CyberIntelligenceEurope2019 2019 Sept. 25, 2019 to Sept. 26, 2019, Vienna, Austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CURRENT AUSTRIAN CYBER SECURITY POLICIES AND STRATEGIES Brigadier Deckenbacher • Overview of the developments made in cyber security across theAustrian Government• Cyber Security policies ...
OFFENSIVE INTELLIGENCE FOUNDATION Gene Yoo • What is “Offensive Intelligence”• What are we doing wrong today and where do we ...
CYBERCRIMES – GERMAN PERSPECTIVE Heiko Lohr • Current cybercrimes faced across Germany• Cooperation with the Austrian and Swiss Governments• Case studies ...
THREAT INTELLIGENCE - A MULTI-STAKEHOLDER CHALLENGE Jorg Abraham • A recap on the traditional threat intelligence cycle.• Introducing a target centric approach.• Assessing ...
CYBERCRIME AWARENESS – LITHUANIA PERSPECTIVE Egidija Versinskiene • Overview of the cybercrimes faced in Lithuania• Combating cybercrimes• Teaching awareness to government officials ...
THE FUTURE OF CYBER SECURITY IN TURKEY Mustafa Afyonluoglu • Current Cyber Security trends across Turkey• Cyber Strategy, TR-CERT and Turkey• Future Plans on ...
OSCE CYBER/ICT SECURITY CONFIDENCE-BUILDING MEASURES, A GLOBAL AND REGIONAL PERSPECTIVE Velimir Radicevic • Development of OSCE cyber CBMs• How do OSCE cyber CBMs relate to the UN?• ...
The importance for considering non-technical aspects of cyber threats Ondrej Rojcik • Analysis of intensions of cyber threat actors• Analysis of political, economic or other behaviour ...
I HATE PASSWORDS! Steven Hope • How to implement a modern password policy without upsettingusers.• Dealing with compliance, regulation and ...
SCANDINAVIAN CYBER SECURITY THREATS – FINLAND PERSPECTIVE Heidi Kivakas • Overview the cyber security challenges faced in Scandinavia andFinland• How the National Cyber Security ...
HOW THE CERT-GOV-MD OPERATES Natalia Spinu • Overview of the Cyber Security Center (CERT-GOV-MD)• Case studies of cyber breaches faced in ...
COUNTERING CYBERCRIMES AND MONEY LAUNDERING ACROSS EUROPE Neil Walsh • Current UN initiatives at countering cybercrimes• Money laundering monitoring across Europe• Different types of ...
A DEEP WALK THROUGH BIG DATA IN THE CYBER THREAT INTELLIGENCE DOMAIN (WITH A SPRAY OF COUNTER CYBER TERRORISM & AML) Raoul Giupponi • Where does it come from• What kind of data is available on the or ...
PANEL DISCUSSION: OFFENSIVE CYBER OPERATIONS AND REGULATIONS Neil Walsh , Kadri Zoetekouw What are the current offensive cyber laws?What are the procedures to respond to a cybercrime?Military-Civil ...
WHEN LAW ENFORCEMENT HACK; IDENTIFYING DARKNET SUSPECTS Ben Jones • Hackers, drug dealers and child abusers use Tor to thwart lawenforcement• Law enforcement are ...
CYBER THREAT INTELLIGENCE FOR A CYBER SITUATION AWARENESS CAPABILITY Salvador Llopis Sanchez • Cyber Threat Intelligence Concept for the military• Threat Management module for a Cyber Situation ...
TRENDS IN INTERNATIONAL LAW FOR CYBERSPACE Kadri Kaska • ‘International law applies in cyberspace’: now what?• Emerging state responses to malicious cyber activities• ...
ENFORCEMENT JURISDICTION ON THE INTERNET; A NEED FOR PROGRESS Mark Zoetekouw • The death of Territoriality has been greatly exaggerated!• Unilaterality, threath or solution?• Law Enforcement ...