I try to push the message across, that it is the collective responsibility of all stakeholders including the government, security agencies, ICT firms, private sector and most importantly the public to keep our cyberspace secure. People need to learn online best practices
Cyber Security: The Strategic View
By: Kah-Kin Ho, Head of Cyber Security Business Development Threat Response, Intelligence and Development (TRIAD)
This session begins by giving an overview of how Cisco sees the challenges and opportunities of cyber security for the Government which include areas such as recent development on applicability of International Law to Cyber conflict, the evolving role of the Government as the legitimate security provider, Public-Private Partnership issues, and the evolving technical, social and political threat landscape. Cisco recognizes that cyber security begins at the policy level and translates through to the operational and system level. We will discuss why an intelligence-led network-centric approach that focuses on enforcing policy, enhancing situational awareness, and providing the insight necessary to tackle threats before they impact information and infrastructure assets is key to Cyber Security.
The European Parliament is the latest government entity Lars G. A. Hilse has briefed about the risks of cyberterrorism. Yet these risks aren’t limited to critical infrastructure. Cyberterrorism is responsible for devastating collateral damage in the private sector, also. This talk presents detailed insights into the past, present, and future of the most significant threat in history, and how these risks can be mitigated/reduced.
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Cyber Security: The Strategic View
By: Kah-Kin Ho, Head of Cyber Security Business Development Threat Response, Intelligence and Development (TRIAD)
This session begins by giving an overview of how Cisco sees the challenges and opportunities of cyber security for the Government which include areas such as recent development on applicability of International Law to Cyber conflict, the evolving role of the Government as the legitimate security provider, Public-Private Partnership issues, and the evolving technical, social and political threat landscape. Cisco recognizes that cyber security begins at the policy level and translates through to the operational and system level. We will discuss why an intelligence-led network-centric approach that focuses on enforcing policy, enhancing situational awareness, and providing the insight necessary to tackle threats before they impact information and infrastructure assets is key to Cyber Security.
The European Parliament is the latest government entity Lars G. A. Hilse has briefed about the risks of cyberterrorism. Yet these risks aren’t limited to critical infrastructure. Cyberterrorism is responsible for devastating collateral damage in the private sector, also. This talk presents detailed insights into the past, present, and future of the most significant threat in history, and how these risks can be mitigated/reduced.
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
This conference was an official event to establish the Global Citizenship Education Network (GCEN) between UNESCO, UCLA and the Boston Global Forum (BGF) . We had several important dialogues concerning Global Citizenship Education in Cyber Civil Defense
cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Conference, Synergia Ranch, New Mexico (Oct 2005), titled: Human Presence in Cyberspace, Outerspace, Streetspace, Mindspace and Biotaspace?
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
This conference was an official event to establish the Global Citizenship Education Network (GCEN) between UNESCO, UCLA and the Boston Global Forum (BGF) . We had several important dialogues concerning Global Citizenship Education in Cyber Civil Defense
cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Conference, Synergia Ranch, New Mexico (Oct 2005), titled: Human Presence in Cyberspace, Outerspace, Streetspace, Mindspace and Biotaspace?
An Origin of Life in Salt Water or Fresh Water?Bruce Damer
Returning to Darwin's "Warm Little Pond" with the Terrestrial Origin of Life Hypothesis. Presented at the Australasian Astrobiology Meeting, Perth, July 2016. Presented by Dr. Bruce Damer, U.C. Santa Cruz.
If the government of Trinidad and Tobago were to create a Ministry of Design, what would that ministry do?
How can design support governance and how can government support design?
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Cyber security is an essential part of our digital lives today. But do you know what cyber security actually constitutes and how secure you really are? In this presentation, we help you understand:
a. The impact of cyber security on our digital lives
b. How cyber security is essential for our families
c. Cyber security in the business context
d. What Quick Heal can do to help
Cyberattacks are malicious actions taken by individuals, groups, or organizations against computer systems, networks, and digital devices with the intent to damage, steal or manipulate data, or disrupt normal operations. These attacks can target anyone, from individuals to governments and large corporations, and can cause severe damage to both personal and professional lives.
