The dark side of the digital world is professionalizing its malicious activities at an amazing speed, launching sophisticated, AI powered cyberattacks to compromise endpoints and sell stolen access credentials through Initial Access Brokers (IABs) to others who then launch ransomware attacks or steal and sell internal information. “We are entering the age of a well-orchestrated bad-actor-industry causing damage of unprecedented scale,” says Thom Langford, Global Security Advocate, SentinelOne. AI and Machine Learning are becoming a requirement to battle against increasingly automated attacks,” he continues. In this panel, we will look at the status of AI powered endpoint security and how to adapt our current strategy to the new risk level.
In order to improve safety and security in pharma supply chain new regulatory requitements are evolving for preventing data breaches and securing access to enterprise resources. These requirements for counterparty authorization are often based on Zero Trust Architecture (ZTA) principles such as “Enhanced Identity Governance” and “Network Infrastructure and Software Defined Perimeters”. Diffuse trust perimeter-less security regards the idea of authorized identifiers, authorizations are conveyed via signed statements in the form of verifiable credentials for a cross-enterprise scenario. The approach of combing ZTA principles with digital identity and credentialing unlocks new Endpoint Security for open supply chain systems: Endpoint Look-up, Message Routing, Authentication and Authorization. It will be shown how these principles are working in a real life implementation of the “Open Credentialing Initiative” for Authorized Trading Partner (ATP) Verification in the US Drug Supply Chain Security Act (DSCSA). Case Study: Open Credentialing Initiative, OCI – Open Credentialing Initiative (oc-i.org)
In today race to conquer the space by launching thousands of small satellites with the intention to provide a wide selection of Earth Observation services, we need to ensure the data and space assets are properly protected. In the near future our sky might get full of flying drones delivering food, medicines and other goods or carrying people. Are we ready for it? Are we sure all those entities are cyber protected and cannot be unlawfully intercepted? What can we do to feel safer?