際際滷shows by User: DrDavidProbert / http://www.slideshare.net/images/logo.gif 際際滷shows by User: DrDavidProbert / Mon, 29 Jul 2024 07:17:15 GMT 際際滷Share feed for 際際滷shows by User: DrDavidProbert "Our Intelligent Arctic Vision: 2025-2040" - Extended Version /slideshow/our-intelligent-arctic-vision-2025-2040-extended-version/270587920 arctic2-240729071715-e7aebba3
The presentation reviews potential practical applications of the emerging field of Artificial Intelligence (AI) to monitor & manage our arctic environmental assets & resources. (1) Personal Background: In June 1992 I first visited INEP/KSC & together with colleagues established the International KolaNet Programme for Environmental Monitoring using contemporary computer networking technologies including the Internet & Web Servers. For the 35th INEP Anniversary I review practical ways to apply AI to the challenges of arctic monitoring & consider a short-list of research & operational projects for the next 15 years. (2) Past Event Timeline: Birth of Computer Networking & Intelligence. The early pioneers of Statistical Learning included 18thC Thomas Bayes (1702-1761) who established Bayesian Learning that is now used extensively in Intelligent Cybersecurity & Advanced Machine Learning. Modern AI & Computing emerged 80 years ago in the early 1940s with the mathematical creation of Neural Networks & the first electronic computers such as Colossus at Dollis Hill, UK. In 1973, already 50 years ago, I started by own PhD research into Stochastic Machine Learning & Self-Organising Systems at Cambridge University, UK (3) Present Day Research: Physical & Human Arctic Environment & Cyber Tech Support. There are already extensive applications of Big Data Mining, AI & Machine Learning and Real-Time Image & Sensor Surveillance within Arctic Scientific Research. The multi-dimensional environments researched include Water Resources & Living Organisms, Air Pollution & Meteorology, Human Activities, Towns & Industrial Enterprises, Terrestrial Organic Life including Plants, Forests & Animals, Arctic Transportation & Geological Surveys. (4) Future Vision 2025-2040: Practical Applications of AI & Machine Learning. We can consider the Arctic in both Physical Geographical Space as well as Temporal Events from Micro to Macro. I suggest that the ultimate aim of AI research tools is to establish a Smart or Intelligent Arctic that is to some extent able to self-monitor & triage alerts such as heavy metal water contamination, seismic events, chemical air pollution or possible radiation leaks. The Arctic Environment is so extensive in both Space & Time that during the coming 15+ years, AI will become an essential tool to monitor & apply the massive real-time data from the expanding network of active arctic sensors. It is already clear that AI will be of considerable use in the practical analysis of climate change, and long term assessment of arctic sea ice. Further applications of AI may be into the impact of industrial & geological enterprises within the dynamic arctic eco-system. Eventually we may expect that all aspects of Our Arctic Environments maybe explored in quasi-real-time through networked sensors & alerts triaged through AI Tools & Human Intelligence into an innovative Arctic Digital Twin! ]]>

