Cyber security is everyone’s responsibility.
What are the current trends in threats, risks, and vulnerabilities? How do threat actors exploit vulnerabilities to conduct ransomware attacks? Participate to understand Cyberspace as an operational environment and what to do about threats, risks, and vulnerabilities.
Cyberspace: hardware, and software which are used to create, process, store, retrieve and disseminate information in different types of interconnected networks that build a large, global network, built, and used by people, has transformed all aspects of human life. It enables information flows at speeds that never existed before; it creates value through e-commerce; it streamlines processes generating value to businesses, and it enables command and control of capabilities for crisis management or to conduct joint operations. However, threat actors identify and exploit vulnerabilities to conduct cyber attacks targeting organisations in academia, and the public and private sectors. The motive can be to steal intellectual property (knowledge), espionage, destruction, or for cybercriminal reasons. Many cases supporting this notion exist: WannaCry, NotPetya, and REvil. Therefore, with an understanding of Cyberspace as the operational environment, participants will get an understanding of threats, risks, vulnerabilities, and what to do about them.