Wednesday , July 23 2025
InfoSecCon 2025

“InfoSecCon-2025″ held successfully promising cyber resilience

“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at Dhaka on 16 May- 2025. The conference was fueled with 3 keynotes, 2 panel discussions and Q&A sessions makes the conference more dynamics.

On the keynote on “Blockchain Technology: Enhancing Security in the Financial Sector” said, Blockchain technology is a revolutionary innovation that improves security in the financial sector. It functions as a decentralized, distributed, and immutable ledger that records transactions across many computers.

UK to ban public sector from paying ransomware gangs

The UK government plans to ban public sector and critical infrastructure organizations from paying ransomware ransoms. The proposed legislation would...
Read More
UK to ban public sector from paying ransomware gangs

(CVE-2025-6704, CVE-2025-7624)
Urgent Sophos Firewall Update: Two Critical RCE Flaws Patched

Sophos has released a security advisory addressing five vulnerabilities in Sophos Firewall, two of which are critical and could enable...
Read More
(CVE-2025-6704, CVE-2025-7624)  Urgent Sophos Firewall Update: Two Critical RCE Flaws Patched

Dell admits breach of test lab platform by World Leaks extortion group

A newly rebranded extortion gang known as "World Leaks" breached one of Dell's product demonstration platforms earlier this month and...
Read More
Dell admits breach of test lab platform by World Leaks extortion group

Microsoft issues urgent patches for SharePoint RCE vulnerabilities

Microsoft issued urgent updates for two serious SharePoint security holes, identified as CVE-2025-53770 and CVE-2025-53771, used in attacks known as...
Read More
Microsoft issues urgent patches for SharePoint RCE vulnerabilities

HPE alerts of hardcoded passwords in Aruba access points

Hewlett-Packard Enterprise (HPE) warns that Aruba Instant On Access Points have hardcoded credentials, enabling attackers to skip normal authentication and...
Read More
HPE alerts of hardcoded passwords in Aruba access points

Akira Ransomware Allegedly Compromise 12 Companies in 72 Hours

The Akira ransomware group increased its attacks, adding 12 new victims to its dark web portal from July 15 to...
Read More
Akira Ransomware Allegedly Compromise 12 Companies in 72 Hours

Singapore urgently engage military force to tackle ‘serious’ cyberattack

Defence Minister Chan Chun Sing said these select units will work with the Cyber Security Agency (CSA) in a united...
Read More
Singapore urgently engage military force to tackle ‘serious’ cyberattack

Hackers infect 10M Androids with BADBOX 2.0

Google is suing 25 unidentified cybercriminals thought to be from China for running BADBOX 2.0, a major global botnet with...
Read More
Hackers infect 10M Androids with BADBOX 2.0

Oracle Patched 200 Vulns With July 2025 CPU

Oracle's July 2025 Critical Patch Update includes 309 new security patches, with 127 addressing remotely exploitable vulnerabilities. SecurityWeek found about...
Read More
Oracle Patched 200 Vulns With July 2025 CPU

Ivanti Zero-Days Exploited to Drop MDifyLoader

Cybersecurity researchers have revealed a new malware named MDifyLoader, linked to cyber attacks using security vulnerabilities in Ivanti Connect Secure...
Read More
Ivanti Zero-Days Exploited to Drop MDifyLoader

Key advantages include decentralization, which removes single points of failure and makes it harder for attackers to compromise the network. Cryptographic hashing maintains the integrity of transaction blocks; altering one block changes its hash and all subsequent hashes.

On the keynotes BJIT’s head of technology operation demonstrated Amir Hossain presented case studies showcasing how Bangladeshi companies and startups are successfully adopting cloud-native architectures. He highlighted three key sectors:

Fintech firms: using cloud to deliver scalable mobile payment solutions.

E-commerce platforms: ensuring uptime and scalability during peak sales periods.

Telecoms and banks : improving customer management through cloud-native systems.

S. M. Tofayel Ahmad, Additional Director (ICT), Bangladesh Bank highlighted on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks” not only in banking sector but enterprise, mid and small size organizations.

At InfoSecCon-2025 (3rd Edition), He presented how cyber attacks like interruption, interception, modification, and fabrication impact availability, confidentiality, integrity, and authenticity in network communication. He also addressed the rising risks of AI-powered attacks, the need for AI-based defenses, and the growing cybersecurity skills gap.

There was a panel discussion on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks”. The panelists said, AI is changing the digital landscape but also creating more advanced cyber threats. These AI-driven attacks are quicker and can bypass traditional security systems, requiring a shift from mere prevention to rapid detection, response, and recovery.

To enhance resilience, organizations need to integrate AI into their cybersecurity strategies. This includes adopting intelligent threat detection tools, automating incident responses, and using predictive analytics to spot vulnerabilities. A robust digital infrastructure also depends on continuous employee training, real-time threat intelligence sharing, and adaptable cloud-native systems.

There was another panel discussion on “Toward a Secure Hybrid Cloud: Bridging Traditional Data Centers with Cloud in Bangladesh” highlighted Bangladesh’s digital transformation requires a hybrid cloud strategy that combines traditional data centers with cloud services. This approach allows for control over on-premise systems, which is important for compliance and handling sensitive information, while also benefiting from the cloud’s scalability and cost-effectiveness.

Ensuring security through encryption, access management, and compliance with relevant standards is essential. Solutions must be tailored to address Bangladesh’s infrastructure challenges, such as connectivity and cloud literacy. Additionally, training and awareness are necessary for secure adoption. In the end, a secure hybrid cloud architecture will enhance operational efficiency and protect data integrity in Bangladesh’s evolving digital environment.

And lastly the Questions and Answer sessions draw the attention of the audiences. Four panelists were on the stage to answer the questions from the audiences.

As chief guest Shish Hyder Chowdhury, secretary ICT division said, “Our digital journey, while promising immense growth, also introduces new vulnerabilities. The rise in sophisticated cyber threats demands a unified and proactive approach. He said, ICT Division is committed to fostering a resilient cybersecurity ecosystem. This involves strengthening our national infrastructure, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to building robust defenses.”

Director General of national cyber security agency (NCSA) Dr. Taibur Rahman said, National Cybersecurity Agency is committed to fostering a resilient digital ecosystem. This requires strengthening our national defenses, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to effectively address these challenges. We must prioritize building indigenous capabilities and adopting global best practices tailored to our unique context.

As a guest of honor Mr. SHOJI Akihiro, JICA Expert highlighted its future plan on cyber security in Bangladesh.

Check Also

Security Companies

New Security Companies Who Are Exploring the Bangladeshi Market 

BlackHat Asia-2025 was held for four days at the Marina Bay Convention Center in Singapore …

Leave a Reply

Your email address will not be published. Required fields are marked *