Page 5 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 5

How Critical Infrastructure Can Prepare for an Uptick in Cyberattacks in 2025 .................. 127
            By Dr. Bill Anderson, Principal Product Manager, Mattermost


            Deep Learning-Based Solutions Help Enterprises Avoid Zero-day Attacks ......................... 130
            By Dave Floyd, Vice President of Cybersecurity Sales and Service, Hughes Network Systems


            Securing Success in a Data-Driven World ............................................................................ 133
            By Yoav Regev, CEO and Co-Founder, Sentra


            Lights, Camera, Safety - The Video Surveillance Revolution ............................................... 136
            By Freddy Kuo, Chairman, Luminys


            Customer  Trust  Is  a  Business  Imperative:  It’s  Not  Enough  to  Just  Protect  Customer  Data,
            Businesses Must Show Proof of Their Efforts as Well. ........................................................ 142
            By Sam Rehman, Chief Information Security Officer, SVP at EPAM Systems, Inc.


            Cyber Security Threats vs. Insider Threats .......................................................................... 146
            By Jim Henderson, Founder / Chairman of the National Insider Threat Special Interest Group (NITSIG) CEO Insider
            Threat Defense Group, Inc. (ITDG)

            Cybersecurity Due Diligence in Mergers and Acquisitions: Essential Focus Areas .............. 149

            By Tom Cockriel, co-leader of Trenam Law’s Business Transactions practice group, Trenam Law

            Dark Web Threats: How Your Data Is Compromised and Monetized by Cybercriminals ...... 154

            By Ankit Sharma, Senior Director and Head - Solutions Engineering, Cyble

            DeepSeek’s AI Revolution: Cost Efficiency Meets Security Concerns ................................. 158

            By Alix Melchy, VP of AI at Jumio

            Fake REAL Ids Have Already Arrived, Here’s How to Protect Your Business ....................... 161

            By Jillian Kossman, Vice President of Marketing & Policy, IDScan.net

            Five Crucial Insights to Combat Today’s Deepfake Phenomenon ........................................ 166

            By Dominic Forrest, Chief Technology Officer, iProov

            From Factory Floor to Second Life: Why Platform Security Must Be Managed Throughout the
            Lifecycle of a Device ............................................................................................................ 170

            By Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.






                                                                                                               5
   1   2   3   4   5   6   7   8   9   10