ICCWS Mini Track Submission Topics
The following Mini Tracks are listed below:
- The art of Cyberwarfare
- Deception in Cybersecurity
- Enterprise Security Architecture: What Value does it Bring to your Organization?
- Cyber Wargaming: Teaching, Testing, Training
- The double-edged sword of Artificial Intelligence in Cyber Warfare
- Economics of Cybersecurity and Risk
Mini Track Call for Papers on The art of Cyberwarfare
Mini Track Chair: Dr Noluxolo Gcaza, CSIR, Pretoria, South Africa
In this era, the use of computers, online control systems and networks as a means to disrupt the activities of a state and organization is prevalent. Alongside this, is the deliberate attack of information systems for strategic or military purposes that is continuously on the rise. This use of computer technology as a warfighting domain is deemed as cyberwarfare. Cyberwarfare is defined as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption. It is therefore not a surprise that some governments have made this kind of warfare an integral part of their overall military strategy, with some having invested substantial amounts of resources to establish cyber warfare capabilities.
Cyber warfare is a cross-national issue that requires a multi-disciplinary perspective in order to fully comprehend. It encompasses a variety of attacks, actors and conflicts that may be considered as aspects of cyber warfare. This is a call for a focused effort to decipher the concept of cyber warfare and its impact on national security. As such, this track seeks to synthesize an in-depth understanding of the concept of cyber warfare. Fundamentally, this track serves as a convening platform for academic scholars, military personnel, and practitioners to share and discuss their epistemological and methodological perspectives on cyber warfare.
Topics of interest include, but are not limited to:
- Cyber counter-intelligence
- Military response to cyberwarfare
- Cyber weaponry
- Cyberwarfare attack modes
- National Security
- State-sponsored cyber attacks
Mini Track Call for Papers on Deception in Cybersecurity
Mini Track Chair: Dr. Char Sample, ICF Inc. Adelphi, MD, USA
Deception, defined as the act of hiding the truth, especially to get an advantage, has a long history in conflict. It has been an important tool on battlefeilds and has now also become an asset in the cyber arena. The cyber environment can be particularly vulnerable to deception due to the lack of sensory feedback from the physical environment. As such deception can occur in cybersecurity where operators and analysts are dependent upon the data received from artificial sensors.
Topics of interest include, but are not limited to:
- Adversarial machine learning techniques
- Machine learning Data poisoning and countering techniques
- Attaining security in Zero Trust architectures
- Methods to identify and counter deceptive data (including but not limited to Fake News)
- Methods in support of data resilience, or data verification
Mini Track Call for Papers on Enterprise Security Architecture: What Value does it Bring to your Organization?
Mini Track Chair: Ed Covert, Warner Bros. Entertainment, Burbank, California
An Enterprise Security Architecture (ESA) is a comprehensive plan to protect organizational information and assets, integrated with other initiatives. The ESA provides a means of collecting critical information in a collaborative way and ensuring a common set of capabilities to create a holistic cybersecurity approach for the organization.
The ESA lets the organization protect its information in a way that is internally consistent with the frameworks and governance models the rest of the organization e.g. business objectives, technology strategy, and CISO goals. The ESA needs to address and align to the threats the organization faces and the regulatory environment in which they operate.
This session will discuss the value of the ESA and the various ways of creating one using the Sherwood Applied Business Security Architecture (SABSA) process. Topics invited to the mini-track include by are not limited to:
- Enabling alignment of security strategy with organizational objectives
- Enabling prioritization of security and control solutions
- Ensuring each business security/control concern is addressed
- Enabling a project-focused approach to security development
- Providing traceability of business needs to security controls and mechanisms
Mini Track Call for Papers on Cyber Wargaming: Teaching, Testing, Training
This track seeks to present current research, lessons learned, and future directions for cyber education and training through games and gamification of curricular material.
