We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!
Cybersecurity Technologies, Standards and OperationsDr David Probert
2-Day Cybersecurity Master Class given at the University of Technology (UTECH), Kingston, Jamaica - 16th-17th September 2010 - in partnership with the UN/ITU Excellence Network in the Caribbean Region. These lectures are more technical than those in the more general 3-Day Cybersecurity Master Class that we held on 13th to 15th September. Topics covered include ITU, NIST, IEEE and ISO/IEC Standards. Setting up and running CERTs/CSIRTS - Computer Emergency Response Team - and Business Continuity.
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976.
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!
Cybersecurity Technologies, Standards and OperationsDr David Probert
2-Day Cybersecurity Master Class given at the University of Technology (UTECH), Kingston, Jamaica - 16th-17th September 2010 - in partnership with the UN/ITU Excellence Network in the Caribbean Region. These lectures are more technical than those in the more general 3-Day Cybersecurity Master Class that we held on 13th to 15th September. Topics covered include ITU, NIST, IEEE and ISO/IEC Standards. Setting up and running CERTs/CSIRTS - Computer Emergency Response Team - and Business Continuity.
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976.
This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
This document provides a summary and vision for cybersecurity from 2017 to 2027. It discusses the transition from the physical world of the 19th century to the intelligent world of the 21st century. The author proposes that cybersecurity will become integrated, adaptive, and intelligent through the use of artificial intelligence and machine learning. Key topics covered over the 10 year period include smart security architectures, the internet of things, and how AI will transform cybersecurity. The overall vision is of proactive, real-time cyber defense against the growing threats of cyber crime, terrorism and warfare.
National Cybersecurity - Roadmap and Action PlanDr David Probert
Analysis, strategies and practical action plans for National Government Cybersecurity based upon the United Nations - International Telecommunications Union - UN/ITU Cybersecurity Framework and their Global Cybersecurity Agenda - GCA.
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
This presentation provides a personal vision of trends in Cybersecurity during the coming 7 years - 2018 to 2025. We start with focusing on the Board Level Agenda for the newly appointed Chief Security Officer (CSO/CISO) and then briefly discuss the TOP 10 Cybersecurity Threats that include Ransomware, DDos Attacks, SQL injection, Social Media Phishing, Toxic Cookies, Classical Malware, Authentication Hacks, Stealth Monitoring and Advanced Persistent Attacks. We group these generic cyber threats under Exploration, Penetration and Real-Time Attacks! We then discuss the need for new Cyber Tools that will provide effective defence against such threat since classical tools such as anti-virus & firewalls will no longer stop the "bad guys" - CyberCriminals, Cyber Hacktivists & CyberTerrorists! We describe scenarios for 2018 (Integrated Security - Cyber & Physical Security), 2020 (Adaptive Security for the Internet of Things) and 2025 (Intelligent Security based upon Artificial Intelligence & Machine Learning). These tools are all available today and yet most organisations are still relying on the classical AV/Firewall Solutions and hence are highly vulnerable to cyberattacks. We wrap up the presentation with a brief look at Security for Critical Sectors such as Banking/Finance & Government. We suggest ways in which business can prioritise and organise CyberSecurity based upon frameworks such as those from NIST, SANS and the UN/ITU. Finally we return to the metaphor that Classical Physical Attacks & Warfare occur at the "Speed of Sound" whilst Global Cyber Attacks & CyberWarfare take place 1million times faster @ the "Speed of Light". This provides the key motivation for significantly upgrading our CyberDefences to provide Security within our 21stC Neural Society!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
Personal Vision of the Evolution of the Cybersecurity Sector during the next 10 years - 2015 - 2015.The presentation includes a review of the major players, both the "Good Guys" and the "Bad Guys". We discuss the important role of Artificial Intelligence, Machine Learning & Adaptive Systems in proving "Speed of Light" response to the continuous 24/7 Real-Time Threats that now target Business & Government. We conclude the presentation with a quick review of the Business Sector including the leading "new wave" cybersecurity companies, mergers, acquisitions and Venture Capital Investment.
