ICT Hungary 2024: A Recap and the Imperative of Cybersecurity Readiness

Jun 5, 2024

The ICT Hungary 2024 conference was an important technology event for the corporate segment. At the conference, our CEO, Dr. Eyal Pinko, delivered an insightful presentation on the cyber trends of 2024. He highlighted the alarming rate of cyber attacks this year, with 10,000 successful breaches since January 1st, averaging four attacks every hour. These incidents have had a staggering impact on the global economy, incurring losses of 8 trillion USD in 2023. Dr. Pinko pointed out that criminals continue to exploit businesses through ransomware and extortion, with the Internet of Things (IoT) presenting new vulnerabilities as our connectivity with devices deepens.

Watch the video of Dr. Pinko’s presentation:

The EU’s response to the escalating cyber threats is the revised Network and Information Systems Directive (NIS), with the second iteration set to take effect in October 2024. This will significantly influence a wide array of European organizations and businesses. Industries that handle sensitive data, such as healthcare, financial services, media/telecom, education, retail/e-commerce, and government, are particularly at risk. For these sectors, adopting the NIS2 Directive’s protocols is not merely a compliance issue but a strategic move to fortify against data breaches and system disruptions. With just a few months left to meet the directive’s comprehensive cybersecurity, risk management, and incident reporting standards, the urgency is clear.

Dr. Pinko also highlighted the vital role of cybersecurity technologies in preemptively combating cyber threats. He emphasized the importance of network security, application and database security, endpoint security, cyber operations, risk analysis, identity and access management, and advanced employee training in cybersecurity awareness.

Given that any business could potentially fall victim to a cyber attack, it’s crucial to consider the financial, legal, and regulatory repercussions. The NIS2 Directive aims to bolster cybersecurity measures and safeguard critical services and infrastructure. EU member states are tasked with creating a national security framework and classifying essential service operators and digital service providers as critical infrastructure, subjecting them to rigorous cybersecurity protocols. The directive also mandates incident reporting and encourages cooperation among member states on cybersecurity matters.

Saifort provides an extensive suite of cybersecurity services to help businesses prepare and comply with NIS2, including CISO as a service, penetration testing, security operation centers, forensics, fraud investigation, cyber intelligence, threat analysis, audits, risk assessments, and comprehensive training for security teams. We recognize the challenges businesses face in navigating the complexities of NIS2 and stand ready to assist.

Saifort’s team can consult and support those seeking a dependable cybersecurity partner. For further assistance, please contact us today.

You may also find interesting…

5 Tips for SOC Analysts to Monitor and Mitigate Threats

5 Tips for SOC Analysts to Monitor and Mitigate Threats

Monitoring has a pivotal role in safeguarding your organization's digital assets. While building a fully equipped SOC may present challenges for many companies, there are fundamental practices that can significantly enhance your capabilities. In this article, I'll...

AI and Machine Learning in Cyber Security Operations

AI and Machine Learning in Cyber Security Operations

We often say that the cyber security landscape is always changing, and threats are constantly evolving. Over the last year, those statements have been widely confirmed by the rise of consumer AI tools, which allow users to create content just by text commands. Just at...

Threat Detection and Modern Response Methods

Threat Detection and Modern Response Methods

Keeping your business secure often relies on two main factors – how you detect threats and how you respond to them. In order to protect your assets, you need to have very specific answers to both of those questions. While using several predefined methods was enough...