Even in this pandemic situation, thank you for making and running the HITCON 2021 so well. Thank you for giving me the chance to talk!
This presentation is revised by reinforcing Q&A. Look forward to seeing you offline next year!
What the heck .. since I wrote the content for this paper and it was edited to focus on wireless I thought it might be worth posting here ... finally. IF anyone wants to read the rationale for high speed rail interconnects to major US airports and the rationale for hydrogen use at airports - produced by kinetic, solar, and wind, and understand how fiber improves airport communications or you just need clarification, then just reach out to me.
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
The Global Entrepreneurship Summit GES 2019 spins off a cooperation agreement between PODIS Ltd, participant of GES 2019, and autoaid GmbH.
This cooperation agreement is the foundation for bringing together a patented Automatic Crash Notification SaaS and a Pioneer in cloud based automotive and remote diagnoses.
The new solution lands into the aftermarket telematics ecosystem implementing IoT, AI and big data technologies.
PODIS patented filter of false alarms in the Autoaid ODBII dongle (http://www.autoaid.de) , together as a cloud based system, will empower B2B clients to:
• Become a compliant TPSP in the eCall ecosystem,
• Offer UBI (Usage Based Insurance),
• Monitor driver's behavior.
• Access detailed accident reports,
• Gain Big Data analytics and insights from the continuous flow to a data lake,
• Perform remote car diagnostics, enabling preventive and predictive maintenance, and
• Improve Claim and the repair support providing to the insurer the First Notification of Loss (FNOL).
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
EY Principal and Cyber Threat Management Leader Anil Markose shows you best practices for cyber risk management and how to sense, resist, and react to cyber attacks on your company.
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
What the heck .. since I wrote the content for this paper and it was edited to focus on wireless I thought it might be worth posting here ... finally. IF anyone wants to read the rationale for high speed rail interconnects to major US airports and the rationale for hydrogen use at airports - produced by kinetic, solar, and wind, and understand how fiber improves airport communications or you just need clarification, then just reach out to me.
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
The Global Entrepreneurship Summit GES 2019 spins off a cooperation agreement between PODIS Ltd, participant of GES 2019, and autoaid GmbH.
This cooperation agreement is the foundation for bringing together a patented Automatic Crash Notification SaaS and a Pioneer in cloud based automotive and remote diagnoses.
The new solution lands into the aftermarket telematics ecosystem implementing IoT, AI and big data technologies.
PODIS patented filter of false alarms in the Autoaid ODBII dongle (http://www.autoaid.de) , together as a cloud based system, will empower B2B clients to:
• Become a compliant TPSP in the eCall ecosystem,
• Offer UBI (Usage Based Insurance),
• Monitor driver's behavior.
• Access detailed accident reports,
• Gain Big Data analytics and insights from the continuous flow to a data lake,
• Perform remote car diagnostics, enabling preventive and predictive maintenance, and
• Improve Claim and the repair support providing to the insurer the First Notification of Loss (FNOL).
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
EY Principal and Cyber Threat Management Leader Anil Markose shows you best practices for cyber risk management and how to sense, resist, and react to cyber attacks on your company.
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
Presentation talking about the ever increasing threat of cyber crime and how social media, mobile devices, cloud computing make an interesting point of attack. Cyber security is only getting more and more important due to the widespread of new platforms, increasingly available and simple to use exploit kits as well as attacks becoming more sophisticated and having specific targets.
Although Sony seemed to dominate the cyber-security headlines of 2014, it was just one of many corporations infiltrated by an increasingly sophisticated and driven pool of hackers. J.P. Morgan Chase, Home Depot, and Target also top the list of businesses struggling with data breaches.
The most recent major cyberattack against Anthem Healthcare shook the insurance industry. In a rare show of honesty, the insurer began alerting customers and the media to the potential of a data break just eight days after it first noted suspicious activity on Jan. 27, 2015.
Immediately upon discovering it had been attacked, Anthem jumped to address the security vulnerability, contacted the FBI, and hired leading cyber-security firm Mandiant to evaluate its systems, said president and CEO Joseph Swedish in a statement.
