Wednesday 23 June 2021
How Cyber Warfare and Information Operations are changing Everything!
Presented by Dr Leigh Armistead
This one-day seminar presents an overview of the key issues which are of concern in today’s challenging world of cyber warfare and cyber security.
There is increasing concern that our systems are vulnerable to attack from numerous sources and that these attacks are becoming more and more sophisticated. It is therefore essential to understand these threats and to be able to create and implement a robust policy of self defence.
This programme takes participants through all the important issues to be considered to ensure that cyber attacks do not disrupt an organization’s operations.
1000 Cyber Warfare Threat
The inter-complexity of 21st century society through a national lens, a corporate lens and a personal lens and society’s increasing dependence of cyber assets and their effective functioning.
Cyber attacks at a National level, a Corporate level and a Personal level and the drivers for the need to increase levels of cyber security at a national level, a corporate level and at a personal level. The need for continual review as Cyber Warfare incidents continue to increase.
1100 Cyber Security Challenges
Cyber has changed the nature of risk and the fundamental responses, to include minimising the possibility of a loss and the creation of operations continuity programmes designed to survive whatever loss is incurred. This discussion evaluates options for meeting these challenges and prioritising risk.
1230 Social Media and IW
Warfare is now conducted using social media which challenges traditional models and this lecture focuses on developing a new processes, variables and possible solutions. This analysis will review the financial and operational dimensions, as well as potential new approaches.
1330 Cyber Forensic Challenges
Forensics has changes with cyber creating new challenges, and this topic focuses on addressing these issues, for all stakeholders. Key to this discussion will be the tools and training required to meet these changing threats, as well as the privacy and legal requirements for audits.
1430 Cyber Threats to ICS
The threat to Industrial Control Systems is growing fast, as actors understand their ability to damage or destroy these key components. Greater focus is being leveraged on these resources with the need for continuous feedback, and the identification of potential internal and external exposures.
1530 Privacy and Cyber Espionage
This lecture centers on the nature of potential losses and their associated risks including accidents, malware intrusions, denial of service, theft of personal data and other assets, corporate and personal identity theft from a privacy aspect. Discussions will talk to the never-ending nature of the cyber espionage challenge.
1630 Close of day
The Seminar will run from 10:00 until 16:30.
To reserve a place and any further details please email Elaine Hayne on Elaine@academic-conferences.org