cyber security review · 2016-03-05 · contents 6 cyber security review, spring 2016 48 data...

8
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) CYBER TECHNOLOGY – CYBER SECURITY ALONE IS NOT ENOUGH SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS ELEPHANT IN THE ROOM: CYBER EUROPE 2016 APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY Cyber Security Review Spring 2016

Upload: others

Post on 16-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)

CYBER TECHNOLOGY – CYBER SECURITY ALONE IS NOT ENOUGH

SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE

THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER

PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS

ELEPHANT IN THE ROOM: CYBER EUROPE 2016

APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT

CORROSIVE SECRECY AND CONFIDENCE:THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC

SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY

Cyber Security ReviewSpring 2016

Page 2: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

Monday 23 and Tuesday 24 May 2016 | London

Cyber 2016Evolving Threats, Security Developments and Improving Cooperation

With increasing connectivity across digital devices, cyber resilience is becoming ever more critical. This two-day conference will bring together senior policy-makers, security and business experts to consider the key challenges in cybersecurity and new approaches to tackle threats.

Registration and information:www.chathamhouse.org/conferences/cyber-2016

@[email protected] +44 (0)20 7314 2785

Speakers include:

Marina Kaljurand Foreign Minister Estonia

Kris Herrin Senior Vice President Financial Services Information Sharing and Analysis Center

Dr Jamie Saunders Director National Cyber Crime Unit

Graham Wright Chief Information Security Officer National Grid

Robert Mueller Partner WilmerHale; Director of the FBI (2001-13)

Rajesh De Partner Mayer Brown; General Counsel at the US National Security Agency (2012-15)

Charles Blauner Chief Information Security Officer Citi Global

Media partner

Page 3: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

3cybersecurity-review.com

Cyber Security Review Published by Delta Business Media Limited3rd floor, 207 Regent StreetLondon W1B 3HHUnited Kingdom

Tel: +44 (0) 20 7193 2303Fax: +44 (0) 20 3014 7659info@deltabusinessmedia.comwww.deltabusinessmedia.comwww.cybersecurity-review.com

ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)

EDITORIAL CONTRIBUTORS

The opinions and views expressed in the editorial content in this publication are those of the authors alone and do not necessarily represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. The views and opinions expressed in this publication do not necessarily express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles.

© 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner.

MEDIA PARTNERS

Page 4: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

CONTENTS

4 CYBER SECURITY REVIEW, Spring 2016

IFC CYBER 2016

5 THE CYBER SECURITY SHOW 2016

7 EUROSATORY 2016

8 SECURITY & COUNTER TERROR EXPO 2016

9 CYBER TECHNOLOGY — CYBER SECURITY ALONE IS NOT ENOUGH By Richard Smith and Helge Janicke, Cyber Security Center, De Montfort University

14 CYBER SECURITY IN TELECOMS 2016

15 THE FLAWED STRATEGIC DISCOURSE ON CYBER POWER By Brandon Newton, United States Army War College

26 APAC CYBER SECURITY SUMMIT 2016

27 SOCIAL MEDIA AS AN INTELLIGENCE GOLDMINE By David Tayouri, M.Sc. in Computer Science, Cyber Intelligence Department Manager, Israel Aerospace Industries (IAI)

31 ITEC 2016

32 CYBER INTELLIGENCE ASIA 2016

33 PUBLIC DISCLOSURE WEBSITES AND EXTREMIST THREATS By Nathan T. Ray, United States Army War College

47 FUTURE OF CYBER CONFERENCE 2016

CONTENTS

Page 5: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

8-9 MARCH 2016BUSINESS DESIGN CENTRE, LONDON

NEW THREATS,NEW SOLUTIONS, NEW PARTNERSHIPSFOR CISOS FROM EUROPE’S CRITICAL INFRASTRUCTURE

Case studies, talks and interviews with our ground breaking speakers including:

To view the full agenda and speaker line-up, visit www.terrapinn.com/cyber-csr

Sir Iain Lobban Former Director, GCHQ

Jamie SheaDeputy Assistant Secretary General of Emerging Security Challenges, NATO

Scott Borg Director & Chief Economist, The U.S. Cyber Consequences Unit

Professor Nayef Al-RodhanHead of Geopolitics and Global Futures Programme, Geneva Centre for Security Policy

(2436) Cyber Security Show EU 2016 AD 225x170 1.2 - PRINT.indd 1 16/12/2015 09:19

Page 6: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

CONTENTS

6 CYBER SECURITY REVIEW, Spring 2016

48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE ByDavidAdams,NavalAirSystemsCommand,TacticalAirliftProgramOffice(PMA-207)

52 ECCWS – 15th EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY

53 ELEPHANT IN THE ROOM: CYBER EUROPE 2016 By Jayadev Parida, Doctoral Fellow on Cyber Security in the Centre for European Studies, School of International Studies, Jawaharlal Nehru University, New Delhi

57 CISO EUROPE 2016 – 13th ANNUAL SUMMIT & ROUNDTABLE

58 APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army

66 CORROSIVE SECRECY AND CONFIDENCE: THE PARADOX AMONG BYPASSING CRYPTOGRAPHIC SOFTWARE, LOSS OF PRIVACY AND INFORMATION SECURITY By Rogério Winter, Brazilian Army – Cyber Defense and RodrigoRuiz,CenterforInformationTechnologyRenatoArcher(CTI)

75 COMEX – IT, TELECOM & TECHNOLOGY SHOW

76 SOFTWARE 2015: SITUATION DIRE ByDonO’Neill,formerpresidentoftheCenterforNationalSoftwareStudies(CNSS)

82 CYBER SECURITY REVIEW – CALL FOR PAPERS

83 MILIPOL QATAR 2016

Page 7: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

Taking cyber solutions to the next level

• Cyber and off-the-air Accessibility solutions • Training, Testing, Simulation & Forensics• Cyber Analytics- Identity Resolution, Geo Location, Anomaly Detection • Modular Cyber Centers: Cyber Security Operation Centers (CSOC), Intelligence Centers and Early Warning Centers

IAI’s Cyber Defense, Intelligenceand Early Warning Solutions

[email protected]

Page 8: Cyber Security Review · 2016-03-05 · CONTENTS 6 CYBER SECURITY REVIEW, Spring 2016 48 DATA REQUIREMENTS REVIEW BOARDS AND THEIR IMPORTANCE By David Adams, Naval Air Systems Command,

www.cybersecurity-review.com

Published by Delta Business Media3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom

Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 [email protected] www.deltabusinessmedia.com

To receive a full version of the Cyber Security Review, please complete the Request Form Here.

Please provide a valid corporate, government or academic email address. We reserve the right to refuse to accept any

application at our discretion.

If you have any queries please email to: [email protected]

REQUEST YOUR COPY OF THE CYBER SECURITY REVIEW