CyberWarCon 2019 Nov. 21, 2019 to Nov. 21, 2019, Arlington, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Andy Greenberg | N/A | |
China’s Influence Campaign Targeting the Hong Kong Protests: What the Data Really Tell Us | Lee Serabian | Chinese influence activity targeting the ongoing Hong Kong protests has recently received prominent media and ... | |
The Secret Life of Sandworms | Billy Mehta | The activities of Sandworm Team have been well covered over the past several years - ... | |
Full-Spectrum Information Operations for Critical Infrastructure Attacks and Disruption | Joe Slowik | Non-kinetic critical infrastructure attacks are typically viewed as limited to the field of “cyber” by ... | |
Lord of the Flies: An Open-Source Investigation into Saud al-Qahtani | Nathan Patin | The reported mastermind who oversaw the murder and dismemberment of Saudi Arabian journalist Jamal Khashoggi ... | |
Chimera | Renee Diresta | Disinformation campaigns and black propaganda are not new, but they are evolving. Recent attention has ... | |
Ch-Ch-Changes: The Arc of the CHOLLIMA’s and DPRK’s State-Driven Cyber Ecosystem | Katie Blankenship | Since 2015, DPRK computer network operations (CNO) have evolved into a self-sustaining, government-operated cyber ecosystem ... | |
Securing a Presidential Campaign | Mick Baccio | The 2020 Presidential race is in full swing, and is also the first time *any* ... | |
Iran Plays its Trumps | Saher Naumaan | Iran has shown its capacity for destructive operations over the last several years, whether signalling ... | |
Internal Influence: A Sampling of Domestic Information Operations | Kyle Ehmke | As 2016 undoubtedly demonstrated, foreign efforts to interfere in elections and politics by way of ... | |
RedSourcing: Cyberwar On a Budget | Chris Carr | N/A | |
Pride & Prejudice: Vanity in State-nexus Cyber Operations | Alex Kichen | State-nexus cyberspace attack and information operations can showcase how classically emotional motives, namely national pride ... | |
Your Persistent Friend: The Untold History of Iran’s Effectiveness in Using Social Media for Information Operations Around the World | Camille Wilson | Last year’s revelations regarding information operations campaigns run by Iranian actors revealed the tip of ... | |
The Disinformation Industry | Cindy Otis | The impact of disinformation and inauthentic behavior on social media platforms has made a significant ... | |
An in-depth look at APT33 | Ned Moran | This talk will focus on the evolution of HOLMIUM (aka APT33) cyber operations over the ... | |
Operation Ghost: The Dukes aren’t back - they never left! | Matthieu Dupuy | It is exceptionally rare for a well-documented threat actor to stay under the radar for ... |