The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!
We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!
This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
Presentation given at the International East-West Security Conference in Rome - November 2016. The presentation begins with a review of Models of the Internet and CyberSpace such as those based upon IP Hilbert Space. We then discuss the transformation from 20thC Physical Threats (Speed of Sound) to the 21stC Cyber Threats (Speed of Light) such as CyberCrime, CyberTerror, CyberEspionage and CyberWar from sources such as the UN/ITU and the World Economic Forum. The core presentation explores Cyber Scenarios for 2018 (Integrated Security). 2020 (Adaptive Security), 2025 (Intelligent Security) and 2040 (Neural Security).We consider the New Generation of Tools based upon Machine Learning & Artificial Intelligence that use Self-Learning & Self-Organisation. We consider the application of these tools for the effective defence of Critical National Infrastructure and also to enhance Cybersecurity for the Internet of Things. We review some of the latest Cyber Ventures that provide Security Solutions based upon Machine Learning. Finally we provide a suggested TOP 10 Actions for your Business to upgrade Cybersecurity & Mitigate Future Attacks!
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!
We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!
This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
Presentation given at the International East-West Security Conference in Rome - November 2016. The presentation begins with a review of Models of the Internet and CyberSpace such as those based upon IP Hilbert Space. We then discuss the transformation from 20thC Physical Threats (Speed of Sound) to the 21stC Cyber Threats (Speed of Light) such as CyberCrime, CyberTerror, CyberEspionage and CyberWar from sources such as the UN/ITU and the World Economic Forum. The core presentation explores Cyber Scenarios for 2018 (Integrated Security). 2020 (Adaptive Security), 2025 (Intelligent Security) and 2040 (Neural Security).We consider the New Generation of Tools based upon Machine Learning & Artificial Intelligence that use Self-Learning & Self-Organisation. We consider the application of these tools for the effective defence of Critical National Infrastructure and also to enhance Cybersecurity for the Internet of Things. We review some of the latest Cyber Ventures that provide Security Solutions based upon Machine Learning. Finally we provide a suggested TOP 10 Actions for your Business to upgrade Cybersecurity & Mitigate Future Attacks!
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976.
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
Personal Vision of the Evolution of the Cybersecurity Sector during the next 10 years - 2015 - 2015.The presentation includes a review of the major players, both the "Good Guys" and the "Bad Guys". We discuss the important role of Artificial Intelligence, Machine Learning & Adaptive Systems in proving "Speed of Light" response to the continuous 24/7 Real-Time Threats that now target Business & Government. We conclude the presentation with a quick review of the Business Sector including the leading "new wave" cybersecurity companies, mergers, acquisitions and Venture Capital Investment.
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
The talk discusses the application of artificial intelligence and machine learning to enterprise cybersecurity. The topics include self-learning, stochastic cellular automata, adaptive & self-organising systems and recursive Bayesian algorithms. The talk briefly surveys several cybersecurity companies including Darktrace, Logrhythm and Norse Corporation. There is also discussion of the application of AI and neural networks within the Banking sector for "Algorithmic Trading" during the last 10 to 20 years. These techniques are now highly relevant, and even ESSENTIAL, for the provision of real-time enterprise cybersecurity to complement traditional "signature" based anti-virus & firewall based solutions. The talk closes with the presentations for the future of Cybersecurity in 2020, 2025 and 2040 including reference to similar forecasts from both Business & Governments. The talk was given by Dr David Eric Probert at the East-West International Security Conference at the Melia Galgos Hotel in Madrid, Spain on the Tuesday 27th October 2015.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
This presentation provides a personal vision of trends in Cybersecurity during the coming 7 years - 2018 to 2025. We start with focusing on the Board Level Agenda for the newly appointed Chief Security Officer (CSO/CISO) and then briefly discuss the TOP 10 Cybersecurity Threats that include Ransomware, DDos Attacks, SQL injection, Social Media Phishing, Toxic Cookies, Classical Malware, Authentication Hacks, Stealth Monitoring and Advanced Persistent Attacks. We group these generic cyber threats under Exploration, Penetration and Real-Time Attacks! We then discuss the need for new Cyber Tools that will provide effective defence against such threat since classical tools such as anti-virus & firewalls will no longer stop the "bad guys" - CyberCriminals, Cyber Hacktivists & CyberTerrorists! We describe scenarios for 2018 (Integrated Security - Cyber & Physical Security), 2020 (Adaptive Security for the Internet of Things) and 2025 (Intelligent Security based upon Artificial Intelligence & Machine Learning). These tools are all available today and yet most organisations are still relying on the classical AV/Firewall Solutions and hence are highly vulnerable to cyberattacks. We wrap up the presentation with a brief look at Security for Critical Sectors such as Banking/Finance & Government. We suggest ways in which business can prioritise and organise CyberSecurity based upon frameworks such as those from NIST, SANS and the UN/ITU. Finally we return to the metaphor that Classical Physical Attacks & Warfare occur at the "Speed of Sound" whilst Global Cyber Attacks & CyberWarfare take place 1million times faster @ the "Speed of Light". This provides the key motivation for significantly upgrading our CyberDefences to provide Security within our 21stC Neural Society!
