[Supported Event] Webinar “Effective recipe book for a Cyber Resilient Approach”

  • Date: Friday 29th of January 2021
  • Time: 16:00 Singapore – 09:00 Italy – 15:00 Vietnam

ICCS is glad to present the first event of its Committee Land, Aerospace, Naval and Security, SciEnce & Technology (LANSSET) on “Effective recipe book for a Cyber Resilient Approach” run by CY4GATE S.p.A.

The increasing speed of the technology evolution, together with the exchanging of the overwhelming amount of data, are amplifying the risks of exposition to cyber threats.

Who are the new threat actors? Which are the new Attack techniques? How to be cyber resilient? Which are the benefits of cyber tranquillity?

In this webinar ICCS will give you an overview of the evolution in the cyber domain, giving some answers to the above queries.

SPEAKERS

  1. Andrea Pompili – Cy4gate Chief Scientist
  2. Angelo Ferraris – Cy4gate International Sales
  3. Katia Redini – Cy4gate Enterprises Sales
  4. Andrea Melegari – CEO advisor
  • 3:00 PM — 3:10 PM
    Welcome address by ICCS
  • 3:10 PM — 3:25 PM
    A new perimeter with new threat actors and new attack techniques
    1, Company perimeter don't exist any more ---- 2, Full softwarization of all the business assets: IoT/SCADA/Wireless/Network ---- 3, Who are the attackers: APT Groups, Hacktivism, Cybercrime ---- 4, The attacker math: targeted attacks, cyber propaganda, scalable campaigns ---- 5, Examples of experienced cases
  • 3:25 PM — 3:40 PM
    From Cyber Security to Cyber Resiliency
    1, Limitation of the current Cyber Security Approach ---- 2, Know asset limitations and survival capabilities to build a resilient network ---- 3, Threat Intelligence for Situation Awareness, indicators and Attack TTP Mappings ---- 4, The NIST Cyber Security Framework: a strong baseline for Resiliency ---- 5, Identify and Protect: the SSDLC to create secure software and secure systems by design ---- 6, Detect and Respond: build an effective survival approach improving threat intelligence oriented anomaly detection and applying resiliency oriented responses ---- 7, Examples of experienced cases
  • 3:40 PM — 3:55 PM
    The right choice for the right company: vademecum of suggested approaches according to the business sector
    1, Cluster of companies per sector and cyber perimeter to be protected ---- 2, What's the best cyber resiliency flavor for each cluster ---- 3, Examples of experienced cases
  • 3:55 PM — 4:10 PM
    Cybersecurity Is a Business Decision
    1, Threat oriented decision process ---- 2, Effective investment on business impact mitigations ---- 3, Situation awareness and full countermeasure control ---- 4, Continuous Intelligence Capabilities ---- 5, Examples of experienced cases
  • 4:10 PM — 4:25 PM
    Q&A
  • 4:25 PM — 4:30 PM
    Closing Remarks