Call for Abstract

Ethicalhacking and Cybersecurity, will be organized around the theme “Protect personal information : The identity saved could be your own”

Cyber Security 2020 is comprised of 22 tracks and 90 sessions designed to offer comprehensive sessions that address current issues in Cyber Security 2020.

Submit your abstract to any of the mentioned tracks. All related abstracts are accepted.

Register now for the conference by choosing an appropriate package suitable to you.

Hackers & Threats sessions include discussions around the growing underground economy, advanced threats, ransomware, cyber-weapons, new classes of vulnerabilities, exploitation techniques, reverse engineering, and how to combat these problems. The second track, Hackers & Threats Advanced, is technically advanced and will include live demos and code dissection.

 

 Cyber Security Threats: 

 

  • Track 1-1Malware: Malware is an umbrella term for a broad range of software designed to intrude on, compromise or harm digital systems.As cyber security researcher Dr. Samuel McQuade has noted, all malware has one thing in common: It is unwanted, unknown and/or ho
  • Track 1-2Viruses: Though often used interchangeably with the term “malware”, viruses are actually a specific subtype of malware.Viruses require action by the user, such as clicking on an email attachment or running an infected program, in order to activate.Onc
  • Track 1-3Trojan Horses: A Trojan horse is a type of malware that’s disguised as legitimate software.According to anti-malware firm Kaspersky, Trojans are unlike viruses and worms, in that they don’t self-replicate.Once activated, Trojans can give hackers the a
  • Track 1-4Phishing Phishing attacks typically take the form of an email or other communication made to look like it came from a trusted source, such as a user’s bank, university or employer. They are often sent with the intention of manipulating users into disclo

\r\n Explore emerging use cases and practical applications for this rapidly changing, transformative technology. Topics include encryption, distributed ledgers, cryptocurrency, decentralized identity, tokenization, key management, homomorphic encryption and the implications of quantum computing on encryption

\r\n

  • Track 2-1With our ever-increasingly connected global economy, the new source of cyber-attacks will come from our global supply chains.
  • Track 2-2Social Engineering - This module looks at what social engineering is, who or what are social engineers, what they want, how they get it, and how to stop them
  • Track 2-3Transactions are complex and costly.
  • Track 2-4Prone to human error or fraud — each participant has its own separate ledger. Inefficient — intermediaries are needed for validation.
  • Track 2-5Frequent delays & losses — paper-based and data stored locally by each party. Peers have a single shared ledger — once the transaction is validated, the record is permanent, secure and immutable.
  • Track 2-6A smart contract — code running on top of a blockchain that contains a set of rules under which the parties mutually agree — eliminates the need for third parties. Owner of the transaction has the power to move anything of value freely and instantly w
  • Track 2-7Eliminates or reduces paper processes, need for intermediaries, speeds up transaction times and increases efficiencies and transparency.
  • Track 2-8Enables developers to better test their code for security

Application Security & DevSecOps focuses on secure software development as well its intersection with security operations. Sessions will focus on sharing real-world, enterprise-level experience, covering topics such as secure application design, secure configurations, containerization, and secure development methodologies.

  • Track 3-1Improves the security aspect of web development
  • Track 3-2Detects security flaws as code is written
  • Track 3-3Works with your existing development tools
  • Track 3-4Enables developers to better test their code for security

 Analytics, Intelligence & Response covers the application of investigative and analytic techniques that help organizations anticipate, identify, contain, investigate, and resolve incidents in the enterprise. It also explores threat intelligence gathering, automating response, and sharing across technologies and organizations.

 

  • Track 4-1including cloud applications
  • Track 4-2marketing automation tools
  • Track 4-3 crm software
  • Track 4-4databases

\r\n Security as a service (SecaaS or SaaS) is a cloud computing model that delivers managed security services over the internet. SecaaS is based on the software as a service (SaaS) model but limited to specialized information security services. SecaaS facilitates the provisioning of managed security services from the cloud, which benefits organizations in the following ways: Reduced costs: SecaaS solutions are provided on a monthly rental basis and per license purchased.

\r\n

\r\n Ease of management: A service provider delivers total management of cloud security services, security policies, and general administration. Customizable and scalable services range from anti-virus/malware to outsourced security suite developers.

\r\n

\r\n Continuous anti-virus updates: SecaaS services ensure that security software is maintained with the most current virus definition and security updates.

\r\n

\r\n  

\r\n

  • Track 5-1BENEFITS OF SECURITY AS A SERVICE
  • Track 5-2EXAMPLES OF SECURITY AS A SERVICE OFFERINGS
  • Track 5-3WHAT TO LOOK FOR IN SECAAS PROVIDERS

This track focuses on the intersection of business and security. It features experiences and opinions of CXOs, communicating cyber-risk to the board, and the latest trends and issues in information security that impact the executive suite.