Cybersecurity Technologies, Standards and OperationsDr David Probert
2-Day Cybersecurity Master Class given at the University of Technology (UTECH), Kingston, Jamaica - 16th-17th September 2010 - in partnership with the UN/ITU Excellence Network in the Caribbean Region. These lectures are more technical than those in the more general 3-Day Cybersecurity Master Class that we held on 13th to 15th September. Topics covered include ITU, NIST, IEEE and ISO/IEC Standards. Setting up and running CERTs/CSIRTS - Computer Emergency Response Team - and Business Continuity.
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
We present Cyber Trends and Tools for 2018 (Cyber Transition), 2020 (Intelligent Security) and 2025 (Neural Security) We discuss the evolution of the next generation of Tools based upon Artificial Intelligence & Machine Learning. And then we discuss applications to the Defence of Smart Devices (Internet of Things - IOT), Smart Transportation and Smart Cities. We briefly profile Next Generation Cybersecurity Products & Services from leading edge Vendors. We conclude with a discussion of ways to interface "Intelligent machines" with the "human brain" through recent developments in Virtual and Augmented Reality. And as usual we provide suggestions for ways to develop a Cyber Action Plan for YOUR Business with a Focus on the Importance of a Chief Information Security Officer (CISO/CSO) @ Board Level!
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
Fighting Cybercrime and Cyberterror requires Business & Government to integrate Biometrics (Pre-Attack) and Digital Forensics (Post-Attack) in order to both mitigate & diagnose attack vectors. This presentation was given @ the East-West International Security Conference in Prague - June 2016. It includes a 25 year Cyber Vision of Future Adaptive, Intelligent & Neural Cybersecurity Tools. These will be based upon Artificial Intelligence, Machine Learning & Adaptive Behavioural Analytics. The advance of Hybrid Cybercrime, Cyberwar & Cyberterror require all Businesses & Government Agencies to seriously consider the deployment of Intelligent Cybersecurity Solutions with Biometrics & Digital Forensics during next 10 years!
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
2017 was a busy year for hackers who used new, ingenious attack vectors and methods such as fileless malware to hold organizations ransom and steal their sensitive data. These threats are almost certain to continue in 2018 and, along with them, there will be even bigger challenges as larger, more advanced cyberattacks target what was previously considered safe havens -- well-guarded critical infrastructure, public clouds, block chains and more. What’s in Store for 2018?
State of Cybersecurity in 2018 - Our Top PredictionsComodo SSL Store
2017 is about to end. We must accept the truth that the year 2017 was full of phishing scams, ransomware and more data breaches that we can count. We're going to see more attacks with increasing reliance on digital technologies. We have collected our predictions in this slide share.
Original Article published-
https://comodosslstore.com/blog/predicting-cyber-security-threats-2018.html
This is a quick review of the State of CyberSecurity industry in 2015, using insights and data from leader companies in the industry like Check Point Software Technologies, Cisco, Akamai, NowSecure, OpenDNS, Skyhigh Networks and more. The scope of the report is focused in four sectors: Mobile, Internet of Things, Cloud Security and Network Security.
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
Invited Presentation at the 3rd Georgian IT Innovation & Cybersecurity Conference (GITI) in Tbilisi, Georgia. The presentation focus upon the urgent need to integrate physical and cyber security within a single management team headed by a Chief Security Officer (CSO). The title references - Vardzia - which was a Medieval Georgian Cave Fortress that had extensive physical security and withstood attacks from invaders for many years.
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976!
Presentation on Smart Security given at the International East-West Security Conference - Rome - November 2016. We begin with reviewing the 21stC Security Landscape including CyberCrime, CyberTerror, CyberEspionage and CyberWar. Specific Topics covered include Integrated Physical & CyberSecurity such as PSIM and SIEM Technologies, Tools & Solutions. The Smart Security Architectures discussed are those from the UN/ITU (United Nations - International Telecommunications Union), NATO, NIST, EU/ENISA, SANS, IEEE and ISO/IEC. The presentation reviews recent Cyber Attacks and analyses the impact on BotNets such as MiraiNet that originate from the "Internet of Things". Finally we discuss Smart Security Defence for Critical National Information Infrastructure and suggest Practical Actions & RoadMap for YOUR Business!
