ABSTRACT
Join us for a captivating keynote that will take you on a unique journey where the worlds of technology, martial arts, and open-source software community empowerment converge. Discover the power of partnership within the tech industry as we unveil innovative collaborations that have reshaped the cybersecurity landscape. Learn how principles borrowed from martial arts philosophy find practical application in the ever-evolving battle against cyber threats. Be inspired by the fusion of tech, martial arts wisdom, open-source innovation, and inclusivity for a resilient cyber world. Don't miss "The Knockout of the Century" in cybersecurity!
- Software supply chain security assurance at red hat: A partnership process model. Red Hat Customer Portal. (2022, November 7). https://access.redhat.com/articles/software%20_supply_chain_security_assuranceGoogle Scholar
- The Linux Foundation. (2022, September 13). New research from Snyk and the Linux Foundation reveals significant security concerns resulting from open source software ubiquity. Linux Foundation. https://www.linuxfoundation.org/press/press-release/state-of-open-source-securityGoogle Scholar
- Gracie, R. and Volponi, P. The 32 Principles: Harnessing the Power of Jiu-Jitsu to Succeed in Business, Relationships, and Life. BenBella Books.Google Scholar
Index Terms
- The Knockout of the Century: Cyber Resiliency through the Arts
Recommendations
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Cyber Social Engineering Kill Chain
Science of Cyber SecurityAbstractCyber attacks are often initiated with a social engineering attack to penetrate a network, which we call Cyber Social Engineering (CSE) attacks. Despite many studies, our understanding of CSE attacks is inadequate in explaining why these attacks ...
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
AbstractThere is a paradigm shift from traditional power distribution systems to smart grids (SGs) due to advances in information and communication technology. An advanced metering infrastructure (AMI) is one of the main components in an SG. ...
Highlights- In-depth exploration and analysis of the state-of-the-art have been conducted.
- ...
Comments