Games have been used since the 18th century to teach skills, test plans or procedures, and train people to work together. Used by the military, government, and industry, games have expanded and adapted to current needs. Many cyber operations appear in modern games but the science of how to put them together so that they yield desired results is still more an art than a science. How can cyber educators and practitioners create and administer games that fulfill specific teaching, testing, and training functions? What techniques can be mined from the over 200 years of gaming history? What new tools must be developed to make modern cyber games objective, realistic, and repeatable? Topics of interest include, but are not limited to:
- Environments for cyber games
- Assessment mechanisms and approaches
- Scenario development
Mini Track Call for Papers on The double-edged sword of Artificial Intelligence in Cyber Warfare
Mini Track Chair: Pardis Moslemzadeh Tehrani, University of Malaya, Kuala Lumpur, Malaysia
Information warfare is a key point in winning any world conflict and has led states to seek the benefits of emerging technologies. In the context of warfare, artificial intelligence (AI) is rapidly becoming the center of a global power play. It is leading societies towards a new algorithm of warfare that knows no boundaries or borders and is well on its way to revolutionize warfare. The trend is leading to nations continueing to develop the AI automated weapons system.
As seen in the past year, cyber-attacks powered by artificial intelligence has become a real thrteat with the first AI-powered cyber-attack was detected in India last year. And expectations are that these attacks will continue to grow in threat level and regularity and preventing them will become more problematic. The use of AI and machine learning in cyber operations opens a range of dangerous scenarios from the use of AI-powered autonomous weapons in cyber warfare to AI-machine learning methods for conducting offensive cyber warfare. AI in cyber warfare is a double-edged sword as it can be used both offensively and defensively. Machine learning and automation have become necessary tools of states to defend themselves as well as to launch attacks on other states.
AI powered autonomous weapons pose a great threat and can be worse than traditional computer viruses as they employ military means of identifying and engaging targets without human intervention. Developments in AI autonomous weapon systems (AWS) pose complex security challenges. Such emerging technology will shape and transform the conduct and consequences of cyber warfare and impact national security and defence systems as well as lead to the proliferation of violence and humanitarian responses.
Topics of interest include, but are not limited to:
- Artificial intelligence as a dual technology in cyber warfare
- AI algorithm in cyber attack
- The ethical and cyber security issues of AI in cyber warfare
- Armed drone and Autonomous weapon in warfare
- New Warfare Technologies
- The legality of new weapons in cyber warfare under IHL
Mini Track Call for Papers on Ethical, Social, and Legal Issues in Cyber Warfare and Cyber Security
Mini Track Chair: Prof.Richard L. Wilson, Towson University in Towson, MD, USA
As technologies continue to grow exponentially the Ethical, Social, and Legal aspects of Cyber Warfare and Cyber Security are in need of being continually re-examined. By examining the Ethical, Social and Legal principles that are currently employed to address issues of Cyber Warfare, Information Warfare, Media Warfare, and Cyber Security we can undertake the further project of attempting to determine what Ethical, Social and Legal principles should guide our thought about these subjects in the future. Recently a number of issues have also arisen involving online Terrorism and online extremism. Ethical, Social, and Legal analysis can provide a foundation for making policy decisions about some of the problems related to all of the above topics.
Topics of interest to this mini-track include, but are not limited to:
- Ethical, Social, and Legal issues of:
- Cyber Warfare
- Information Warfare
- Social Media Warfare
- Ethical, Societal, and legal impacts of online extremism.
- Ethical, Societal, and legal impacts of online terrorism.
- Societal impacts of Cyber Warfare, Information Warfare, and Social Media Warfare.
- Societal impact of online extremism.
- Societal impact of Domestic Terrorism.
Mini Track Call for Papers on Economics of Cybersecurity and Risk
Mini Track Chair: Dr. Unal Tatar, University at Albany – SUNY, USA
Cyber risk has recently become one of the top global risks in terms of economic implications for businesses and the number one risk in Europe, East Asia and the Pacific and North America regions. Due to this governments and international organizations have been responding to cybersecurity risks by publishing standards, best practices and regulations.
Another emerging field of cybersecurity risk management is cyber insurance. Cyber insurance markets are emerging all over the world, including in the US. The global scale of cyber insurance is expected to double in under a decade – making it one of the most important growth areas in cyber risk management.
This session will discuss cybersecurity from and economics and risk management perspective. Topics of interest to this mini-track include, but are not limited to:
- Investment in information security
- Cyber-risk quantification and cyber-insurance
- Cost of cyber-attacks and cybercrime
- Cybersecurity policies, standards and regulations
- Incentives for information sharing and cooperation
- Economics of privacy and anonymity
- Behavioural models of security and privacy