This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Getting the Cyber Future We Want, Not the One We Deserve
Polymorphis and Metaphoric Threats and Your Cyber Future
In honor of our Black Hat Abu Dhabi event, this web cast will take a step back from the deep technical forays Black Hat is know for, and instead give a broader look at the future of cyber conflict in the world. Are we inevitably headed toward a dark and chaotic world, as some of the FUD out there suggests? Will we live in an Orwellian society of watchers and imposed order? What are some realistic views of the next 15 years and beyond?
Pencils down for this one, and give your full attention to our very special guest, Director of the Cyber Statecraft Initiative of the Atlantic Council, Jason Healy, as he guides us through an array of possible out comes. Some are more preferable than others...
Director of the Cyber Statecraft Initiative of the Atlantic Council
Jason Healey is the Director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace. Previously he has worked cyber issues since the 1990s as a policy director at the White House, vice president at Goldman Sachs and a US Air Force intelligence officer. As a widely published on cyber conflict and statecraft, he is a board member of Cyber Conflict Studies Association, lecturer in cyber policy at Georgetown University and editor for the first book on cyber conflict history (due 2013).
Sr. Manager Threat Research Intelligence
Mr. Gragido possesses over 18 years of information security experience. A former United States Marine, Mr. Gragido began his career in the data communications information security and intelligence communities. Mr. Gragido worked within several information security consultancy roles performing and leading red teaming, penetration testing, incident response, security assessments, ethical hacking, malware analysis and risk management program development