SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Ransom and AI generated attacks driving cybersecurity investment according to survey by Infosecurity Europe

22 May 2024

Ransom and AI generated attacks driving cybersecurity investment according to survey by Infosecurity Europe
Contact company
Contact RX USA
icon Add as a preferred source Download PDF version
Related Links
  • G2E Asia’s grand return to Macau: Celebrating 15 years of excellence

Infosecurity Europe, the most influential information security event running at ExCeL London from 4-6 June 2024 announced further findings from its 2024 Cybersecurity Trends, Obstacles, and Opportunities report highlighting that ransomware and AI-generated attacks are weighing heavily on cybersecurity pioneers’ minds, with almost 40% of those surveyed stating these issues were accelerating investment into cyber defences. 

This emphasises the urgency for organisations to stay ahead of evolving threats and allocate greater resources to bolster their defences.

Role of cybersecurity

With attacks becoming more frequent, complex, and damaging, businesses are allocating greater resources to bolster their defences and enhance their resilience against evolving threats.

This heightened investment reflects a growing recognition of the critical role that cybersecurity plays in protecting sensitive data, preserving customer trust, and safeguarding business continuity.

Addressing the threat landscape

The threat of ransomware persists and 2024 Infosecurity Europe event is set to address the issue in greater depth

The threat of ransomware persists and the 2024 Infosecurity Europe event is set to address the issue in greater depth. As malicious actors continue to exploit vulnerabilities in software, hardware, and human behaviour, it’s critical to drive awareness around the significant risks posed to organisations' security and stability. 

From ransomware attacks targeting critical infrastructure to sophisticated phishing campaigns aimed at stealing sensitive data, the threat landscape is more diverse and dynamic than ever. 

Ransomware payment

These topics will be further explored in some of the keynote sessions across the 3-day event. In a panel discussion titled ‘Ransomware - Time to Decide - Will You or Won't You Pay?’  on Thursday 6 June from10:55 - 11:25, Jon Davies, Senior Director - Cyber Defense, News Corp, will be joined by Paul Peters, Detective Superintendent / Managing Director, The Cyber Resilience Centre for Wales and Gareth Bateman, UK Cyber Growth pioneer, Marsh. 

The trio will take to the stage, alongside moderator James Coker, Deputy Editor, Infosecurity Magazine, to discuss ransomware payment, a debate that has raged on for some time.  

Effective response & recovery strategies

"Ransomware attacks have become increasingly prevalent and continue to pose a significant threat to organisations. As cybercriminals continue to evolve their tactics, organisations must be prepared and equipped with effective response & recovery strategies. We will share real-world experiences and advice on how to respond to a ransomware attack, weighing the potential risks and consequences associated with paying the ransom," said Jon Davies, Director of Cyber Defence at News Corp.

"This session aims to provide attendees with the knowledge and reference needed to make informed decisions and mitigate the impact of ransomware incidents."

Response and recovery actions

The panel will discuss the internal procedures following an attack, examine the methods and vulnerabilities

Jennifer McGhee, CISO of Element Materials Technology, will further examine the immediate response in the wake of an attack in her keynote ‘Crisis Management – Responding to the Unimaginable’ at 14:05 - 14:45 on Thursday 6 June.

Moderated by Paul Watts, Distinguished Analyst/vCISO, Information Security Forum, Jennifer will join a panel with Paul Mackie, CISO, Fern Trading, Stuart Seymour, Group CISO and CSO, Virgin Media O2, and Tomàs Roy, Director of the Cybersecurity Agency of Catalonia. The panel will discuss the internal procedures following an attack, examine the methods and vulnerabilities exploited, and assess the effectiveness of the response and recovery actions to refine security strategies.

Importance of crisis management

"As a CISO, with first-hand experience of facing a cyber attack, I understand the critical importance of crisis management," said Jennifer McGhee, CISO of Element Materials Technology.

"Cybersecurity incidents can have far-reaching consequences, impacting not only an organisation's operations but also its reputation and customer trust. Businesses need to be prepared with a robust incident response plan, detection, containment, and recovery."

Communication, collaboration, and coordination

“This should be coupled with clear communication, collaboration, and coordination among stakeholders during a crisis."

"I will draw on my expertise in crisis management, along with other cybersecurity experts, to provide actionable guidance on how to strengthen overall cybersecurity posture and ensure resilience when responding to an attack."

Infosecurity Europe

Attendees will gain valuable knowledge on decision-making in ransomware situations

Infosecurity Europe will feature several other sessions that explore the topic of ransomware and provide attendees with valuable insights and updates. These sessions will bring together industry experts, thought pioneers, and cybersecurity professionals to discuss the latest trends, strategies, and best practices in combating ransomware attacks.

Attendees will gain valuable knowledge on decision-making in ransomware situations, and the essential updates needed to stay ahead of this evolving threat.

Survey methodology

The research was conducted by Censuswide, among a sample of 200 IT security decision-makers (18+). The data was collected between 18.01.24 - 23.01.24. 

Censuswide abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles. Censuswide is also a member of the British Polling Council.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security monitoring system
  • Network monitoring
  • Institute security
  • Security service
  • Integration software
  • Cyber security
  • Data Security
  • Artificial intelligence (AI)
  • Related links
  • Infosecurity Europe 2024
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

"Infosecurity Europe 2024 report reveals AI-driven and ransomware attacks are increasingly impacting cybersecurity strategies, with 40% respondents escalating investment in defense. Join us to explore latest risks and effective response strategies."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec