The role of malware in intelligence operations (partner presentation)

Wednesday 3 October 15:00 - 15:30, Red room

Kenneth Geers (Comodo Cybersecurity)



Imagine you are king or queen for a day. How would you employ the time and talent of computer hackers? Whom would you target, with what type of malware, and for what purpose? Where would you set technical, legal, and ethical constraints? This presentation will examine the role of malicious software in real-world nation-state intelligence operations. Information technology continuously transforms the nature of statecraft, from external threats to internal security. This talk will clarify the roles and risks of law enforcement, counterintelligence, and foreign intelligence operations in the Internet era. We will consider the attack and defence of everything in a modern state, from elections to electricity. And finally, we will discuss how enterprises should respond to a threat that has no fear of prosecution or retaliation.

 

Kenneth-Geers-web.jpg

Dr Kenneth Geers

Dr Kenneth Geers (PhD, CISSP): Comodo Cybersecurity Chief Research Scientist, NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate. 20 years US Government (US Army, NSA, NCIS, NATO); FireEye Senior Global Threat Analyst. Author Strategic Cyber Security, Editor Cyber War in Perspective, Editor The Virtual Battlefield, Technical Expert Tallinn Manual, many articles and chapters on international and cyber security. 

@KennethGeers


   Download slides

Back to VB2018 Programme page

Other VB2018 papers

The Big Bang Theory by APT-C-23

Lotem Finkelstein (Check Point)
Aseel Kayal (Check Point)

Fire & ice: making and breaking macOS firewalls

Patrick Wardle (Digita Security)

From drive-by download to drive-by mining: understanding the new paradigm

Jérôme Segura (Malwarebytes)

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.