Defending Cyber Dominance

Title: Defending Cyber Dominance

Venue: Cyber, Space & Intelligence Association , Washington DC, March 2014

Language: English

Duration: Script

Audience: Defense industrial base and government contractors

Abstract: An exploration of how cyber dominance can be defended by adding passive cyber defense, along with some promising new concepts that can make a difference in cyber defense

Cyber Warfare. Preparing for the Inevitable

Title: Cyber Warfare. Preparing for the Inevitable

Venue: ICT Summit Eurasia, Istanbul, September 2012

Language: English

Duration: 45 minutes

Audience: Politics and defence industry

Abstract: Political and economical background information on cyber warfare

Cyber-Physical Attacks and National Security

Title: Cyber-Physical Attacks and National Security

Venue: INSS International Conference on Cyberspace and National Security, Tel Aviv, September 2012

Language: English

Duration: 45 minutes

Audience: Cyber security experts and political advisors for national security

Abstract: A discussion of potential impacts of cyber-physical attacks on national security

stuxnet deep dive

Title: Stuxnet Attack Code Deep Dive

Venue: SCADA Security Scientific Symposium, Miami, January 2012

Language: English

Duration: 50 minutes + 10 minutes Q&A

Audience: ICS security experts

Abstract: In-depth technical discussion of Stuxnet’s attack code, including striking forensic evidence on attack target and strategy

cyber weapons

Title: Destructive Cyber Weapons

Venue: Zurich Minds flagship event, Zurich, December 2011

Language: English

Duration: 18 minutes

Audience: CEOs and academia

Abstract: Big-picture explanation of cyber weapons and their potential impact

Title: Deterrence in cyberspace: Debating the right strategy

Venue: The Brookings Institution, Washington (DC), September 2011

Language: English

Duration: 1 hour debate + 20 minutes Q&A (audio only)

Audience: Military and political decision makers

Abstract: Ralph had challenged cybersecurity authority Dmitri Alperovitch to debate their opposing viewpoints on deterrence as a defense strategy in cyber warfare. Military strategist Peter Singer was kind enough to host and moderate the event at The Brookings Institution in front of a distinguished DC crowd which joins the discussion after the opening statements.

stuxnet architecture

Title: The first deployed cyber weapon in history: Stuxnet’s architecture and implications

Venue: NATO’s International Conference on Cyber Conflict, Tallin (Estonia), June 2011

Language: English

Duration: 45 Minutes keynote + 15 minutes Q&A

Audience: Military and political decision makers

Abstract: A technical discussion of Stuxnet’s payload, followed by a big-picture analysis of the implications for cyber warfare

anatomie stuxnet

Title: Anatomie des Stuxnet-Wurms

Venue: TNG Big Tech Day, Munich, May 2011

Language: German

Duration: 50 minutes + 15 minutes Q&A

Audience: IT experts, software engineers

Abstract: Technical explanation of Stuxnet for an IT crowd

cracking stuxnetTitle: Cracking Stuxnet, a 21st century cyber weapon

Venue: TED Conference, Long Beach, March 2011

Language: English; subtitles in 29 languages

Duration: 10 Minutes

Audience: Everybody

Abstract: The first explanation of Stuxnet for a general audience. With over 1,000,000 views, this is the most popular talk on Stuxnet ever.