INCYBER FORUM CANADA

Avatar
[[{“value”:”

October 29-30, 2024
Location: Palais des Congrès, Montreal, Québec, Canada

Join us for the InCyber Forum Canada 2024 on October 29-30 at the Palais des Congrès in Montreal, QC. This leading event in cybersecurity and digital trust returns for its third edition, promising to bring together over 5,000 visitors, 200 exhibitors, and 250 speakers.

With the theme “Cybersecurity in the Age of AI,” the forum will feature keynote speeches from top experts, dynamic panel discussions, and interactive demonstrations. The agenda covers crucial topics such as AI integration in cybersecurity, digital identity, cybercrime, and the security of smart transportation systems.

What sets the InCyber Forum apart is its unique format as the only event that combines a trade show, a forum, and a summit. Attendees will have the opportunity to network with industry leaders, explore cutting-edge solutions in the Tech Lab, and participate in specialized sessions that address both operational and strategic challenges in cybersecurity.

This event is essential for professionals seeking to enhance their knowledge, connect with influential decision-makers, and stay ahead of emerging trends and technologies. Don’t miss this chance to be part of a transformative experience that shapes the future of cybersecurity.

For more details and to register, visit https://northamerica.forum-incyber.com/ .

As an EC-Council member, use our discount code ECCO1HNL7KE2 to get 50% off on the ticket price.

The post INCYBER FORUM CANADA appeared first on CISO MAG | Cyber Security Magazine.

“}]] 

Total
0
Shares
Previous Post

Counter-Insider Threat Symposium

Next Post

CISO Canberra

Related Posts

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. "An Authentication Bypass Using an Alternate Path or
Avatar
Read More

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It concerns a
Avatar
Read More