Edit Template

Category: Press

Cybecs to Unveil Cutting-Edge Security Solutions at FIBA 2024

Cybecs to Unveil Cutting-Edge Security Solutions at FIBA 2024

Discover how Cybecs led the way in cybersecurity at FIBA 2024, showcasing cutting-edge security solutions and forging strategic partnerships across Florida. Explore highlights from our successful pitch in Tallahassee and our activities in Tampa.

Read More
Cybecs Makes Waves: New Regional HQ in Tampa Draws Media Spotlight!

Cybecs Makes Waves: New Regional HQ in Tampa Draws Media Spotlight!

Cybecs announces its U.S. expansion with a regional HQ in Tampa. Featured in The Business Journals, St Pete Catalyst, and The Observer, we’re setting new standards in global cybersecurity. Join our mission in Tampa.

Read More
Tsofit Shachar on ‘ICS Cyber Talks’: Women in Cyber, Challenges & Future Trends

Tsofit Shachar on ‘ICS Cyber Talks’: Women in Cyber, Challenges & Future Trends

Tsofit Shachar on ‘ICS Cyber Talks’: Women in Cyber, Challenges & Future Trends Tsofit Shachar On ‘ICS Cyber Talks’: Women In Cyber, Challenges & Future Trends We’re thrilled to spotlight Tsofit Shachar’s recent appearance on the ‘ICS Cyber Talks’ podcast, hosted by Nachshon Pincu and Mally Bar. Tsofit, Vice President of Cyber Strategy and BizDev at Cybecs Security Solutions brings her extensive expertise as a former Global CISO at esteemed organizations like Elbit Systems, EL AL Israel Airlines, and MEKOROT® to the forefront of critical infrastructure cybersecurity. In this engaging podcast episode, Tsofit delves into several key topics: Challenges Faced by Women in Cyber: Tsofit sheds light on the unique challenges that women encounter in the realm of cybersecurity. Balancing Work and Life Decisions: She discusses the decisions and strategies related to achieving work-life balance in the dynamic field of cybersecurity. Evolving Cyber Landscape in 2023: Tsofit provides insights into the ever-changing cyber landscape in the current year. CISO Challenges in Prominent Organizations: Drawing from her rich experience, Tsofit addresses the specific challenges faced by Chief Information Security Officers (CISOs) in prominent organizations. Differences in CISO Roles and Organizational Culture: She highlights the variations in CISO roles, organizational culture, and gender perspectives between Israel and other countries. Comparing the “New” and “Old” Cyber World: Tsofit offers comparisons between the traditional and modern aspects of the cybersecurity domain. Anticipated Cybersecurity Trends: Listeners gain insights into the anticipated trends in the cybersecurity sphere. Overcoming OT Cybersecurity Challenges: Tsofit explores challenges related to operational technology (OT) cybersecurity and how to create value for stakeholders. Transitioning to Business-Centric Cybersecurity: The transition from traditional cybersecurity approaches to business-centric strategies is discussed in detail. We cordially invite you to join the conversation and glean valuable insights from Tsofit Shachar, a prominent advocate for women in the Israeli cyberspace. Tune in to the full podcast episode 👉 Link. For further information on critical infrastructure cybersecurity and insights from Tsofit Shachar, feel free to explore our advanced security solutions. Kudos to TLV1 Podcasts, Itai Shelem, MADSEC, and Doron Sivan for facilitating this essential dialogue. ICS Cyber Talks Podcast TLV1 Podcasts Itai Shelem MADSEC Doron Sivan #podcast #womanleadership #woman #cyber #cyberdefence #otcybersecurity #icscybersecurity https://lnkd.in/d6hVkssT

Read More
Or Nuriani’s Expert Insight on AWS Cloud Security, Now on PentestMag!

Or Nuriani’s Expert Insight on AWS Cloud Security, Now on PentestMag!

Or Nuriani’s Expert Insight on AWS Cloud Security, Now on PentestMag! We’re proud to spotlight our Red Team Manager, Or Nuriani, for his latest contribution to PentestMag – “Navigating AWS Cloud Security: Insights from a Red Team Manager”. Delving into the intricacies of AWS cloud-based penetration testing, Or shares his rich experiences and invaluable strategies derived from his tenure at Cybecs Security Solutions. A must-read for anyone in the cybersecurity realm! Dive into Or’s insights here: 👉 Link A heartfelt thank you to PentestMag for hosting Or’s expertise, fostering growth and knowledge-sharing within our community.

