CyberIntelligenceEurope2019 2019 Sept. 25, 2019 to Sept. 26, 2019, Vienna, Austria
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
CURRENT AUSTRIAN CYBER SECURITY POLICIES AND STRATEGIES | Brigadier Deckenbacher | • Overview of the developments made in cyber security across theAustrian Government• Cyber Security policies ... | |
OFFENSIVE INTELLIGENCE FOUNDATION | Gene Yoo | • What is “Offensive Intelligence”• What are we doing wrong today and where do we ... | |
CYBERCRIMES – GERMAN PERSPECTIVE | Heiko Lohr | • Current cybercrimes faced across Germany• Cooperation with the Austrian and Swiss Governments• Case studies ... | |
THREAT INTELLIGENCE - A MULTI-STAKEHOLDER CHALLENGE | Jorg Abraham | • A recap on the traditional threat intelligence cycle.• Introducing a target centric approach.• Assessing ... | |
CYBERCRIME AWARENESS – LITHUANIA PERSPECTIVE | Egidija Versinskiene | • Overview of the cybercrimes faced in Lithuania• Combating cybercrimes• Teaching awareness to government officials ... | |
THE FUTURE OF CYBER SECURITY IN TURKEY | Mustafa Afyonluoglu | • Current Cyber Security trends across Turkey• Cyber Strategy, TR-CERT and Turkey• Future Plans on ... | |
OSCE CYBER/ICT SECURITY CONFIDENCE-BUILDING MEASURES, A GLOBAL AND REGIONAL PERSPECTIVE | Velimir Radicevic | • Development of OSCE cyber CBMs• How do OSCE cyber CBMs relate to the UN?• ... | |
The importance for considering non-technical aspects of cyber threats | Ondrej Rojcik | • Analysis of intensions of cyber threat actors• Analysis of political, economic or other behaviour ... | |
I HATE PASSWORDS! | Steven Hope | • How to implement a modern password policy without upsettingusers.• Dealing with compliance, regulation and ... | |
SCANDINAVIAN CYBER SECURITY THREATS – FINLAND PERSPECTIVE | Heidi Kivakas | • Overview the cyber security challenges faced in Scandinavia andFinland• How the National Cyber Security ... | |
HOW THE CERT-GOV-MD OPERATES | Natalia Spinu | • Overview of the Cyber Security Center (CERT-GOV-MD)• Case studies of cyber breaches faced in ... | |
COUNTERING CYBERCRIMES AND MONEY LAUNDERING ACROSS EUROPE | Neil Walsh | • Current UN initiatives at countering cybercrimes• Money laundering monitoring across Europe• Different types of ... | |
A DEEP WALK THROUGH BIG DATA IN THE CYBER THREAT INTELLIGENCE DOMAIN (WITH A SPRAY OF COUNTER CYBER TERRORISM & AML) | Raoul Giupponi | • Where does it come from• What kind of data is available on the or ... | |
PANEL DISCUSSION: OFFENSIVE CYBER OPERATIONS AND REGULATIONS | Neil Walsh , Kadri Zoetekouw | What are the current offensive cyber laws?What are the procedures to respond to a cybercrime?Military-Civil ... | |
WHEN LAW ENFORCEMENT HACK; IDENTIFYING DARKNET SUSPECTS | Ben Jones | • Hackers, drug dealers and child abusers use Tor to thwart lawenforcement• Law enforcement are ... | |
CYBER THREAT INTELLIGENCE FOR A CYBER SITUATION AWARENESS CAPABILITY | Salvador Llopis Sanchez | • Cyber Threat Intelligence Concept for the military• Threat Management module for a Cyber Situation ... | |
TRENDS IN INTERNATIONAL LAW FOR CYBERSPACE | Kadri Kaska | • ‘International law applies in cyberspace’: now what?• Emerging state responses to malicious cyber activities• ... | |
ENFORCEMENT JURISDICTION ON THE INTERNET; A NEED FOR PROGRESS | Mark Zoetekouw | • The death of Territoriality has been greatly exaggerated!• Unilaterality, threath or solution?• Law Enforcement ... |