Noting the importance of protecting financial institutions, New York's Department of Financial Services responded to the Anthem breach by announcing its intent to integrate regular assessments of cyber-security preparedness at insurance companies as part of its examination process. It will also enforce "enhanced regulations" on insurers based in New York.
"Recent cyber security breaches should serve as a stern wake up call for insurers and other financial institutions to strengthen their cyber defenses," said Benjamin M. Lawsky, New York State's superintendent of financial services, in a statement. He continued, "Regulators and private sector companies must both redouble their efforts and move aggressively to help safeguard this consumer data.“
Most people might expect that larger insurers, given the sensitive customer information they handle, would boast robust cyber-security programs. This is not necessarily true.
As part of its investigation, the Department found that 95% of insurers already think they have sufficient staff for information security, and just 14% of CEOs receive monthly briefings on data security. Anthem, the nation's second-largest health insurer, had not even encrypted its database containing nonmedical data. It claims that the HIPAA did not require it to do so.
While experts believe that Anthem was exclusively targeted in its attack, there is no doubt that all financial institutions are at risk. Here are eight things to know as the industry enters a year of increasingly heightened cyber-vulnerability.
Digital businesses are difficult to launch and run even without the challenge of security. And yet, digital business strategies are also being used by hackers to systematically go after lucrative targets. Following up on our release of the 2015 NTT Group Global Threat Intelligence Report, this executive summary highlights key findings from the report that affect today’s digital businesses.
What trends will 2018 bring for Business Continuity Professionals?PECB
Many business continuity practitioners are perceiving a higher level of risk than ever before in their careers. Unfortunately, these risks are more often resulting in real incidents which require emergency response and continuity of operations. Being prepared may be the most important thing an organization can do in 2018. But what should we prepare for, and how should we prepare for it? This discussion will walk through some of the emerging threats concepts, tools, and techniques that business continuity professionals can expect to see more of in 2018.
Main points covered:
- What should we prepare for in 2018?
- How should we prepare?
- The emerging threats, concepts, tools, and techniques expected in 2018
- Emerging threats creating new risks
Presenter:
David Feeney, CPP, PMP has 17 years of security industry experience assisting organizations with risk management matters specific to physical, personnel, and cyber security. He has 9 years of experience with service providers and 8 years of experience within enterprise security organizations. David has worked with industry leaders in the energy, technology, healthcare, and real estate sectors. Areas of specialization include Security Operations Center design and management, Security Systems design and implementation, and Enterprise Risk Management. David holds leadership positions in ASIS International and is also a member of the InfraGard FBI program. David holds Certification Protection Professional (CPP) and Project Management Professional (PMP) certifications.
Andrea LeStarge, MS has over ten years of experience in program management, risk analysis and curriculum development. Being specialized in Homeland Security, Andrea leverages her experience in formerly managing projects to support various Federal Government entities in identifying, detecting and responding to man-made, natural and cyber incidents. She has an established track record in recognizing security gaps and corrective risk mitigation options, while effectively communicating findings to stakeholders, private sector owners and operators, and first-responder personnel within tactical, operational and strategic levels. Overall, Andrea encompasses analytical tradecraft and demonstrates consistent, repeatable and defensible methodologies pertaining to risk and the elements of threat, vulnerability and consequence.
Organizer: Nevila Muka
Date: January 17, 2018
Link to the recorded webinar:
Event Agenda:
1. Company presentation - Welcome remarks & Introduction
2. Threat landscape - What cyber threats is Sudan facing and impact of breaches on private & public sector
3. PCI DSS - PCI benefits and opportunities for private sector and unlocking global opportunities
4. Security Operation Centers - Importance of SOC and its benefit to overall cyber resilience for public & private entities
5. Cyber insurance - Importance of having cyber insurance to hedge risk
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...CODE BLUE
In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities.
