Reading view

CPT Cybersecurity Conference

Name : CPT Cybersecurity Conference
Website: https://www.cycomhackingconference.com/
Date: March 4-5, 2026
Location: Allianz Arena, Munich, Germany
CPT 2026: Connect. Protect. Transform.Join Germany’s top voices for Cybersecurity at Munich’s Allianz Arena from March 4–5. Master NIS-2 compliance, AI resilience, and BSI standards through high-level networking and expert keynotes. Secure your strategy for the digital future.

CPT 2026: Strategic Resilience & Digital SovereigntyWho determines our digital future?Technological dependencies, data sovereignty, and AI-driven transformation are no longer abstract concepts—they are the decisive factors for Europe’s future. At CPT 2026, we bring together the leading voices of the Munich cybersecurity ecosystem to move from reactive implementation to active sovereignty.The Key QuestionsIn the heart of Munich’s tech hub, we address the core challenges of our industry:

  • How can we preserve digital sovereignty while maintaining global connectivity?
  • How much technological dependency is unavoidable — and what are the strategic consequences?

Who sets the rules — governments, global corporations, or the specialized expertise within our network?

Why You Should AttendCPT 2026 acts as a high-level summit for 400 selected decision-makers and experts, creating a space for perspectives that rarely meet directly.

  • Eye-Level Dialogue: Engage with Claudia Plattner (BSI), Dunja Hayali, Uli Hoeneß and top industry leaders.
  • Knowledge Advantage: 16 interactive Masterclasses (e.g., AI liability, BSI-C5 standards) and 4 panel discussions.
  • Network & Connect: Strengthen your ties within the Munich Cybersecurity Network and build lasting relationships with technology and policy experts.

Secure your place at the centre of the dialogue and establish your lead in the 2026 transformation.Get your ticket: https://www.cpt.events/

The post CPT Cybersecurity Conference appeared first on CISO MAG | Cyber Security Magazine.

  •  

Cycom Hacking Conference

Name : Cycom Hacking Conference
Website: https://www.cycomhackingconference.com/
Date: April 23-24, 2026
Location: Montpellier, France
The CYCOM Hacking Conference is the annual cybersecurity event organized by Devensys Cybersecurity. A key event in Montpellier and Occitanie, CYCOM brings together the entire cybersecurity ecosystem for several days: professionals, technical experts, students, specialized schools, institutions, local authorities, technology partners, and industry associations.

Designed as a technical, educational, and community event, CYCOM highlights offensive, defensive, and operational cybersecurity practices through a packed program of conferences, demonstrations, feedback sessions, round tables, workshops, technical presentations, and professional meetings.
The event also includes highly anticipated highlights, such as its nighttime Capture The Flag (CTF), a hacking challenge lasting several hours that brings together enthusiasts, student teams, and experienced technical professionals.

Before the opening, a half-day event called EDUCYCOM is entirely dedicated to schools, students, and people undergoing retraining. It offers orientation workshops, introductions to major certifications (CCT, CEH, CISSP, OSCP), and an educational “hackathon” on cybersecurity.

CYCOM has two main goals:

  1. To share a high level of technical expertise in an accessible and practical way.
  2. To encourage networking and discussion between different players in the digital sector, both public and private.

Held at Kiasma in Castelnau-le-Lez (Montpellier Métropole), CYCOM welcomes several hundred participants each year and continues to expand its format with new activities, more conferences, and a growing partner village.

The post Cycom Hacking Conference appeared first on CISO MAG | Cyber Security Magazine.

  •  

Cyber and Physical Risks Targeting the 2026 Winter Olympics

Blogs

Blog

Cyber and Physical Risks Targeting the 2026 Winter Olympics

In this post we analyze the multi-vector threat landscape of the 2026 Winter Olympics, examining how the Games’ dispersed geographic footprint and high digital complexity create unique potential for cyber sabotage and physical disruptions.

SHARE THIS:
Default Author Image
February 5, 2026

The Milano-Cortina 2026 Winter Olympics represent a historic milestone as the first Games co-hosted by two major cities. However, the event’s expansive geographic footprint—covering 22,000 square kilometers across northern Italy—presents a complex security environment. From the metropolitan centers of Milan to the alpine peaks of Cortina d’Ampezzo, security forces are contending with a multi-vector threat landscape.

Kinetic and Physical Security Challenges

The geographically dispersed nature of the Milano-Cortina 2026 Winter Games also creates unique physical security challenges. Because venues are spread across thousands of square kilometers of the Alps, securing transit corridors and ensuring rapid emergency response across different Italian regions—including Lombardy, Veneto, and Trentino—is an incredible logistical hurdle. New tunnels, increased train services, and extended bus routes have been welcomed but create new potential targets for physical disruption by threat actors or protestors.

Terrorist and Extremist Threats

Flashpoint has not identified any terrorist or extremist threats to the Winter Olympic Games. However, lone threat actors in support of international terrorist organizations or domestic violence extremists remain a persistent threat due to the large number of attendees expected and the media attention that this event will attract.