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
The talk discusses the application of artificial intelligence and machine learning to enterprise cybersecurity. The topics include self-learning, stochastic cellular automata, adaptive & self-organising systems and recursive Bayesian algorithms. The talk briefly surveys several cybersecurity companies including Darktrace, Logrhythm and Norse Corporation. There is also discussion of the application of AI and neural networks within the Banking sector for "Algorithmic Trading" during the last 10 to 20 years. These techniques are now highly relevant, and even ESSENTIAL, for the provision of real-time enterprise cybersecurity to complement traditional "signature" based anti-virus & firewall based solutions. The talk closes with the presentations for the future of Cybersecurity in 2020, 2025 and 2040 including reference to similar forecasts from both Business & Governments. The talk was given by Dr David Eric Probert at the East-West International Security Conference at the Melia Galgos Hotel in Madrid, Spain on the Tuesday 27th October 2015.
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
This document discusses energizing cybersecurity with biometrics and digital forensics. It covers topics like integrating cybersecurity operations with real-time surveillance and profiling tools to prevent terrorism. Other topics include using biometrics and forensics to defend against cybercrime and terrorism by migrating from 20th century physical security to 21st century smart security. It also discusses profiling and tracking "bad guys" in real-time using tools like facial recognition from CCTV and monitoring social media and dark web communications. The document outlines various cyber-physical threat scenarios from cybercrime and cyberterrorism and how hybrid physical-cyber terrorism will require redesigning security. It also discusses how cyber attacks can enable or facilitate physical attacks and vice versa
Presentation on Smart Security given at the International East-West Security Conference - Rome - November 2016. We begin with reviewing the 21stC Security Landscape including CyberCrime, CyberTerror, CyberEspionage and CyberWar. Specific Topics covered include Integrated Physical & CyberSecurity such as PSIM and SIEM Technologies, Tools & Solutions. The Smart Security Architectures discussed are those from the UN/ITU (United Nations - International Telecommunications Union), NATO, NIST, EU/ENISA, SANS, IEEE and ISO/IEC. The presentation reviews recent Cyber Attacks and analyses the impact on BotNets such as MiraiNet that originate from the "Internet of Things". Finally we discuss Smart Security Defence for Critical National Information Infrastructure and suggest Practical Actions & RoadMap for YOUR Business!
Integrated Cybersecurity and the Internet of ThingsDr David Probert
Presentation given in Madrid at the East-West International Security Conference - October 2015. The topics include Integrated Cybersecurity and Physical Security as well as developments in the Internet of Things. The talk discusses models, architectures and standards for the IoT as well as a survey of some EU work under the IERC Programme. Finally the talk makes suggestions for actions by Chief Security Officers (CSOs) to prepare themselves for IoT Security. It is recommended that CSOs review the security for ALL their legacy networked devices to mitigate the risks of cyber attacks. The talk was given by Dr David Eric Probert on 27th October 2015 at the Security Conference Venue - Melia Galgos Hotel - Madrid, Spain.
Presentation discusses CyberCrime, CyberTerror & CyberWar & the ways in which the "Bad Guys" organise themselves to undertake major Cyber Attacks. The TOP 10 Threats are categorized as Exploration, Penetration and Attack Tools. The threats include: (1) Advanced Persistent Attack (APT), (2) Stealth Monitoring, (3) Toxic eMail, (4) Database & Web Hacks (SQL/XSS), (5) Classic Virus/Trojan Malware, (6) Authentication Hacks, (7) Designer "Bots" (Stuxnet), (8) Toxic Cookies/Proxy/DNS (9) DDoS & (10) Ransomware, We conclude with recommendations to Defend your Business with In-Depth Technical & Operational Defence Action Plans!
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
We present Cyber Trends and Tools for 2018 (Cyber Transition), 2020 (Intelligent Security) and 2025 (Neural Security) We discuss the evolution of the next generation of Tools based upon Artificial Intelligence & Machine Learning. And then we discuss applications to the Defence of Smart Devices (Internet of Things - IOT), Smart Transportation and Smart Cities. We briefly profile Next Generation Cybersecurity Products & Services from leading edge Vendors. We conclude with a discussion of ways to interface "Intelligent machines" with the "human brain" through recent developments in Virtual and Augmented Reality. And as usual we provide suggestions for ways to develop a Cyber Action Plan for YOUR Business with a Focus on the Importance of a Chief Information Security Officer (CISO/CSO) @ Board Level!
