Event Recap: 18th International Conference On Cyber Warfare And Security (ICCWS)


by Alex Desmond, co-host of the Forensic Focus podcast

Background

This year was the 18th International Conference on Cyber Warfare and Security (ICCWS). The word ‘international’ doesn’t necessarily mean it is definitively all nations, as there is a sister conference called the European Conference on Cyber Warfare and Security (ECCWS) and one that used to run out of Perth, Western Australia.

“ICCWS uniquely addresses cybersecurity, cyberwarfare, and information warfare. Over the years, the conference has been attended by a variety of security and military organisations, including the Cyber Security Policy Research Institute, more than 10 national defense colleges, NATO, SHAPE, etc.” – ACI website

Conference Scope

This year’s conference ran two in-person streams and two online streams that had different talks. There were 71 talks, including the two keynotes at the beginning of each day. The majority of talks were done by researchers in their respective fields, and topics ranged from military ethics and information warfare with a focus on the Jan 6 US Capitol attack to technical talks on digital forensics in different fields and remote hacking the CAN bus of cars.

For all the papers go here.

Dr George R. Lucas

Keynotes

The keynote speakers both had thought provoking talks. Mr Justin Fanelli spoke to Zero Trust and how it was used and developed in the US Navy. Dr George R. Lucas gave some insights to recent discussions and development around military ethics and the use of AI algorithms in drone technology in the current conflicts around the world.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

You can check out their bios from the conference, as well as information about the other chairs and organisers, here.

Accompanying Journal

Like other workshop conferences, the ICCWS partners with the Journal of Information Warfare, which helps support publishing speakers, whether they are seasoned professionals or students.

Key Takeaways

Some of the talks that stuck with me and that I have mentioned on the podcast with Si are worth mentioning in here, mostly because I think they’re universal and not a singular cyber domains issue to be conscious of.

Martti Lehto gave a talk on budding research into Cyber security training in Finnish basic and general upper secondary education. My immediate question on this was how the structure of schooling compares to others around the world when using the terminology ‘secondary education’. The motivation behind the research was fantastic, and I think it’s a question we should be asking ourselves in each country – “What should we be teaching children about cyber security?”. The early implementation within this paper focused on asking teachers qualitative questions in their abilities both with regard to cyber security in general, and the confidence they would have teaching this on top of the other curriculum subjects.

It is important to keep in mind that every area involving cyber security has a skills shortage, and in three decades’ time the school children will be choosing where they want their careers to go.

Clara Maathuis delivered a presentation on Social Media Manipulation Deep Learning based Disinformation Detection, along with two other talks as part of a series for her research. It focused in on the information manipulation surrounding the covid-19 pandemic and how social media, particularly twitter, could sway the public view and opinion on the matter.

This issue was highlighted by the UN as disinformation and an “existential risk to humanity”. Clara and her teams’ research were based on how to build deep learning models using an existing dataset. I won’t go into the model of choices here in this article (BERT and CNN were used), since the paper does a good job explaining and I would probably butcher it.

What I personally conclude after reading the paper is that humans are still so vital in training these models and ensuring that false positives or true negatives are identified where possible. However, with the sheer amount of information that is release into the web everyday, these models built of deep learning and data science principles are needed more than ever to help combat the issue.

Like all conferences though, I think the best part was the watercooler chats. The in-between talks gave an opportunity to really dive into the presenters’ content more and offered a chance to make connections with other attendees. It also allowed me to find potential guests for the podcast and make contacts relevant to my own interests and job.

In terms of cyber security conferences, it is unique, and since it’s accessible wherever you are in the world, I would highly recommend it to anyone that has the chance to check it out.

Next year

A trend has started to form with the international version of this conference, where every five years it visits South Africa. Details will be added to the ACI website soon.

Follow the conference on any of these:

Leave a Comment

Latest Videos

Digital Forensics News Round Up, February 28 2024 #digitalforensics #dfir

Forensic Focus 29th February 2024 4:58 pm

Digital Forensics News Round-Up, February 21 2024 #digitalforensics #dfir

Forensic Focus 21st February 2024 6:19 pm

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts. 

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director 
43:45 – Privacy of user data

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts.

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director
43:45 – Privacy of user data

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_ifoHVkjJtRc

How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing

Forensic Focus 21st February 2024 3:07 pm

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles