Overview
Explore the world of cyber espionage in this 27-minute Web Summit talk featuring James Trainor Jr. and Rob Sloan. Delve into the history and scale of cyber attacks, examining landmark incidents and the capabilities of various nation-state actors. Learn about targeting strategies, standout breaches like the OPM incident, and the differences between Russian and Chinese attack methods. Assess the potential dangers posed by Iran and North Korea, and understand the challenges of attributing cyber attacks. Investigate the evolving tactics of threat actors, the readiness of government departments to improve their defenses, and the impact of cyber influence campaigns. Discuss states' tolerance of cyber espionage, potential response options, and the role of cyber insurance. Gain insights into major cyber crime networks and the crucial role of social engineering in modern digital threats. Evaluate the implications for the security of the 2018 US midterm elections and beyond.
Syllabus
Introduction
History of cyber espionage
Scale of attacks
Nationstate actors
Targeting
Standout incidents
OPM breach
How do Russian and Chinese attacks differ
Are Iran and North Korea more dangerous
How difficult is it to attribute attacks
Is it worth it to attribute attacks
What threat actors are doing
Are government departments able to improve their defenses
Cyber influence campaigns
States willing to tolerate cyber espionage
Response options
Cyber insurance
Biggest cyber crime networks
Role of social engineering
Taught by
Web Summit