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
Now we see the evolution of Hybrid Warfare, Cybercrime and Terrorism. To mitigate to Terror Attacks we urgently need to integrate Real-Time Cybersecurity Solutions with Physical Surveillance in Business, Campus, Cities And Nationwide! In this presentation we discuss both Historic & Current Cyber Threats and practical options to minimise the risks of future Terror Attacks through Integrated Physical-Cybersecurity Solutions. We briefly review the United Nations/ITU, NATO and NIST Cybersecurity Frameworks, and the threats on Critical National Information Infrastructure. Finally we suggest the TOP Actions for Chief Security Officers (CSO) to mitigate Attacks within their own Security Operations. This invited presentation was given @ the International East-West Security Conference at the Marriott Courtyard Hotel in Prague - June 2016.
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference!
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
A Top-Level Strategic Analysis of Trends and Practical Solutions for the Integration of Physical and Cybersecurity for National Governments and Corporate Business. The Presentation is aimed at Chief Security Officers for both Government Ministries and for Major Corporate Business. The focus is upon critical sectors such as Banking, Energy, Transportation and Telecommunications
This document provides information about an upcoming conference on digital forensics and cyber security, including the date, location, registration details, and key topics to be addressed. The conference will bring together practitioners and researchers from various fields related to digital forensics and cybersecurity. Some of the main topics to be covered include the usage of machine learning in digital forensics, handling digital evidence and network forensics, and standardized forensic processes. The conference aims to discuss approaches for securing data and digital investigations. It will provide opportunities for business and intellectual engagement among attendees.
AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all!
Stuxnet was a sophisticated cyber attack targeting Iran's nuclear facilities that changed perceptions of threats to critical infrastructure systems like SCADA. It exploited vulnerabilities in both Windows and Siemens control software to sabotage centrifuges without detection for nearly a year. This highlighted that SCADA/ICS are vulnerable targets due to their use of outdated protocols and legacy systems not originally designed with security in mind. Common security issues with SCADA include lack of access controls, unpatched systems, integration with corporate networks, and human/contractor oversight. Best practices like the NERC standards and updates to protocols like DNP3 can help mitigate risks if properly implemented throughout the SCADA lifecycle.
This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
This document provides a summary and vision for cybersecurity from 2017 to 2027. It discusses the transition from the physical world of the 19th century to the intelligent world of the 21st century. The author proposes that cybersecurity will become integrated, adaptive, and intelligent through the use of artificial intelligence and machine learning. Key topics covered over the 10 year period include smart security architectures, the internet of things, and how AI will transform cybersecurity. The overall vision is of proactive, real-time cyber defense against the growing threats of cyber crime, terrorism and warfare.
National Cybersecurity - Roadmap and Action PlanDr David Probert
Analysis, strategies and practical action plans for National Government Cybersecurity based upon the United Nations - International Telecommunications Union - UN/ITU Cybersecurity Framework and their Global Cybersecurity Agenda - GCA.
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
This presentation provides a personal vision of trends in Cybersecurity during the coming 7 years - 2018 to 2025. We start with focusing on the Board Level Agenda for the newly appointed Chief Security Officer (CSO/CISO) and then briefly discuss the TOP 10 Cybersecurity Threats that include Ransomware, DDos Attacks, SQL injection, Social Media Phishing, Toxic Cookies, Classical Malware, Authentication Hacks, Stealth Monitoring and Advanced Persistent Attacks. We group these generic cyber threats under Exploration, Penetration and Real-Time Attacks! We then discuss the need for new Cyber Tools that will provide effective defence against such threat since classical tools such as anti-virus & firewalls will no longer stop the "bad guys" - CyberCriminals, Cyber Hacktivists & CyberTerrorists! We describe scenarios for 2018 (Integrated Security - Cyber & Physical Security), 2020 (Adaptive Security for the Internet of Things) and 2025 (Intelligent Security based upon Artificial Intelligence & Machine Learning). These tools are all available today and yet most organisations are still relying on the classical AV/Firewall Solutions and hence are highly vulnerable to cyberattacks. We wrap up the presentation with a brief look at Security for Critical Sectors such as Banking/Finance & Government. We suggest ways in which business can prioritise and organise CyberSecurity based upon frameworks such as those from NIST, SANS and the UN/ITU. Finally we return to the metaphor that Classical Physical Attacks & Warfare occur at the "Speed of Sound" whilst Global Cyber Attacks & CyberWarfare take place 1million times faster @ the "Speed of Light". This provides the key motivation for significantly upgrading our CyberDefences to provide Security within our 21stC Neural Society!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
Personal Vision of the Evolution of the Cybersecurity Sector during the next 10 years - 2015 - 2015.The presentation includes a review of the major players, both the "Good Guys" and the "Bad Guys". We discuss the important role of Artificial Intelligence, Machine Learning & Adaptive Systems in proving "Speed of Light" response to the continuous 24/7 Real-Time Threats that now target Business & Government. We conclude the presentation with a quick review of the Business Sector including the leading "new wave" cybersecurity companies, mergers, acquisitions and Venture Capital Investment.
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
The talk discusses the application of artificial intelligence and machine learning to enterprise cybersecurity. The topics include self-learning, stochastic cellular automata, adaptive & self-organising systems and recursive Bayesian algorithms. The talk briefly surveys several cybersecurity companies including Darktrace, Logrhythm and Norse Corporation. There is also discussion of the application of AI and neural networks within the Banking sector for "Algorithmic Trading" during the last 10 to 20 years. These techniques are now highly relevant, and even ESSENTIAL, for the provision of real-time enterprise cybersecurity to complement traditional "signature" based anti-virus & firewall based solutions. The talk closes with the presentations for the future of Cybersecurity in 2020, 2025 and 2040 including reference to similar forecasts from both Business & Governments. The talk was given by Dr David Eric Probert at the East-West International Security Conference at the Melia Galgos Hotel in Madrid, Spain on the Tuesday 27th October 2015.
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
This document discusses energizing cybersecurity with biometrics and digital forensics. It covers topics like integrating cybersecurity operations with real-time surveillance and profiling tools to prevent terrorism. Other topics include using biometrics and forensics to defend against cybercrime and terrorism by migrating from 20th century physical security to 21st century smart security. It also discusses profiling and tracking "bad guys" in real-time using tools like facial recognition from CCTV and monitoring social media and dark web communications. The document outlines various cyber-physical threat scenarios from cybercrime and cyberterrorism and how hybrid physical-cyber terrorism will require redesigning security. It also discusses how cyber attacks can enable or facilitate physical attacks and vice versa
Presentation on Smart Security given at the International East-West Security Conference - Rome - November 2016. We begin with reviewing the 21stC Security Landscape including CyberCrime, CyberTerror, CyberEspionage and CyberWar. Specific Topics covered include Integrated Physical & CyberSecurity such as PSIM and SIEM Technologies, Tools & Solutions. The Smart Security Architectures discussed are those from the UN/ITU (United Nations - International Telecommunications Union), NATO, NIST, EU/ENISA, SANS, IEEE and ISO/IEC. The presentation reviews recent Cyber Attacks and analyses the impact on BotNets such as MiraiNet that originate from the "Internet of Things". Finally we discuss Smart Security Defence for Critical National Information Infrastructure and suggest Practical Actions & RoadMap for YOUR Business!
Integrated Cybersecurity and the Internet of ThingsDr David Probert
Presentation given in Madrid at the East-West International Security Conference - October 2015. The topics include Integrated Cybersecurity and Physical Security as well as developments in the Internet of Things. The talk discusses models, architectures and standards for the IoT as well as a survey of some EU work under the IERC Programme. Finally the talk makes suggestions for actions by Chief Security Officers (CSOs) to prepare themselves for IoT Security. It is recommended that CSOs review the security for ALL their legacy networked devices to mitigate the risks of cyber attacks. The talk was given by Dr David Eric Probert on 27th October 2015 at the Security Conference Venue - Melia Galgos Hotel - Madrid, Spain.
