Сyber Security Review Spring 2016 ebook - preview edition

Page 1

ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)

Cyber Security Review Spring 2016

CYBER TECHNOLOGY – CYBER SECURITY ALONE IS NOT ENOUGH SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS ELEPHANT IN THE ROOM: CYBER EUROPE 2016

APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT

CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY


Monday 23 and Tuesday 24 May 2016 | London

Cyber 2016

Speakers include:

Evolving Threats, Security Developments and Improving Cooperation With increasing connectivity across digital devices, cyber resilience is becoming ever more critical. This two-day conference will bring together senior policy-makers, security and business experts to consider the key challenges in cybersecurity and new approaches to tackle threats. Registration and information: www.chathamhouse.org/conferences/cyber-2016 @CH_Events dmitchelmore@chathamhouse.org +44 (0)20 7314 2785 Media partner

Marina Kaljurand Foreign Minister Estonia Kris Herrin Senior Vice President Financial Services Information Sharing and Analysis Center Dr Jamie Saunders Director National Cyber Crime Unit Graham Wright Chief Information Security Officer National Grid Robert Mueller Partner WilmerHale; Director of the FBI (2001-13) Rajesh De Partner Mayer Brown; General Counsel at the US National Security Agency (2012-15) Charles Blauner Chief Information Security Officer Citi Global


EDITORIAL CONTRIBUTORS

Cyber Security Review

MEDIA PARTNERS

The opinions and views expressed in the editorial content in this

Published by Delta Business Media Limited 3rd floor, 207 Regent Street London W1B 3HH United Kingdom

publication are those of the authors alone and do not necessarily

Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659 info@deltabusinessmedia.com www.deltabusinessmedia.com www.cybersecurity-review.com

The views and opinions expressed in this publication do not necessarily

represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles. Š 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a

ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)

retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner. cybersecurity-review.com

3


CONTENTS

CONTENTS

IFC CYBER 2016 5

THE CYBER SECURITY SHOW 2016

7

EUROSATORY 2016

8

SECURITY & COUNTER TERROR EXPO 2016

9

CYBER TECHNOLOGY — CYBER SECURITY ALONE IS NOT ENOUGH

14

CYBER SECURITY IN TELECOMS 2016

By Richard Smith and Helge Janicke, Cyber Security Center, De Montfort University

15 THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER

By Brandon Newton, United States Army War College

26

APAC CYBER SECURITY SUMMIT 2016

27

SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE

31

ITEC 2016

32

CYBER INTELLIGENCE ASIA 2016

33

PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS

47

FUTURE OF CYBER CONFERENCE 2016

4

By David Tayouri, M.Sc. in Computer Science, Cyber Intelligence Department Manager, Israel Aerospace Industries (IAI)

By Nathan T. Ray, United States Army War College

CYBER SECURITY REVIEW, Spring 2016


8-9 MARCH 2016 BUSINESS DESIGN CENTRE, LONDON

NEW THREATS, NEW SOLUTIONS, NEW PARTNERSHIPS FOR CISOS FROM EUROPE’S CRITICAL INFRASTRUCTURE Case studies, talks and interviews with our ground breaking speakers including: Scott Borg

Sir Iain Lobban

Director & Chief Economist, The U.S. Cyber Consequences Unit

Former Director, GCHQ

Professor Nayef Al-Rodhan

Jamie Shea

Head of Geopolitics and Global Futures Programme, Geneva Centre for Security Policy

Deputy Assistant Secretary General of Emerging Security Challenges, NATO

To view the full agenda and speaker line-up, visit www.terrapinn.com/cyber-csr


CONTENTS

48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE

By David Adams, Naval Air Systems Command, Tactical Airlift Program Office (PMA-207)

52

ECCWS – 15th EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY

53

ELEPHANT IN THE ROOM: CYBER EUROPE 2016

57

CISO EUROPE 2016 – 13th ANNUAL SUMMIT & ROUNDTABLE

58

APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT

66

CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY

75

COMEX – IT, TELECOM & TECHNOLOGY SHOW

76

SOFTWARE 2015: SITUATION DIRE

82

CYBER SECURITY REVIEW – CALL FOR PAPERS

83

MILIPOL QATAR 2016

By Jayadev Parida, Doctoral Fellow on Cyber Security in the Centre for European Studies, School of International Studies, Jawaharlal Nehru University, New Delhi

By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army

By Rogério Winter, Brazilian Army – Cyber Defense and Rodrigo Ruiz, Center for Information Technology Renato Archer (CTI)

By Don O’Neill, former president of the Center for National Software Studies (CNSS)

OBC ISRAEL AEROSPACE INDUSTRIES - IAI 6

CYBER SECURITY REVIEW, Spring 2016


Taking cyber solutions to the next level

IAI’s Cyber Defense, Intelligence and Early Warning Solutions • Cyber and off-the-air Accessibility solutions • Training, Testing, Simulation & Forensics • Cyber Analytics- Identity Resolution, Geo Location, Anomaly Detection • Modular Cyber Centers: Cyber Security Operation Centers (CSOC), Intelligence Centers and Early Warning Centers

www.iai.co.il corpmkg@iai.co.il


To receive a full version of the Cyber Security Review, please complete the Request Form Here. Please provide a valid corporate, government or academic email address. We reserve the right to refuse to accept any application at our discretion. If you have any queries please email to: editorial@deltabusinessmedia.com

REQUEST YOUR COPY OF THE CYBER SECURITY REVIEW

www.cybersecurity-review.com

Published by Delta Business Media 3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659 info@deltabusinessmedia.com www.deltabusinessmedia.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.