Authorities in northern Italy are investigating a series of sabotage attacks on the national railway network that coincided with the opening of the 2026 Winter Olympic Games. The coordinated incidents—which included arson at a track switch, severed electrical cables, and the discovery of a rudimentary explosive device—caused delays of over two hours and temporarily disabled the vital transport hub of Bologna.

Protests

Flashpoint analysts identified several protests targeting the 2026 Winter Olympics:

  • US Presence and ICE Backlash: Hundreds of demonstrators have participated in protests in central Milan to demand that US ICE agents withdraw from security roles at the upcoming Winter Olympics.
  • Anti-Olympic and Environmental Activism: The most organized opposition comes from the Unsustainable Olympics Committee. They have already staged marches in Milan and Cortina, with more planned for February.
  • Pro-Palestinian Groups: Organizations such as BDS Italia are actively campaigning to boycott the games, demanding that Israel not be permitted to participate. Other pro-Palestinian groups have attempted to disrupt the Torch Relay in several cities and are expected to hold flash mob-style demonstrations in Milan’s Piazza del Duomo during the Opening Ceremony.
  • Labor Strikes: Italy frequently experiences transport strikes, which often fall on Fridays. Because the Opening Ceremony is on Friday, February 6, unions are leveraging this for maximum impact. An International Day of Protest has been coordinated by port and dock workers across the Mediterranean for February 6.

On February 7, a massive protest of approximately 10,000 people near the Olympic Village in Milan descended into violence as a peaceful march against the Winter Games ended in clashes with Italian police. While the majority of demonstrators initially focused on the environmental destruction caused by Olympic infrastructure, a smaller group of masked protestors engaged security forces with flares, stones, and firecrackers.

Cyber Threats Facing the 2026 Winter Olympics

The Milano-Cortina 2026 Winter Olympics will be among the most digitally complex global events, making it a prime target for cyberattacks. The greatest risks stem from familiar tactics such as phishing, spoofed websites, and business email compromise, which exploit human trust rather than technical flaws. With billions of viewers and a vast network of cloud services, vendors, and connected systems, the games create an expansive attack surface under intense operational pressure.

Italy blocked a series of cyberattacks targeting its foreign ministry offices, including one in Washington, as well as Winter Olympics websites and hotels in Cortina d’Ampezzo, with officials attributing the attempts to Russian sources. Foreign Minister Antonio Tajani confirmed the attacks were prevented just days before the Games’ official opening, which began with curling matches on February 4. 

Past Olympic Games show a clear pattern of heightened cyber activity, including phishing campaigns, distributed denial-of-service (DDoS) attacks, ransomware, and online scams targeting both organizers and the public. A mix of cybercriminals, advanced persistent threats, and hacktivists is expected to exploit the event for financial gain, espionage, or publicity. Experts emphasize that improving security awareness, verifying digital interactions, and strengthening supply chain defenses are critical, as the most damaging incidents often arise from ordinary threats amplified by scale and urgency.

Staying Safe at the 2026 Winter Games

The security success of Milano-Cortina 2026 relies on the integration of real-time intelligence, advanced technological safeguards, and public vigilance. As the Games proceed, the intersection of cyber-sabotage and physical protest remains the most likely source of operational disruption.

To stay safe at this year’s Games, participants should:

  1. Download Official Apps: Install the Milano Cortina 2026 Ground Transportation App and the Atm Milano app for real-time updates on transit, road closures, and “guaranteed” travel windows during strikes.
  2. Plan Around Friday Strikes: Be aware that transport strikes (Feb 6, 13, and 20) typically guarantee services only between 6:00 AM – 9:00 AM and 6:00 PM – 9:00 PM. Plan your venue transfers accordingly.
  3. Secure Your Digital Footprint: Avoid public Wi-Fi at major venues. Use a VPN and ensure Multi-Factor Authentication (MFA) is active on all your ticketing and banking accounts.
  4. Stay Clear of Protests: While most demonstrations are expected to be peaceful, they can cause sudden police cordons and transit delays.
  5. Respect the Drone Ban: Unauthorized drones are strictly prohibited over Milan and venue clusters. Leave yours at home to avoid heavy fines or interception by security units.

Stay Safe Using Flashpoint

While there are no current indications of imminent threats of extreme violence targeting the Milano-Cortina 2026 Winter Olympics, the event’s vast geographic footprint and digital complexity demand constant vigilance. Securing an event that spans 22,000 square kilometers requires more than just a physical presence; it necessitates a multi-faceted approach that bridges the gap between digital and kinetic risks.

To effectively navigate the intersection of cyber-sabotage, civil unrest, and logistical challenges, organizations and attendees must adopt a comprehensive strategy that integrates real-time intelligence with proactive security measures. Download Flashpoint’s Physical Safety Event Checklist to learn more.

Request a demo today.

The post Cyber and Physical Risks Targeting the 2026 Winter Olympics appeared first on Flashpoint.