Presentation discusses CyberCrime, CyberTerror & CyberWar & the ways in which the "Bad Guys" organise themselves to undertake major Cyber Attacks. The TOP 10 Threats are categorized as Exploration, Penetration and Attack Tools. The threats include: (1) Advanced Persistent Attack (APT), (2) Stealth Monitoring, (3) Toxic eMail, (4) Database & Web Hacks (SQL/XSS), (5) Classic Virus/Trojan Malware, (6) Authentication Hacks, (7) Designer "Bots" (Stuxnet), (8) Toxic Cookies/Proxy/DNS (9) DDoS & (10) Ransomware, We conclude with recommendations to Defend your Business with In-Depth Technical & Operational Defence Action Plans!
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
We present Cyber Trends and Tools for 2018 (Cyber Transition), 2020 (Intelligent Security) and 2025 (Neural Security) We discuss the evolution of the next generation of Tools based upon Artificial Intelligence & Machine Learning. And then we discuss applications to the Defence of Smart Devices (Internet of Things - IOT), Smart Transportation and Smart Cities. We briefly profile Next Generation Cybersecurity Products & Services from leading edge Vendors. We conclude with a discussion of ways to interface "Intelligent machines" with the "human brain" through recent developments in Virtual and Augmented Reality. And as usual we provide suggestions for ways to develop a Cyber Action Plan for YOUR Business with a Focus on the Importance of a Chief Information Security Officer (CISO/CSO) @ Board Level!
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
Now we see the evolution of Hybrid Warfare, Cybercrime and Terrorism. To mitigate to Terror Attacks we urgently need to integrate Real-Time Cybersecurity Solutions with Physical Surveillance in Business, Campus, Cities And Nationwide! In this presentation we discuss both Historic & Current Cyber Threats and practical options to minimise the risks of future Terror Attacks through Integrated Physical-Cybersecurity Solutions. We briefly review the United Nations/ITU, NATO and NIST Cybersecurity Frameworks, and the threats on Critical National Information Infrastructure. Finally we suggest the TOP Actions for Chief Security Officers (CSO) to mitigate Attacks within their own Security Operations. This invited presentation was given @ the International East-West Security Conference at the Marriott Courtyard Hotel in Prague - June 2016.
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference!
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
A Top-Level Strategic Analysis of Trends and Practical Solutions for the Integration of Physical and Cybersecurity for National Governments and Corporate Business. The Presentation is aimed at Chief Security Officers for both Government Ministries and for Major Corporate Business. The focus is upon critical sectors such as Banking, Energy, Transportation and Telecommunications
This document provides information about an upcoming conference on digital forensics and cyber security, including the date, location, registration details, and key topics to be addressed. The conference will bring together practitioners and researchers from various fields related to digital forensics and cybersecurity. Some of the main topics to be covered include the usage of machine learning in digital forensics, handling digital evidence and network forensics, and standardized forensic processes. The conference aims to discuss approaches for securing data and digital investigations. It will provide opportunities for business and intellectual engagement among attendees.
AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all!
Stuxnet was a sophisticated cyber attack targeting Iran's nuclear facilities that changed perceptions of threats to critical infrastructure systems like SCADA. It exploited vulnerabilities in both Windows and Siemens control software to sabotage centrifuges without detection for nearly a year. This highlighted that SCADA/ICS are vulnerable targets due to their use of outdated protocols and legacy systems not originally designed with security in mind. Common security issues with SCADA include lack of access controls, unpatched systems, integration with corporate networks, and human/contractor oversight. Best practices like the NERC standards and updates to protocols like DNP3 can help mitigate risks if properly implemented throughout the SCADA lifecycle.
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
Cyber is a real threat and we can not keep our eyes shut to the same. Most of the countries surrounding us are involved in cyberwar covertly and we need to take steps to counter the same at the earliest.
