- Designing technology, legislative and regulatory frameworks
- Governance, effectiveness and efficiency
- Self-reliance through R&D
- Capacity building
- Compliance and law enforcement
- Regions should collaborate first
- Multilateral information sharing
- International cooperation
1. Tip of the iceberg. What we know and what we are worried about
2. Origination of attacks
1. The reality of the situation is well hiddenViewpoint 3: National strategies
2. Industry and institutions working together
1. Sharing talent and knowledge is the only way to succeed
2. Live attack and incident data sharing
Director of Oman National CERT
- Impact of virtual border crossings
- Legally and illegal data access
- Secure transmit paths
- Encryption and backup
- Security and monitoring
- Viral and malware technology for mobile environments
- Enhanced mobile handshake between corporate and public environments
- Centralised data analysis solutions for cloud technology
- Forget what you think you know. In reality you know about 10% of what is really happening.
- How easy is it to DDOS?
- Loss of trust from customers
- Data loss = $
- Access loss = $
- Brand damage = $
- Identifying genuine traffic
- Responsive and threat aware firewalls
- Security compliance and standardisation
- Cloud-based CDN routing
- Human behaviour analysis
- Layer 7 attack protection
- ISP collaboration and DDOS mitigation
- Analyse, understand and secure
- Dormant intrusion which triggers later
- Know your weaknesses, the hackers do!
- Digital forensics
- Fraud detection: Monitoring and protecting accounts
- Secure keys and secure payment
- Secure mobile payments. NFID
- Memory forensics
- Real time network analysis
- Behavioural analytics
- Black outs and loss of business
- Incorrect actions and manipulation of processes
- Physical damage and loss of life
- Political motivations
- Secure smart grids
- Hybrid security, corporate and industrial strategies
- Human intelligence and training methodologies
He developed the Strategy and Training Development Plan for Oman CERT during its inception and.
Hord Tipton is the Executive Director at (ISC)², the largest not-for-profit membership body.
With more than 20 years of experience in Cyber Security, Andrea Rigoni is currently the.
Cyber Crime Adviser
Raoul ‘Nobody’ Chiesa – after having been among the first Italian hackers from 1986 to.