  •  

Protecting the Big Game: A Threat Assessment for Super Bowl LX

Blogs

Blog

Protecting the Big Game: A Threat Assessment for Super Bowl LX

This threat assessment analyzes potential physical and cyber threats to Super Bowl LX.

SHARE THIS:
Default Author Image
February 4, 2026
Superbowl LIX Threat Assessment | Flashpoint Blog
Table Of Contents

Each year, the Super Bowl draws one of the largest live audiences of any global sporting event, with tens of thousands of spectators attending in person and more than 100 million viewers expected to watch worldwide. Super Bowl LX, taking place on February 8, 2026 at Levi’s Stadium, will feature the Seattle Seahawks and the New England Patriots, with Bad Bunny headlining the halftime show and Green Day performing during the opening ceremony.

Beyond the game itself, the Super Bowl represents one of the most influential commercial and media stages in the world, with major brands investing in some of the most expensive advertising time of the year. The scale, visibility, and economic significance of the event make it an attractive target for threat actors seeking attention, disruption, or financial gain, underscoring the need for heightened security awareness.

Cybersecurity Considerations

At this time, Flashpoint has not observed any specific cyber threats targeting Super Bowl LX. Despite the absence of overt threats, it remains possible that threat actors may attempt to obtain personal information—including financial and credit card details—through scams, malware, phishing campaigns, or other opportunistic cyber activity.

High-profile events such as the Super Bowl have historically been leveraged as bait for cyber campaigns targeting fans and attendees rather than league infrastructure. In October 2024, the online store of the Green Bay Packers was hacked, exposing customers’ financial details. Previous incidents also include the February 2022 “BlackByte” ransomware attack that targeted the San Francisco 49ers in the lead-up to Super Bowl LVI.

Although Flashpoint has not identified any credible calls for large-scale cyber campaigns against Super Bowl LX at this time, analysts assess that cyber activity—if it occurs—is more likely to focus on fraud, impersonation, and social engineering directed at ticket holders, travelers, and high-profile attendees.

Online Sentiment

Flashpoint is currently monitoring online sentiment ahead of Super Bowl LX. At the time of publishing, analysts have identified pockets of increasingly negative online chatter related primarily to allegations of federal immigration enforcement activity in and around the event, as well as broader political and social tensions surrounding the Super Bowl.

Online discussions include calls for protests and boycotts tied to perceived Immigration and Customs Enforcement (ICE) involvement, as well as controversy surrounding halftime and opening ceremony performers. While sentiment toward the game itself and associated events remains largely positive, Flashpoint continues to monitor for escalation in rhetoric that could translate into real-world activity.

Potential Physical Threats

Protests and Boycotts

Flashpoint analysts have identified online chatter promoting protests in the Bay Area in response to allegations that Immigration and Customs Enforcement (ICE) agents will conduct enforcement operations in and around Super Bowl LX. A planned protest is scheduled to take place near Levi’s Stadium on February 8, 2026, during game-day hours.

At this time, Flashpoint has not identified any calls for violence or physical confrontation associated with these actions. However, analysts cannot rule out the possibility that demonstrations could expand or relocate, potentially causing localized disruptions near the venue or surrounding infrastructure if protesters gain access to restricted areas.

In addition, Flashpoint has identified online calls to boycott the Super Bowl tied to both the alleged ICE presence and controversy surrounding the event’s halftime and opening ceremony performers. Flashpoint has not identified any chatter indicating that players, NFL personnel, or affiliated organizations plan to boycott or disrupt the game or related events.

Terrorist and Extremist Threats

Flashpoint has not identified any direct or credible threats to Super Bowl LX or its attendees from violent extremists or terrorist groups at this time. However, as with any high-profile sporting event, lone actors inspired by international terrorist organizations or domestic violent extremist ideologies remain a persistent risk due to the scale of attendance and global media attention.

Super Bowl LX is designated as a SEAR-1 event, necessitating extensive interagency coordination and heightened security measures. Law enforcement presence is expected to be significant, with layered security protocols, strict access control points, and comprehensive screening procedures in place throughout Levi’s Stadium and surrounding areas. Contingency planning for crowd management, emergency response, and evacuation scenarios is ongoing.

Mitigation Strategies and Executive Protection

Given the absence of specific, identified threats, mitigation strategies for key personnel attending Super Bowl LX focus on general best practices. Security teams tasked with executive protection should remove sensitive personal information from online sources, monitor open-source and social media channels, and establish targeted alerts for potential threats or emerging protest activity.

Physical security teams and protected individuals should also familiarize themselves with venue layouts, emergency exits, nearby medical facilities, and law enforcement presence, and remain alert to changes in crowd dynamics or protest activity in the vicinity of the event.

The nearest medical facilities are:

  • O’Connor Hospital (Santa Clara Valley Healthcare)
  • Kaiser Permanente Santa Clara Medical Center
  • Santa Clara Valley Medical Center
  • Valley Health Center Sunnyvale

Several of these facilities offer 24/7 emergency services and are located within a short driving distance of the stadium.

