Istanbul Cyber-Security Forum

News

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. ...

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. This has caused the basic architecture and services of the Internet to cause privacy and integrity problems over time. Due to the rapid growth, problems related to “accessibility“ have also increased over time, causing the concept of security to be one step behind in developments.

The expected effects of new and emerging technologies on the cyber threat environment; It has been confirmed by the authorities that the future will shape the multidimensional security environment, artificial intelligence, and machine learning, autonomous devices and systems, telecommunications and computing technologies, satellites and space assets, human-machine interfaces, quantum computing and threats in cyberspace are within the scope of hybrid warfare. And “cyber-space“ was accepted as the 5th dimension of the war.

While new technologies bring dynamism to business and daily life, they also contain unpredictable dangers. Today, we are faced with many new phenomena that start with the word "cyber". “Cyber-crime“, “cyber-fraud“, “cyber-bullying“, “cyber-war“ etc. And social awareness of these concepts is increasing day by day. Awareness, which has been started with the need for cyber-security, has already taken its place in business life as a new profession with the education and training of experts in the field of cyber-security.

The new pandemic expected after the Covid-19 outbreak maintains its importance as a strong thesis that "there may be problems in cyber-security and competitive governance of the ecosystem". Because the multidimensional cyber-security field has now become the nature of life. On the other hand, the business and sustainable development model is changing rapidly under the leadership of concepts such as "green economy" and "digital revolution", as it is better understood that moving from linear economy to "circular economy" is not an option but a necessity in the current pandemic process. This transformation, which also means new global standards, has the potential to radically change the competitive indexes. Knowledge economies focused on the "digital revolution", which redefines the meaning and value of power and property, will be the determinants of today and the future.

In this context, the Istanbul Cyber-Security Forum with the main theme of "Post-Security, Digital Revolution, Circular Economy and Cyber ​​Ecosystem"; will be organized with the following sub-themes concerning generating policy options for public, private sector and civil society decision-makers, offering proactive collaboration, model project/program proposals, and making a strategic contribution to global academic/expertise accumulation.

SUB-THEMES

Cyber-Security in the MENA (Middle East and North Africa) and Other Regions

Standards and Norms in Cyber-Security

Industrial Cyber-Security

IoT and Cyber-Security

Mobility and Cyber-Security

DeepFake and Cyber-Security

Artificial Intelligence, Virtual Reality, and Cybersecurity

Cyber-Security in Critical Infrastructures

Cyber-Security for Decision Makers

SECTORIAL WORKSHOPS AND SPECIAL PRESENTATIONS

Global Industrial Cyber Security Standards and Norms (led by Eurofins – France)

Mobility and IoT Cyber Security (led by IRIS – Germany)

Cyber Security in Critical Infrastructures (led by Derovis – Germany)

Academia, Education and Secure Coding (led by Secure Code Warriors – Australia)

Executive Cyber Security for Decision-makers (led by Teligencia – Germany)

BRAINS TURKEY (Biotechnology, Robotics, AI, Nanotechnology, Space and Strategic Services)

Cyber Security in Deepfake Product and Defence Ecosystem

Event Page
 
Event details and vision document can be accessed from the link below:

https://tasam.org/en/Etkinlik/18330/istanbul_cyber-security_forum_

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 471 ) Actiivities ( 219 )
Areas
TASAM Africa 0 149
TASAM Asia 0 236
TASAM Europe 0 43
TASAM Latin America & Carribea... 0 34
TASAM North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 177 ) Actiivities ( 54 )
Areas
TASAM Balkans 0 93
TASAM Middle East 0 61
TASAM Black Sea and Caucasus 0 16
TASAM Mediterranean 0 7
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 75 )
Areas
TASAM Islamic World 0 147
TASAM Turkic World 0 29
TASAM Türkiye ( 1 Fields )
Action
 Contents ( 223 ) Actiivities ( 59 )
Areas
TASAM Türkiye 0 223

Although during the Russian war in Ukraine, Belarus may be qualified as a Russian proxy, paradoxically, it can be as well perceived as a country struggling to save the rest of its independence from Moscow. ;

Artificial intelligence has become an important turning point of technological developments. Especially with the use of this technology a transformation process has begun in our lives. Systems developed and under development together with artificial intelligence technology: for example, the developm...;

After the military coup, Niger's future hangs in uncertainty driven by terrorism, necessitating the presence of Western allies in the Sahel region.;

The ‘Security in East Mediterranean’ Workshop, the first event within the scope of the East Mediterranean Program initiated by the TASAM National Defence and Security Institute and the Near East South Asia Strategic Studies Center (NESA) affiliated to the US Ministry of Defense, is held at Sheraton ...;

After the end of the Cold War, relations between the People's Republic of China (PRC) and the Russian Federation (RF) have developed dynamically, albeit seemingly unevenly. The possibility of a genuine strategic partnership between Russia and China seemed to be downplayed.;

Wars have been going on since the first humanity and gained new dimensions in the last century fed by different objects. As the aerospace and space race increased in the bipolar world, whose tensions increased during the Cold War period, it has become clear that the unpredictable works on rocket tec...;

One of the economic and foreign policy objectives of Turkiye is the development of the Middle Corridor on the New Silk Road route and thus becoming a logistics base in the terrestrial East-West trade via Eurasia and being a center in the supply chain.;

Turkish stance towards the ongoing Russian aggression in Ukraine is based on the national interest that implies avoiding risks and profiting from opportunities created by the conflict. The ultimate aim is to make its own place in the post-war international system more optimal than it was in the pre-...;