South Korean National Intelligence Service (NIS, Korean CIA) officially reported 75,472 cyberattacks launched against the government and public agencies from 2010 until October 2014. Additionally, the NIS's National Cyber Security Center reported that North Korea attempts millions of indiscriminate cyber-attack attempts on government agencies and private corporations in South Korea.
The NIS believes that North Korean General Bureau of Reconnaissance, specifically Unit 121, dedicates more than 6,000 full-time hackers who create malicious computer codes. This estimate, which was echoed by the South Korean Ministry of Defense in a white paper released in January 2015, is double the estimated figure previously released by the NIS in 2013. According to claims by North Korean defectors, the North Korean government began to focus on its cyber capabilities as an attempt to develop its asymmetric warfare in the 1990s, when economic hardships put strains on its conventional military assets. At that time, Mirim University - since renamed Pyongyang Automation University - was opened to train hackers in electronic warfare tactics.
To narrow the gap with the North, recently South Korean government has been devoting itself to raise more cyber security experts. In this talk I will talk how our government invests in human capital for cyber-security. Especially, I will focus on the training programs of , , and , all of which play the central role for bring up security experts. Aside from state-run programs, I will give a talk about private sector’s effort to train white-hat hackers (for example, SECUINSIDE of , CODEGATE of , POC of , , , etc).
Given that a variety of training programs are underway to secure more security and hacking experts, we seems to be making progress. For example, , the team comprised of students from Korea University and the Korea-based IT security solution provider RAONSECURE, won the TOP prize at the ‘DEFCON CTF 23’! However, we have problems that still needs to be solved. I will also point out these.
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
Presentation talking about the ever increasing threat of cyber crime and how social media, mobile devices, cloud computing make an interesting point of attack. Cyber security is only getting more and more important due to the widespread of new platforms, increasingly available and simple to use exploit kits as well as attacks becoming more sophisticated and having specific targets.
Although Sony seemed to dominate the cyber-security headlines of 2014, it was just one of many corporations infiltrated by an increasingly sophisticated and driven pool of hackers. J.P. Morgan Chase, Home Depot, and Target also top the list of businesses struggling with data breaches.
The most recent major cyberattack against Anthem Healthcare shook the insurance industry. In a rare show of honesty, the insurer began alerting customers and the media to the potential of a data break just eight days after it first noted suspicious activity on Jan. 27, 2015.
Immediately upon discovering it had been attacked, Anthem jumped to address the security vulnerability, contacted the FBI, and hired leading cyber-security firm Mandiant to evaluate its systems, said president and CEO Joseph Swedish in a statement.
Noting the importance of protecting financial institutions, New York's Department of Financial Services responded to the Anthem breach by announcing its intent to integrate regular assessments of cyber-security preparedness at insurance companies as part of its examination process. It will also enforce "enhanced regulations" on insurers based in New York.
"Recent cyber security breaches should serve as a stern wake up call for insurers and other financial institutions to strengthen their cyber defenses," said Benjamin M. Lawsky, New York State's superintendent of financial services, in a statement. He continued, "Regulators and private sector companies must both redouble their efforts and move aggressively to help safeguard this consumer data.“
Most people might expect that larger insurers, given the sensitive customer information they handle, would boast robust cyber-security programs. This is not necessarily true.
As part of its investigation, the Department found that 95% of insurers already think they have sufficient staff for information security, and just 14% of CEOs receive monthly briefings on data security. Anthem, the nation's second-largest health insurer, had not even encrypted its database containing nonmedical data. It claims that the HIPAA did not require it to do so.
While experts believe that Anthem was exclusively targeted in its attack, there is no doubt that all financial institutions are at risk. Here are eight things to know as the industry enters a year of increasingly heightened cyber-vulnerability.
Digital businesses are difficult to launch and run even without the challenge of security. And yet, digital business strategies are also being used by hackers to systematically go after lucrative targets. Following up on our release of the 2015 NTT Group Global Threat Intelligence Report, this executive summary highlights key findings from the report that affect today’s digital businesses.
