Meet Our Speakers
Maj. Gen. (Ret.) Prof. Isaac Ben-Israel
Cyber Week ;
Blavatnik ICRC, Tel Aviv University ISR
We forget the most important thing there is that we have to do – all we have to do is look for pin points, vulnerabilities, places where it could hurt – and then watch how long it takes for hackers to get in via our incidents
When you think about the threats we’re facing, that’s where they are- attacks against elections, attacks against integrity. There’s someone manipulating the data. These things are going to become true, and very real, and very physical. There’s a world of difference between your spreadsheet crashes and you lose your data, or your car crashes and you lose your life. It might be same CPU, the same software, the same vulnerability, but wildly different consequences.
Take every incident, every compromise like it’s going to be your last. Take it seriously.
We’ve got to move to some kind of cognitive computational system that integrates machine learning, A.I., and an expert system. And we’ve got to have the ability to see events that hit each company and share them across companies within a sector to get sector-wide visibility and protection, and then share sector information with other sectors and the government for a comprehensive program. This is technically possible and it’ll happen.
If we look at adversity in the right way, we can harness its power to compel us all to do more in our industry, to fight a common adversary together. Adversity leveraged in the right way can only make us stronger, forcing us to focus on the outcomes that our cyber defenders need the most.
We see cyber which has been an ongoing part of the daily competition between nations, now clearly will be part of conflict between nations.
Cybersecurity will use AI for both attack and defense, however, you need to have a human in the loop to make the decision on who gets targeted
Whenever technology interfaces with base human behavior, the result is an amplification and an escalation. From a scientific point of view, this points to the mutation of behavior in cyber contexts… if we can figure out this amplification, then we can also figure out how to de-escalate.
We need to communicate and collaborate better. We obviously need to take a look at deceptive tech...we need to take a look at addressing organizations and we need to educate them and get them to listen... This gathering that we have here has the power to do so much good. Do some good, get out, communicate, collaborate.