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976.
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
Personal Vision of the Evolution of the Cybersecurity Sector during the next 10 years - 2015 - 2015.The presentation includes a review of the major players, both the "Good Guys" and the "Bad Guys". We discuss the important role of Artificial Intelligence, Machine Learning & Adaptive Systems in proving "Speed of Light" response to the continuous 24/7 Real-Time Threats that now target Business & Government. We conclude the presentation with a quick review of the Business Sector including the leading "new wave" cybersecurity companies, mergers, acquisitions and Venture Capital Investment.
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
The talk discusses the application of artificial intelligence and machine learning to enterprise cybersecurity. The topics include self-learning, stochastic cellular automata, adaptive & self-organising systems and recursive Bayesian algorithms. The talk briefly surveys several cybersecurity companies including Darktrace, Logrhythm and Norse Corporation. There is also discussion of the application of AI and neural networks within the Banking sector for "Algorithmic Trading" during the last 10 to 20 years. These techniques are now highly relevant, and even ESSENTIAL, for the provision of real-time enterprise cybersecurity to complement traditional "signature" based anti-virus & firewall based solutions. The talk closes with the presentations for the future of Cybersecurity in 2020, 2025 and 2040 including reference to similar forecasts from both Business & Governments. The talk was given by Dr David Eric Probert at the East-West International Security Conference at the Melia Galgos Hotel in Madrid, Spain on the Tuesday 27th October 2015.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
This presentation provides a personal vision of trends in Cybersecurity during the coming 7 years - 2018 to 2025. We start with focusing on the Board Level Agenda for the newly appointed Chief Security Officer (CSO/CISO) and then briefly discuss the TOP 10 Cybersecurity Threats that include Ransomware, DDos Attacks, SQL injection, Social Media Phishing, Toxic Cookies, Classical Malware, Authentication Hacks, Stealth Monitoring and Advanced Persistent Attacks. We group these generic cyber threats under Exploration, Penetration and Real-Time Attacks! We then discuss the need for new Cyber Tools that will provide effective defence against such threat since classical tools such as anti-virus & firewalls will no longer stop the "bad guys" - CyberCriminals, Cyber Hacktivists & CyberTerrorists! We describe scenarios for 2018 (Integrated Security - Cyber & Physical Security), 2020 (Adaptive Security for the Internet of Things) and 2025 (Intelligent Security based upon Artificial Intelligence & Machine Learning). These tools are all available today and yet most organisations are still relying on the classical AV/Firewall Solutions and hence are highly vulnerable to cyberattacks. We wrap up the presentation with a brief look at Security for Critical Sectors such as Banking/Finance & Government. We suggest ways in which business can prioritise and organise CyberSecurity based upon frameworks such as those from NIST, SANS and the UN/ITU. Finally we return to the metaphor that Classical Physical Attacks & Warfare occur at the "Speed of Sound" whilst Global Cyber Attacks & CyberWarfare take place 1million times faster @ the "Speed of Light". This provides the key motivation for significantly upgrading our CyberDefences to provide Security within our 21stC Neural Society!
Cybersecurity Technologies, Standards and OperationsDr David Probert
2-Day Cybersecurity Master Class given at the University of Technology (UTECH), Kingston, Jamaica - 16th-17th September 2010 - in partnership with the UN/ITU Excellence Network in the Caribbean Region. These lectures are more technical than those in the more general 3-Day Cybersecurity Master Class that we held on 13th to 15th September. Topics covered include ITU, NIST, IEEE and ISO/IEC Standards. Setting up and running CERTs/CSIRTS - Computer Emergency Response Team - and Business Continuity.
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
We present Cyber Trends and Tools for 2018 (Cyber Transition), 2020 (Intelligent Security) and 2025 (Neural Security) We discuss the evolution of the next generation of Tools based upon Artificial Intelligence & Machine Learning. And then we discuss applications to the Defence of Smart Devices (Internet of Things - IOT), Smart Transportation and Smart Cities. We briefly profile Next Generation Cybersecurity Products & Services from leading edge Vendors. We conclude with a discussion of ways to interface "Intelligent machines" with the "human brain" through recent developments in Virtual and Augmented Reality. And as usual we provide suggestions for ways to develop a Cyber Action Plan for YOUR Business with a Focus on the Importance of a Chief Information Security Officer (CISO/CSO) @ Board Level!