 

  • Track 6-1Types of C-Suite Roles and Titles
  • Track 6-2Chief Executive Officer (CEO)
  • Track 6-3Chief Financial Officer (CFO)
  • Track 6-4Chief Information Officer (CIO)
  • Track 6-5Chief Operating Officer (COO)
  • Track 6-6Chief Marketing Officer (CMO)

 The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization and hybrid architectures.

 

 Storage virtualization in Cloud Computing is nothing but the sharing of physical storage into multiple storage devices which further appears to be a single storage device. It can be also called as a group of an available storage device which simply manages from a central console. This virtualization provides numerous benefits such as easy backup, achieving, and recovery of the data.

 

 This whole process requires very less time and works in an efficient manner. Storage virtualization in Cloud Computing does not show the actual complexity of the Storage Area Network (SAN). This virtualization is applicable to all levels of SAN.

 

  • Track 7-1The Cloud Security & Virtualization track includes sessions on the security aspects of using and leveraging cloud services, virtualization technologies/services, segmentation, deployment models, network function virtualization and hybrid architectures.
  • Track 7-2Types of Storage Virtualization
  • Track 7-3Storage Virtualization Risks
  • Track 7-4Methods of Storage Virtualization
  • Track 7-5Why Storage Virtualization is Important?
  • Track 7-6How Storage Virtualization Apply?
  • Track 7-7Advantages of Storage Virtualization

 This academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

 

  • Track 8-1Modern cryptography concerns itself with the following four objectives:
  • Track 8-2
  • Track 8-3Confidentiality: the information cannot be understood by anyone for whom it was unintended Integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected

What does the world look like in 2025? What technology, process and staffing considerations should you be making now to prepare for whatever may lie in the future to put you ahead of the adversary? Cybersecurity Future Proof: 2025 delivers a rare look into the security crystal ball and includes traditional presentations and interactive lab-like sessions, designed for the cross-section of world Conference 2020 (CYBER SECURITY) attendees from technology, business, academia, policy and law, to help frame your future thinking.

 

  • Track 9-1“Threat information sharing” will become more balanced between companies and the government as red tape is removed.
  • Track 9-2Despite the proliferation of new tools for data computation and data security, there will be a massive lack of good data scientists and cybersecurity professionals.
  • Track 9-3We have a massive wealth of data on threats but we have little in the way of proactive prevention of threats – but this will change.

 This track covers the creation and implementation of risk management frameworks, compliance-related sessions on standards, and instituting governance across the extended enterprise. This track also contains sessions on a wide variety of security metrics and measurements.

\

  • Track 10-1Understand and prioritize stakeholder expectations
  • Track 10-2Set business objectives that are congruent with values and risks.
  • Track 10-3Achieve objectives while optimizing risk profile and protecting value.
  • Track 10-4Operate within legal, contractual, internal, social, and ethical boundaries.
  • Track 10-5Provide relevant, reliable, and timely information to appropriate stakeholders
  • Track 10-6Enable the measurement of the performance and effectiveness of the system.

This track explores how people make trust choices, innovative ways to secure the human, and how classic attacks and emerging threats now include a human element. Topics include social networking/engineering, insider threats, information operations, and user behavior analytics.

 

  • Track 11-1That collision of people and planet is something that Balog, also the subject of the 2012 documentary Chasing Ice, has been capturing in photographs for decades. In The Human Element, his work is framed through the four ancient elements: earth, air, fire
  • Track 11-2People, Balog suggests, are a fifth element — a force of nature, too. People are driving climate change, and their lives are being altered by it.

This track covers the processes, technologies and policies for managing and controlling digital identities across the extended enterprise.

 

  • Track 12-1Disgruntled employees, contractors and insiders who damage systems and steal intellectual property. Terrorists seeking low cost, low risk and high gain hacking opportunities.
  • Track 12-2Professional cyber thieves who steal and sell information. Adversarial nations or groups who use the Internet for cyber warfare, IP theft and civil disobedience.

\r\n The Law track explores topics ranging from unintended consequences due to legislation, legal rulings, liability, and emerging issues on the legal landscape.

\r\n

\r\n  

\r\n

\r\n The statute also defines “security control,” “malicious cyber command and control,” and “cyber threat indicator.”

\r\n

\r\n Although these definitions help to illuminate the purpose of the legislation, the Cybersecurity Act does not directly explain what lawmakers meant by “cybersecurity.”

\r\n

\r\n A day rarely passes without another report of a major cybersecurity incident. Hackers routinely breach the systems of retailers, stealing consumer credit card data, social security numbers, and other valuable personal information.

\r\n

\r\n  

\r\n

  • Track 13-1Attackers launch distributed denial-of-service attacks, knocking some of the most popular websites offline for hours or days.Home security webcams become remote spying devices. Even the U.S. electoral system is compromised by hacks of the email accounts o
  • Track 13-2In the increasingly frequent news coverage of these attacks, commentators, and lawmakers demand immediate and swift legal solutions to prevent further damage. The constant media coverage begs the question: How well do our existing laws address cybersecuri

\r\n This track provides focused discussion on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms. It will also explore the challenges posed by the Internet of Things and the implications of the interconnectivity of everything.

\r\n

\r\n  

\r\n

\r\n  

\r\n

  • Track 14-1mobile and embedded devices have become an essential part of life and work. As such devices represent many and varied combinations of technologies, they have unique security and privacy issues that potentially impact users, developers, service providers,
  • Track 14-2This course will focus on various aspects of security and privacy that are faced by mobile and Internet of Things devices, including aspects of wireless communication and networking, mobile computing, data analytics, security, and privacy. The course will
  • Track 14-3One of the main goals of the course is to improve knowledge and awareness of security issues faced by mobile application developers, embedded system builders, and smart system designers. Material will cover standards, best practices, and research challeng
  • Track 14-4In addition to individual homework assignments, students will participate in an intensive group project involving significant research, development, and experimentation. Graduate standing is required to register for this course.

\r\n This track features sessions on current and proposed government strategies, policies, legislation, and standards that could shape the direction of cloud computing, cyber-norms, public private-partnerships, Big Data initiatives, cyberthreat intelligence sharing, industry standards, and security compliance requirements for years to come.

\r\n

\r\n  

\r\n

\r\n In Germany and Austria the Nationalrat), in which he announces the intended policies of the government during the next legislative session. The statement is not legally binding, but is a significant constitutional commitment for the parliament and the government. During the legislative period the federal government, through the Chancellor and the ministers, can give statements to the parliament through the chancellor or the ministers concerning current political themes. It cannot however be obliged to give such statements.

\r\n

\r\n In Belgium, the federal government holds its policy statement (Beleidsverklaring) on the second Wednesday in October; its northern region of Flanders states its \r\n

  • Track 15-1September Declaration (Septemberverklaring) on the fourth Monday of September. In the Netherlands, every third Tuesday in September is Prinsjesdag: the king holds the Speech from the throne (Troonrede) and the government will state its policy and budget p

\r\n This dedicated half-track explores the privacy issues related to Big Data, social media, cloud, legislative changes, IoT, and other emerging technologies and processes in the enterprise.A broad multicultural literary tradition going to the beginnings of recorded history discusses the concept of privacy.One way of categorizing all concepts of privacy is by considering all discussions as one of these concepts:

\r\n

\r\n the right to be let alone the option to limit the access others have to one's personal information

\r\n

\r\n secrecy, or the option to conceal any information from otherscontrol over others' use of information .

\r\n

\r\n  

\r\n

\r\n  

\r\n

  • Track 16-1about oneself
  • Track 16-2states of privacy
  • Track 16-3states of privacy
  • Track 16-4protection of intimate relationships

\r\n
\r\n Professional Development covers technical and business/management training, professional certifications and career development, diversity as well as staff and personnel management. 

\r\n

\r\n  

\r\n

\r\n Benefits

\r\n

\r\n Reduce the risk of a cyber security breach

\r\n

\r\n Instil proper behaviour in to the people who come in to contact with your valuable assets

\r\n

\r\n Protect your brand and reputation and avoid the resulting media attention

\r\n

\r\n Modules available include:

\r\n

\r\n  

\r\n

  • Track 17-1The Threat - This module provides an overview of cyber threat landscape faced by organisations, outlining the impacts of cyber security incidents as well as tactics and strategies to aid cyber defence.
  • Track 17-2Passwords and password management - Passwords are the keys to your sensitive data when using websites, email accounts and your computer itself (via User Accounts). This module is designed to provide users with an understanding of the importance of strong
  • Track 17-3An introduction to hacking - This module introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools and techniques used by hackers and security professionals alike.
  • Track 17-4Phishing attacks - This module takes a detailed look at what phishing is, why it poses a threat and how users can minimise their exposure to phishing attacks.
  • Track 17-5People risk / insider threat - This module looks at the weakest security link in any organisation – its people. Most organisations have good technology, but people often bypass controls or forget procedures. Guidance will be provided on how to help peop
  • Track 17-6Bring Your Own Device (BYOD) -This module introduces users to the growing trend of BYOD, analysing the Pros and Cons as well as providing guidance on BYOD policy considerations. Safe internet use - While the internet offers us many benefits, this module i
  • Track 17-7Social networking - Social media has revolutionised the way we communicate with others. We can now talk one-to-one or to large groups of people at once from the convenience of our computer or mobile device. This module identifies the ways in which ID frau
  • Track 17-8Antivirus software and installing updates – This module explains why it is necessary to install antivirus software and patches.
  • Track 17-9Physical security - This module highlights the importance of physical security as part of an overall information security strategy and the risks of not considering it – be it as simple as locking your doors and desk/file cabinet drawers, and a clear des
  • Track 17-10Removable Media – This module explores the benefits of limiting the use of removable media and producing policy to support this.

