Top Business Tech Events, Cybersecurity: Fighting back with AI

Top Business Tech looks back over its first webinar, ‘Cybersecurity: Fighting back with AI’, and shares what’s in store at our next event!
Top Business Tech looks back over its first webinar, ‘Cybersecurity: Fighting back with AI’, and shares what’s in store at our next event!

Missed ‘Cybersecurity: Fighting back with AI?’ Watch it here:

Top Business Tech held its first webinar, ‘Cybersecurity: Fighting back with AI’ this week, where our editor, Amber Donovan-Stevens, caught up with Cyber Security Specialist for ESET, Jake Moore. 

Moore previously worked for Dorset Police, spanning 14 years primarily investigating computer crime in the Digital Forensics Unit on a range of offences from fraud to murder. Within law enforcement powers, he learnt how to retrieve digital evidence from all devices whilst engaging in various ways to ethically break security to help protect innocent victims of cybercrime. He then became a cybersecurity consultant for the police delivering tailored advice to the public and local businesses to help protect the community and build upon their security foundations.

The state of cybercrime in 2021

As IT leaders know all too well from the last year, cybersecurity threats have continued to climb at an exponential rate. In addition to this, the nature of the threats has changed. This shift has been attributed to the cybersecurity risks posed by remote work and cloud migrations that organisations carried out hurriedly. 

Cyberattacks impact companies of all sizes

Moore noted that a small company often does not consider itself the target of cybersecurity. Still, small companies run the risk of being impacted just as much as a large companies. In addition, he said that many companies of all sizes are suffering from fatigue from cybersecurity education. Moore emphasises that phishing simulations have the potential to do well but be conducted carefully. Shaming employees for falling for phishing, be it real or curated by the company for educational purposes, does little to improve cybersecurity. He goes on to acknowledge the success of Deep Fakes in attacking businesses and that most employees will not know that this technology has even been created. This is another reason not to punish employees, as most employees will have never seen these types of attacks before. 

The rise of ML in cyberattacks 

Data gathering and machine learning are two key components that have emerged as key forms of attack in the last year. This makes public data, which once would have taken years to collate, immensely valuable as it can now be collected in minutes using machine learning. This creates ethical questions for platforms that host public data, such as Facebook, which had its data stolen earlier this year. Though Facebook asserted this was not an attack as the information taken was publicly available, it does bring brand trust into question. These attacks have also become more prevalent across communications platforms that have become popular over national lockdowns such as Zoom and Microsoft Teams. With employees working across so many communication platforms, including email, which has become one of the top cybersecurity threats in 2021, employees are becoming overwhelmed and require more support in protecting themselves and their organisations. 

To discover how to mitigate against these attacks, be sure to check out the full video now.

About our next event: How the digital nomad generation influences business behaviour

For so many of us, we can still recall a life where technology was not so heavily interlaced into our everyday. But, while many of us can remember the days of a dial-up connection, floppy disks, and flip phones, a generation of digital nomads are rising, who have spent infancy with smartphones in their hands.

As we pair the digital fluency of Generation Z and its subsequent generations with the acceleration of digital transformation across all sectors in response to the coronavirus pandemic, it is no surprise that the standard working model has given way to remote and hybrid work. While the benefits are considerable, a new set of security concerns has been added to the plate of technology decision-makers, who must contend with cloud security threats; the lack of firewalls and blacklisted IP addresses, and bring your own device (BYOD) considerations. Top Business Tech catches up with several thought leaders who provide their thoughts on the shifting landscape.


Click here to register for the next event 

We welcome all technology leaders and enthusiasts to the event, where we will host an open Q&A. We hope to see you on Tuesday 28th September 2021, at 10:00! 

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Ab Initio partners with BT Group to deliver big data

Luke Conrad • 24th October 2022

AI is becoming an increasingly important element of the digital transformation of many businesses. As well as introducing new opportunities, it also poses a number of challenges for IT teams and the data teams supporting them. Ab Initio has announced a partnership with BT Group to implement its big data management solutions on BT’s internal...

WAICF – Dive into AI visiting one of the most...

Delia Salinas • 10th March 2022

Every year Cannes held an international technological event called World Artificial Intelligence Cannes Festival, better known by its acronym WAICF. One of the most luxurious cities around the world, located on the French Riviera and host of the annual Cannes Film Festival, Midem, and Cannes Lions International Festival of Creativity. 

Bouncing back from a natural disaster with resilience

Amber Donovan-Stevens • 16th December 2021

In the last decade, we’ve seen some of the most extreme weather events since records began, all driven by our human impact on the plant. Businesses are rapidly trying to implement new green policies to do their part, but climate change has also forced businesses to adapt and redefine their disaster recovery approach. Curtis Preston,...