The primary law enforcement facility near the venue is:

  • Santa Clara Police Department

As a SEAR-1 event, extensive coordination is expected among local, state, and federal law enforcement agencies throughout the Bay Area.

    Stay Safe Using Flashpoint

    Although there are no indications of any credible, immediate threats to Super Bowl LX or attendees at this time, it is imperative to be vigilant and prepared. Protecting key personnel in today’s threat environment requires a multi-faceted approach. To effectively bridge the gap between online and offline threats, organizations must adopt a comprehensive strategy that incorporates open source intelligence (OSINT) and physical security measures. Download Flashpoint’s Physical Safety Event Checklist to learn more.

    Request a demo today.

    •  

    CISO Middle East Summit 2026 – Doha

    CISO Middle East Summit – Doha, Qatar | 22nd January 2026

    The CISO Middle East Summit 2026, taking place on 22nd January in Doha, Qatar, stands as one of the region’s most anticipated gatherings for cybersecurity leaders, innovators, and policymakers. Under the theme “Digital Freedom & Resilience: The Pillars of Qatar’s Cyber Vision 2030,” the summit will unite key decision-makers from government, critical infrastructure, and enterprise sectors to shape the future of cybersecurity in the Middle East.

    The event will feature thought-provoking discussions, strategic insights, and real-world case studies that address the evolving cyber threat landscape and the increasing need for digital trust, resilience, and collaboration. With participation from senior cybersecurity executives, government representatives, and technology experts, the summit will highlight emerging trends in AI security, regulatory evolution, and national cyber defense.

    Beyond its knowledge-sharing sessions, the CISO Middle East Summit offers a unique networking platform for CISOs, solution providers, and innovators to connect and explore partnerships that drive the region’s cybersecurity maturity. Supported by leading sponsors and media partners, this one-day event in Doha reinforces Qatar’s growing position as a hub for digital innovation and cyber resilience.

    For those driving the next phase of security transformation, this summit is a defining milestone in the Middle East’s cybersecurity journey.

    The post CISO Middle East Summit 2026 – Doha appeared first on CISO MAG | Cyber Security Magazine.

    •  

    WAM Morocco

    WAM Morocco 2026 is organised by KAOUN International (a subsidiary of Dubai World Trade Centre) and proudly in association with GITEX Africa. The debut event is set to be the continent’s largest tech and start-up event in advanced manufacturing and future mobility.

    WAM Morocco will take place under the auspices of the Moroccan Ministry of Industry and Trade from 20 – 22 January 2026 at Foire Internationale de Casablanca, Morocco. Expected to draw over 350 exhibitors and more than 20,000 high-level corporate buyers, WAM Morocco will be the hub where the entire industrial innovation ecosystem connects and collaborates.

    WAM Morocco features four co-located events World Advanced Future Mobility (WAFM), World Green Energy (WGE), World Pharma Manufacturing (WPM) and World Digital Food Hub (WDFH). Cutting-edge technologies in AI, quantum computing, 3D printing, blockchain and mixed reality will take centre stage at WAM Morocco and drive forward Morocco’s vision of becoming a globally competitive and sustainable manufacturing capital.

    The post WAM Morocco appeared first on CISO MAG | Cyber Security Magazine.

    •  

    AI CyberCon Summit 2026

    Event Date: 10 January 2026
    Venue: T-Hub, Hyderabad

    AI CyberCon Summit 2026 is India’s leading summit on Artificial Intelligence, Cybersecurity, Fraud Prevention, Digital Trust & Compliance, bringing together:

    CXOs, CISOs, CTOs

    AI Innovators & Cybersecurity Leaders

    Fintech & Enterprise Tech Professionals

    Policymakers & Government Representatives

    500+ Industry Decision Makers

    The summit will feature:

    -High-impact keynotes & panel discussions

    -Live cyberattack simulations & hands-on workshops

    -Sessions on AI governance, AML, Zero Trust & compliance

    -Exhibition zone for technology showcases

    -Strategic networking opportunities

    A powerful platform designed to strengthen India’s secure AI transformation and digital resilience.

    The post AI CyberCon Summit 2026 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    CyberWiseCon Europe 2026 

    Workshop | May 19 | Vilnius, Lithuania
    Conference | May 20-22 | Vilnius, Lithuania

    CyberWiseCon Europe 2026 Returns to Vilnius — Your Front Line for Cyber Defense

    Four Days of Cybersecurity Insights, Hands-On Learning & Global Security Community | May 19–22, 2026

    Cyber threats are growing more advanced every day and so must the defenders.

    CyberWiseCon Europe 2026, taking place May 19–22 in Vilnius, Lithuania, is the premier event for security professionals, researchers, ethical hackers, and IT leaders working to protect the technologies we rely on.
    Now entering its next edition, CyberWiseCon brings together a global community of cybersecurity experts for four days of deep learning, hands-on experiences, and meaningful networking. With 100+ sessions, practical workshops, and attendees from over 35 countries, this conference is built for those who are serious about strengthening their defense strategies in an increasingly complex threat landscape.