 This track explores the cascading security requirements of the extended enterprise and the classification, tracking, and protection of data. It covers data protection regulations, DLP and threats to sensitive data, and emerging trends, as well as vendor and partner SLAs, supply chain mapping, continuous enforcement, and how to future-proof vendor contracts and risk assessments for evolving requirements.

5 Cybersecurity Best Practices for your Supply Chain Ecosystem

  • Track 18-1 Assess Your Readiness- It’s essential to have a plan before you start, but most of us are too close to our own systems to evaluate them objectively. To learn where you stand with your supply chain’s cybersecurity, hire a third-party organization to p
  • Track 18-2Extend Security Guidelines to Your Vendors- When you share data with suppliers and vendors, you’re allowing essential communication that’s vital for your operations as well as theirs. But you’re also opening up access to your internal systems.
  • Track 18-3Test and Repeat- Security is never a set-and-forget exercise. Cybercriminals are creative and motivated, and attackers are constantly adapting to defenses. That means cyber security plans must be updated frequently. At LynnCo, we undergo a formal audit ev

\r\n This track includes interesting speakers and sessions on a wide range of topics not found anywhere else during the week.

\r\n

\r\n Too good to be the whole truth

\r\n

\r\n So, first the good part: As anybody in the cyber security industry knows, it can feel a bit like an endless game of Whac-a-Mole. Patch one vulnerability, and the bad guys discover another one—or two or three or a dozen. So it’s nice to hear when the good guys whack the mole quickly

\r\n

\r\n  

\r\n

  • Track 19-1Is open source a bit too open? So, starting from the top. If you’re a fan of open source software—and most people must be, given that it is now at least a component of nearly every application out there—a new report has some good news, along with so
  • Track 19-2Apocalypse soon? Well, for decades we’ve been hearing about the growing threat of a major cyber attack on U.S. critical infrastructure that could take down portions of the grid, cripple or destroy water distribution systems, shut down healthcare facilit

\r\n Security Strategy & Architecture covers the policy, planning, and evolving areas of enterprise security architecture and the management issues of implementing successful security programs. Sessions will include the structures and tools needed to build a security program that enables and enhances business processes, cyber-resiliency, and cyber-hygiene.

\r\n

\r\n  

\r\n

\r\n  

\r\n

  • Track 20-1DXC leverages the unparalleled experience of its industry-aligned consultants to help you: Perform a security architecture and strategy review to enhance your security functionality, reduce operating costs and significantly reduce risk
  • Track 20-2Align your security strategy with business needs, protect sensitive data, guarantee compliance with local laws and security standards, and increase the maturity of security processes and governance Achieve cost-effective security transformation and minimi
  • Track 20-3Align your security strategy with business needs, protect sensitive data, guarantee compliance with local laws and security standards, and increase the maturity of security processes and governance Achieve cost-effective security transformation and minimi
  • Track 20-4Significantly reduce the risks inherent in production systems, assure data privacy and increase your ability to respond to and manage cyber attacks

\r\n Listen to a spectrum of experts and security issues delivered and discussed by leading-edge companies.

\r\n

\r\n Sponsorship requests should be addressed to Marie-Aude Hulshoff at secyber49@gmail.com  and include:

\r\n

\r\n  

\r\n

\r\n  

\r\n

  • Track 21-1a brief description of the goals of the short course or small conference
  • Track 21-2a proposed schedule
  • Track 21-3a list of suggested presenters
  • Track 21-4a preliminary budget plan, detailing income source (with registration fee if applicable) and foreseen expenses information regarding the location and infrastructure

\r\n This track focuses on the most interesting and challenging elements of current and emerging security infrastructure, providing a highly technical view on strategic planning, implementation, orchestration, vulnerability assessment, and security monitoring for the defense of networks, endpoints, operational technology, and systems.

\r\n

  • Track 22-1Trend 1: Serverless computing Serverless computing, and in particular the capability known as function platform as a service (FPaaS).
  • Track 22-2Trend 2: Artificial intelligence (AI) impacts According to Gartner, global AI derived business value will reach nearly $3.9 trillion by 2022. From an I&O perspective, IT leaders must ask: What is the value of using AI to support growing infrastructures.
  • Track 22-3Trend 3: Network agility (or lack of?) The network underpins and enables everything IT and the business rely on — cloud services, IoT, edge services — and will continue to do so moving forward.