ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)
Cyber Security Review Spring 2016
CYBER TECHNOLOGY – CYBER SECURITY ALONE IS NOT ENOUGH SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS ELEPHANT IN THE ROOM: CYBER EUROPE 2016
APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT
CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY
Monday 23 and Tuesday 24 May 2016 | London
Cyber 2016
Speakers include:
Evolving Threats, Security Developments and Improving Cooperation With increasing connectivity across digital devices, cyber resilience is becoming ever more critical. This two-day conference will bring together senior policy-makers, security and business experts to consider the key challenges in cybersecurity and new approaches to tackle threats. Registration and information: www.chathamhouse.org/conferences/cyber-2016 @CH_Events dmitchelmore@chathamhouse.org +44 (0)20 7314 2785 Media partner
Marina Kaljurand Foreign Minister Estonia Kris Herrin Senior Vice President Financial Services Information Sharing and Analysis Center Dr Jamie Saunders Director National Cyber Crime Unit Graham Wright Chief Information Security Officer National Grid Robert Mueller Partner WilmerHale; Director of the FBI (2001-13) Rajesh De Partner Mayer Brown; General Counsel at the US National Security Agency (2012-15) Charles Blauner Chief Information Security Officer Citi Global
EDITORIAL CONTRIBUTORS
Cyber Security Review
MEDIA PARTNERS
The opinions and views expressed in the editorial content in this
Published by Delta Business Media Limited 3rd floor, 207 Regent Street London W1B 3HH United Kingdom
publication are those of the authors alone and do not necessarily
Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659 info@deltabusinessmedia.com www.deltabusinessmedia.com www.cybersecurity-review.com
The views and opinions expressed in this publication do not necessarily
represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles. Š 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online)
retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner. cybersecurity-review.com
3
CONTENTS
CONTENTS
IFC CYBER 2016 5
THE CYBER SECURITY SHOW 2016
7
EUROSATORY 2016
8
SECURITY & COUNTER TERROR EXPO 2016
9
CYBER TECHNOLOGY — CYBER SECURITY ALONE IS NOT ENOUGH
14
CYBER SECURITY IN TELECOMS 2016
By Richard Smith and Helge Janicke, Cyber Security Center, De Montfort University
15 THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER
By Brandon Newton, United States Army War College
26
APAC CYBER SECURITY SUMMIT 2016
27
SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE
31
ITEC 2016
32
CYBER INTELLIGENCE ASIA 2016
33
PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS
47
FUTURE OF CYBER CONFERENCE 2016
4
By David Tayouri, M.Sc. in Computer Science, Cyber Intelligence Department Manager, Israel Aerospace Industries (IAI)
By Nathan T. Ray, United States Army War College
CYBER SECURITY REVIEW, Spring 2016
8-9 MARCH 2016 BUSINESS DESIGN CENTRE, LONDON
NEW THREATS, NEW SOLUTIONS, NEW PARTNERSHIPS FOR CISOS FROM EUROPE’S CRITICAL INFRASTRUCTURE Case studies, talks and interviews with our ground breaking speakers including: Scott Borg
Sir Iain Lobban
Director & Chief Economist, The U.S. Cyber Consequences Unit
Former Director, GCHQ
Professor Nayef Al-Rodhan
Jamie Shea
Head of Geopolitics and Global Futures Programme, Geneva Centre for Security Policy
Deputy Assistant Secretary General of Emerging Security Challenges, NATO
To view the full agenda and speaker line-up, visit www.terrapinn.com/cyber-csr
CONTENTS
48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE
By David Adams, Naval Air Systems Command, Tactical Airlift Program Office (PMA-207)
52
ECCWS – 15th EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY
53
ELEPHANT IN THE ROOM: CYBER EUROPE 2016
57
CISO EUROPE 2016 – 13th ANNUAL SUMMIT & ROUNDTABLE
58
APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT
66
CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY
75
COMEX – IT, TELECOM & TECHNOLOGY SHOW
76
SOFTWARE 2015: SITUATION DIRE
82
CYBER SECURITY REVIEW – CALL FOR PAPERS
83
MILIPOL QATAR 2016
By Jayadev Parida, Doctoral Fellow on Cyber Security in the Centre for European Studies, School of International Studies, Jawaharlal Nehru University, New Delhi
By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
By Rogério Winter, Brazilian Army – Cyber Defense and Rodrigo Ruiz, Center for Information Technology Renato Archer (CTI)
By Don O’Neill, former president of the Center for National Software Studies (CNSS)
OBC ISRAEL AEROSPACE INDUSTRIES - IAI 6
CYBER SECURITY REVIEW, Spring 2016
Taking cyber solutions to the next level
IAI’s Cyber Defense, Intelligence and Early Warning Solutions • Cyber and off-the-air Accessibility solutions • Training, Testing, Simulation & Forensics • Cyber Analytics- Identity Resolution, Geo Location, Anomaly Detection • Modular Cyber Centers: Cyber Security Operation Centers (CSOC), Intelligence Centers and Early Warning Centers
www.iai.co.il corpmkg@iai.co.il
To receive a full version of the Cyber Security Review, please complete the Request Form Here. Please provide a valid corporate, government or academic email address. We reserve the right to refuse to accept any application at our discretion. If you have any queries please email to: editorial@deltabusinessmedia.com
REQUEST YOUR COPY OF THE CYBER SECURITY REVIEW
www.cybersecurity-review.com
Published by Delta Business Media 3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 7659 info@deltabusinessmedia.com www.deltabusinessmedia.com