What trends will 2018 bring for Business Continuity Professionals?PECB
Many business continuity practitioners are perceiving a higher level of risk than ever before in their careers. Unfortunately, these risks are more often resulting in real incidents which require emergency response and continuity of operations. Being prepared may be the most important thing an organization can do in 2018. But what should we prepare for, and how should we prepare for it? This discussion will walk through some of the emerging threats concepts, tools, and techniques that business continuity professionals can expect to see more of in 2018.
Main points covered:
- What should we prepare for in 2018?
- How should we prepare?
- The emerging threats, concepts, tools, and techniques expected in 2018
- Emerging threats creating new risks
Presenter:
David Feeney, CPP, PMP has 17 years of security industry experience assisting organizations with risk management matters specific to physical, personnel, and cyber security. He has 9 years of experience with service providers and 8 years of experience within enterprise security organizations. David has worked with industry leaders in the energy, technology, healthcare, and real estate sectors. Areas of specialization include Security Operations Center design and management, Security Systems design and implementation, and Enterprise Risk Management. David holds leadership positions in ASIS International and is also a member of the InfraGard FBI program. David holds Certification Protection Professional (CPP) and Project Management Professional (PMP) certifications.
Andrea LeStarge, MS has over ten years of experience in program management, risk analysis and curriculum development. Being specialized in Homeland Security, Andrea leverages her experience in formerly managing projects to support various Federal Government entities in identifying, detecting and responding to man-made, natural and cyber incidents. She has an established track record in recognizing security gaps and corrective risk mitigation options, while effectively communicating findings to stakeholders, private sector owners and operators, and first-responder personnel within tactical, operational and strategic levels. Overall, Andrea encompasses analytical tradecraft and demonstrates consistent, repeatable and defensible methodologies pertaining to risk and the elements of threat, vulnerability and consequence.
Organizer: Nevila Muka
Date: January 17, 2018
Link to the recorded webinar:
Event Agenda:
1. Company presentation - Welcome remarks & Introduction
2. Threat landscape - What cyber threats is Sudan facing and impact of breaches on private & public sector
3. PCI DSS - PCI benefits and opportunities for private sector and unlocking global opportunities
4. Security Operation Centers - Importance of SOC and its benefit to overall cyber resilience for public & private entities
5. Cyber insurance - Importance of having cyber insurance to hedge risk
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...CODE BLUE
In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities.
South Korean National Intelligence Service (NIS, Korean CIA) officially reported 75,472 cyberattacks launched against the government and public agencies from 2010 until October 2014. Additionally, the NIS's National Cyber Security Center reported that North Korea attempts millions of indiscriminate cyber-attack attempts on government agencies and private corporations in South Korea.
The NIS believes that North Korean General Bureau of Reconnaissance, specifically Unit 121, dedicates more than 6,000 full-time hackers who create malicious computer codes. This estimate, which was echoed by the South Korean Ministry of Defense in a white paper released in January 2015, is double the estimated figure previously released by the NIS in 2013. According to claims by North Korean defectors, the North Korean government began to focus on its cyber capabilities as an attempt to develop its asymmetric warfare in the 1990s, when economic hardships put strains on its conventional military assets. At that time, Mirim University - since renamed Pyongyang Automation University - was opened to train hackers in electronic warfare tactics.
To narrow the gap with the North, recently South Korean government has been devoting itself to raise more cyber security experts. In this talk I will talk how our government invests in human capital for cyber-security. Especially, I will focus on the training programs of , , and , all of which play the central role for bring up security experts. Aside from state-run programs, I will give a talk about private sector’s effort to train white-hat hackers (for example, SECUINSIDE of , CODEGATE of , POC of , , , etc).