    This isn’t just another security conference—it’s the place where cybersecurity meets wisdom. Whether you’re on the front lines detecting threats, building secure systems, or shaping organizational strategy, you’ll find sessions designed around real-world challenges and actionable solutions.

    Why Attend CyberWiseCon Europe 2026?

    CyberWiseCon focuses on what truly matters: practical cybersecurity knowledge. Every talk, demo, and workshop is crafted to give you insights that you can apply immediately—whether you’re mitigating ransomware attacks, implementing Zero Trust, securing your cloud environment, or combating AI-driven threats.

    Plus, your ticket gives you access to three top conferences under one roof:

    • CyberWiseCon Europe
    • DevDays Europe
    • DevOps Pro Europe

    This unique 3-in-1 experience allows you to explore intersecting areas across cybersecurity, software engineering, and operations—helping you understand and secure the full technology lifecycle.

    You’ll also join a vibrant, international gathering of security engineers, CISOs, risk managers, DevSecOps professionals, ethical hackers, and government experts. Networking flows naturally in the cinema-style venue, workshops, interactive sessions, and the legendary conference afterparty.

    CyberWiseCon is where defenders learn from defenders—and where your next big idea or career connection may begin.

    What to Expect at CyberWiseCon 2026

    • AI-Driven Cyber Threats – Understanding and defending against AI-powered attacks, deepfakes, and autonomous malware
    • Ransomware Evolution – Double extortion, data theft, and next-gen mitigation strategies
    • Cloud Security & Zero Trust – Building resilient architectures for modern enterprises
    • Ethical Hacking & Pen Testing – Live demos, new exploitation methods, and offensive tooling
    • Cyberwarfare & Nation-State Attacks – Trends, geopolitical impacts, and defense frameworks
    • Blockchain & Quantum Security – Emerging technologies and future-proof cryptography
    • IoT & Mobile Security – Securing a rapidly expanding threat surface
    • Privacy, Compliance & Regulation – Staying ahead of tightening global requirements

    Whether you’re securing critical infrastructure, defending SaaS environments, or guiding organizational risk, you’ll gain practical knowledge, essential tools, and fresh perspectives.

    Tickets Now Available.

    Explore the full agenda, meet the speakers, and secure your seat at: https://cyberwisecon.eu/

    Don’t miss your opportunity to join Europe’s most forward-thinking cybersecurity community—and prepare for the
    challenges that lie ahead.

    The post CyberWiseCon Europe 2026  appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Insider Risk Summit West

    Date: March 18-19, 2026
    Location: Monterey Conference Center, Monterey, CA

    Formerly hosted by Advanced Onion, Inc, Defense Strategies Institute will host the 10th Insider Risk Summit West, March 18-19, 2026, in Monterey, CA.

    The Insider Risk Summit West unites the nation’s leading experts, innovators, and security professionals dedicated to tackling one of today’s most complex challenges — the insider risk. Hosted on the West Coast, this premier forum will bring together voices from big tech, AI, social media, energy, and all levels of government to explore the evolving insider risk landscape and the strategies needed to stay ahead of it.

    What to Expect:

    A Regional Focus on Innovation: Explore insider risk in the heart of the West Coast tech and energy corridor, with sessions tailored to AI, social media, autonomous systems, and utility sectors.

    Federal, State, and Local Collaboration in Action: Engage with representatives from West Coast federal agencies, DOW Commands, and state and local governments working together to advance insider risk prevention and strengthen regional security.

    Insights from Leading Technology and Security Experts: Hear directly from leaders across big tech, AI-driven enterprises, energy, and utilities as they share real-world strategies to safeguard data, protect IP, and strengthen organizational resilience.

    Behavioral Science and Emerging Technology in Practice: Learn how behavioral analytics, AI-enabled detection tools, and cross-sector collaboration are transforming how insider threats are identified and mitigated.

    Key Topics of Discussion:

    • Mitigating insider risk & improving operational resilience through partnership, innovation, & technology
    • Securing innovation: insider risks and the future of big tech
    • Addressing the growing risk of insider attacks as semiconductor demand skyrockets
    • Tackling insider risks at social media enterprises
    • Navigating the future threat landscape in AI, autonomous, & electric vehicles
    • .. and more!

    Registration is now open. Active-duty US military and government employees attend complimentary. Sponsorship & exhibit opportunities are available. For more information, visit https://insiderwest.dsigroup.org/.

