Cyber Security Articles & News

EVENT REVIEW: Regent’s cybersecurity summit looks at threats from Russia and our appliances | Cybersecurity column

Is my TV talking to Russians?

Do refrigerators really need an internet connection?

Are robots going to put us all out of work?

These were but a few of the questions prompted by speeches and panel discussions at Regent University’s inaugural cybersecurity summit Feb. 15.

The lineup for the first session – which had a packed house in the main theater at the school’s Performing Arts Center – included executives from Google, Cybint, Hewlett Packard, the FBI, GE Healthcare, Eastern Virginia Medical School, GRIMM and Regent.

The discussions centered on cybersecurity challenges in every aspect of life including business, government, health care and home.

The sold-out second session and luncheon featured Kevin Mitnick, a former hacker who was on the FBI’s Most Wanted List. After a five-year prison stint, he became a “white hat” hacker, or one considered ethical.

Now the CEO of security consulting company, Mitnick entertained the audience with displays of cyber legerdemain and a rollicking rendition of his life, from his start as a “phone phreaker,” to life on the run to respected businessman. He showed for example, how to quickly steal basic information from an employee identity card.

Ian Green, a Google executive and engineering manager, opened his keynote address with the startling figure that 2017 marked the year the number of connected devices exceeded the number of humans on the planet.

“So this begs the question, how do we scale to meet the demands of an ever increasingly connected world?” Green asked.

Read the rest of the event review at the source.

Source: Inside Business

Topics: Google, cybersecurity summit, Eastern Virginia Medical School, FBI, GE Healthcare, GRIMM, Hewlett Packard, Ian Green, keynote speaker, Roy Zur, Virginia, white hat hacker, Cybint, Regent University, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›