The presentation reviews potential practical applications of the emerging field of Artificial Intelligence (AI) to monitor & manage our arctic environmental assets & resources. (1) Personal Background: In June 1992 I first visited INEP/KSC & together with colleagues established the International KolaNet Programme for Environmental Monitoring using contemporary computer networking technologies including the Internet & Web Servers. For the 35th INEP Anniversary I review practical ways to apply AI to the challenges of arctic monitoring & consider a short-list of research & operational projects for the next 15 years. (2) Past Event Timeline: Birth of Computer Networking & Intelligence. The early pioneers of Statistical Learning included 18thC Thomas Bayes (1702-1761) who established Bayesian Learning that is now used extensively in Intelligent Cybersecurity & Advanced Machine Learning. Modern AI & Computing emerged 80 years ago in the early 1940s with the mathematical creation of Neural Networks & the first electronic computers such as Colossus at Dollis Hill, UK. In 1973, already 50 years ago, I started by own PhD research into Stochastic Machine Learning & Self-Organising Systems at Cambridge University, UK (3) Present Day Research: Physical & Human Arctic Environment & Cyber Tech Support. There are already extensive applications of Big Data Mining, AI & Machine Learning and Real-Time Image & Sensor Surveillance within Arctic Scientific Research. The multi-dimensional environments researched include Water Resources & Living Organisms, Air Pollution & Meteorology, Human Activities, Towns & Industrial Enterprises, Terrestrial Organic Life including Plants, Forests & Animals, Arctic Transportation & Geological Surveys. (4) Future Vision 2025-2040: Practical Applications of AI & Machine Learning. We can consider the Arctic in both Physical Geographical Space as well as Temporal Events from Micro to Macro. I suggest that the ultimate aim of AI research tools is to establish a Smart or Intelligent Arctic that is to some extent able to self-monitor & triage alerts such as heavy metal water contamination, seismic events, chemical air pollution or possible radiation leaks. The Arctic Environment is so extensive in both Space & Time that during the coming 15+ years, AI will become an essential tool to monitor & apply the massive real-time data from the expanding network of active arctic sensors. It is already clear that AI will be of considerable use in the practical analysis of climate change, and long term assessment of arctic sea ice. Further applications of AI may be into the impact of industrial & geological enterprises within the dynamic arctic eco-system. Eventually we may expect that all aspects of Our Arctic Environments maybe explored in quasi-real-time through networked sensors & alerts triaged through AI Tools & Human Intelligence into an innovative Arctic Digital Twin! ]]>
Mon, 29 Jul 2024 07:17:15 GMT /slideshow/our-intelligent-arctic-vision-2025-2040-extended-version/270587920 DrDavidProbert@slideshare.net(DrDavidProbert) "Our Intelligent Arctic Vision: 2025-2040" - Extended Version DrDavidProbert The presentation reviews potential practical applications of the emerging field of Artificial Intelligence (AI) to monitor & manage our arctic environmental assets & resources. (1) Personal Background: In June 1992 I first visited INEP/KSC & together with colleagues established the International KolaNet Programme for Environmental Monitoring using contemporary computer networking technologies including the Internet & Web Servers. For the 35th INEP Anniversary I review practical ways to apply AI to the challenges of arctic monitoring & consider a short-list of research & operational projects for the next 15 years. (2) Past Event Timeline: Birth of Computer Networking & Intelligence. The early pioneers of Statistical Learning included 18thC Thomas Bayes (1702-1761) who established Bayesian Learning that is now used extensively in Intelligent Cybersecurity & Advanced Machine Learning. Modern AI & Computing emerged 80 years ago in the early 1940s with the mathematical creation of Neural Networks & the first electronic computers such as Colossus at Dollis Hill, UK. In 1973, already 50 years ago, I started by own PhD research into Stochastic Machine Learning & Self-Organising Systems at Cambridge University, UK (3) Present Day Research: Physical & Human Arctic Environment & Cyber Tech Support. There are already extensive applications of Big Data Mining, AI & Machine Learning and Real-Time Image & Sensor Surveillance within Arctic Scientific Research. The multi-dimensional environments researched include Water Resources & Living Organisms, Air Pollution & Meteorology, Human Activities, Towns & Industrial Enterprises, Terrestrial Organic Life including Plants, Forests & Animals, Arctic Transportation & Geological Surveys. (4) Future Vision 2025-2040: Practical Applications of AI & Machine Learning. We can consider the Arctic in both Physical Geographical Space as well as Temporal Events from Micro to Macro. I suggest that the ultimate aim of AI research tools is to establish a Smart or Intelligent Arctic that is to some extent able to self-monitor & triage alerts such as heavy metal water contamination, seismic events, chemical air pollution or possible radiation leaks. The Arctic Environment is so extensive in both Space & Time that during the coming 15+ years, AI will become an essential tool to monitor & apply the massive real-time data from the expanding network of active arctic sensors. It is already clear that AI will be of considerable use in the practical analysis of climate change, and long term assessment of arctic sea ice. Further applications of AI may be into the impact of industrial & geological enterprises within the dynamic arctic eco-system. Eventually we may expect that all aspects of Our Arctic Environments maybe explored in quasi-real-time through networked sensors & alerts triaged through AI Tools & Human Intelligence into an innovative Arctic Digital Twin! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/arctic2-240729071715-e7aebba3-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The presentation reviews potential practical applications of the emerging field of Artificial Intelligence (AI) to monitor &amp; manage our arctic environmental assets &amp; resources. (1) Personal Background: In June 1992 I first visited INEP/KSC &amp; together with colleagues established the International KolaNet Programme for Environmental Monitoring using contemporary computer networking technologies including the Internet &amp; Web Servers. For the 35th INEP Anniversary I review practical ways to apply AI to the challenges of arctic monitoring &amp; consider a short-list of research &amp; operational projects for the next 15 years. (2) Past Event Timeline: Birth of Computer Networking &amp; Intelligence. The early pioneers of Statistical Learning included 18thC Thomas Bayes (1702-1761) who established Bayesian Learning that is now used extensively in Intelligent Cybersecurity &amp; Advanced Machine Learning. Modern AI &amp; Computing emerged 80 years ago in the early 1940s with the mathematical creation of Neural Networks &amp; the first electronic computers such as Colossus at Dollis Hill, UK. In 1973, already 50 years ago, I started by own PhD research into Stochastic Machine Learning &amp; Self-Organising Systems at Cambridge University, UK (3) Present Day Research: Physical &amp; Human Arctic Environment &amp; Cyber Tech Support. There are already extensive applications of Big Data Mining, AI &amp; Machine Learning and Real-Time Image &amp; Sensor Surveillance within Arctic Scientific Research. The multi-dimensional environments researched include Water Resources &amp; Living Organisms, Air Pollution &amp; Meteorology, Human Activities, Towns &amp; Industrial Enterprises, Terrestrial Organic Life including Plants, Forests &amp; Animals, Arctic Transportation &amp; Geological Surveys. (4) Future Vision 2025-2040: Practical Applications of AI &amp; Machine Learning. We can consider the Arctic in both Physical Geographical Space as well as Temporal Events from Micro to Macro. I suggest that the ultimate aim of AI research tools is to establish a Smart or Intelligent Arctic that is to some extent able to self-monitor &amp; triage alerts such as heavy metal water contamination, seismic events, chemical air pollution or possible radiation leaks. The Arctic Environment is so extensive in both Space &amp; Time that during the coming 15+ years, AI will become an essential tool to monitor &amp; apply the massive real-time data from the expanding network of active arctic sensors. It is already clear that AI will be of considerable use in the practical analysis of climate change, and long term assessment of arctic sea ice. Further applications of AI may be into the impact of industrial &amp; geological enterprises within the dynamic arctic eco-system. Eventually we may expect that all aspects of Our Arctic Environments maybe explored in quasi-real-time through networked sensors &amp; alerts triaged through AI Tools &amp; Human Intelligence into an innovative Arctic Digital Twin!
"Our Intelligent Arctic Vision: 2025-2040" - Extended Version from Dr David Probert
]]>
45 0 https://cdn.slidesharecdn.com/ss_thumbnails/arctic2-240729071715-e7aebba3-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Our Intelligent Arctic: Vision 2025-2040 /slideshow/our-intelligent-arctic-vision-2025-2040/269881575 arctic-vision-240625151944-d54e0c44
My Personal Vision for applications of Artificial Intelligence & Machine Learning Technologies to support the future Management of our Arctic Environment. The Vision takes us forward 15 Years with a brief review of current Scientific AI Arctic Research Projects. The talk suggests that using AI/ML and GenAI we may move towards an interactive Cyber or Digital Arctic Twin by 2040. This could cover themes such as Sea-Ice Prediction, Maritime Arctic Routes, Permafrost, Flora & Flauna, Arctic Industries and Human Settlements. Mention is also made of the importance of securing the valuable Arctic Real-Time Data using Cybersecurity Solutions. ]]>

