Istanbul Cyber-Security Forum

News

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. ...

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. This has caused the basic architecture and services of the Internet to cause privacy and integrity problems over time. Due to the rapid growth, problems related to “accessibility“ have also increased over time, causing the concept of security to be one step behind in developments.

The expected effects of new and emerging technologies on the cyber threat environment; It has been confirmed by the authorities that the future will shape the multidimensional security environment, artificial intelligence, and machine learning, autonomous devices and systems, telecommunications and computing technologies, satellites and space assets, human-machine interfaces, quantum computing and threats in cyberspace are within the scope of hybrid warfare. And “cyber-space“ was accepted as the 5th dimension of the war.

While new technologies bring dynamism to business and daily life, they also contain unpredictable dangers. Today, we are faced with many new phenomena that start with the word "cyber". “Cyber-crime“, “cyber-fraud“, “cyber-bullying“, “cyber-war“ etc. And social awareness of these concepts is increasing day by day. Awareness, which has been started with the need for cyber-security, has already taken its place in business life as a new profession with the education and training of experts in the field of cyber-security.

The new pandemic expected after the Covid-19 outbreak maintains its importance as a strong thesis that "there may be problems in cyber-security and competitive governance of the ecosystem". Because the multidimensional cyber-security field has now become the nature of life. On the other hand, the business and sustainable development model is changing rapidly under the leadership of concepts such as "green economy" and "digital revolution", as it is better understood that moving from linear economy to "circular economy" is not an option but a necessity in the current pandemic process. This transformation, which also means new global standards, has the potential to radically change the competitive indexes. Knowledge economies focused on the "digital revolution", which redefines the meaning and value of power and property, will be the determinants of today and the future.

In this context, the Istanbul Cyber-Security Forum with the main theme of "Post-Security, Digital Revolution, Circular Economy and Cyber ​​Ecosystem"; will be organized with the following sub-themes concerning generating policy options for public, private sector and civil society decision-makers, offering proactive collaboration, model project/program proposals, and making a strategic contribution to global academic/expertise accumulation.

SUB-THEMES

Cyber-Security in the MENA (Middle East and North Africa) and Other Regions

Standards and Norms in Cyber-Security

Industrial Cyber-Security

IoT and Cyber-Security

Mobility and Cyber-Security

DeepFake and Cyber-Security

Artificial Intelligence, Virtual Reality, and Cybersecurity

Cyber-Security in Critical Infrastructures

Cyber-Security for Decision Makers

SECTORIAL WORKSHOPS AND SPECIAL PRESENTATIONS

Global Industrial Cyber Security Standards and Norms (led by Eurofins – France)

Mobility and IoT Cyber Security (led by IRIS – Germany)

Cyber Security in Critical Infrastructures (led by Derovis – Germany)

Academia, Education and Secure Coding (led by Secure Code Warriors – Australia)

Executive Cyber Security for Decision-makers (led by Teligencia – Germany)

BRAINS TURKEY (Biotechnology, Robotics, AI, Nanotechnology, Space and Strategic Services)

Cyber Security in Deepfake Product and Defence Ecosystem

Event Page
 
Event details and vision document can be accessed from the link below:

https://tasam.org/en/Etkinlik/18330/istanbul_cyber-security_forum_

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 454 ) Actiivities ( 218 )
Areas
Africa 0 144
Asia 0 230
Europe 0 38
Latin America & Carribean 0 34
North America 0 8
Regions ( 4 Fields )
Action
 Contents ( 173 ) Actiivities ( 52 )
Areas
Balkans 0 93
Middle East 0 59
Black Sea and Caucasus 0 16
Mediterranean 0 5
Identity Fields ( 2 Fields )
Action
 Contents ( 175 ) Actiivities ( 74 )
Areas
Islamic World 0 146
Turkish World 0 29
Turkey ( 1 Fields )
Action
 Contents ( 219 ) Actiivities ( 57 )
Areas
Turkey 0 219

The Ukraine-Russia war has had shocking effects across the African continent and all over the world. Many African states, which are currently struggling with political, economic and sociocultural problems, are exposed to the effects of this war when they have yet to recover from the impact of the ...;

BRAINS2 TÜRKİYE is a brand/initiative with multi-programs based in Turkey which develops market, ecosystem and capacity in the ‘Biotechnology’, ‘Robotics’, ‘Artificial Intelligence’, ‘Nanotechnology’, ‘Space’ and ‘Strategic Services’ fields. The programs planned through identical visions and strateg...;

'Russia Is Not Angry; It's focusing.' This is a Russian aphorism put forward by Alexander Gorchakov, the Foreign Minister of the Russian empire, in 1856, after Russia lowered its international profile following its defeat in the Crimean War. Indeed, Russia is a country that has had its ups and dow...;

After the Industrial Revolution, with the development of production, trade, logistics and markets, it is seen that Britain in the 19th century and the United States later in the 20th century owed their control over world trade to navy.;

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the develo...;

Transforming the relations between Turkey and Middle East (or in a narrower context between Turkey and the Gulf States - where strategic dialogue is still developing despite its strong historical and cultural background) from a fragile axis to a cooperation axis that will adapt to new balances, new ...;

The geopolitical panorama created by the similarities of African countries as well as their differences provides crucial data both for their integration and for their potential for conflict. Both intra-continental and international defence and security strategies need to be determined in a way that ...;

The international institutions and the understanding of security created after World War II for global balance and control become unable to respond to the security needs of our age. The deepening of the last wave of globalization that started in the 1980s brought with it unprecedented alignments and...;

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 04 Nov 2022
  • DTB Hilton Istanbul Topkapi Hotel -
  • İstanbul - Turkey

6th Turkey - Gulf Defence And Securıty Forum

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Türkiye

5th Turkey - Afrıca Defence Securıty And Aerospace Forum

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Türkiye

4th Marıne And Marıtıme Securıty Forum 2022

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Askerî Müzesi ve Kültür Sitesi -
  • İstanbul - Türkiye

8th Istanbul Security Conference (2022)

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Turkey

World Turkic Forum Wise Persons Board Meeting 5

  • 14 Jun 2023 - 14 Jun 2023
  • İstanbul - Türkiye