Friday , June 27 2025
InfoSecCon 2025

“InfoSecCon-2025″ held successfully promising cyber resilience

“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at Dhaka on 16 May- 2025. The conference was fueled with 3 keynotes, 2 panel discussions and Q&A sessions makes the conference more dynamics.

On the keynote on “Blockchain Technology: Enhancing Security in the Financial Sector” said, Blockchain technology is a revolutionary innovation that improves security in the financial sector. It functions as a decentralized, distributed, and immutable ledger that records transactions across many computers.

Critical RCE Flaws in Cisco ISE and ISE-PIC Allow to Gain Root Access

Cisco has issued updates to fix two critical security vulnerabilities in Identity Services Engine (ISE) and ISE Passive Identity Connector...
Read More
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow to Gain Root Access

CISA Warns of FortiOS Hard-Coded Credentials Vulns

CISA warns about a serious vulnerability in Fortinet FortiOS that threatens network security. CISA included CVE-2019-6693 in its Known Exploited...
Read More
CISA Warns of FortiOS Hard-Coded Credentials Vulns

5 vendors’ printer totaling 748 models affected: Rapid7

Rapid7 has revealed serious vulnerabilities in multifunction printers (MFPs) from Brother, FUJIFILM, Ricoh, and Toshiba Tec Corporation. These findings, covering...
Read More
5 vendors’ printer totaling 748 models affected: Rapid7

Citrix Released Emergency Patches for Actively Exploited CVE-2025-6543

Citrix has issued security updates for a critical vulnerability in NetScaler ADC that has been actively exploited. The vulnerability CVE-2025-6543...
Read More
Citrix Released Emergency Patches for Actively Exploited CVE-2025-6543

SonicWall warns of a trojanized NetExtender stealing VPN logins

SonicWall warned on Monday that unknown attackers have trojanized its SSL-VPN NetExtender application, tricking users into downloading it from fake...
Read More
SonicWall warns of a trojanized NetExtender stealing VPN logins

CVE-2025-36537
TeamViewer patched vuln allowing hacker SYSTEM Rights

A significant security vulnerability has been revealed in TeamViewer Remote Management for Windows, posing a risk of privilege escalation attacks....
Read More
CVE-2025-36537  TeamViewer patched vuln allowing hacker SYSTEM Rights

Hacker Target 70+ Microsoft Exchange Servers to Steal Credentials with Keyloggers

Unidentified hackers are targeting exposed Microsoft Exchange servers to inject harmful code into login pages and steal credentials. Positive Technologies...
Read More
Hacker Target 70+ Microsoft Exchange Servers to Steal Credentials with Keyloggers

WhatsApp banned on all US House of Representatives devices

The U.S. House of Representatives has banned congressional staff from using WhatsApp on government devices due to security concerns, as...
Read More
WhatsApp banned on all US House of Representatives devices

Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

Kaspersky found a new mobile malware dubbed SparkKitty in Google Play and Apple App Store apps, targeting Android and iOS....
Read More
Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

OWASP has released its AI Testing Guide, a framework to help organizations find and fix vulnerabilities specific to AI systems....
Read More
OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

Key advantages include decentralization, which removes single points of failure and makes it harder for attackers to compromise the network. Cryptographic hashing maintains the integrity of transaction blocks; altering one block changes its hash and all subsequent hashes.

On the keynotes BJIT’s head of technology operation demonstrated Amir Hossain presented case studies showcasing how Bangladeshi companies and startups are successfully adopting cloud-native architectures. He highlighted three key sectors:

Fintech firms: using cloud to deliver scalable mobile payment solutions.

E-commerce platforms: ensuring uptime and scalability during peak sales periods.

Telecoms and banks : improving customer management through cloud-native systems.

S. M. Tofayel Ahmad, Additional Director (ICT), Bangladesh Bank highlighted on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks” not only in banking sector but enterprise, mid and small size organizations.

At InfoSecCon-2025 (3rd Edition), He presented how cyber attacks like interruption, interception, modification, and fabrication impact availability, confidentiality, integrity, and authenticity in network communication. He also addressed the rising risks of AI-powered attacks, the need for AI-based defenses, and the growing cybersecurity skills gap.

There was a panel discussion on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks”. The panelists said, AI is changing the digital landscape but also creating more advanced cyber threats. These AI-driven attacks are quicker and can bypass traditional security systems, requiring a shift from mere prevention to rapid detection, response, and recovery.

To enhance resilience, organizations need to integrate AI into their cybersecurity strategies. This includes adopting intelligent threat detection tools, automating incident responses, and using predictive analytics to spot vulnerabilities. A robust digital infrastructure also depends on continuous employee training, real-time threat intelligence sharing, and adaptable cloud-native systems.

There was another panel discussion on “Toward a Secure Hybrid Cloud: Bridging Traditional Data Centers with Cloud in Bangladesh” highlighted Bangladesh’s digital transformation requires a hybrid cloud strategy that combines traditional data centers with cloud services. This approach allows for control over on-premise systems, which is important for compliance and handling sensitive information, while also benefiting from the cloud’s scalability and cost-effectiveness.

Ensuring security through encryption, access management, and compliance with relevant standards is essential. Solutions must be tailored to address Bangladesh’s infrastructure challenges, such as connectivity and cloud literacy. Additionally, training and awareness are necessary for secure adoption. In the end, a secure hybrid cloud architecture will enhance operational efficiency and protect data integrity in Bangladesh’s evolving digital environment.

And lastly the Questions and Answer sessions draw the attention of the audiences. Four panelists were on the stage to answer the questions from the audiences.

As chief guest Shish Hyder Chowdhury, secretary ICT division said, “Our digital journey, while promising immense growth, also introduces new vulnerabilities. The rise in sophisticated cyber threats demands a unified and proactive approach. He said, ICT Division is committed to fostering a resilient cybersecurity ecosystem. This involves strengthening our national infrastructure, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to building robust defenses.”

Director General of national cyber security agency (NCSA) Dr. Taibur Rahman said, National Cybersecurity Agency is committed to fostering a resilient digital ecosystem. This requires strengthening our national defenses, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to effectively address these challenges. We must prioritize building indigenous capabilities and adopting global best practices tailored to our unique context.

As a guest of honor Mr. SHOJI Akihiro, JICA Expert highlighted its future plan on cyber security in Bangladesh.

Check Also

Security Companies

New Security Companies Who Are Exploring the Bangladeshi Market 

BlackHat Asia-2025 was held for four days at the Marina Bay Convention Center in Singapore …

Leave a Reply

Your email address will not be published. Required fields are marked *