The presentation for my talk at the "Ukraine and the Challenges of International Law: Annexation, Aggression, Cyber Warfare" conference hosted at the Cambridge University
This document discusses various cybersecurity issues facing the cryptocurrency and FinTech industries. It notes that 36 cryptocurrency exchanges are now defunct due to hacks that stole over 950,000 bitcoins. Mining software is also vulnerable to exploits that could allow attackers to redirect funds or install malware. The document recommends using multisignature wallets, key derivation, blockchain records, cold storage, backups and other techniques to better manage security risks for cryptocurrency projects.
The fifth conference of the Ukrainian Information Security Group was held on December 3, 2010 in Kyiv and attracted 55 information security professionals. The conference featured 14 presentations on topics such as IT governance, risk management, vulnerability management, security testing, and social aspects of information security. Products from sponsors Cisco, Checkpoint, RSA, and Zyxel were demonstrated. Feedback from attendees was positive about the quality of presentations and organization of the event.
The document discusses how network security assessments have traditionally been done manually, which is time-consuming and error-prone. It then describes how Cisco used automation to map their entire global network infrastructure in two weeks. Several case studies are presented that show how automation can efficiently analyze network topology and access, detect vulnerabilities and policy violations, and evaluate proposed configuration changes. Automation provides a consistent, repeatable process for network security that improves visibility, prioritization of issues, and decision making.
The document provides a list of subjects in the information security market of Ukraine, including their names, websites, main areas of business, and alternative areas. It was developed by the Ukrainian Information Security Group and contains over 100 entries of organizations working in areas such as integration, consulting, distribution, education, and vendor representation in Ukraine. The table is intended to be a permanent address book of contacts in the information security industry in Ukraine.