My Personal Vision for applications of Artificial Intelligence & Machine Learning Technologies to support the future Management of our Arctic Environment. The Vision takes us forward 15 Years with a brief review of current Scientific AI Arctic Research Projects. The talk suggests that using AI/ML and GenAI we may move towards an interactive Cyber or Digital Arctic Twin by 2040. This could cover themes such as Sea-Ice Prediction, Maritime Arctic Routes, Permafrost, Flora & Flauna, Arctic Industries and Human Settlements. Mention is also made of the importance of securing the valuable Arctic Real-Time Data using Cybersecurity Solutions. ]]>
Tue, 25 Jun 2024 15:19:44 GMT /slideshow/our-intelligent-arctic-vision-2025-2040/269881575 DrDavidProbert@slideshare.net(DrDavidProbert) Our Intelligent Arctic: Vision 2025-2040 DrDavidProbert My Personal Vision for applications of Artificial Intelligence & Machine Learning Technologies to support the future Management of our Arctic Environment. The Vision takes us forward 15 Years with a brief review of current Scientific AI Arctic Research Projects. The talk suggests that using AI/ML and GenAI we may move towards an interactive Cyber or Digital Arctic Twin by 2040. This could cover themes such as Sea-Ice Prediction, Maritime Arctic Routes, Permafrost, Flora & Flauna, Arctic Industries and Human Settlements. Mention is also made of the importance of securing the valuable Arctic Real-Time Data using Cybersecurity Solutions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/arctic-vision-240625151944-d54e0c44-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My Personal Vision for applications of Artificial Intelligence &amp; Machine Learning Technologies to support the future Management of our Arctic Environment. The Vision takes us forward 15 Years with a brief review of current Scientific AI Arctic Research Projects. The talk suggests that using AI/ML and GenAI we may move towards an interactive Cyber or Digital Arctic Twin by 2040. This could cover themes such as Sea-Ice Prediction, Maritime Arctic Routes, Permafrost, Flora &amp; Flauna, Arctic Industries and Human Settlements. Mention is also made of the importance of securing the valuable Arctic Real-Time Data using Cybersecurity Solutions.
Our Intelligent Arctic: Vision 2025-2040 from Dr David Probert
]]>
58 0 https://cdn.slidesharecdn.com/ss_thumbnails/arctic-vision-240625151944-d54e0c44-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AI Meets 21stC Security: Trends & Scenarios! /slideshow/ai-meets-21stc-security-trends-scenarios/257917593 ai-meets-security-230519123445-97bbe126
Brief article on the Impact of Artificial Intelligence & Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 & 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture & Society. This year will be 50 years since I started my own PhD into AI - "Stochastic Machine Learning" at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy! ]]>

Brief article on the Impact of Artificial Intelligence & Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 & 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture & Society. This year will be 50 years since I started my own PhD into AI - "Stochastic Machine Learning" at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy! ]]>
Fri, 19 May 2023 12:34:45 GMT /slideshow/ai-meets-21stc-security-trends-scenarios/257917593 DrDavidProbert@slideshare.net(DrDavidProbert) AI Meets 21stC Security: Trends & Scenarios! DrDavidProbert Brief article on the Impact of Artificial Intelligence & Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 & 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture & Society. This year will be 50 years since I started my own PhD into AI - "Stochastic Machine Learning" at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ai-meets-security-230519123445-97bbe126-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Brief article on the Impact of Artificial Intelligence &amp; Machine Learning on the Security Sector. We review the fundamentals of AI Security before providing a quick review of key sectors. Finally we provide a speculative set of scenarios for 2030, 2050, 2075 &amp; 2100 regarding the possible future evolution of artificial intelligence. This includes a short assessment of the risks that autonomous AI tools bring that could prove to be an existential risk to Human Life, Culture &amp; Society. This year will be 50 years since I started my own PhD into AI - &quot;Stochastic Machine Learning&quot; at Cambridge University Statistical Laboratory which is part of the Department of Mathematics. Enjoy!
AI Meets 21stC Security: Trends & Scenarios! from Dr David Probert
]]>
22 0 https://cdn.slidesharecdn.com/ss_thumbnails/ai-meets-security-230519123445-97bbe126-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AI & Cybersecurity meet 21stC GeoPolitics /slideshow/ai-cybersecurity-meet-21stc-geopolitics/255949048 ai-cyber-geopolitics-v3-230220161942-1611ec62
AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all! ]]>

AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all! ]]>
Mon, 20 Feb 2023 16:19:42 GMT /slideshow/ai-cybersecurity-meet-21stc-geopolitics/255949048 DrDavidProbert@slideshare.net(DrDavidProbert) AI & Cybersecurity meet 21stC GeoPolitics DrDavidProbert AI & Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules & Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ai-cyber-geopolitics-v3-230220161942-1611ec62-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> AI &amp; Cybersecurity Tools are being weaponised by National Governments which is already impacting Export Rules &amp; Regulations. This short article opens up an online discussion of some of these contemporary issues which impact us all!
AI & Cybersecurity meet 21stC GeoPolitics from Dr David Probert
]]>
43 0 https://cdn.slidesharecdn.com/ss_thumbnails/ai-cyber-geopolitics-v3-230220161942-1611ec62-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From Hughesovka to Donetsk (Translated to Russian) /slideshow/from-hughesovka-to-donetsk-russian-language/251080971 hughesovka-donetsk-rus2-220130191125
Donetsk, Ukraine is at the core of regional issues between Russia & the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government & Welsh Entrepreneur - John Hughes with the "New Russia Company Limited" registered in 1869. This 19thC Company Town was renamed Stalino in 1924 & Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts & Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) . ]]>

Donetsk, Ukraine is at the core of regional issues between Russia & the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government & Welsh Entrepreneur - John Hughes with the "New Russia Company Limited" registered in 1869. This 19thC Company Town was renamed Stalino in 1924 & Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts & Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) . ]]>
Sun, 30 Jan 2022 19:11:25 GMT /slideshow/from-hughesovka-to-donetsk-russian-language/251080971 DrDavidProbert@slideshare.net(DrDavidProbert) From Hughesovka to Donetsk (Translated to Russian) DrDavidProbert Donetsk, Ukraine is at the core of regional issues between Russia & the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government & Welsh Entrepreneur - John Hughes with the "New Russia Company Limited" registered in 1869. This 19thC Company Town was renamed Stalino in 1924 & Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts & Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) . <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hughesovka-donetsk-rus2-220130191125-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Donetsk, Ukraine is at the core of regional issues between Russia &amp; the West. In the 19thC my Great Great Grandfather worked for 25 years in Hughesovka which was created as an Industrial Public Private Partnership (PPP) between the Russian Government &amp; Welsh Entrepreneur - John Hughes with the &quot;New Russia Company Limited&quot; registered in 1869. This 19thC Company Town was renamed Stalino in 1924 &amp; Donetsk in 1961. Here is the Russian Translation of my Personal Thoughts &amp; Family Story relating to the historical journey from Hughesovka (1870) to Donetsk (2022) .
From Hughesovka to Donetsk (Translated to Russian) from Dr David Probert
]]>
94 0 https://cdn.slidesharecdn.com/ss_thumbnails/hughesovka-donetsk-rus2-220130191125-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
19thC Hughesovka to 21stC Donetsk /slideshow/personal-reflections-from-hughesovka-to-donetsk/251060094 hughesovka-donetsk-220126194140
Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript & Analysis of current events.]]>

Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript & Analysis of current events.]]>
Wed, 26 Jan 2022 19:41:40 GMT /slideshow/personal-reflections-from-hughesovka-to-donetsk/251060094 DrDavidProbert@slideshare.net(DrDavidProbert) 19thC Hughesovka to 21stC Donetsk DrDavidProbert Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript & Analysis of current events. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hughesovka-donetsk-220126194140-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Some Personal Reflections on the Evolution of the 19thC Industrial Complex set up by John Hughes in 1870 by the New Russia Company in the City known then as Hughesovka and since renamed as Donetsk in Donbas - Eastern Ukraine. The article includes some family history and connections with Donbas and a Personal Postscript &amp; Analysis of current events.
19thC Hughesovka to 21stC Donetsk from Dr David Probert
]]>
109 0 https://cdn.slidesharecdn.com/ss_thumbnails/hughesovka-donetsk-220126194140-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber-Pandemic: Current Reality & Future Trends /slideshow/cyberpandemic-current-reality-future-trends/250670013 cyber-pandemic-final2-211117150023
We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!]]>

We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!]]>
Wed, 17 Nov 2021 15:00:23 GMT /slideshow/cyberpandemic-current-reality-future-trends/250670013 DrDavidProbert@slideshare.net(DrDavidProbert) Cyber-Pandemic: Current Reality & Future Trends DrDavidProbert We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal & require "Defence in Time" We speculate on the emergence of "Silicon Life" and the possibility of autonomous cyber-attacks by networks of AI-Bots & Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyber-pandemic-final2-211117150023-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We compare the challenge of the current COVID-19 Bio-Pandemic with the potential of Global Cyber-Pandemic during the coming decade! Bio-Events are Spatial whilst Cyber-Events are Temporal &amp; require &quot;Defence in Time&quot; We speculate on the emergence of &quot;Silicon Life&quot; and the possibility of autonomous cyber-attacks by networks of AI-Bots &amp; Drone Swarms upon Critical National Infrastructure. The paper assumes some understanding of Artificial Intelligence, Machine Learning and Cybersecurity. Enjoy!
Cyber-Pandemic: Current Reality & Future Trends from Dr David Probert
]]>
533 0 https://cdn.slidesharecdn.com/ss_thumbnails/cyber-pandemic-final2-211117150023-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar! /slideshow/intelligent-integrated-cybersecurity-cybercrime-cyberterror-cyberwar/197458020 malta-three-v81printed-191125153821
Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!]]>

Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976!]]>
Mon, 25 Nov 2019 15:38:21 GMT /slideshow/intelligent-integrated-cybersecurity-cybercrime-cyberterror-cyberwar/197458020 DrDavidProbert@slideshare.net(DrDavidProbert) Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar! DrDavidProbert Invited Talk @ 40th International East-West Security Conference ' Hilton Hotel, Malta - November 2019 on Intelligent & Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats & defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning & Deep Learning and provide much faster & accurate real-time "Speed of Light" responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological & social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security & then finally "Neural Security" for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the "Best of Breed" Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to "take control of the more advanced AI tools" and to programme the AI software with some understanding of compliance with Human Needs & Ethics! The author has worked on InfoSec & Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory & Churchill College in June 1976! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malta-three-v81printed-191125153821-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited Talk @ 40th International East-West Security Conference &#39; Hilton Hotel, Malta - November 2019 on Intelligent &amp; Integrated CyberSecurity! The talk explores the current status of Cybersecurity threats &amp; defence and then develops Scenarios for its future evolution. This focuses upon the role of Artificial Intelligence, Stochastic Machine Learning &amp; Deep Learning and provide much faster &amp; accurate real-time &quot;Speed of Light&quot; responses against Cyber Attacks! We discuss the evolution of the Internet during the last 50 years since its birth, and then explore possible cyber trends for the next 25 to 30 years based upon technological &amp; social evolution. Topics include Network Intelligence, Self-Learning, Self-Adaptive Security &amp; then finally &quot;Neural Security&quot; for 2040 onwards! The presentation provides several examples of recent cyber attacks as well as some of the &quot;Best of Breed&quot; Cyber AI solutions that are already available from Cybersecurity vendors! We warp-up with a warning regarding the need to &quot;take control of the more advanced AI tools&quot; and to programme the AI software with some understanding of compliance with Human Needs &amp; Ethics! The author has worked on InfoSec &amp; Cybersecurity for 25 years since summer 1994. He has also more than 40 years of experience in AI having completed the very 1st Doctorate in Stochastic Machine Learning @ Cambridge University Statistical Laboratory &amp; Churchill College in June 1976!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar! from Dr David Probert
]]>
1733 6 https://cdn.slidesharecdn.com/ss_thumbnails/malta-three-v81printed-191125153821-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure /slideshow/upgrading-industrial-cybersecurity-security-critical-national-infrastructure/197388077 malta-two-v81printed-191125115108
Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976. ]]>

Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976. ]]>
Mon, 25 Nov 2019 11:51:08 GMT /slideshow/upgrading-industrial-cybersecurity-security-critical-national-infrastructure/197388077 DrDavidProbert@slideshare.net(DrDavidProbert) Upgrading Industrial CyberSecurity & Security Critical National Infrastructure DrDavidProbert Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats & Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical & cyber security as well as the problem of counterfeit electronic parts & components within the industrial value-chain. We explore the issue of industrial espionage & surveillance including video & satellite images that may be used by the "bad guys" when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants & industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise & the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malta-two-v81printed-191125115108-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited talk at the 40th International East-West Security Conference @ Hilton Hotel - Malta on Upgrading Industrial CyberSecurity. The talk focuses on the Industrial Internet of Things (IIoT) and specifically on ICS/SCADA systems - Industrial Control Systems and Supervisory Control and Data Acquisition. These legacy systems are often not well secured and open to a wide range of Cyber Threats &amp; Attacks. Examples are given on some recent attacks including DDoS and Ransomware in Trans-National Industrial Enterprises.The talk covers the integration of physical &amp; cyber security as well as the problem of counterfeit electronic parts &amp; components within the industrial value-chain. We explore the issue of industrial espionage &amp; surveillance including video &amp; satellite images that may be used by the &quot;bad guys&quot; when researching economic, political or terror attacks on critical infrastructure. We explore the risks within the energy sector such as civilian nuclear power plants &amp; industrial metal smelting works. We wrap-up by recommending 10 ways to secure your industrial enterprise &amp; the paths to developing your Smart Security Business Plan. The author has worked in the field of CyberSecurity / InfoSec for 25 years since Summer 1994. He has also worked in AI/Machine Learning for more than 40 years since completing the 1st Doctorate in Stochastic Machine Learning @ the Cambridge University Statistical Laboratory in June 1976.
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure from Dr David Probert
]]>
636 4 https://cdn.slidesharecdn.com/ss_thumbnails/malta-two-v81printed-191125115108-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security! /slideshow/21stc-trends-in-cybersecurity-in-the-finance-banking-sectors-security/197385158 malta-one-v81printed-191125113853
Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976!]]>

Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976!]]>
Mon, 25 Nov 2019 11:38:53 GMT /slideshow/21stc-trends-in-cybersecurity-in-the-finance-banking-sectors-security/197385158 DrDavidProbert@slideshare.net(DrDavidProbert) 21stC Trends in CyberSecurity in the Finance & Banking Sectors Security! DrDavidProbert Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance & Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence & Stochastic Machine Learning that are now available for several leading "best of breed" vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains & big data analytics in improving transaction security and compliance with Anti-Money Laundering & Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve & upgrade your own enterprise cybersecurity using AI, Machine & Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI & Stochastic Machine Learning @ Cambridge University in 1976! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malta-one-v81printed-191125113853-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited Presentation @ 40th Internationnal East-West Security Conference in Malta on the Theme of Cybersecurity in Finance &amp; Banking! This 45minute talk covers the importance of upgrading to the new cyber tools based upon Artificial Intelligence &amp; Stochastic Machine Learning that are now available for several leading &quot;best of breed&quot; vendors! The talk also covers typical cyber threats from DDoS to Ransomware as well as the role of blockchains &amp; big data analytics in improving transaction security and compliance with Anti-Money Laundering &amp; Counter-Terror Financing. The talk ends with recommended guidelines on ways to improve &amp; upgrade your own enterprise cybersecurity using AI, Machine &amp; Deep Learning! The author has spent more than 25 years working on Cybersecurity and completed his Doctorate in AI &amp; Stochastic Machine Learning @ Cambridge University in 1976!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security! from Dr David Probert
]]>
545 2 https://cdn.slidesharecdn.com/ss_thumbnails/malta-one-v81printed-191125113853-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling /slideshow/effective-cybersecurity-for-the-2020s-intelligent-analytics-modelling/154305308 naples2019-three-finals-190708103424
This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!]]>

This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!]]>
Mon, 08 Jul 2019 10:34:23 GMT /slideshow/effective-cybersecurity-for-the-2020s-intelligent-analytics-modelling/154305308 DrDavidProbert@slideshare.net(DrDavidProbert) Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling DrDavidProbert This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror & CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats & Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan "Bots", Classic Malware, & Toxic Cookies, DNS & Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare & Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) & way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions & Toolkits that are available today for implmentation. Many Cyber tools already embed AI & Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth & malware attacks including DDoS, APT, SQL & Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-three-finals-190708103424-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This invited presentation was given at the International East-West Security Conference on the 4th June in Naples, Italy. The talk begins with a review of the current Cyber Society including the topics of CyberCrime, CyberTerror &amp; CyberWar. We include a quick review of the extremely useful national cybersecurity strategy guides developed by the UN/ITU (United Nations - International telecommunications Union) during the last 10 years. We then progress to review the Top 10 Cyber Threats &amp; Attacks including DDOS, SQL Injection, Ransomware, APT - Advanced Persistent Attack, Custom Torjan &quot;Bots&quot;, Classic Malware, &amp; Toxic Cookies, DNS &amp; Proxy Diversion Attacks, We provide numerous examples of some recent devastating cyber attacks across market sectors such as Banking, Airllines, Shipping, Healthcare &amp; Government. We the proceed to review future cyber scenarios - 2019 (Integrated Security), 2020(Self-Adaptive Security), 2022 (Self-Learning), 2025 (Cyber-Intelligent) &amp; way into the future - 2040 (Neural Security). Once again we provide many examples of Cyber Solutions &amp; Toolkits that are available today for implmentation. Many Cyber tools already embed AI &amp; Deep Learning Algorithms which can help mitigate zero-day attacks and most other cyber stealth &amp; malware attacks including DDoS, APT, SQL &amp; Ransomware. We conclude, as usual, with suggestions for how YOUR Business can review, audit and upgrade to boost cyber resilience! Enjoy!
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling from Dr David Probert
]]>
1149 10 https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-three-finals-190708103424-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy /slideshow/247-intelligent-video-surveillance-securing-your-business-data-privacy/154304065 naples2019-two-finals-190708101522
This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!]]>