Given that a variety of training programs are underway to secure more security and hacking experts, we seems to be making progress. For example, , the team comprised of students from Korea University and the Korea-based IT security solution provider RAONSECURE, won the TOP prize at the ‘DEFCON CTF 23’! However, we have problems that still needs to be solved. I will also point out these.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
This week’s forum discussion is all about training and equipment. TakishaPeck109
This week’s forum discussion is all about training and equipment. In general, personal protection specialists and details exist to protect human capital. Organizations employ or contract security professionals solely for risk optimization and it is important to understand this before determining what training, skills, or equipment may be necessary to complete the mission. Without a solid understanding of the various risks and threats the client faces, it would be difficult to determine the operational needs of the detail. “Conducting security surveys with an integrated risk management approach, when done in a proactive way, can help provide more cost-effective and successful [protection] programs” (Kovacich & Halibozek, 2016). However, June lays out a few “universal” areas of necessary training in Introduction to Executive Protection which include threat assessment and risk analysis, emergency medicine, advance planning and defensive tactics, and etiquette (June, 2016). In my opinion, security details need individuals who are trained in these five core aspects of protection to be successful, regardless of the threat profile. And in-service training should reflect that. It is important to routinely train and evaluate teams and individuals to increase proficiency because training is primarily focused on “how and when to react” (p. 151).
There are also some essential skills that personal protection specialists should have to be effective. In high threat protection, we generally consider making holes and plugging holes to be the most essential, but the reality is that the greatest threat most clients face is ordinary and shared by everyone in the modern world: vehicle accidents. Driving is a critical foundational skill that all protection specialists should have. Traveling is a necessity in most industries, and it is generally understood that clients in high threat environments are at the greatest risk when moving from point A to B. And routine vehicle accidents are not the only issue. Because attacks on principle are largely functions of time and opportunity, the client is most vulnerable while underway. In general, this promotes driving at faster rates of speed to reduce time on the road, further highlighting the importance of having skilled and capable drivers on security details.
In addition to training and skill requirements, equipment is a major consideration in protective operations. The vehicle is a critical piece of equipment in protective operations (McGovern, 2011) and proper loadout is a big part of success during an incident. Typical loadouts generally include communications equipment, emergency medical supplies such as first aid kits and AEDs, and extradition equipment (APUS, 2020). Properly staging the vehicle and conducting familiarization training is equally important. For example, the Toyota LC200 has become the gold standard for protective operations worldwide and up-armored variants are used by nearly every single state, non ...
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
The main purpose of the study and its point of action is to develop regional critical information infrastructure (CII) resilience practices by identifying CII that have strategic imperatives and developing coordinated approaches for cybersecurity protection. The scope of this project study is based on the ASEAN ICT Masterplan 2020 which aims to strengthen information security and assurance among ASEAN Member States (AMS).
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
Current IT modernization plans create opportunities for tremendous gains in effectiveness and efficiency. However, if poorly implemented, they can also increase risk. Successful leaders know that while it’s impossible to eliminate risk, it can be managed. Discover the basics of the Risk Management Framework (prescribed by NIST Standards) and how to begin to apply it.
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
Seungjoo Kim, "How South Korea Is Fighting North Korea's Cyber Threats", Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats, Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
Kid Blockchain - Everything You Need to Know - (Part 1)
01. 화폐의 역사 : 금에서부터 간편결제에 이르기까지 ... 4P
02. 비트코인의 탄생 ... 27P
03. 비트코인과 블록체인의 세부 동작원리 ... 85P
04. 작업증명(PoW)이란? ... 158P
05. 비트코인과 블록체인이 당면한 기술적 문제 ... 171P
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
Seungyeon Jeong, Sooyoung Kang, and Seungjoo Kim, "Application of the Common Criteria to Building Trustworthy Automotive SDLC", Proc. of The 19th ICCC 2020, The 19th International Common Criteria Conference, Virtual (online) Conference, November 16-18, 2020.
