USA küberturbe valdkonnas töötava majandusteadlase Scott Borg'i avalik loeng TTÜ-s 1. nov kell 16:00 U01-202
1. novembril kell 16:00 peab aulataguses auditooriumis U01-202 avaliku loengu USA küberturbe valdkonnas töötav majandusteadlane Scott Borg. Teemaks küber-ökosüsteemid ja see, kuhu kübermaailm liigub ning kuidas see on majandusega seotud.
Scott Borg on USA majandusteadlane, US Cyber Consequences Unit direktor. Nimetatud uurimisasutus keskendub küberrünnakute strateegiliste ja majanduslike mõjude uurimisele. Scott Borg on maailmas laialt tunnustatud küberturvalisuse majanduslike aspektide uurimise ekspert. Tema meetodid majandusteaduse mudelite kasutamisel küberturvalisuse valdkonnas on andnud suhteliselt täpse pildi arengutest küberturvalisuse valdkonnas alates 2002 a.
Loeng toimub inglise keeles.
Tutvustus inglise keeles:
The Role of Fake News and Other Indirect Cyber Actions in Cyber Campaigns
Director (CEO) and Chief Economist
U.S. Cyber Consequences Unit
People planning cyber defense and cyber exercises need to take account of the full range of cyber actions that an adversary can employ in a cyber campaign. This talk will focus on actions utilizing information technology that are neither cyber attacks, nor conventional military operations. It will introduce a more comprehensive way of thinking about cyber conflict.
Scott Borg is Director of the U.S. Cyber Consequences Unit, an independent, nonprofit research institute that investigates the strategic and economic consequences of cyber attacks. He is widely recognized as the world’s leading authority on the economics of cyber security. He has done extensive, influential, groundbreaking work on the strategies of cyber conflict.
Scott Borg has long been a leader in the development of cyber-conflict exercises. He was the chief economist and one of the main scenario planners for both Livewire and CyberStorm, the United States’ first two large-scale national cyber-security exercises. He was Red Team Commander for the famous Co-Rev War Game III, where the low-budget Red Country defeated the high-budget Blue Country by putting most of its resources into cyber weapons and later biological weapons, while Blue was still investing in conventional weapons. Borg led the international team that created and ran the first Estonian National Cyber-Security Exercise. In this exercise, he personally wrote all six of the interlocking scenarios and, in collaboration with Steve Snyder, created all of the news bulletins and other documents that appeared in the exercise.
Borg has been the principal proponent of a quantitative, risk-based approach to cyber security. He created most of the economic models used in implementing this approach. These include models for quantifying cyber threats, cyber consequences, and cyber vulnerabilities. He is responsible for many of the concepts that are now used to understand the effects of cyber attacks in business contexts.
Borg’s many technical contributions to cyber security include pioneering research on the techniques for hiding and finding malware and new methods for analyzing it. He is author of The ISA Guidelines for Securing the Electronic Supply Chain, the most comprehensive reference document for protecting electronics manufacturing. Along with John Bumgarner, he is co-author of the new US-CCU Cyber-Security Matrix, a complete survey of genuinely useful cyber defense measures, more than a thousand items long, organized according to the attacker activities they are designed to prevent.
Partly because of the way he has been able to employ economic models, Borg’s record for anticipating new developments in cyber security since 2002 is probably unequaled. He was able to predict Stuxnet, for example, its exact target, and exactly how it would reach and damage that target fourteen months before it as found. He has been quoted in most of the world’s leading news publications, appears frequently on radio and television, served on the Commission on Cybersecurity for the 44th Presidency, and has lectured at Harvard, Yale, Columbia, and other leading universities. His current research is on the implications of cyber security for international relations.