This document discusses the growing dependency of individuals and organizations on cyberspace and the associated risks. It provides historical context on the evolution of the internet from ARPANET. Key points covered include:
- Individuals and organizations have become increasingly reliant on cyberspace for daily activities, work operations, and digital transformation, leaving them vulnerable to cyber threats.
- Emerging areas of focus for cybersecurity are the internet of things and how hackers can access systems through connected devices, as well as exploiting personal devices with stored data.
- Common cyber risks discussed are viruses, service disruptions, phishing, SQL injection attacks, and password attacks. Stricter laws have been implemented in some countries like the
We at The Cyber Express aim to keep our readers updated with the latest news in Cybersecurity news world. With the help of our adept editorial team and eminent contributors, we bring diverse facets of the industry, including data breaches, ransomware, cyber warfare, detailed security trends analysis, whitepaper, market research, exclusive interviews and podcasts.
Cyber warfare is an emerging reality that involves attacks in cyberspace to disrupt digital systems and infrastructure. Nation states and other groups now use cyber attacks for purposes like espionage, sabotage, and warfare. The document discusses the history and evolution of cyber warfare, from early hacker attacks to modern incidents like Stuxnet. It outlines the threats in cyberspace, from individual hackers to nation states. Various cyber weapons, tactics, and operations are also described. While increased cyber security could help, deterrence and international agreements may be needed to reduce cyber conflicts between nations in the future.
Honeypots and honeynets are used to study cyber attacks. A honeypot is a computer system set up to attract cyber attacks so threats can be observed and analyzed. A honeynet contains multiple honeypots and allows attacks on an entire network to be monitored. Deploying honeypots provides benefits like risk mitigation, intrusion detection, and research opportunities to study attacker techniques. However, honeypots also have downsides like limited visibility and potential additional security risks if compromised.
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
This document discusses threats, attacks, and vulnerabilities which play a key role in cyber security. It begins by defining cyber security as preventing, detecting, and responding to cyber attacks. It then discusses various common cyber threats like cyber theft, cyber vandalism, and denial of service attacks. It also examines different types of cyber attacks like untargeted and targeted attacks. The document outlines how vulnerabilities in software, policies, users, and other areas can enable these threats and attacks. It concludes that while technology can help reduce cyber attacks, vulnerabilities ultimately reside with human behavior, so education is important to strengthen cyber security.
Finland s cyber security strategy background dossierYury Chemerkin
This document provides background information on Finland's Cyber Security Strategy. It discusses the cyber domain and threats, principles of cyber security management, securing vital functions against cyber threats, cyber security regulation, and implementation of the strategy. The cyber domain is increasingly interconnected but also introduces new risks. Cyber attacks can disrupt critical infrastructure and society. Finland aims to increase cyber situation awareness, guarantee cybersecurity of businesses, prevent cybercrime, improve cyber defense capabilities, and foster international cooperation and research.
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
Society is inextricably dependent on the Internet and other globally interconnected infrastructures
used in the provisioning of information services. The growth of information technology (IT) and
information systems (IS) over the past decades has created an unprecedented demand for access to
information. The implication of wireless mobility are great, and the commercial possibilities of new and
innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of
Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry.
As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and
flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker
industry is blurring the distinction between motivated crime and traditional computer security threats -
including the disruption of critical infrastructures or the penetration of networks.
Society is inextricably dependent on the Internet and other globally interconnected infrastructures
used in the provisioning of information services. The growth of information technology (IT) and
information systems (IS) over the past decades has created an unprecedented demand for access to
information. The implication of wireless mobility are great, and the commercial possibilities of new and
innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of
Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry.
As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and
flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker
industry is blurring the distinction between motivated crime and traditional computer security threats -
including the disruption of critical infrastructures or the penetration of networks.
Cyber(in)security: systemic risks and responsesblogzilla
Presented at National Security 2008 in Brussels. Updated for British Computer Society, Deutsche Bank, Oxford University, and University of Southern Denmark.
Presentation to OECD project group on Global Risk. Expanded version presented to British Computer Society, Deutsche Bank and University of Southern Denmark.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
This document discusses cyber terrorism, including its definition, history, examples, effects, and ways to counter it. Cyber terrorism is defined as using computers or networks to intentionally cause harm or further political/ideological goals. The document provides background on the evolution of terrorism and increased public interest in cyber terrorism in the late 1980s/1990s. Examples of cyber terrorism history from 1997-2001 are outlined. The major effects of potential cyber attacks on critical infrastructure like power systems, water supplies, air traffic control, and healthcare are described. The document concludes by mentioning the International Multilateral Partnership Against Cyber Threats and the US military's role in countering cyber terrorism.
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.
Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.
Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe an ...
Terrorist cyber attacks pose a significant threat to national institutions and have the potential to cause greater devastation than cybercrimes targeting individuals. As technology advances rapidly, organizations must constantly upgrade their security systems to defend against evolving cyber threats from terrorist groups. A successful terrorist cyber attack could put people at risk by allowing sensitive information to fall into the wrong hands, disrupting critical resources, or manipulating data to cause harm. Key targets include energy, transportation, banking, and communication networks. Nations must remain vigilant against these threats through strong cyber defenses and active countermeasures.
The document is the U.S. Department of Homeland Security's Cybersecurity Strategy from 2018 to 2023. It outlines the department's vision to improve national cybersecurity risk management by 2023 through increasing security across government and critical infrastructure networks, decreasing illicit cyber activity, improving responses to incidents, and fostering a more secure cyber ecosystem.
The strategy identifies five pillars to manage national cybersecurity risks: risk identification, vulnerability reduction, threat reduction, consequence mitigation, and enabling cybersecurity outcomes. Under these pillars, the department has seven goals, such as assessing evolving risks, protecting federal systems and critical infrastructure, preventing criminal cyber activity, responding to incidents, and strengthening the overall cyber ecosystem.
Similar to Cyber-Pandemic: Current Reality & Future Trends (20)
Brief article on the Impact of Artificial Intelligence & Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 & 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture & Society. This year will be 50 years since I started my own PhD into AI - "Stochastic Machine Learning" at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy!
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
Donetsk, Ukraine is at the core of regional issues between Russia & the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government & Welsh Entrepreneur - John Hughes with the "New Russia Company Limited" registered in 1869. This 19thC Company Town was renamed Stalino in 1924 & Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts & Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) .
Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript & Analysis of current events.
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the "Institute of Ecological Problems of the North" - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel & Monchegorsk. The presentation concludes with suggestions for redefining & upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine & Deep Learning to research massive databases related to climate change & arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation & Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland & Russia!
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
The document discusses the results of a study on the effects of exercise on memory and thinking abilities in older adults. The study found that regular exercise can help reduce the decline in thinking abilities that often occurs with age. Specifically, older adults who exercised regularly performed better on memory and thinking tests compared to those who did not exercise regularly.
Embedding Artificial Intelligence in the EnterpriseDr David Probert
Influential Presentation that was presented during DECVille 1988 @ the Cannes Palais des Congress for Digital Equipment Corporation (DEC). The author introduces the concept of the "Knowledge Lens" which is used to show how Artificial Intelligence (A.I.) is now being embedded in enterprise products, software and applications. The talk also discusses the 3 Ages of Computing that span the 1960s to 21st Century. This talk was subsequently used as the basis of a Keynote Speech for the British Computer Society Conference on Expert Systems that was held in Brighton, UK during December 1988.
Presentation Slides from the Digital Business Blueprint (1988) that was used during the late 1980s as the basis for Digital's Business Strategy for Value-Added Networks. This conceptual presentation provided the strategic foundation blocks for the emerging "Knowledge Society". In particular it show how the Computing Industry should migrate from Physical Product Architectures (Space) to those based upon upon Software & Services (Time). The author (David Probert) subsequently established and managed the Internet Business Group for Digital Equipment Corporation (DEC) across EMEA (Europe, Middle East & Africa). David represented DEC on the EARN Management Board (European and Academic Research Networks - subsequently TERENA) from 1991 to 1999.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).