EVENT REVIEW: Regent’s cybersecurity summit looks at threats from Russia and our appliances | Cybersecurity column

Is my TV talking to Russians?

Do refrigerators really need an internet connection?

Are robots going to put us all out of work?

These were but a few of the questions prompted by speeches and panel discussions at Regent University’s inaugural cybersecurity summit Feb. 15.

The lineup for the first session – which had a packed house in the main theater at the school’s Performing Arts Center – included executives from Google, Cybint, Hewlett Packard, the FBI, GE Healthcare, Eastern Virginia Medical School, GRIMM and Regent.

The discussions centered on cybersecurity challenges in every aspect of life including business, government, health care and home.

The sold-out second session and luncheon featured Kevin Mitnick, a former hacker who was on the FBI’s Most Wanted List. After a five-year prison stint, he became a “white hat” hacker, or one considered ethical.

Now the CEO of security consulting company, Mitnick entertained the audience with displays of cyber legerdemain and a rollicking rendition of his life, from his start as a “phone phreaker,” to life on the run to respected businessman. He showed for example, how to quickly steal basic information from an employee identity card.

Ian Green, a Google executive and engineering manager, opened his keynote address with the startling figure that 2017 marked the year the number of connected devices exceeded the number of humans on the planet.

“So this begs the question, how do we scale to meet the demands of an ever increasingly connected world?” Green asked.

Read the rest of the event review at the source.

Source: Inside Business

Topics: Google, cybersecurity summit, Eastern Virginia Medical School, FBI, GE Healthcare, GRIMM, Hewlett Packard, Ian Green, keynote speaker, Roy Zur, Virginia, white hat hacker, Cybint, Regent University, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›