CyberSci will reveal lessons learned and actionable takeaways that you can plug into your organization—and avoid repeating history. Here’s a peek into what the thought leaders and panelists will cover:
“If the information space of the cyber domain is the new frontier of battle, then deceptive data represents the new munition.” -- Char Sample, Fellow and Technical Director, Cybersecurity
Asymmetric threats don’t just damage our infrastructure—they create real-life complications for combat leaders in the field. A growing range of adversaries will identify and take advantage of any infrastructural weakness and deplete military operations that rely on public- or civilian-owned utilities.
Our sessions will explore the previously unforeseen ways in which threats manifest—and the gaps and opportunities that organizations can take from both civilian and military perspectives.
IoT and autonomy, together in harmony
In the era of autonomous and social communications systems, mission assurance requires resilient approaches to phishing attacks, ransomware, and foreign campaigns to undermine our most basic democratic values.
With entire infrastructures at the whim of a central network, monitoring and resilience depends on our understanding of cyber-physical systems, IoT, and cyber security analytics tooling. How can we integrate process and engineering considerations into cyber-analysis?
“CyberSci 2018 will be unprecedented in its focus on resilience and protection of virtual and physical assets. It will bring together experts to discuss core issues on how to optimize ways to mitigate threats from state and non-state actors working to compromise our interests. ” -- Baris Yener, Senior Vice President, Enterprise Cyber and Resilience
Disinformation, the great disruptor
State actors have weaponized disinformation to disrupt both civilian and military systems, threatening our fundamental assumption of trust.
Gone are the days of blindly accepting user credentials. In this environment, trust requires re-evaluation and verification, and anything (or anyone) who handles data must be aware of the potential threats from seemingly innocent sources. At CyberSci, we’ll explore proposals with novel approaches to mitigating threats from misinformation problems in this domain.