Главная
Study mode:
on
1
Introduction
2
History of cyber espionage
3
Scale of attacks
4
Nationstate actors
5
Targeting
6
Standout incidents
7
OPM breach
8
How do Russian and Chinese attacks differ
9
Are Iran and North Korea more dangerous
10
How difficult is it to attribute attacks
11
Is it worth it to attribute attacks
12
What threat actors are doing
13
Are government departments able to improve their defenses
14
Cyber influence campaigns
15
States willing to tolerate cyber espionage
16
Response options
17
Cyber insurance
18
Biggest cyber crime networks
19
Role of social engineering
Description:
Explore the world of cyber espionage in this 27-minute Web Summit talk featuring James Trainor Jr. and Rob Sloan. Delve into the history and scale of cyber attacks, examining landmark incidents and the capabilities of various nation-state actors. Learn about targeting strategies, standout breaches like the OPM incident, and the differences between Russian and Chinese attack methods. Assess the potential dangers posed by Iran and North Korea, and understand the challenges of attributing cyber attacks. Investigate the evolving tactics of threat actors, the readiness of government departments to improve their defenses, and the impact of cyber influence campaigns. Discuss states' tolerance of cyber espionage, potential response options, and the role of cyber insurance. Gain insights into major cyber crime networks and the crucial role of social engineering in modern digital threats. Evaluate the implications for the security of the 2018 US midterm elections and beyond.

How Cyber Espionage Created a $100 Billion Industry

Web Summit
Add to list
0:00 / 0:00