Cybersecurity threats in 2018

Cybersecurity threats in 2018
Nov 21, 2018
3 MIN. READ

This year’s cybersecurity events have revealed a glaring similarity between the public and private sectors: our operations remain vulnerable to clear and present threats.

But as we’ve seen from commercial espionage and breaches in state and federal governments, these threats are not new. Adversaries have evolved to outpace their targets. For organizations large and small, the solution of building resilience is simplebut not easy.

On December 6, influencers and executives from government, industry, and academia will converge at ICF’s Northern Virginia headquarters for CyberSci 2018. It will be the latest discussion on resilience and adaptability.

Cybersci key note image

CyberSci will reveal lessons learned and actionable takeaways that you can plug into your organization—and avoid repeating history. Here’s a peek into what the thought leaders and panelists will cover:

“If the information space of the cyber domain is the new frontier of battle, then deceptive data represents the new munition.”

-- Char Sample, Fellow and Technical Director, Cybersecurity

Mission: Assurance

Asymmetric threats don’t just damage our infrastructure—they create real-life complications for combat leaders in the field. A growing range of adversaries will identify and take advantage of any infrastructural weakness and deplete military operations that rely on public- or civilian-owned utilities.

Our sessions will explore the previously unforeseen ways in which threats manifest—and the gaps and opportunities that organizations can take from both civilian and military perspectives.

IoT and autonomy, together in harmony

In the era of autonomous and social communications systems, mission assurance requires resilient approaches to phishing attacks, ransomware, and foreign campaigns to undermine our most basic democratic values.

With entire infrastructures at the whim of a central network, monitoring and resilience depends on our understanding of cyber-physical systems, IoT, and cyber security analytics tooling. How can we integrate process and engineering considerations into cyber-analysis?

“CyberSci 2018 will be unprecedented in its focus on resilience and protection of virtual and physical assets. It will bring together experts to discuss core issues on how to optimize ways to mitigate threats from state and non-state actors working to compromise our interests. ”

-- Baris Yener, Senior Vice President, Enterprise Cyber and Resilience

Disinformation, the great disruptor

State actors have weaponized disinformation to disrupt both civilian and military systems, threatening our fundamental assumption of trust.

Gone are the days of blindly accepting user credentials. In this environment, trust requires re-evaluation and verification, and anything (or anyone) who handles data must be aware of the potential threats from seemingly innocent sources. At CyberSci, we’ll explore proposals with novel approaches to mitigating threats from misinformation problems in this domain.

Subscribe to get our latest insights