Webinar_Cybersecurity is a shared responsibility presentation211 Check
Webinar_Cybersecurity is a shared responsibility presentation by Charles Chol, a cybersecurity analyst and tech entrepreneur in Juba, South Sudan.
He presented in a session organised by Defyhatenow with support from the International Fact-checking Network (IFCN)
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Cybersecurity awareness is the understanding of the importance of protecting data and information from malicious activities.
It involves understanding the risks associated with digital communication, online activities, and technology in general.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Building a secure cyberspace for innovative enterprise, a collective responsibility
1. Building A Secure Cyberspace for
Innovative Enterprise:
A Collective Responsibility
Secure Africa Conference 2013
Centre For Management Development , Lagos
Kayode Yussuf
|
CyberSecurity Advocate
2. ’Start by doing what is necessary,
then what is possible
and suddenly, you’re doing the impossible.’
Saint Francis of Assisi
3. Some Hard Facts
• The world today is reliant on the internet, British
businesses earn £1 in every £5 from the internet –
www.gov.uk
• We expect govt and our institutions to protect us
from online security breaches
• Over 600 million phishing attacks per annum –
www.go-golf.com
• Cybercrime is costing the world $110 billion every
year - Symantec Corp
4. Whose responsibility is it to secure our
Cyberspace?
Find X?
Government
Professional
Associations
X
Individuals
Private
Sector
5. Cybersecurity is a shared responsibility, and each of us
has a role to play. Emerging cyber threats require the
engagement of the entire society—from government
and law enforcement to the private sector and most
importantly, members of the public.
• Janet Napolitano
Former Secretary, Department of Homeland Security
8. Build Collaborative Communities
‘Law enforcement agencies are often “reluctant to
use new techniques, and don’t always maximize
current technology. Criminals, however, are
certainly maximizing the benefits of technology in
their wrongdoing.’
• Noboru Nakatani,
Executive Director INTERPOL’s Global Complex for Innovation.
9. Next Steps
• Favorable policies and legislation ( Nigeria’s Cyber-security
law and Creative Commons licensing for Education)
• Mass enlightenment
• Immediate creation and support of a CERT
• Law enforcement agencies must work together
• Inter-nation collaborations
• Citizens participation through volunteering
10. Next Steps Cont’d
• Empower Individuals and Organizations to Operate
Securely
• Build Collaborative Communities with CSO and
professional bodies to serve as lobbyists
• Cyber-Competitions sponsored by private
organizations & government
• PPP in research & development in CyberSecurity
11. What is expected of the Public?
Be cyber-security conscious
Make information available
Get involved in community projects
Enlightening people around you
12. What is expected of the Public?
•
•
•
•
•
•
•
•
•
•
Secure your devices, PCs and online accounts
Never click on links in emails
Never open the attachments unless you are sure of its source
Do not give out personal information over the phone or in an
email unless completely sure
Set secure passwords and don't share them with anyone.
Keep your operating system, browser, anti-virus and other critical
software up to date.
Verify the authenticity of requests from companies or individuals
by contacting them directly.
For e-Mail, turn off the option to automatically download
attachments.
Be suspicious of unknown links or requests sent through email or
text message
Pay close attention to website URLs.
13. What I do to enlightening people
• Personal enlightenment amongst friends
• Speaking at conferences and seminars
• Organizing trainings
• Organizing conferences…. NGSECURE
14. If each one can reach one,
then each one can teach one
what a beautiful nation Nigeria can be…..
Chaz B,
OAP and Producer of Sharing Life Issues with Chaz B
15. If each one can reach one,
then each one can teach one
what a beautiful & safe world
we can live in…..
Kayode Yussuf’s remixed
16. Thank you for listening, we hope you
join us secure Nigeria
Kayode Yussuf
+234-8029730059
kayusyussuf@yahoo.com
@k_whybaba