THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY
By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks
September 2016
INTERNATIONAL COLLABORATION
JAPAN AND ISRAEL’s CYBER COOPERATION FOR THE 2020 OLYMPIC GAMES
By Ori Bar-Chaim, Director General at Regional Branch of Custodio Pte. Ltd – a subsidiary of Israel Aerospace Industries (IAI) and Camila Edry, Department Manager of Cyber Centers at Cyber Directorate – Elta, IAI
July 2016
SMART CITIES: THE IMPLICATIONS FOR THE PRIVATE SECTOR
By Nicolas Reys, Consultant, Control Risks Cyber Security Services
July 2016
THE INSIDER SECURITY THREAT
HOW SHAREPOINT AND OFFICE 365 MEASURE UP
By Peter Bradley, CEO of Torsion Information Security
July 2016
By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
February 2016
CRITICAL INFRASTRUCTURE AND OPERATIONAL TECHNOLOGY SECURITY
By Dr. Yiftah Lipkin (Israel Aerospace Industries Ltd), Amir Shlomo (Israel Aerospace Industries Ltd),
Amir Paz (Israel Aerospace Industries Ltd), David Menaker (Israel Aerospace Industries Ltd),
Guy Mizrahi, (Cyberia advanced cyber solutions [IAI’s Cyber accessibility center]), Niv David (Tel Aviv University)
November 2015
CYBERSECURITY WON’T EVOLVE IF WE’RE ONLY CLEANING UP AFTER A BREACH
By Ryan Olson, Intelligence Director at Palo Alto Networks
November 2015
A CONJOINT APPROACH: USER-CENTRIC AND DATA-CENTRIC SECURITY
By Dan Solomon, Director of Cyber Risk And Resilience Services, Optimal Risk Management and Arye Gickman, C.E.O, Longsight
November 2015
CONTROL-SYSTEM SECURITY ATTACK MODELS
By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions
November 2015
CYBERSECURITY: A CALL FOR NATIONAL STRATEGY
By Yajan Dua, Aerospace & Defence Analyst, MarketsandMarkets
June 2015
THE CURRENT STATE OF CYBER WARFARE
By Lior Tabansky, Cyber Security Policy Expert, Tel Aviv University, the Yuval Ne’eman Workshop for Science, Technology and Security
May 2015