Skyhawk Security was at Cybertech – What did you miss?

Blog AWS Security Cloud Security

The Cybertech conference of 2024 was supposed to mark the tenth year of the event that has long been considered the most significant in the local industry. The event that started as an event by Israelis, for Israelis, has long since become the “showcase” of the local  industry, where established companies such as Checkpoint, large startups and also completely new startups (some just emerging out of stealth mode) present themselves to the public. But what happened in October changed everything. The conference was postponed from its traditional date in January to April. The postponement (and the tense security situation in Israel) led to many concerns by both exhibitors and visitors, and some of them canceled their planned participation in the conference. In the end, the conference was held this week in a pleasant wintry atmosphere, and was crowned a success. Although the number of exhibiting companies was smaller than in previous years (the notable absence were the booths of VCs, which in previous years erected large booths in an attempt to promote their companies and also to “show off”), as was the number of visitors from abroad, but the visitors who came to Pavilion 2 at the Expo in Tel Aviv got to see Israel’s cyber industry, which even six months of fighting could not stop.

The exhibition was divided into areas; The conference area where visitors hear lectures and reviews, among others from Mr. Gabi Portnoy, head of the Israeli Cyber Directorate, , who said that “the intensity of cyber attacks against Israel has increased threefold since the beginning of the war. Portnoy also revealed details about the “BlackShadow” attack group that operated against entities in Israel. The group operates Under the cover of a private company in Tehran but actually is working for the Iranian Ministry of Intelligence. Other sessions dealt with the protection of the health systems, Internet of things, communication systems, entrepreneurship and cyber investments, and hosted diverse speakers such as former CEO of Checkpoint Gil Shwed, and officials from the cyber agencies of countries such as Germany, Lithuania, India and more .

In the main exhibition hall, well-known Israeli companies such as Cyberark and Checkpoint presented alongside foreign companies with research centers in Israel (such as Proofpoint, Intel and Thales) as well as mature startups. But the interesting part of the exhibition was the startup pavilion, which contained dozens of young and partly unknown companies, presenting products in new product categories. This year the most notable theme  was of off course  cybersecurity in the cloud, with an emphasis on identifying threats and containing them in real time, and, naturally, the use of artificial intelligence to identify and contain attacks. The beauty of the “startup marketplace” as it is popularly called is the immediacy in which you can talk to the team members of the startups and hear from them about the products. Since the entrance to the exhibition is free, there is an interesting mix of end-users (CISOs and information security professionals), soldiers from technological units of the IDF who are interested in the products (and also sniff about work after their release from service), students, other startups who are testing the market, representatives of huge companies who are looking for innovative solutions and also investors. Last but not least are the high school students from the various cyber programs, who come to the conference to rub shoulders with the industry that may serve as their home a few years’ time. It’s humbling to see that even at the busiest booth, everyone, especially the young guys, is given their full attention, explaining to them what problems the product solves and how it does it. Such an educational atmosphere cannot be found in any other cyber conference in the world.

Of course, it is not possible to completely detach from the situation. Both the Israelis and the visitors from abroad were exposed to a moving exhibit that included 133 empty chairs with the names of the hostages held in Gaza, which were placed in a prominent place and reminded everyone that the war is not over. This duality between “business as usual” and “a state of war” was well felt at the conference. Some claimed that it created a depressing atmosphere where other look at the positive side, stating that If in such a difficult year the industry continues to operate, conferences are held, people fly over and express confidence in the country and its cyber sector despite the concerns, then we have here a particularly resilient and strong industry that will know how to survive the current crisis and come out of it strengthened. We all hope that by the time of the next Cybertech, somewhere in 2025, the war will be behind us, the hostages will return home and the industry will grow again. In this context, it will be interesting to see what war-related technologies and products will be invented and presented at the next conference. What is certain – there is something to wait for.

Blog

Skyhawk Security stands out in a competitive market! The organization is proud to announce that it has been named a finalist in the 2024 Cloud Security Awards program in four categories: Cloud Security Innovator of the Year Best Use of

Cloud SecurityAIData BreachThreat Detection
Blog

The Cybertech conference of 2024 was supposed to mark the tenth year of the event that has long been considered the most significant in the local industry. The event that started as an event by Israelis, for Israelis, has long

Cloud SecurityAIData BreachThreat Detection
Blog

Did you know cloud attacks increased 75% over the last year? Or, that human error was the leading cause of cloud breaches at 55%? And 75% of businesses state that more than 40% of data stored in the cloud is

Cloud SecurityThreat Detection
Blog

US National Institute of Standards and Technology (NIST) defines “Attack surface” as: The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or

Cloud SecurityAIData BreachThreat Detection
Blog

It is a fact that the security industry suffers from a chronic shortage of skilled employees. This global shortage, which ISC2 estimates at 4 million professionals. The global workforce is estimated at 5.5 million people, meaning it nearly needs to

Cloud SecurityAIData BreachThreat Detection
Blog

Please check out this guest blog post by Alex Sharpe, a Cyber Security Expert with decades of experience. The SEC Cybersecurity Rule is designed to provide transparency so investors can make information decisions. The rule effectively imposes two requirements on

Cloud SecurityAIData BreachThreat Detection

Thanks For Reaching Out!

One of our expert will get back to you
promptly at asafshachar@gmail.com

Ready?
Fill out the form and we'll schedule your demo
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.