1 / 8

Israeli Innovation in Cyber Technology

Israeli Innovation in Cyber Technology. Meet Mr Hacker!. Fake Identity. Huge Amounts of Data. Encryption. The (Black-Hat) Hackers are Winning !. http://www.pwc.com/en_US/us/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf. IAI Cyber Innovation Drivers.

ellard
Download Presentation

Israeli Innovation in Cyber Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Israeli Innovation in Cyber Technology

  2. Meet Mr Hacker! Fake Identity Huge Amounts of Data Encryption

  3. The (Black-Hat) Hackers are Winning ! http://www.pwc.com/en_US/us/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

  4. IAI Cyber Innovation Drivers • Cyber as an EVOLUTION and not (only) a REVOLUTION • Adapting legacy Radar, Electronic Warfare, C4I and Comm. Capabilities • Diverse competencies • Collaborating with Israeli (& other) Start-Up companies • Establishing Cyber Innovation, Research & Development Centers • Protecting IAI’s IP, firmware, network & systems • A test-bed for IAI’s Cyber capabiltie

  5. Cyber as an EVOLUTION and not (only) a REVOLUTIONUtilizing Radar and EW Techniques in Cyber • The Challenge in Creating a Radar Situation Picture • Similar practices in Cyber Analytics – The Identity challenge

  6. IAI’s Cyber R&D Centers Combining White Hat Hackers, Researchers and Engineers Target System vulnerability & protocol research Identifying Exploit Solution proof of concept & prototype Lab Testing Productization SOPs Deployment & Support Ongoing: Handling changes in Target System & protocol Hacking Engineering Custodio – IAI’s Cyber Early Warning R&D Center (Singapore) Cyberia – IAI’s Cyber Accessibility Research Center (Israel)

  7. Ensuring Innovation with a Cyber Early Warning Center - A Service Oriented Approach • Government offices and CNIs as subscribers • Centralized Handling of Cyber Threat Monitoring • Forming a national database and forensic center capabilities for Cyber threats • Populating news, threats and security measuresAbility to perform forensics at the national level • Bi-Directional relationship with subscribers • To CEWC: Collection, information, new threats/virus/malware • From CEWC: intelligence, new threats/virus/malware, policies and procedures

  8. Thank you

More Related