Download Centre

video_lgFeatured Video

video_lg Videos

  • The Russian/Georgian Cyber War
    John Bumgarner, Chief Technology Officer of the U.S. Cyber Consequences Unit, discusses the report on the Russian/Georgian cyber war, the impending reality of other state-to-state cyber wars, and the requirement of looking at smart and green energy as a possible vulnerability issue.
  • Former CIA and SOCOM Specialist Exposes Net War Realities
    Defence IQ had the privilege of speaking with John Bumgarner, Chief Technical Officer of the US Cyber Consequences Unit, a non profit research organisation dedicated to studying economic and strategic impacts of cyber warfare.
  • Vulnerability Risks of Personal Information Online
    Amit Yoran, CEO of Netwitness Corp. and former Director of Cyber Security at the Department of Homeland Security, speaks with at Cyber Warfare 2010 on the vulnerability risks of personal information online, and the lack of law enforcement cooperation in tackling cyber crime.
  • Professor Dan Kuehl, National Defence University
    Prof. Kuehl explains what the biggest developments in the cyber domain have been this past year, and what form he believes interoperation should take to properly ensure national and international security.
  • Frank Coggrave, Guidance Software
    Cyber Warfare sponsor Guidance Software returned to support the event and continue efforts to bring together military and industry. Representative Frank Coggrave digs into the issues of the rapid evolution of the cyber threat and the need to build sturdier bridges between the private and public sectors, a requirement echoed by the experts at this year’s event.
  • Former Security Minister Hints at UK Cyber Attack Capabilities
    This segment of our interview with Admiral the Lord West of Spithead, former Parliamentary Under-Secretary of State for Security and Counter-terrorism under Gordon Brown, reveals how serious and organised crime has brought private and public sectors to their knees

articles_lg Articles

  • India Feels Its Way Through National Cyber Security Infrastructure Upgrades
    It only takes a brief look at the year’s headlines to see the rapidly increasing concerns of India’s top political and military leaders surrounding cyber security within India. Outlining the scale of the problem, Shri M M Pallam Raju, the Minister of State for Defence, has gone on record specifically citing what he calls “the [cyber] war being raised by our adversaries”, as one that was "vital" to the Armed Forces as well as the "telecommunication and cyber infrastructure of national and strategic assets". It's is this danger that is compelling the Indian military to (as Defence Minister Shri A K Anthony puts it) “continuously enhance its ability to absorb latest technologies in collaboration with the Industry and R&D establishment
  • What does the India-US cyber pact mean for global policy?
    The recent news of a freshly formed agreement between the United States and India to benefit its mutual ‘cyber shield’ has generated interest from all quarters, not only because this is an open affirmation that national security can only come about from international cooperation, but because it may trigger a new direction for all nations in their mission for cyber resilience…
  • London 2012 Opens Window of Opportunity for Cyber Criminals
    June 2011
    Contributor: Contingency Today
    As the Olympics near, the billions pouring into business and local government will attract criminals and siphoning off money from business accounts will be hard to detect, says Iron Keys' Jeremy Freeman.
  • Successful Cyber Attacks Reveal Chinks in US and UK Security Reviews
    June 2011
    Contributor: Chris McIntosh
    Warfare is constantly evolving along with advances in technology. In the past few years, and especially in recent months, it has become apparent that the cyber world is the next theatre of battle. One only has to look at statements that the Ministry of Defence and Treasury have come under cyber-attack; the development and release of the Stuxnet virus; the large-scale hacking attack against Sony; or the Lulzsec hacking collective’s ongoing attacks against everyone from computer game companies to the CIA and US Senate. The message is clear: cyber-attack needs to be a significant factor in any defence strategy.
  • India launches its own Cyber Command
    Almost two years after the United States established its cyber command (USCYBERCOM), the Indian Ministry of Defence has announced its intention to launch its own central command in order to consolidate efforts for combating the increased threat of cyber attacks.
  • ISM Whitepaper: Cyber Risk in Critical National Infrastructure
    In the realm of cyber security, threats are treated in isolation, analysed in separation from the actor behind the attack, or the cyber weapon that is utilised in the incident. This may have been because of a lack of resources and skills, or it may be because organisations do not see how the identity of the actor affects their tactical choices in deploying its defence, unless the attack was perpetrated internally.
  • Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare
    The emergence of the 'Stuxnet Worm', a Windows-based malware programme designed to upset and reprogramme large-scale industrial computer systems, has been described by experts as the first recognised 'cyber weapon'. Where most cases of malware attacks have been motivated by financial reward or general disruption, Stuxnet has been clearly designed to target critical infrastructure.
  • CIA, US Military Step Up Cyber Space Security Strategies
    Cyber space security is becoming an increasingly big issue among the major world powers, with the United States and the UK recently announcing new initiatives in the fight against Web-based attacks. On April 26th, the CIA unveiled the blueprint for the organisation's future.
  • Former British SIS Agent Warns Public of Modern Cyber Terror Threat
    Nigel Inkster is from the International Institute for Strategic Studies and has served in the British Secret Intelligence Service, focusing extensively on transnational issues, and eventually taking the post of Assistant Chief and Director for Operations and Intelligence. Nigel now serves the IISS in the role of Director of Transnational Threats and Political Risk.
  • European Banking Scandal Reveals Cyber Criminals On the Loose
    The National Bank of Ukraine has issued a letter to all of its branches alerting them to a sharp rise in financial cyber crime, after the nation’s cyber security service identified a widespread gap in the awareness and precautions taken by local banks.