Read More
Cybecs & ISACA Collaborate for a Secure Development Session

Cybecs & ISACA Collaborate for a Secure Development Session

Cybecs & ISACA Collaborate for a Secure Development Session Exciting news! Cybecs, a frontrunner in the cybersecurity domain, is partnering with the esteemed global body, ISACA, to host a session centered on secure development practices. This collaboration reaffirms Cybecs’ commitment to enhancing security and integrity in tech development. Be part of the movement. Register now! 👉 Link ISACA COLLEGE invites you to a series of three lectures on the topic: “Integrating Information Security into Development Processes.” A face-to-face meeting will take place at Cybecs’ offices – 29 HaRokmim St., 10th floor, Holon. Monday, 17/07/2023, 15:00-19:00. Secure Development – Future Trends (50 minutes) The lecture’s goal: The foundation for discovering and understanding possible future scenarios in secure development realms is centered on a deep familiarity with future trends in technological and regulatory domains, which are shaping today’s scenarios. Key topics: Global trends in secure development realms. Lecturer: Tsofit Shachar, Cyber Vice President, Cybecs Group. With over 20 years of experience in information security, Tsofit held roles such as Chief Cyber Officer at Elbit Systems, Head of Information Security and Cyber Protection at Kupat Holim Meuhedet, Chief Technology Officer at White Hat Israeli Cyber, and Chief Information Security Officer (CISO) at El Al. Secure Development for Information Security Managers – Application (75 minutes) The lecture’s goal: Practical tools for information security managers in the integration of secure development processes. During the lecture, important concepts in the field are discussed, advanced techniques, and proven methods to enhance information security in development processes. Key topics: Practical tools in secure development. Lecturer: Nitzan Levi, Information Security and Secure Development, Cybecs. A cybersecurity expert, secure development, and IT audit. With 20 years of experience in software development, architecture, information security, and cybersecurity, he held a variety of roles in the Israeli software and high-tech industry. He leads international projects and is a senior consultant in the field of cybersecurity and information security. He has rich experience in training in these fields and is a recognized instructor on behalf of CISCO. Secure Development in the Cloud Realms (75 minutes) The lecture’s goal: The lecture “Secure Development in the Cloud Realms” brings information security managers to the forefront of knowledge in secure development in the era of the cloud. During the lecture, practical principles for secure development processes are presented, focusing on secure development processes, highlighting unique limitations and challenges of cloud development, and recommended paths to enhance data security. Key topics: Methodologies and principles in secure development in the cloud realms. Lecturer: Oren Yegar, CEO, SecureBricks.Cloud Oren is a cybersecurity expert, data protection, and public cloud audit, a lecturer, and has rich experience in technology training in the IDF and academic frameworks. A professional leader and senior lecturer in the CISO & DPO combined course at Bar-Ilan University; also holding a BBA degree and an international CISSP, CCSK, CISO, DPO certification. Costs: ₪200 ISACA member; ₪250 sister associations member; ₪300 others; 1 session per card. (Participation is rewarded with 4 CPE hours)

Read More
Cybecs is published in Cyber and Privacy Magazine 2023

Cybecs is published in Cyber and Privacy Magazine 2023

We are happy to present a part of the Cyber and Privacy Magazine 2023, worked on by Rachel Yonani and David Kuperman, Cybecs privacy specialists. 5 Essential tips for securing your small business network: We are excited to share that Cybecs has been featured in Cyber and Privacy Magazine 2023. In this fast-evolving digital landscape, staying ahead of cybersecurity trends is paramount. As a leading player in the cybersecurity domain, Cybecs is committed to sharing valuable insights to help you secure your business networks effectively. In this article, we provide you with 5 essential tips to fortify your small business network against potential cyber threats. Strengthen Wi-Fi Security: Cyber attackers often target small businesses through vulnerable Wi-Fi networks. Safeguard your office Wi-Fi by avoiding default settings and changing the router’s default permissions. Regularly update the router’s firmware and implement strong passwords for network access. If you’re using public Wi-Fi networks, ensure a reliable virtual private network (VPN) is in place to protect your data. Implement a Firewall: Defend your network with a robust firewall that monitors and blocks unauthorized access attempts. This can be achieved through either hardware or software solutions. Consider investing in dedicated hardware firewalls for enhanced protection. Managed firewall services can also provide additional support and information security expertise. Enable Two-Step Verification: Elevate security by implementing two-step verification for all employee accounts. This adds an extra layer of protection, requiring dual authentication methods before accessing sensitive information or systems. This can be executed through methods like SMS codes, email verification, or authentication apps. Encourage Private VPN Usage: Prevent employees from using Public Wi-Fi networks in cafes, airports, or hotels. These networks are potential targets for hackers. To secure data transmission between employee devices and the office network, employ a secure VPN solution with encryption. Keep Software Updated: Regularly update all software applications, including operating systems, to maintain the latest security patches. Enable automatic updates wherever possible. This rule applies to computers, laptops, mobile devices, and security systems. Notably, prioritize software and firmware updates for routers to address potential vulnerabilities. By incorporating these expert tips, you can significantly bolster the security of your small business network and reduce the likelihood of cyber-attacks and data breaches. For further insights and guidance on enhancing your network security, explore our comprehensive cybersecurity solutions.

Read More

Categories