18.11.2014 Views

Google's Top-ranked Cyber Security Conference to Bring Key Insights for CISOs Facing Cyber Threats

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises' information assets.

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises' information assets.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Google's</strong> <strong>Top</strong>-<strong>ranked</strong> <strong>Cyber</strong> <strong>Security</strong> <strong>Conference</strong> <strong>to</strong> <strong>Bring</strong> <strong>Key</strong><br />

<strong>Insights</strong> <strong>for</strong> <strong>CISOs</strong> <strong>Facing</strong> <strong>Cyber</strong> <strong>Threats</strong><br />

Building off of the momentum of past successful conferences, Golden<br />

Networking brings <strong>Cyber</strong> <strong>Security</strong> World <strong>Conference</strong> 2014 New York City<br />

(www.<strong>Cyber</strong><strong>Security</strong>World<strong>Conference</strong>.com), <strong>for</strong>um that will bring the latest<br />

thinking from security experts <strong>to</strong> hundreds of senior executives focused on<br />

protecting enterprises' in<strong>for</strong>mation assets.<br />

New York, NY, USA (November 18, 2014) --<br />

When pro-democracy protests erupted in<br />

Hong Kong in September, cyber attacks<br />

aimed at compromising protesters' mobile<br />

phones soon followed. Spread through links<br />

in pro-Hong Kong e-mail messages, the<br />

mobile remote access <strong>to</strong>ol (mRAT) gave the<br />

group behind the attack, the most obvious<br />

suspect being the Chinese government,<br />

almost <strong>to</strong>tal access <strong>to</strong> the device and its data.<br />

Two weeks later, similar espionage attacks<br />

were found hidden on compromised websites<br />

of organizations supporting the democratic<br />

movement.<br />

The attack on Hong Kong citizens<br />

underscores the degree <strong>to</strong> which<br />

governments have taken <strong>to</strong> programs<br />

typically associated with hackers and<br />

cybercriminals. In fact, our reliance on these<br />

technologies has left us open <strong>to</strong> a variety of<br />

threats, says the Georgia Institute of Technology. <strong>Cyber</strong>criminals continue <strong>to</strong><br />

compromise users' computers and are increasingly turning their attention <strong>to</strong> mobile<br />

devices. In addition, online thieves have aimed their <strong>to</strong>ols at larger prey, resulting in a<br />

string of large data breaches at well-known companies, such as Target, Home Depot,<br />

and JPMorgan Chase.<br />

Indeed, J.P. Morgan Chase, America's largest bank with $2.39 trillion in assets,<br />

announced a few months ago that about 76 million households and 7 million of smallbusiness<br />

cus<strong>to</strong>mers had been affected by a cybersecurity attack in one of the most<br />

sweeping disclosed global breaches. The bank said the unknown attackers s<strong>to</strong>le<br />

cus<strong>to</strong>mers' contact in<strong>for</strong>mation, which included names, email addresses, phone


numbers and addresses, affected an amount equivalent <strong>to</strong> two-thirds of American<br />

households.<br />

A brief walk down memory lane of some the biggest recent cyber-attacks now include<br />

Adobe Systems, Au<strong>to</strong>mated Data Processing, Citigroup, E*Trade Financial, Fidelity<br />

Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Walmart.<br />

It is not unlikely <strong>to</strong> consider that the in<strong>for</strong>mation of every American has already<br />

been compromised in any of these publicly disclosed attacks.<br />

<strong>Cyber</strong> security is there<strong>for</strong>e no longer a term <strong>to</strong> ignore <strong>for</strong> neither individuals nor<br />

corporations. The daily activities of all Americans, the country's economic prominence<br />

and global security rely on a safe and resilient cyberspace. Yet the number of cyberattacks<br />

has increased dramatically over the last years, exposing confidential personal<br />

and business data, disrupting critical operations, and imposing high costs on the<br />

economy overall.<br />

Golden Networking's <strong>Cyber</strong> <strong>Security</strong> World <strong>Conference</strong> 2014 New York City<br />

(http://www.<strong>Cyber</strong><strong>Security</strong>World<strong>Conference</strong>.com) will provide a plat<strong>for</strong>m <strong>for</strong> in<strong>for</strong>mation<br />

security authorities and innovative service providers <strong>to</strong> distil their latest thinking <strong>for</strong><br />

hundreds of senior executives focused on protecting <strong>to</strong>day's enterprises. <strong>Cyber</strong><br />

security experts will discuss <strong>to</strong>pics such as protecting individuals and companies<br />

against cyber-attacks, biometrics as the future of security, risks brought by mobile<br />

computing, and protecting corporate and national infrastructure against <strong>for</strong>eign attacks.<br />

<strong>Top</strong>ics that <strong>Cyber</strong> <strong>Security</strong> World <strong>Conference</strong> 2014 will discuss include:<br />

• <strong>Cyber</strong> <strong>Security</strong> Megatrends <strong>Security</strong> Professionals can't Ignore Today<br />

• Designing and Managing Effective In<strong>for</strong>mation <strong>Security</strong> Programs<br />

• How Hackers Really Operate <strong>to</strong> Obtain Financial Data<br />

• <strong>Key</strong> Considerations about <strong>Security</strong> in the Internet of Things Age<br />

• Strengthening the <strong>Security</strong> of Industry-wide Technology Infrastructure<br />

• <strong>Cyber</strong> <strong>Security</strong> and its Role in the Overall <strong>Security</strong> of the United States<br />

<strong>Cyber</strong> <strong>Security</strong> World <strong>Conference</strong> 2014 is produced by Golden Networking, the premier<br />

networking community <strong>for</strong> business and technology executives, entrepreneurs and<br />

inves<strong>to</strong>rs. Panelists, speakers and sponsors are invited <strong>to</strong> contact Golden Networking<br />

by sending an email <strong>to</strong> in<strong>for</strong>mation@goldennetworking.com.<br />

Media Contact:<br />

Julia Petrova<br />

Media Relations Coordina<strong>to</strong>r<br />

Golden Networking<br />

+1-414-FORUMS0<br />

jpetrova@goldennetworking.com<br />

http://www.goldennetworking.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!