podcasts_lg PodCasts

  • How Estonia is pioneering multinational cyber partnerships
    The Senior Advisor to the Undersecretary at the Estonian MoD shines a light on the pioneering work that Estonia has contributed to global cyber security measures, and provides insight into the progress being made in regards to developing cyber policy, an integrated CERT team, and the underlying issue of improving cyber forensics to ensure future accuracy when it comes to identifying the source of a network attack. Heli Tirmaa-Klaar will be conducting a presentation at this year’s event.
  • Professor Peter Sommer Discusses the Challenges of Cyber Crimes
    Professor Peter Sommer from the London School of Economics and Political Science discusses the challenges of dealing with today's cyber crimes, including its laws, politics and issues with identification
  • Mutually Assured Disruption: waking up to the era of Cyber War
    The U.S. Cyber Consequences Unit (US-CCU) concerns itself primarily with large-scale cyber attacks that could potentially be mounted by criminal organizations, terrorist groups, rogue corporations, and nation states. Its Research Director for Security Technology talks with Defence IQ about the very real consequences we could be facing if firm progress is not delivered quickly enough.
  • Head of USAF Cyber Strategy: “All warfare in the 21st Century is going to be dependent upon cyberspace”
    Col. David Fahrenkrug, director of the US Air Force’s CSAF Cyber Strategic Studies Group, talks candidly to us about the structure of the United States’ cyber defence structure, how our need for battlespace information evolved from a need for air dominance, and the controversial use of offensive measures to defend a nation’s infrastructure. All comments and opinions are those of Col. Fahrenkrug and do not necessarily reflect those of the US Air Force.

articles_lg Whitepapers

  • Detect and Survive
    As Guidance Software explains in this whitepaper, the ability to detect complex cases of computer misuse within an organisation, whether perpetrated by outsiders or from within, is vital to the continuing survival of the company. But as computer criminals refine their techniques, so must the detection methods evolve. To enable this, modern-day IT departments need to employ techniques and tools previously only available to forensic investigators within the law enforcement community.
  • Countering advanced persistant threats with cyber forensics
    Many security teams have been caught unprepared by recent advances in targeted attacks. Multi-stage, multi-vector campaigns now steal sensitive and classified data, access privileged accounts, and spy on public sector organizations. This white paper from our sponsor Guidance Software explains the need for new security tactics and rapid response technologies to counter these advanced persistent threats.
  • How 3 cyber threats transform the role of incident response
    This Guidance Software paper describes how malware enables these advanced persistent threats. Three case studies explain how enterprise information security and incident response (IR) teams can employ cyber-forensics tools to minimize the damage.

webinar_lg Webinar

articles_lg Press Releases