Page 5 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 5
How Critical Infrastructure Can Prepare for an Uptick in Cyberattacks in 2025 .................. 127
By Dr. Bill Anderson, Principal Product Manager, Mattermost
Deep Learning-Based Solutions Help Enterprises Avoid Zero-day Attacks ......................... 130
By Dave Floyd, Vice President of Cybersecurity Sales and Service, Hughes Network Systems
Securing Success in a Data-Driven World ............................................................................ 133
By Yoav Regev, CEO and Co-Founder, Sentra
Lights, Camera, Safety - The Video Surveillance Revolution ............................................... 136
By Freddy Kuo, Chairman, Luminys
Customer Trust Is a Business Imperative: It’s Not Enough to Just Protect Customer Data,
Businesses Must Show Proof of Their Efforts as Well. ........................................................ 142
By Sam Rehman, Chief Information Security Officer, SVP at EPAM Systems, Inc.
Cyber Security Threats vs. Insider Threats .......................................................................... 146
By Jim Henderson, Founder / Chairman of the National Insider Threat Special Interest Group (NITSIG) CEO Insider
Threat Defense Group, Inc. (ITDG)
Cybersecurity Due Diligence in Mergers and Acquisitions: Essential Focus Areas .............. 149
By Tom Cockriel, co-leader of Trenam Law’s Business Transactions practice group, Trenam Law
Dark Web Threats: How Your Data Is Compromised and Monetized by Cybercriminals ...... 154
By Ankit Sharma, Senior Director and Head - Solutions Engineering, Cyble
DeepSeek’s AI Revolution: Cost Efficiency Meets Security Concerns ................................. 158
By Alix Melchy, VP of AI at Jumio
Fake REAL Ids Have Already Arrived, Here’s How to Protect Your Business ....................... 161
By Jillian Kossman, Vice President of Marketing & Policy, IDScan.net
Five Crucial Insights to Combat Today’s Deepfake Phenomenon ........................................ 166
By Dominic Forrest, Chief Technology Officer, iProov
From Factory Floor to Second Life: Why Platform Security Must Be Managed Throughout the
Lifecycle of a Device ............................................................................................................ 170
By Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.
5