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
Fighting Cybercrime and Cyberterror requires Business & Government to integrate Biometrics (Pre-Attack) and Digital Forensics (Post-Attack) in order to both mitigate & diagnose attack vectors. This presentation was given @ the East-West International Security Conference in Prague - June 2016. It includes a 25 year Cyber Vision of Future Adaptive, Intelligent & Neural Cybersecurity Tools. These will be based upon Artificial Intelligence, Machine Learning & Adaptive Behavioural Analytics. The advance of Hybrid Cybercrime, Cyberwar & Cyberterror require all Businesses & Government Agencies to seriously consider the deployment of Intelligent Cybersecurity Solutions with Biometrics & Digital Forensics during next 10 years!
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
2017 was a busy year for hackers who used new, ingenious attack vectors and methods such as fileless malware to hold organizations ransom and steal their sensitive data. These threats are almost certain to continue in 2018 and, along with them, there will be even bigger challenges as larger, more advanced cyberattacks target what was previously considered safe havens -- well-guarded critical infrastructure, public clouds, block chains and more. What’s in Store for 2018?
State of Cybersecurity in 2018 - Our Top PredictionsComodo SSL Store
2017 is about to end. We must accept the truth that the year 2017 was full of phishing scams, ransomware and more data breaches that we can count. We're going to see more attacks with increasing reliance on digital technologies. We have collected our predictions in this slide share.
Original Article published-
https://comodosslstore.com/blog/predicting-cyber-security-threats-2018.html
This is a quick review of the State of CyberSecurity industry in 2015, using insights and data from leader companies in the industry like Check Point Software Technologies, Cisco, Akamai, NowSecure, OpenDNS, Skyhigh Networks and more. The scope of the report is focused in four sectors: Mobile, Internet of Things, Cloud Security and Network Security.
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
Invited Presentation at the 3rd Georgian IT Innovation & Cybersecurity Conference (GITI) in Tbilisi, Georgia. The presentation focus upon the urgent need to integrate physical and cyber security within a single management team headed by a Chief Security Officer (CSO). The title references - Vardzia - which was a Medieval Georgian Cave Fortress that had extensive physical security and withstood attacks from invaders for many years.
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976!
Presentation on Smart Security given at the International East-West Security Conference - Rome - November 2016. We begin with reviewing the 21stC Security Landscape including CyberCrime, CyberTerror, CyberEspionage and CyberWar. Specific Topics covered include Integrated Physical & CyberSecurity such as PSIM and SIEM Technologies, Tools & Solutions. The Smart Security Architectures discussed are those from the UN/ITU (United Nations - International Telecommunications Union), NATO, NIST, EU/ENISA, SANS, IEEE and ISO/IEC. The presentation reviews recent Cyber Attacks and analyses the impact on BotNets such as MiraiNet that originate from the "Internet of Things". Finally we discuss Smart Security Defence for Critical National Information Infrastructure and suggest Practical Actions & RoadMap for YOUR Business!
Integrated Cybersecurity and the Internet of ThingsDr David Probert
Presentation given in Madrid at the East-West International Security Conference - October 2015. The topics include Integrated Cybersecurity and Physical Security as well as developments in the Internet of Things. The talk discusses models, architectures and standards for the IoT as well as a survey of some EU work under the IERC Programme. Finally the talk makes suggestions for actions by Chief Security Officers (CSOs) to prepare themselves for IoT Security. It is recommended that CSOs review the security for ALL their legacy networked devices to mitigate the risks of cyber attacks. The talk was given by Dr David Eric Probert on 27th October 2015 at the Security Conference Venue - Melia Galgos Hotel - Madrid, Spain.
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.
Presentation discusses CyberCrime, CyberTerror & CyberWar & the ways in which the "Bad Guys" organise themselves to undertake major Cyber Attacks. The TOP 10 Threats are categorized as Exploration, Penetration and Attack Tools. The threats include: (1) Advanced Persistent Attack (APT), (2) Stealth Monitoring, (3) Toxic eMail, (4) Database & Web Hacks (SQL/XSS), (5) Classic Virus/Trojan Malware, (6) Authentication Hacks, (7) Designer "Bots" (Stuxnet), (8) Toxic Cookies/Proxy/DNS (9) DDoS & (10) Ransomware, We conclude with recommendations to Defend your Business with In-Depth Technical & Operational Defence Action Plans!
AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all!
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference!
Cool Infographics: what venture capitalists tell us about Homeland SecurityAndrew Goldsmith
To understand where the homeland security market is going, why not look at where some of the smartest folks in the VC community are placing their bets? I created a couple cool infographics and a great case study from Rapiscan Systems
La seguridad cibernética es claramente un tema de creciente importancia en estos días. La presentación invitará a reflexionar sobre la semántica de las palabras que usamos al hablar sobre seguridad cibernética, y lo guiará a través del mapa de perspectivas y metodologías hacia su propio camino para estar seguros y protegidos en el entorno digital. La charla se ajusta tanto para los líderes empresariales como técnicos.
