London hospitals hit by cyber attack highlights urgent need for cyber security in critical industries


Recent cyber-attacks have disrupted services at major London hospitals, this is a stark reminder of the persistent cyber security threats that our critical industries are facing every day. The Institution of Engineering and Technology (IET) is hosting the Cyber Security for Critical Industries Conference this September, to draw attention to the prevalence of these threats and what we can do to strengthen cyber defences and promote resilience in sectors and industries vital to UK security and prosperity.

Prominent NHS hospitals, King’s College Hospital, Guy’s and St Thomas’, were the latest unfortunate victims of the on-going attack on a national service, drawing parallels with the spate of attacks on US energy infrastructure in 2023. The rise in cyber-attacks demonstrates the significant vulnerabilities that exist within our essential services. These incidents not only disrupt operations but also pose substantial risks to public safety and confidence. As cyber threats continue to evolve, there is an undeniable need for our critical industries to enhance their cyber security measures.

The Cyber Security for Critical Industries Conference, taking place from 10-11 September 2024 at IET London: Savoy Place, will provide a crucial platform for industry leaders, cyber security experts, and policymakers to discuss and tackle these challenges. The event aims to foster dialogue and promote collaboration and innovation in the field of cyber security.

The conference will delve into the latest developments in cyber security, discuss evolving threats, and explore strategies for building resilient and secure systems. Attendees will have the opportunity to connect with peers, learn from industry experts, and gain insights into best practices to safeguard their organisations’ people and data.

Cyber Security for Critical Industries Conference Producer at the IET, Louis Merralls said: “In recent years, the conversation in the cyber security space has shifted from trying to understand the threat landscape and identify the key bad-actors, whether they be independent hacking groups or state-sponsored attacks. To how organisations and their people can begin to address the vulnerabilities that are present in all systems, whether they’re physical or digital.”

The conference line-up includes panel discussions on the latest cyber security strategies, breakout sessions on specific challenges facing the industry, and keynote addresses from industry leaders, policy makers, and regulators. It is an imperative event for anyone involved in managing, protecting, or overseeing critical infrastructure.

The IET encourages all professionals involved in critical industries to attend the conference. It is an opportunity not only to learn about the latest advancements in cyber security but also to actively engage in shaping the future of our critical industries.

For more information about the conference and to register, please visit theiet.org/cyber-security


Sign up for our Newsletter


Related:

  • Alleged breached data of Airport and Aviation Services Sri Lanka surfaces online

    July 10, 2024

    A recent post on the notorious cybercrime forum BreachForums claims that the Airport and Aviation Services Sri Lanka (AASL) has suffered a data breach. According to the post, the breached data contains approximately 7,083 records that include names, NICs, emails, passport numbers, and other sensitive data. Blurred screenshot of post alleging Airport and Aviation Services Sri ...

  • Reeling in DarkGate Malware Attacks from the Beach

    July 10, 2024

    Last year, the number of malware attacks worldwide reached 6.08 billion. That’s a 10% increase compared with 2022. Why are cybercriminals developing so much malware? Because it is a vital tool to help them infiltrate businesses, networks or specific computers to steal or destroy sensitive data. or destroy sensitive data. There are many types of malware ...

  • Resurrecting Internet Explorer: Threat Actors Using Zero-Day Tricks In Internet Shortcut File To Lure Victims (CVE-2024-38112)

    July 9, 2024

    Check Point Research recently discovered that threat actors have been using novel (or previously unknown) tricks to lure Windows users for remote code execution. Specifically, the attackers used special Windows Internet Shortcut files (.url extension name), which, when clicked, would call the retired Internet Explorer (IE) to visit the attacker-controlled URL. An additional trick on IE ...