Top Business Tech Events, Cybersecurity: Fighting back with AI

Top Business Tech looks back over its first webinar, ‘Cybersecurity: Fighting back with AI’, and shares what’s in store at our next event!
Top Business Tech looks back over its first webinar, ‘Cybersecurity: Fighting back with AI’, and shares what’s in store at our next event!

Missed ‘Cybersecurity: Fighting back with AI?’ Watch it here:

Top Business Tech held its first webinar, ‘Cybersecurity: Fighting back with AI’ this week, where our editor, Amber Donovan-Stevens, caught up with Cyber Security Specialist for ESET, Jake Moore. 

Moore previously worked for Dorset Police, spanning 14 years primarily investigating computer crime in the Digital Forensics Unit on a range of offences from fraud to murder. Within law enforcement powers, he learnt how to retrieve digital evidence from all devices whilst engaging in various ways to ethically break security to help protect innocent victims of cybercrime. He then became a cybersecurity consultant for the police delivering tailored advice to the public and local businesses to help protect the community and build upon their security foundations.

The state of cybercrime in 2021

As IT leaders know all too well from the last year, cybersecurity threats have continued to climb at an exponential rate. In addition to this, the nature of the threats has changed. This shift has been attributed to the cybersecurity risks posed by remote work and cloud migrations that organisations carried out hurriedly. 

Cyberattacks impact companies of all sizes

Moore noted that a small company often does not consider itself the target of cybersecurity. Still, small companies run the risk of being impacted just as much as a large companies. In addition, he said that many companies of all sizes are suffering from fatigue from cybersecurity education. Moore emphasises that phishing simulations have the potential to do well but be conducted carefully. Shaming employees for falling for phishing, be it real or curated by the company for educational purposes, does little to improve cybersecurity. He goes on to acknowledge the success of Deep Fakes in attacking businesses and that most employees will not know that this technology has even been created. This is another reason not to punish employees, as most employees will have never seen these types of attacks before. 

The rise of ML in cyberattacks 

Data gathering and machine learning are two key components that have emerged as key forms of attack in the last year. This makes public data, which once would have taken years to collate, immensely valuable as it can now be collected in minutes using machine learning. This creates ethical questions for platforms that host public data, such as Facebook, which had its data stolen earlier this year. Though Facebook asserted this was not an attack as the information taken was publicly available, it does bring brand trust into question. These attacks have also become more prevalent across communications platforms that have become popular over national lockdowns such as Zoom and Microsoft Teams. With employees working across so many communication platforms, including email, which has become one of the top cybersecurity threats in 2021, employees are becoming overwhelmed and require more support in protecting themselves and their organisations. 

To discover how to mitigate against these attacks, be sure to check out the full video now.

About our next event: How the digital nomad generation influences business behaviour

For so many of us, we can still recall a life where technology was not so heavily interlaced into our everyday. But, while many of us can remember the days of a dial-up connection, floppy disks, and flip phones, a generation of digital nomads are rising, who have spent infancy with smartphones in their hands.

As we pair the digital fluency of Generation Z and its subsequent generations with the acceleration of digital transformation across all sectors in response to the coronavirus pandemic, it is no surprise that the standard working model has given way to remote and hybrid work. While the benefits are considerable, a new set of security concerns has been added to the plate of technology decision-makers, who must contend with cloud security threats; the lack of firewalls and blacklisted IP addresses, and bring your own device (BYOD) considerations. Top Business Tech catches up with several thought leaders who provide their thoughts on the shifting landscape.

READ MORE:

Click here to register for the next event 

We welcome all technology leaders and enthusiasts to the event, where we will host an open Q&A. We hope to see you on Tuesday 28th September 2021, at 10:00! 

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...

Nova: The Ultimate AI-Powered Martech Solution for Boosting Sales, Marketing...

Erin Lanahan • 19th November 2024

Discover how Nova, the AI-powered engine behind Launched, revolutionises Martech by automating sales and marketing tasks, enhancing personalisation, and delivering unmatched ROI. With advanced intent data integration, revenue attribution, and real-time insights, Nova empowers businesses to scale, streamline operations, and outperform competitors like 6Sense and 11x.ai. Experience the future of Martech with Nova’s transformative AI...