Gloucester Hotel
4-18 Harrington Gardens, London, United Kingdom
Cyber risks and Railways. Fixing OT to keep the hackers out OT / ICS / IIoT are relatively niche technology areas, but share a common purpose; to enable industrial ‘things’. Gartner’s description of OT nails it “…hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, […]
How should your business prepare and respond to a cyber attack? Staying cyber-resilient remains top-of-mind for all business leaders, and the cyber risk landscape continues to challenge companies. Cyber insurance is verging on the unaffordable, if indeed firms can even obtain cover. The threats of ransomware, social engineering, nation-state attacks and disinformation are constantly evolving. […]
Hilton Stockholm Slussen
Guldgränd 8, Stockholm, Sweden
Jo Dalton will be presenting: Supply chain tales and fails. Can there be a happy ending? As Operational Technology (OT) becomes smarter and increasingly connected, there are more risks that we need to understand and mitigate against. There is plenty we can learn from the list of ‘facepalm’ security moments in IoT to prevent similar […]