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
Presentation on the Design and Implementation of Integrated Physical Cyber Security Systems - "Smart Security" - for both Business and Government. Given as a Master Class in Yerevan, Armenia - Summer 2012
Brief article on the Impact of Artificial Intelligence & Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 & 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture & Society. This year will be 50 years since I started my own PhD into AI - "Stochastic Machine Learning" at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy!
Josh Corman, Research Director, Enterprise Security Practice, is often known for his deep insights into and candid discussions about the state of enterprise security and the variables and trends that impact it. Listen as Josh discusses how and why PCI compliance has affected the state of security-specifically, the impact of approaching PCI as a checklist. He also gives ideas for what we need to do, and the types of solutions we need to have to not only satisfy the PCI audit, but to also provide real system security. Josh discusses this in an informal back and forth format with Gene Kim, Tripwire co-Founder and CTO.
In this webcast, you'll learn:
How compliance introduced cost complexity by causing a divergence between what we need to do to pass an audit versus avert threats.
The fallacy that being PCI compliance means you're secure.
Controls that both help you pass your PCI audit while also deterring advanced threats.
How Tripwire VIA solutions provide that rare combination of controls that address both compliance and security.
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
A wide spectrum of cybersecurity and open source security news in this week’s Open Source Insight, including the need for hospitals to ramp up their cybersecurity efforts; the need to include open source security in any plan to secure medical devices; a major data breach at Italian bank Unicredit; two Black Duck executives share their views on open source security in video interviews; and why the automotive industry many be close to an iPhone moment.
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
Donetsk, Ukraine is at the core of regional issues between Russia & the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government & Welsh Entrepreneur - John Hughes with the "New Russia Company Limited" registered in 1869. This 19thC Company Town was renamed Stalino in 1924 & Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts & Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) .
Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript & Analysis of current events.
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the "Institute of Ecological Problems of the North" - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel & Monchegorsk. The presentation concludes with suggestions for redefining & upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine & Deep Learning to research massive databases related to climate change & arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation & Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland & Russia!
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
Now we see the evolution of Hybrid Warfare, Cybercrime and Terrorism. To mitigate to Terror Attacks we urgently need to integrate Real-Time Cybersecurity Solutions with Physical Surveillance in Business, Campus, Cities And Nationwide! In this presentation we discuss both Historic & Current Cyber Threats and practical options to minimise the risks of future Terror Attacks through Integrated Physical-Cybersecurity Solutions. We briefly review the United Nations/ITU, NATO and NIST Cybersecurity Frameworks, and the threats on Critical National Information Infrastructure. Finally we suggest the TOP Actions for Chief Security Officers (CSO) to mitigate Attacks within their own Security Operations. This invited presentation was given @ the International East-West Security Conference at the Marriott Courtyard Hotel in Prague - June 2016.
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
Presentation given @ Kola Science Centre, Apatity, Russia for the 7th Anniversary Celebration of the Launch of the International KolaNet Project in the Russian Arctic Kola Peninsula ( Russian Lapland ). The Project Mission was to use advanced digital networking, computing and sensor technologies to provide a "quick response" in case of a possible nuclear accident within the Russian Murmansk Region.
Embedding Artificial Intelligence in the EnterpriseDr David Probert
Influential Presentation that was presented during DECVille 1988 @ the Cannes Palais des Congress for Digital Equipment Corporation (DEC). The author introduces the concept of the "Knowledge Lens" which is used to show how Artificial Intelligence (A.I.) is now being embedded in enterprise products, software and applications. The talk also discusses the 3 Ages of Computing that span the 1960s to 21st Century. This talk was subsequently used as the basis of a Keynote Speech for the British Computer Society Conference on Expert Systems that was held in Brighton, UK during December 1988.
Presentation Slides from the Digital Business Blueprint (1988) that was used during the late 1980s as the basis for Digital's Business Strategy for Value-Added Networks. This conceptual presentation provided the strategic foundation blocks for the emerging "Knowledge Society". In particular it show how the Computing Industry should migrate from Physical Product Architectures (Space) to those based upon upon Software & Services (Time). The author (David Probert) subsequently established and managed the Internet Business Group for Digital Equipment Corporation (DEC) across EMEA (Europe, Middle East & Africa). David represented DEC on the EARN Management Board (European and Academic Research Networks - subsequently TERENA) from 1991 to 1999.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.