    The post Insider Risk Summit West appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Bharat Tech Summit Awards 2025

    Name : Bharat Tech Summit Awards 2025

    Website: https://www.bharattechawards.com/

    Bharat Tech Summit Awards 2025

    📍 8 November 2025 | Venue: Hotel Taj Ambassador, New Delhi

        Organized by: Global Tech Policy Confederation (GTPC)

        In collaboration with: Confederation of All India Traders (CAIT)

    The Bharat Tech Summit & Awards 2025 stands as India’s most influential convergence of technology, policy, and leadership — an annual celebration that unites innovators, visionaries, and policymakers to shape Bharat’s $20-Trillion Digital Vision 2045.

    Under the theme “Celebrating Visionaries • Igniting Innovation • Empowering Transformation,” this landmark event amplifies Bharat’s technological sovereignty, highlighting advances across Cybersecurity, AI, Cloud, IoT, Semiconductors, and Digital Infrastructure.

    As Bharat accelerates its digital transformation, cyber resilience emerges as the backbone of national progress.

    Sessions led by cybersecurity leaders from Tata Communications, Honda, Palo Alto Networks, PwC, and EY explore:

        • Building Zero-Trust and resilient digital frameworks

        • AI-driven cyber defense and intelligence

        • Securing digital infrastructure for a $20-trillion economy

        • Cyber education and upskilling for national readiness

    The Bharat Tech Summit & Awards 2025 is not merely an event — it’s a movement towards a secure, scalable, and sustainable digital Bharat.

    By fostering collaboration between government, industry, startups, and academia, the summit redefines India’s role in the global technology landscape.

    Join us to celebrate Bharat’s technological evolution — where innovation meets integrity, and leadership inspires transformation.

     

    Learn more at: https://www.bharattechawards.com/

     

    The post Bharat Tech Summit Awards 2025 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Africa Fraud, Security & Compliance Summit – West Africa 2025

    Name : Africa Fraud, Security & Compliance Summit – West Africa 2025

    Website: https://www.biiafsc.com/west-africa-edition/

    Africa Fraud, Security & Compliance (AFSC) Summit – West Africa 2025

    📍 28–29 October 2025 | Lagos Marriott Hotel, Ikeja, Nigeria

    The Africa Fraud, Security & Compliance (AFSC) Summit – West Africa brings together the region’s leading regulators, banks, fintechs, and solution providers to strengthen the fight against financial crime and advance digital trust across Africa’s evolving financial ecosystem.

    Now in its West Africa edition, the summit will host C-suite executives, compliance leaders, AML specialists, risk professionals, and technology innovators for two transformative days of insights, networking, and collaboration. Discussions will span key themes including AI-driven fraud prevention, AML/CFT innovation, regulatory technology, cyber resilience, and the psychology of fraud.

    The event will also feature the prestigious AFSC Awards – West Africa, celebrating organizations and individuals who demonstrate excellence in compliance, innovation, and integrity.

    With interactive panel sessions, fireside chats, and an exhibition showcasing cutting-edge technologies, AFSC West Africa 2025 is where strategy meets innovation shaping a secure, compliant, and inclusive financial future for the region.

    The post Africa Fraud, Security & Compliance Summit – West Africa 2025 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Cyber Security Experience 2025

    Date: November 27, 2025
    Location: Spant! Conference Centre, Bussum, Netherlands
     
    On Thursday, 27 November 2025, the annual Cyber Security Experience will take place at Spant! Conference Centre in Bussum. This year’s conference presents a program that focuses on realistic case studies, current threats, and the strategic choices organizations face today at the intersection of technology, security, and governance.
    One of the central elements is a talk show moderated by Erik Peekel, featuring:
    • Thomas Schmidt (IT & Cybersecurity Lead for the NATO Summit, on behalf of the Ministry of Foreign Affairs)
    • Rick van der Kleij (Professor of Cyber Resilient Organizations, Avans University of Applied Sciences / Senior Researcher at TNO)
    • Corence Klop (Chief Information Security Officer, Rabobank)
    In this session, they reflect on the organization and cybersecurity of the NATO Summit held on 25 June 2025 in The Hague. They will discuss questions such as: How do you strike the right balance between risk acceptance and control? How do you respond when your organization is suddenly confronted with a digital breach? And what should already be in place beforehand?
    The program also offers a behind-the-scenes look at one of this year’s most talked-about cybersecurity incidents. Clinical Diagnostics, the laboratory that collaborated with Bevolkingsonderzoek Nederland, was hit by a cyberattack. Agnes Bouwman, MT member for Marketing & Communication, will share how the organization responded and what lessons were learned.
    Also discover:
    • Vanderlande Industries – In the roundtable “Third Party Risk under Geopolitical Pressure – Navigating Between Regulation and Reality”Ruud van Oorschot (Senior Groupleader Cyber Defence Organisation & TISO) discusses complex supply chain and third-party risks in an international context.
    • Kennedy Van der Laan – In the session “Deep Dive: Keep Calm and Call Breach Counsel!”Rosalie Brand(Lawyer & Partner Cybersecurity) addresses the legal aspects of cyber incidents, including AI-driven attacks, evolving regulations, and the role of counsel in crisis management.
    • Van Oord Dredging and Marine Contractors B.V. – In “The Tower of Babel in Security: Making the Case for One CISO Capability Map”Edwin Franse (CISO) and Milan van der Meer (Enterprise Security Architect) present a practical model for the role of the CISO in complex organizations with diverse responsibilities.
    In short: an event not to be missed.

