cyber security review · 2016-03-05 · contents 6 cyber security review, spring 2016 48 data...
Post on 16-Jul-2020
0 Views
Preview:
TRANSCRIPT
ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)
CYBER TECHNOLOGY – CYBER SECURITY ALONE IS NOT ENOUGH
SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE
THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER
PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS
ELEPHANT IN THE ROOM: CYBER EUROPE 2016
APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT
CORROSIVE SECRECY AND CONFIDENCE:THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC
SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY
Cyber Security ReviewSpring 2016
Monday 23 and Tuesday 24 May 2016 | London
Cyber 2016Evolving Threats, Security Developments and Improving Cooperation
With increasing connectivity across digital devices, cyber resilience is becoming ever more critical. This two-day conference will bring together senior policy-makers, security and business experts to consider the key challenges in cybersecurity and new approaches to tackle threats.
Registration and information:www.chathamhouse.org/conferences/cyber-2016
@CH_Eventsdmitchelmore@chathamhouse.org +44 (0)20 7314 2785
Speakers include:
Marina Kaljurand Foreign Minister Estonia
Kris Herrin Senior Vice President Financial Services Information Sharing and Analysis Center
Dr Jamie Saunders Director National Cyber Crime Unit
Graham Wright Chief Information Security Officer National Grid
Robert Mueller Partner WilmerHale; Director of the FBI (2001-13)
Rajesh De Partner Mayer Brown; General Counsel at the US National Security Agency (2012-15)
Charles Blauner Chief Information Security Officer Citi Global
Media partner
3cybersecurity-review.com
Cyber Security Review Published by Delta Business Media Limited3rd floor, 207 Regent StreetLondon W1B 3HHUnited Kingdom
Tel: +44 (0) 20 7193 2303Fax: +44 (0) 20 3014 7659info@deltabusinessmedia.comwww.deltabusinessmedia.comwww.cybersecurity-review.com
ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)
EDITORIAL CONTRIBUTORS
The opinions and views expressed in the editorial content in this publication are those of the authors alone and do not necessarily represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. The views and opinions expressed in this publication do not necessarily express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles.
© 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner.
MEDIA PARTNERS
CONTENTS
4 CYBER SECURITY REVIEW, Spring 2016
IFC CYBER 2016
5 THE CYBER SECURITY SHOW 2016
7 EUROSATORY 2016
8 SECURITY & COUNTER TERROR EXPO 2016
9 CYBER TECHNOLOGY — CYBER SECURITY ALONE IS NOT ENOUGH By Richard Smith and Helge Janicke, Cyber Security Center, De Montfort University
14 CYBER SECURITY IN TELECOMS 2016
15 THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER By Brandon Newton, United States Army War College
26 APAC CYBER SECURITY SUMMIT 2016
27 SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE By David Tayouri, M.Sc. in Computer Science, Cyber Intelligence Department Manager, Israel Aerospace Industries (IAI)
31 ITEC 2016
32 CYBER INTELLIGENCE ASIA 2016
33 PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS By Nathan T. Ray, United States Army War College
47 FUTURE OF CYBER CONFERENCE 2016
CONTENTS
8-9 MARCH 2016BUSINESS DESIGN CENTRE, LONDON
NEW THREATS,NEW SOLUTIONS, NEW PARTNERSHIPSFOR CISOS FROM EUROPE’S CRITICAL INFRASTRUCTURE
Case studies, talks and interviews with our ground breaking speakers including:
To view the full agenda and speaker line-up, visit www.terrapinn.com/cyber-csr
Sir Iain Lobban Former Director, GCHQ
Jamie SheaDeputy Assistant Secretary General of Emerging Security Challenges, NATO
Scott Borg Director & Chief Economist, The U.S. Cyber Consequences Unit
Professor Nayef Al-RodhanHead of Geopolitics and Global Futures Programme, Geneva Centre for Security Policy
(2436) Cyber Security Show EU 2016 AD 225x170 1.2 - PRINT.indd 1 16/12/2015 09:19
CONTENTS
6 CYBER SECURITY REVIEW, Spring 2016
48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE ByDavidAdams,NavalAirSystemsCommand,TacticalAirliftProgramOffice(PMA-207)
52 ECCWS – 15th EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY
53 ELEPHANT IN THE ROOM: CYBER EUROPE 2016 By Jayadev Parida, Doctoral Fellow on Cyber Security in the Centre for European Studies, School of International Studies, Jawaharlal Nehru University, New Delhi
57 CISO EUROPE 2016 – 13th ANNUAL SUMMIT & ROUNDTABLE
58 APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
66 CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY By Rogério Winter, Brazilian Army – Cyber Defense and RodrigoRuiz,CenterforInformationTechnologyRenatoArcher(CTI)
75 COMEX – IT, TELECOM & TECHNOLOGY SHOW
76 SOFTWARE 2015: SITUATION DIRE ByDonO’Neill,formerpresidentoftheCenterforNationalSoftwareStudies(CNSS)
82 CYBER SECURITY REVIEW – CALL FOR PAPERS
83 MILIPOL QATAR 2016
Taking cyber solutions to the next level
• Cyber and off-the-air Accessibility solutions • Training, Testing, Simulation & Forensics• Cyber Analytics- Identity Resolution, Geo Location, Anomaly Detection • Modular Cyber Centers: Cyber Security Operation Centers (CSOC), Intelligence Centers and Early Warning Centers
IAI’s Cyber Defense, Intelligenceand Early Warning Solutions
www.iai.co.ilcorpmkg@iai.co.il
www.cybersecurity-review.com
Published by Delta Business Media3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom
Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659info@deltabusinessmedia.com www.deltabusinessmedia.com
To receive a full version of the Cyber Security Review, please complete the Request Form Here.
Please provide a valid corporate, government or academic email address. We reserve the right to refuse to accept any
application at our discretion.
If you have any queries please email to: editorial@deltabusinessmedia.com
REQUEST YOUR COPY OF THE CYBER SECURITY REVIEW
top related