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
Sooyoung Kang, Seungyeon Jeong, and Seungjoo Kim, "Assurance-Level Driven Method for Integrating Security into SDLC Process”, Proc. of The 18th CCUF Workshop 2020, The 18th Common Criteria Users Forum Workshop, Virtual (online) Conference, November 12, 2020.
o 행 사 명 : 포스트코로나 시대의 ICT산업 미래전략포럼
o 일시/장소 : ‘20.5.22.(금) 10:00~16:30 / 에스팩토리(서울 성수동 소재)
o 주최/후원 : KAIT, KCA, IITP / SKT, KT, LGU+, LG전자 등
o 참 석 자 : 과기정통부 2차관, 정보통신산업정책관 및 ICT산업분야별 전문가 등
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common Criteria @ ICCC 2019 (International Common Criteria Conference), which is a major conference for the community of experts involved in security evaluation
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
Verification of IVI Over-The-Air using UML/OCL @ ICCC 2019 (International Common Criteria Conference), which is a major conference for the community of experts involved in security evaluation
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How libraries can support authors with open access requirements for UKRI fund...
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
1. Why is it getting harder to train
the cybersecurity workforce?
(Extended Version)
Prof. Seungjoo (Gabriel) Kim / Korea University
2. Seungjoo Kim
Professor of the School of Cybersecurity of
Korea University, Head of the Department
of Cyber Defense of Korea University, and
a Member of the Presidential Committee
on the 4th Industrial Revolution.
From 2018 to 2019, he was a visiting
professor of Korea Military Academy.
He served as a Black Hat Asia review board
member from 2019, a team leader of
Korea Internet & Security Agency (KISA)
from 1998 to 2004, and an associate
professor of Sungkyunkwan University,
Korea.
4. Cyber Threats in South Korea
South Korean government groups and agencies experience
more than 1.62 million hacking attempts a day according to
South Korean National Intelligence Service (NIS, Korean
CIA).
⇒ From North Korea 》 China 〉 Russia 〉 Iran & Pakistan ↑
5. Cyber Threats in South Korea
Also, in recent years, there have been more attacks mainly
targeting private companies rather than public institutions.
The hacking damage is estimated at 86% and 14% for the
private and public, respectively.
6. North Korean Hacking Workforce
Korean government believes that North Korean General
Bureau of Reconnaissance (偵察總局), specifically Unit 121,
dedicates 6,000+ (exactly 6,800) full-time hackers who
create malicious computer codes.
⇒ 1,700 are experts and 5,100 are supportive members.
7.
8. NK's hacking skills are really that good?
⇒ Evidence ⑴) Foreign IT expert evaluated that NK has a
potential to replace Indian S/W outsourcing market.
9. NK's hacking skills are really that good?
⇒ Evidence ⑵) North Korean students have a good
foundation for computer science itself.
10.
11.
12.
13. North Korean Hacking Workforce
As seen before, North Korean hackers have good hacking
skills and good base in computer science.
But above all, they have very strong motivation such as Kim
Jung-un’s encouragements.
Furthermore, North Korean hackers are state-sponsored
soldiers. Thus they have the solid knowledge of (military)
operation. As we can see in SWIFT hacking, they can carry
out very well organized operation.
14. Dept. of Cyber Defense @ Korea Univ.
Established in 2012 to prepare for North Korea's hacking
attack (Inspired by Israel's Talpiot program)
⇒ We produced 30 first graduates in 2016.
Joint educational programs with Korea Army (Cyber
Command)
Full Scholarship over Guaranteed Employment
15. Dept. of Cyber Defense @ Korea Univ.
Upon graduation, they are to be commissioned as second
lieutenants and must serve in the military for seven years.
Accept top 0.4%~0.6% of students in the national college
entrance exam.
16. The team led by graduates of our dept. got 2nd place in the CYBERNET 2021 CTF (Netherland,
Nov. 15~19)! (1st : Netherland, 2nd : Korea, 3rd : EU combined team, 4th : Norway, 5th : Japan)
17. Other Education Programs
NSR’s CSTEC(Cyber Security Training and Exercise Center)
KISA’s K-Shield
KITRI’s BoB(Best of the Best) Program : Running strong
peer-to-peer mentoring style of education. And so far, it
has made so may pretty good results.
18. Changes in the Security Environment Ⅰ
Entering the era of the 4th Industrial Revolution, cyber
security began to be demanded in all areas connected to
the Internet.