    The post Cyber Security Experience 2025 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Cyber Security & Cloud Expo Global 2026

    Date: February 4-5, 2026

    Location: Olympia, London, United Kingdom

    Website: https://www.cybersecuritycloudexpo.com/global/

    Join 9,000+ cybersecurity and tech leaders for two days of expert insights, high-level discussions, and premium networking.

    CTOs, IT Directors, Government Officials, Developers, Investors, and industry innovators will gather to explore the latest in cybersecurity and digital transformation.

    With 200+ speakers and hundreds of exhibitors, the event delivers real-world strategies, cutting-edge solutions, and actionable knowledge.

    The dedicated Cyber Security Expo stage will tackle Europe’s most pressing cybersecurity challenges, from emerging threats to industry-specific innovations. Key sectors covered include finance, healthcare, legal, retail, energy, government, and more.

    Don’t miss the chance to expand your expertise, discover new technologies, and connect with decision-makers shaping the future of digital security. Register Now.

    While the event is free to attend, the Gold Pass offers all-access benefits, including enhanced networking opportunities. The code is: MP20

    The post Cyber Security & Cloud Expo Global 2026 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    GITEX GLOBAL 2025

    GITEX GLOBAL 2025, marking its 45th edition, stands as the world’s largest tech & AI event. For over four decades, it has been the

    premiere gateway for tech creators, investors and enthusiasts to collaborate. This year, the event scales new heights, spanning

    across two mega venues – Dubai World Trade Centre & Dubai Harbour. It offers an unprecedented 40 halls of exhibition space,

    showcasing tech giants and innovative startups in fields like AI, Data Centres, Digi Health & Biotech, Cybersecurity, Intelligent

    Connectivity, Green Impact and more.

    Prepare for five exhilarating days filled with conferences, live-action workshops, matched concierge networking and business

    partnerships. Discover the latest and unseen tech innovations that continue to shape our world.

    The GITEX GLOBAL ecosystem encompasses 11 co-located shows: GITEX GLOBAL, GITEX Cyber Valley, GITEX Digi Health & Biotech,

    GITEX Green Impact, GITEX Quantum Expo, Global Devslam, Expand North Star, GITEX ScaleX, House of Finance, Marketing Mania,

    North Star Green Impact. Central to these shows are innovation, collaboration, and discovery. 200,000+ visitors will explore real-

    world applications of AI and source latest innovations that reduce operating costs and enhance business efficiency.

    For More Information: Visit GITEX GLOBAL 2025

    The post GITEX GLOBAL 2025 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Cyber Security World Asia 2025

    Date: October 8-9, 2025
    Location: Marina Bay Sands Expo and Convention Centre, Singapore
    Website: https://www.singaporetechnologyweek.com/cyber-security-world/

    Cyber Security World Asia 2025 returns on 8 – 9 October 2025!

    Over two days, you can:

    • Explore leading technologies that safeguard your enterprise
    • Benchmark solutions side by side for resilience and risk management
    • Get practical insights from experts on securing your digital future

    If strengthening your cyber resilience, protecting customer trust, and ensuring compliance are on your agenda this year, this is the place to make it happen.

    See you this 8-9 October, together with thousands of other cybersecurity professionals representing organisations such as A*STAR, Airbus, Coalition of Cybersecurity in Asia-Pacific, DSTA, Prudential, The Coca-Cola Company and more.

    The post Cyber Security World Asia 2025 appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Cyber Secure Forum

    Date: November 11, 2025
    Location: Hilton London Canary Wharf, London, United Kingdom
    Website: https://cybersecureforum.co.uk/

    Cyber Secure Forum – Your One-Day Gateway to High-Value Connections

    Celebrating 10 years of bringing industry leaders and innovative solution providers together for a day of powerful networking, insights, and business growth.
    This year marks our 10th anniversary, and we’re making it our biggest and most impactful Cyber Secure Forum yet.
    We know your time is valuable, so we make it count. Simply tell our team who you’d like to meet, and we’ll create a personalised itinerary of one-to-one meetings matched to your needs, preferences, and live projects – so you can focus on what matters most.
    As a buyer, your FREE pass includes:

    • A tailored itinerary of pre-arranged one-to-one meetings
    • Full hospitality throughout the day, including lunch & refreshments
    • Multiple networking opportunities with industry peers
    • Access to our expert-led educational seminar programme
    • Flexible attendance options to suit your schedule

    Register your FREE pass here via our quick booking form.

    For more details on what you can expect as a buyer, contact Josh Kingsmill on 01992 374100 or j.kingsmill@forumevents.co.uk .