This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy!]]>
Mon, 08 Jul 2019 10:15:22 GMT /slideshow/247-intelligent-video-surveillance-securing-your-business-data-privacy/154304065 DrDavidProbert@slideshare.net(DrDavidProbert) 24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy DrDavidProbert This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports & sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin & Moscow. We discuss the importance of providing an integrated dashboard for Physical & CyberSecurity in order to Identify, Mitigate & ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples & case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence & Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis & digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases & real-time streams. We also suggest Top 3 Actions & Security RoadMap for YOUR Business! Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-two-finals-190708101522-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This invited presentation was given at the International East-West Security Conference in Naples, Italy on th 4th June 2019. The talk has 9 chapters beginning with a background review of the evolution of the marketplace for video intelligence from 20thC CCTV to 21srC Real-Time Networked Video Surveillance! We then discuss the importance of deploying intelligence video surveillance in crowded places such as shopping malls, stadiums, theatres, transport hubs, airports &amp; sports events. We provide examples of some recent tragic events related to Urban Terrorism such as Nice, Paris, Brussels, London, Berlin &amp; Moscow. We discuss the importance of providing an integrated dashboard for Physical &amp; CyberSecurity in order to Identify, Mitigate &amp; ideally prevent such Urban Terrorism. At all stages of the talk we try an provide examples &amp; case studies of Intelligent Video Surveillance solutions that are available on the marketplace today! W then review Advanced Video Analytics based upon Artificial Intelligence &amp; Deep Learning (Neural Networks). This includes a discussion of intelligent behaviour profiling and real-time biometric analysis &amp; digital forensics. The development of on-line services has led to the new economic theory of Surveillance Capitalism (Published by Shoshana Zuboff - Jan 2019). This is highly relevant to Video Surveillance since some of the intelligent video tools such as Public Facial Recognition have provoked a strong reaction in cities such as San Francisco. We conclude the talk with a review of ways in which Big Data Analytics can provide Fast Intelligent Support in the analysis of massive video databases &amp; real-time streams. We also suggest Top 3 Actions &amp; Security RoadMap for YOUR Business! Enjoy!
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy from Dr David Probert
]]>
440 12 https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-two-finals-190708101522-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain /slideshow/21stc-trends-in-fintech-security-ai-deep-learning-blockchain/154302794 naples2019-one-finals-190708095715
The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019]]>

The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019]]>
Mon, 08 Jul 2019 09:57:15 GMT /slideshow/21stc-trends-in-fintech-security-ai-deep-learning-blockchain/154302794 DrDavidProbert@slideshare.net(DrDavidProbert) 21stC Trends in FinTech Security - AI, Deep Learning & Blockchain DrDavidProbert The presentation has 9 chapters beginning with a brief survey of FinTech Evolution & the Global Marketplace with a strong focus on China & the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech & Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , & Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection & Prevention including tools for identifying Money Laundering, and Financing for Terrorism & other National & International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining & Analytics can reduce the impact & devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-one-finals-190708095715-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The presentation has 9 chapters beginning with a brief survey of FinTech Evolution &amp; the Global Marketplace with a strong focus on China &amp; the USA! We note that Fintech is a disruptive technology and that there are inherent cyber-risks. We provide examples of some recent major hacks within the FinTech &amp; Financial Services Sector. We then consider ways options to mitigate these security risks using new technological tools based upon Artificial Intelligence, Machine Learning Algorithms , &amp; Deep Learning (Neural Networks). We then also review ways in which Blockchains can provide enhanced security for peer-to-peer transactions both in FinTech as well as in most other market sectors. We then discuss Cyber Fraud Detection &amp; Prevention including tools for identifying Money Laundering, and Financing for Terrorism &amp; other National &amp; International Criminal Exploits. We review ways in which the latest Tools for Big Data Mining &amp; Analytics can reduce the impact &amp; devastating losses from Global FinTech CyberCrime. We conclude with a summary of the current disruptive transition from 20thC Physical Banks to 21stC Virtual FinTech Accounts. We include suggestions for ways in which you can provide enhanced Security for FinTech within YOUR Business! This invited talk was given at the International East-West Security Conference in Naples, Italy on the 4th June 2019
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain from Dr David Probert
]]>
445 4 https://cdn.slidesharecdn.com/ss_thumbnails/naples2019-one-finals-190708095715-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks! /slideshow/kolanet-19921999-and-beyond-arctic-environmental-monitoring-networks/153580985 kolanet-v17printed-190704164013
Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the "Institute of Ecological Problems of the North" - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel & Monchegorsk. The presentation concludes with suggestions for redefining & upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine & Deep Learning to research massive databases related to climate change & arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation & Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland & Russia!]]>

Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the "Institute of Ecological Problems of the North" - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel & Monchegorsk. The presentation concludes with suggestions for redefining & upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine & Deep Learning to research massive databases related to climate change & arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation & Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland & Russia!]]>
Thu, 04 Jul 2019 16:40:13 GMT /slideshow/kolanet-19921999-and-beyond-arctic-environmental-monitoring-networks/153580985 DrDavidProbert@slideshare.net(DrDavidProbert) KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks! DrDavidProbert Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the "Institute of Ecological Problems of the North" - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel & Monchegorsk. The presentation concludes with suggestions for redefining & upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine & Deep Learning to research massive databases related to climate change & arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation & Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland & Russia! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kolanet-v17printed-190704164013-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited Presentation at the Plenary Session of the 30th Anniversary Conference of the &quot;Institute of Ecological Problems of the North&quot; - Kola Science Centre - Russian Academy of Sciences - Apatity, Murmansk Region, Russia. The presentation reviews the Multi-National Project that aimed to establish a network to monitor radiation levels (in case of nuclear accident or major leak) around the Kola Atomic Power Station in the Russian Kola Peninsula, the programme included several training courses held in Svahovd Norway as well as the Kola Science Centre, Apatity. The project later extended its mission to include monitoring of other industrial pollution such as sulphur dioxide from the extensive Nickel Smelting Works within the Region @ Nikel &amp; Monchegorsk. The presentation concludes with suggestions for redefining &amp; upgrading the KolaNet Programme for the 21st Century with a focus on Artificial Intelligence, Big Data Analytics, Machine &amp; Deep Learning to research massive databases related to climate change &amp; arctic pollution! We conclude with a review of the KolaNet Lessons noting that the programme was successful due to (1) TeamWork (2) Practical Adaptation &amp; Exploitation of Advanced Technologies (3) International Partnerships across the Nordic Region - Norway, Sweden, Finland &amp; Russia!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks! from Dr David Probert
]]>
270 10 https://cdn.slidesharecdn.com/ss_thumbnails/kolanet-v17printed-190704164013-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit! /slideshow/cybervision-2020-to-2030-your-21stc-cybersecurity-toolkit/124149948 cybersecurity-three-2018-181127115231
This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!]]>

This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy!]]>
Tue, 27 Nov 2018 11:52:31 GMT /slideshow/cybervision-2020-to-2030-your-21stc-cybersecurity-toolkit/124149948 DrDavidProbert@slideshare.net(DrDavidProbert) CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit! DrDavidProbert This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks & attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy & DNS Hacks & Attacks. After briefing exploring Blockchains, "Internet of Things" & Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government & open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan & RoadMap! Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-three-2018-181127115231-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation provides a personal vision of cybersecurity trends for the coming 10 years and beyond! We begin with some historical relics and the discovery of the Antikythera Mechanism almost 2000 years ago (Cyber Year ZERO!). We rapidly move to our cyber society - 2018 - and some recent massive cyber hacks &amp; attacks related both to cybercrime, cyberterror and emerging cyber and information warfare. We briefly discuss the TOP 10 Cyber attack and means of defence. These include Advanced Persistent Threat (APT), Stealth Monitoring, Toxic eMail, Custom Bots (Stuxnet), DDoS, Ransomware and Toxic Cookies/Proxy &amp; DNS Hacks &amp; Attacks. After briefing exploring Blockchains, &quot;Internet of Things&quot; &amp; Integrated Security Dashboards we present a sequence of cyber scenarios for 2019 (Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber Intelligent) and 2040 (Neural Security). We provide examples of cyber tools already available that deploy machine learning, AI and Deep Learning to protect business and governments around the world. We provide some warnings from the late Stephen Hawking on both the risks and rewards or the widespread deployment of artificial intelligence based solutions in both business, government &amp; open society! Finally we wrap up with a quick review of future cyber tools and suggestions for your own Business Action Plan &amp; RoadMap! Enjoy!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit! from Dr David Probert
]]>
2117 24 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-three-2018-181127115231-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics! /slideshow/intelligent-cyber-surveillance-ai-video-analytics-biometrics/124148426 cybersecurity-two-2018-181127113305
This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!]]>

This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!]]>
Tue, 27 Nov 2018 11:33:05 GMT /slideshow/intelligent-cyber-surveillance-ai-video-analytics-biometrics/124148426 DrDavidProbert@slideshare.net(DrDavidProbert) Intelligent Cyber Surveillance: AI Video Analytics & Biometrics! DrDavidProbert This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical & cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which "crowded place" such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics & biometric which are now a key component in business & government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-two-2018-181127113305-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation discusses recent trends in cyber surveillance to combat increasing cybercrime, cyberterrorism and the advent of cyberwarfare! We begin by reviewing the convergence of physical &amp; cybersecurity before moving to recent tragic events in urban terrorism, We discuss the ways in which &quot;crowded place&quot; such as stadiums, transport hubs, resorts and malls may be more fully secured against cyberterrorists, We then review trends in advanced AI - artificial intelligence - based video analytics &amp; biometric which are now a key component in business &amp; government cyber toolkit! We provide a short review of cyber sector sector before providing some 7 year cyber trends towards the year 2025. The presentation wraps up with your TOP 3 Actions and a suggested Cyber Shopping List for your Business! Enjoy!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics! from Dr David Probert
]]>
429 4 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-two-2018-181127113305-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity for Critical National Infrastructure /slideshow/cybersecurity-for-critical-national-infrastructure/124146987 cybersecurity-one-2018-181127111521
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!]]>

Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!]]>
Tue, 27 Nov 2018 11:15:20 GMT /slideshow/cybersecurity-for-critical-national-infrastructure/124146987 DrDavidProbert@slideshare.net(DrDavidProbert) Cybersecurity for Critical National Infrastructure DrDavidProbert Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-one-2018-181127111521-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber &quot;Shopping List&quot; , Business Action Plan &amp; Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
Cybersecurity for Critical National Infrastructure from Dr David Probert
]]>
870 11 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-one-2018-181127111521-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
21stC Cybersecurity Trends: 2018-2025 & Beyond!... /slideshow/21stc-cybersecurity-trends-20182025-beyond/105154715 issa-v28finalprinted-180710125659
Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference!]]>

Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference!]]>
Tue, 10 Jul 2018 12:56:59 GMT /slideshow/21stc-cybersecurity-trends-20182025-beyond/105154715 DrDavidProbert@slideshare.net(DrDavidProbert) 21stC Cybersecurity Trends: 2018-2025 & Beyond!... DrDavidProbert Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware & DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security & Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO & IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning & Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics & Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards & Technology. I would like to thank Sophie Wingrove & Team for their kind invitation to speak at this CyberSecurity Conference! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/issa-v28finalprinted-180710125659-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation to the ISSA Summer Cybersecurity Conference on HQS Wellington Ship on the River Thames, London - 5th July 2018. The keynote talk covers the TOP 10 Cyber Attacks - APT, Stealth Monitoring, Toxic eMail, Classic Malware, Custom Bots,, DDoS, Ransomware &amp; DNS/Proxy Re-routing..We present Cybervision Scenarios for 2018 (Integrated Security), 2019(Self-Adaptive), 2020 (Self-Learning), 2025 (Cyber-Intelligent) and finally 2040 (Neural Security &amp; Artificial Silicon Life!). This is followed by a brief survey of Maritime Security including the BIMCO &amp; IET Guidelines and then wrapped up with a summary of the New Cybersecurity Toolkit. The presentation has a strong focus on the applications of artificial intelligence, Machine Learning &amp; Deep Learning (Neural Networks) to Cybersecurity Solutions. In addition there is analysis of the fields of Intelligent Video Analytics, Digital Forensics &amp; Cyber-Biometrics together with some real world solutions. Finally there is reference to Strategy Toolkits such as those from the United Nations / ITU, and from NIST = US National Institute of Standards &amp; Technology. I would like to thank Sophie Wingrove &amp; Team for their kind invitation to speak at this CyberSecurity Conference!
21stC Cybersecurity Trends: 2018-2025 & Beyond!... from Dr David Probert
]]>
1703 7 https://cdn.slidesharecdn.com/ss_thumbnails/issa-v28finalprinted-180710125659-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! /slideshow/cybersecurity-futures-2018-2025-technology-tools-trends/82826122 seville-one-v9printed-edited-171127145102
This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.]]>

