Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Cyber Attribution - Beyond the Breach: Challenges, Techniques, and Policy Implications

Автор: Canadian Institute for Cybersecurity (CIC)

Загружено: 2025-10-16

Просмотров: 69

Описание:

22nd Annual International Conference on Privacy, Security & Trust, August 2025.

Panel - Cyber Attribution - Beyond the Breach: Challenges, Techniques, and Policy Implications
This panel's primary aim is to promote dialogue across technical, academic, and policy domains to enhance cyber defence, resilience, and accountability mechanisms. The panel members will discuss the evolving landscape of cyber attribution in response to increasingly complex and persistent cyber threats. Moving beyond the initial breach, the panellists will address the technical, operational, and legal challenges of identifying threat profiles and actors, attributing attacks with confidence, and navigating geopolitical sensitivities. The discussion will illuminate the critical needs for cyber attribution across various contexts, including national security and the protection and resilience of critical infrastructure, where the stakes are high and the consequences far-reaching. Another focus of the panel is the emerging methodologies, such as AI-assisted forensics and behavioural analytics, for policy development and deterring future threats.

• Moderator: Colin MacSween, Director General, National Cybersecurity, Public Safety Canada
• Kelly Anderson, Director, International Cyber and Critical Technology Policy, Global Affairs Canada
• Ahmed Al-Rawi, Associate Professor, Simon Fraser University
• Argyri Panezi, Canada Research Chair in Digital Information Law and Policy, University of New Brunswick
• Kostia Nikolaiev, Product Manager, Mastercard

Colin MacSween is the Director General, National Cyber Security within the National and Cybersecurity Branch at Public Safety Canada. He has previously worked with the Department of National Defence, the Canada Border Services Agency and, most recently, the Canadian Security Intelligence Service. MacSween holds a Master of Public Administration from Dalhousie University.

Kelly Anderson currently serves as Director for International Cyber and Critical Technology Policy at Global Affairs Canada. She joined the Department of Foreign Affairs and International Trade in 1997. At Headquarters, Anderson has worked in a variety of assignments including Deputy Director for NATO, OSCE and European Defence Cooperation; Deputy Director for Conventional, Chemical and Biological Weapons; and, as Deputy Director for Space Policy and Regulation. She has served overseas at the Canadian Embassies in Belgrade, Serbia and Washington, DC. She was Deputy Permanent Representative of Canada to the Conference on Disarmament in Geneva from 2011-2014 and, most recently, served as Counsellor and Head of the Foreign Policy and Diplomacy section of the Canadian Embassy to Austria.

Dr. Ahmed Al-Rawi is an Associate Professor of News, Social Media, and Public Communication at the School of Communication at Simon Fraser University. He is also the founder and director of the Disinformation Project, and his research interests are related to news, global communication, misinformation, and social media with emphasis on Canada and the Middle East.

Dr. Argyri Panezi is the Tier 2 Canadian Research Chair in Digital Information Law and Policy at the University of New Brunswick (UNB), an affiliated member of the Canadian Institute for Cybersecurity. In her role as the director of UNB's Legal Innovation Laboratory she is also involved in policymaking in New Brunswick, working in collaboration with the judiciary, government, and civil society actors. Panezi's research explores the effects that disruptive technologies have on citizens, institutions, and the law.

Kostiantyn (Kostia) Nikolaiev is a seasoned Product Manager with over 15 years of cross-functional experience in technology and software development. Currently at Mastercard, he leads initiatives in identity verification and fraud detection. Nikolaiev has held leadership roles across diverse sectors including gaming, fintech, and B2B SaaS, and has a strong track record of building and scaling product teams, launching innovative solutions, and driving business growth. He holds a Master’s degree in Mathematics and Computer Science and is a Certified Scrum Product Owner.
-------------------------------
To learn more about the Canadian Institute for Cybersecurity watch,    • Canadian Institute for Cybersecurity  
Annual International Conference on Privacy, Security & Trust, https://pstnet.ca/pst2025/

#CybersecurityAwareness #CyberAttribution #CyberSecurity #DigitalPolicy #AIForensics #CriticalInfrastructure #TechPolicy

Stay connected with us!
Twitter:   / cic_unb  
Facebook: https://fb.me/cicunbca
LinkedIn:   / canadian_institute_cybersecurity  
Blog: https://cyberdailyreport.com/blog
Website: https://www.unb.ca/cic/

Canadian Institute for Cybersecurity
University of New Brunswick
46 Dineen Drive, Fredericton, NB E3B 9W4

Cyber Attribution - Beyond the Breach: Challenges, Techniques, and Policy Implications

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Cyber Attribution Data Centre (CADC): The Future of Identifying Cyber Threat Actors

Cyber Attribution Data Centre (CADC): The Future of Identifying Cyber Threat Actors

Почему люди кликают: уроки качественного исследования с Дэвидом Шипли и Майклом Джойсом

Почему люди кликают: уроки качественного исследования с Дэвидом Шипли и Майклом Джойсом

Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto

Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto

Cybersecurity and the Law - Quo vadis, Canada? by Dr. Argyri Panezi

Cybersecurity and the Law - Quo vadis, Canada? by Dr. Argyri Panezi

НА каком ЯЗЫКЕ лучше ДУМАТЬ? — ТОПЛЕС

НА каком ЯЗЫКЕ лучше ДУМАТЬ? — ТОПЛЕС

Ideologia Rosji jako trwałe źródło zagrożenia || Radosław Sikorski - didaskalia#163

Ideologia Rosji jako trwałe źródło zagrożenia || Radosław Sikorski - didaskalia#163

Cybersecurity Outreach and Awareness at CIC and Beyond by Griffin Higgins

Cybersecurity Outreach and Awareness at CIC and Beyond by Griffin Higgins

Getting to Yes: Executive Leadership and Cybersecurity by Dan Doran

Getting to Yes: Executive Leadership and Cybersecurity by Dan Doran

АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами

АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами

Understanding and Addressing Fairwashing in Machine Learning by Sébastien Gambs

Understanding and Addressing Fairwashing in Machine Learning by Sébastien Gambs

Изображая священника. Кто следил за Христо Грозевым

Изображая священника. Кто следил за Христо Грозевым

The Next Cyber Era by Rajiv Gupta

The Next Cyber Era by Rajiv Gupta

4 Hours Chopin for Studying, Concentration & Relaxation

4 Hours Chopin for Studying, Concentration & Relaxation

Настоящая причина болезни Альцгеймера. Профилактика деменции

Настоящая причина болезни Альцгеймера. Профилактика деменции

ДНК создал Бог? Самые свежие научные данные о строении. Как работает информация для жизни организмов

ДНК создал Бог? Самые свежие научные данные о строении. Как работает информация для жизни организмов

Disruptive Innovation Explained

Disruptive Innovation Explained

Отзыв Microsoft: абсолютный КОШМАР конфиденциальности 2025 года

Отзыв Microsoft: абсолютный КОШМАР конфиденциальности 2025 года

За экраном: кибербуллинг как угроза кибербезопасности с доктором Виндхьей Ранкотге

За экраном: кибербуллинг как угроза кибербезопасности с доктором Виндхьей Ранкотге

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

Weaponizing Intelligence: Understanding LLM-Driven Malware and Zero-Day Threats by Samita Bai

Weaponizing Intelligence: Understanding LLM-Driven Malware and Zero-Day Threats by Samita Bai

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]