    Are you a supplier to the industry?
    Meet face-to-face with pre-qualified, senior decision-makers who have asked to meet you specifically to discuss your products and services – and are actively seeking solutions for upcoming projects.

    Your supplier package includes:

    • A schedule of one-to-one meetings with your chosen prospects
    • A fully equipped stand with electrics, furniture & name board
    • Lunch & refreshments for the full day
    • Detailed delegate profiles in advance
    • Your logo featured in all event marketing
    • Inclusion in our supplier networking sessions

    Buyers attending are seeking solutions in areas such as:

    • UK Cyber Strategy
    • Data Protection
    • Access Control
    • Authentication
    • Cloud Business Continuity
    • Identity Access Management
    • Multi-Factor Authentication
    • AI & Machine Learning
    • Application Security
    • …and much more.

    For more information on supplier partner packages, contact our Event Manager:
    l.cloona@forumevents.co.uk | 01992 374078

    The post Cyber Secure Forum appeared first on CISO MAG | Cyber Security Magazine.

    •  

    Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

    Blogs

    Blog

    Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

    Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can often rebuild infrastructure and return from disruptions in new forms

    SHARE THIS:
    Default Author Image
    August 30, 2023

    Qakbot takedown and seizure

    A global law enforcement operation has successfully disrupted the infrastructure of the Qakbot botnet, striking a major—though likely temporary—blow to a dominant player in the cybercriminal underground supply chain. 

    Qakbot, familiarly Qbot, has been a major cyber threat since 2007, infecting victims’ computers to steal financial information and distribute additional malware payloads like ransomware. As a result of the takedown, more than 700,000 infected devices worldwide were identified and cleaned of the malware. The DOJ also announced the seizure of $8.6M in cryptocurrency in illicit profits.

    While there is no doubt that the Qakbot takedown is a major win in the fight against cybercrime, it may only provide short-term relief in the fight against a notoriously resilient cybercriminal ecosystem.

    ‘Swiss Army knife’

    A Swiss Army knife of cybercrime tools, Qakbot was a complex malware that opened remote access to victims’ systems, stole credentials and financial information, and downloaded additional malware payloads. Its modular architecture enabled frequent updates to add new capabilities over its 15+ years of operation.

    “The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact..”

    Ian Gray, VP Of Intelligence

    Qakbot has been a versatile workhorse for cybercriminals. Its banking trojan functionality has been used to pilfer payment information and intercept financial transactions. As a loader, it distributed ransomware such as ProLock to extort victims.

    Qakbot has also powered large-scale spam email campaigns and brute force attacks. Its worm-like spreading kept it entrenched in infected networks. By providing the backdoor access and distribution channel for other malware, Qakbot played a key supporting role in the cybercrime ecosystem. Botnets like Emotet and TrickBot operated similarly, loading additional threats onto compromised systems. These jack-of-all-trades botnets have proven lucrative for their criminal operators.

    A history of temporary relief

    Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations can often rebuild infrastructure and return from disruptions in new forms.

    In the case of Emotet, the botnet came back online in 2022 using new techniques after its infrastructure was dismantled in 2021. TrickBot also persisted despite takedown attempts and remains an active threat. This resiliency highlights the challenges law enforcement faces in permanently eliminating cyber threats.

    While takedowns temporarily degrade capabilities, dedicated cybercriminal groups adapt to avoid further disruption. New malware families also inevitably emerge to fill the gaps left by larger takedowns. For example, BazarLoader and ZLoader rose to prominence as loader malware after the Emotet takedown.

    Yet despite their disruptions, resilient botnets often return and new ones emerge. After prior actions against Emotet and TrickBot, the lingering demand in underground markets brought them back in adapted new forms. Bots remain attractive tools for cybercriminals thanks to their versatility, automation, and money generating potential.

    While Qakbot’s infrastructure was disrupted, its operators may attempt to rebuild or evolve their techniques. Sustained pressure on botnet financial flows, developer communities, and other aspects of the cybercrime supply chain is needed to deter future attacks. For now, the coordinated Qakbot takedown bought time and degraded the capabilities of a dominant cybercrime player.

    The fight against cybercrime must be persistent and comprehensive

    The Qakbot takedown was effectively coordinated among global governments, including France, Germany, Latvia, Romania, the Netherlands, the UK, and the US, as well as the private sector. The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact.

    Law enforcement and the private sector should to continue coordinating takedowns while also focusing on detecting new malware variants early, disrupting communication channels, and following the money trails of criminal enterprises.

    Cyber hygiene and threat awareness across organizations must also improve to reduce vulnerability to malware infections, including loaders and trojans that distribute threats like Qakbot. Technical controls like endpoint detection, network monitoring, and patching are also key.

    Ultimately, defeating cybercrime requires comprehensive strategy across law enforcement operations, cybersecurity practices, and international collaboration. The Qakbot takedown represents meaningful progress, but the world must remain vigilant against an adaptable threat landscape.

    Get Flashpoint on your side

    Flashpoint Ignite enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

    Request a demo today.

    •  
    ❌