As the importance of cybersecurity spreads across all areas,
security experts are forced to have more in-depth domain
knowledge than ever before.
19. Changes in the Security Environment Ⅰ
For example, in the European Union, the regulations on
automotive cybersecurity will be mandatory for all new
vehicles produced from July 2024.
⇒ UNECE WP.29 & ISO/SAE 21434
20. Changes in the Security Environment Ⅰ
UNECE regulations consist of ⑴ R155 for cyber security and
⑵ R156 for software update.
UNECE regulation 155 (Cyber Security) introduce a
Cybersecurity Management System (CSMS) in automotive
on organization level. :
√ Risk management across the entire company and the entire life cycle of
each individual vehicle
√ Analysis of weak points during the entire development and production
process
√ Cyber security monitoring and incident response to existing vehicle types
21. Changes in the Security Environment Ⅰ
UNECE regulations consist of ⑴ R155 for cyber security and
⑵ R156 for software update.
UNECE regulation 156 (SW Updates) introduce a framework
for remote updates (over-the-air) with a Software Update
Management System (SUMS). :
√ Systematic control and compliance with government guidelines
√ Establish Software identification management
√ Assessment whether a software update (SU) affects type approval and
security of vehicle
25. Changes in the Security Environment Ⅰ
Also, on April 11th~12th, 2019 International Air Transport
Association (IATA) held for the first time, at its Regional
Office in Singapore, an Aviation Cyber Security Roundtable
(ACSR).
Through this, they concluded that it was necessary to
cultivate a new generation of individuals and organizations
that are able to support in answering the aviation cyber
security challenge.
26. Changes in the Security Environment Ⅰ
As another example, the U.S. DoD has been developing
various policies aimed at hardening the cybersecurity for its
weapon systems.
⇒ RMF A&A
27. Changes in the Security Environment Ⅰ
(e.g.) Lockheed Martin's CRL Framework for Weapon,
Mission, and Training Systems
28. Changes in the Security Environment Ⅱ
As cybersecurity is highlighted in all fields, the recruitment
of cyber security experts by large companies (such as
Samsung, LG, Hyundai/KIA, etc.) is increasing rapidly.
As a result, SMEs(Small and Medium-sized Enterprises) are
having difficulty in hiring security experts.
29. How to Educate Them?
In order to train security experts specialized in each
industrial sector, real data in the field is required to grow
in-depth domain-knowledge.
However, it is difficult for universities to obtain the data
generated in the real world.
This is particularly serious in the fields of automobiles,
aircraft, and weapon systems, etc.
30. How to Educate Them?
Need very strong public-private partnership!
Universities should teach students to have solid basic
knowledge, so that they can quickly acquire practical
domain-knowledge taught in the company(or government)
after joining that company(or government).
In addition, as in Cyber Grand Challenge of DARPA in the
United States, efforts should be made to provide a high-
quality research platform to academia.
32. How to Educate Them?
In fact, in the case of our Department of Cyber Defense, we
are focusing on preventing students from studying only
specific security skills, such as vulnerability analysis.
Our curriculum includes the basic and essential major
subjects required by the Department of Computer Science.
Moreover, cyber security-related subjects are not only
focused on hacking, but also cover all subjects necessary
for cyber security experts such as cryptography, digital
forensics, data security and privacy law, etc.
33. How to Educate Them?
However, due to the nature of the department that should
not expose students' identities as much as possible, there
are limitations in running various internship programs.
Moreover, in this pandemic situation, it is more difficult to
promote internship programs.
34. How to Motivate Them?
Good salary. (-:
Even if the current salary is small, it needs to have a clear
future vision.
In the case of military or government institutions, it is
necessary to assign them tasks that are difficult to
experience in private companies or tasks that can make
them feel patriotic.
35. Thank you for giving me the opportunity to talk at a really fun conference! Let's meet offline at HITCON next year!!
36. Seungjoo Kim
Head of Department of Cyber Defense
skim71@korea.ac.kr
www.KimLab.net
www.HackProof.systems
Twitter : @skim71