Cyber is a fascinating labyrinthine world, harboring a wealth of constantly evolving opportunities and breakthroughs, dangers and challenges, and new actors and frontiers. In a selection of talks, I present the most current developments in the field, combining research and current affairs in accessible language.
COVID-19 has changed the way we work and live, opening new opportunities for attackers and challenges for cyber defense. Cyber criminals and governments alike are working hard to turn the tables in their favor- stealing trade secrets, vaccine information, and more. What has changed in cyber during COVID-19? How are nations and organizations coping? Who takes advantage of the situation and how?
Russia, China, North Korea and Iran, as well as the U.S. and Israel, are considered leading countries in terms of offensive cyber capabilities. Who are the main players in the international cyber arena? What are the key threats? What is the global balance of cyber power?
communication services, navigation services, weather forecasting, natural
disasters, and more are all provided by space, which is one of the most
strategically important infrastructures for national security and humanity as a
As the war in Ukraine demonstrated, damage to satellite communications shut down communications on earth immediately. How should we prepare for the risks? And what can be learned from Russia’s attempts to disable satellite communications in Ukraine?
AI technologies are making rapid inroads into every aspect of our life. The combination of AI and offensive cyber capabilities can create new threats with far-reaching scope and capabilities. AI systems can themselves be targeted, posting yet another threat. What are the new threats that come with this new technology? And how does it affect our daily lives?
Cyber threats are relevant to every organization today. What are the main threats? Who are the actors? What is threat modeling? How to conduct a threat assessment and management process? This practical talk addresses everything an organization’s Chief Security Officer needs to know.