This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.]]>
Mon, 27 Nov 2017 14:51:01 GMT /slideshow/cybersecurity-futures-2018-2025-technology-tools-trends/82826122 DrDavidProbert@slideshare.net(DrDavidProbert) CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! DrDavidProbert This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools & Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical & CyberSecurity, Scenario 2019: Adaptive Security including the "Internet of Things & "Smart Security", Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence & finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning & Artificial General Intelligence where we may see the emergence of "Artificial Silicon Life"?! In each scenario we explore the emergent tools & provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments & Enterprises. the talk also touches upon the Integration of Biometrics & Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted "Peer-to-Peer" Financial Records & "Networked Spreadsheets"! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seville-one-v9printed-edited-171127145102-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation updates earlier talks and provides a CyberVision for Cybersecurity Tools &amp; Technologies for the next 5 to 10 Years. The talk discusses CyberScenarios for Scenario 2018: Integrated Physical &amp; CyberSecurity, Scenario 2019: Adaptive Security including the &quot;Internet of Things &amp; &quot;Smart Security&quot;, Scenario 2020: Self-Learning Security using Machine Learning, Scenario 2025 Intellgent Security based upon Networked Artificial Intellgence &amp; finally Scenario 2040 (!) - Neural Security based upon Advanced Deep Learning &amp; Artificial General Intelligence where we may see the emergence of &quot;Artificial Silicon Life&quot;?! In each scenario we explore the emergent tools &amp; provide some concrete examples of Advanced CyberSecurity Applications that are already available for Governments &amp; Enterprises. the talk also touches upon the Integration of Biometrics &amp; Digital Forensics into the 21st Century Cyber Toolkit. We also mention the role of Blockchains and CryptoCurrencies in the provision of Secure Encrypted &quot;Peer-to-Peer&quot; Financial Records &amp; &quot;Networked Spreadsheets&quot;! Talk concludes with Recommendations for the TOP 10 Actions that YOUR CSO can execute to provide maximal CyberDefence for your Business or Agency! This talk was given on the Tuesday 21st November 2017 @ the 36th International East-Wet Security Conference @ Seville, Spain - by Dr David E Probert.
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends! from Dr David Probert
]]>
900 6 https://cdn.slidesharecdn.com/ss_thumbnails/seville-one-v9printed-edited-171127145102-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Threats & Defence! - "Intelligent CyberSecurity"! /slideshow/cyber-threats-defence-intelligent-cybersecurity/82824930 seville-two-v9printed-edited-171127142610
Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.]]>

Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.]]>
Mon, 27 Nov 2017 14:26:10 GMT /slideshow/cyber-threats-defence-intelligent-cybersecurity/82824930 DrDavidProbert@slideshare.net(DrDavidProbert) Cyber Threats & Defence! - "Intelligent CyberSecurity"! DrDavidProbert Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration & Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism & Cyber Political & Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers & Cams, (3) Toxic eMail & Social Phishing (4) Database SQL Attacks & Web Hacks, (5) Classic Malware, Viruses & Trojans, (6) Authentication/Compliance Hacks including Missing Patches & Password Dictionaries, (7) Custom Design "Bot" such as Stuxnet & Flame, (8) Toxic Cookies, DNS & Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya & WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber & Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seville-two-v9printed-edited-171127142610-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation discusses TOP 10 CyberSecurity Threats - Exploration, Penetration &amp; Attack! We review some recent Case Studies of CyberCrime, CyberTerrorism &amp; Cyber Political &amp; Hacktivist Attacks. The Threats discussed include: !1) APT - Advanced Persistent Attacks, (2) Stealth Monitoring with Loggers &amp; Cams, (3) Toxic eMail &amp; Social Phishing (4) Database SQL Attacks &amp; Web Hacks, (5) Classic Malware, Viruses &amp; Trojans, (6) Authentication/Compliance Hacks including Missing Patches &amp; Password Dictionaries, (7) Custom Design &quot;Bot&quot; such as Stuxnet &amp; Flame, (8) Toxic Cookies, DNS &amp; Proxy Re-Direction, (9) DDoS - Distributed Denial of Service Attacks and finally (10) Ransomware using Toxic Scripts such as Petya &amp; WannaCry! The presentation concludes with recommendations for ways to defend against such attacks including both Technical and Operationsl Action Plans. We stress the importance of appointing a BOARD LEVEL Chief Security Officer to manage ALL aspects of both Cyber &amp; Physical Security for your Enterprise or government Agency. This talk was given on the Tuesday 21st November 2017 at the 36th East-West International Security Conference @ the Melia Hotel - Seville, Spain - by Dr David E Probert.
Cyber Threats & Defence! - "Intelligent CyberSecurity"! from Dr David Probert
]]>
532 4 https://cdn.slidesharecdn.com/ss_thumbnails/seville-two-v9printed-edited-171127142610-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-DrDavidProbert-48x48.jpg?cb=1746817557 I've spent more than 40 years working in the computing and telecommunications industries. During the 1990's I was particularly active in support the development of the Internet in the countries of Eastern Europe and the Former Soviet Union, including International projects such as KolaNet. Now in my "Retirement Years" I work exclusively on a "Pro Bono" (No Fee) Basis in sectors such as Cybersecurity, A.I. and Machine Learning. I enjoy delivering occasional Master Classes & Lectures for International Development Agencies, Educational Establishments & Professional Institutions. My interests include : Cybersecurity, AI & Machine Learning & Music + Travel. www.vaza.com https://cdn.slidesharecdn.com/ss_thumbnails/arctic2-240729071715-e7aebba3-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/our-intelligent-arctic-vision-2025-2040-extended-version/270587920 &quot;Our Intelligent Arcti... https://cdn.slidesharecdn.com/ss_thumbnails/arctic-vision-240625151944-d54e0c44-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/our-intelligent-arctic-vision-2025-2040/269881575 Our Intelligent Arctic... https://cdn.slidesharecdn.com/ss_thumbnails/ai-meets-security-230519123445-97bbe126-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ai-meets-21stc-security-trends-scenarios/257917593 AI Meets 21stC Securit...