Istanbul Cyber-Security Forum
- “Post-Security, Digital Revolution, Circular Economy, and Cyber Ecosystem”
SUB-THEMES
Cyber-Security in the MENA (Middle East and North Africa) and Other Regions
Standards and Norms in Cyber-Security
Industrial Cyber-Security
IoT and Cyber-Security
Mobility and Cyber-Security
DeepFake and Cyber-Security
Artificial Intelligence, Virtual Reality, and Cybersecurity
Cyber-Security in Critical Infrastructures
Cyber-Security for Decision Makers
Although during the Russian war in Ukraine, Belarus may be qualified as a Russian proxy, paradoxically, it can be as well perceived as a country struggling to save the rest of its independence from Moscow.
;
Artificial intelligence has become an important turning point of technological developments. Especially with the use of this technology a transformation process has begun in our lives. Systems developed and under development together with artificial intelligence technology: for example, the developm...;
The ‘Security in East Mediterranean’ Workshop, the first event within the scope of the East Mediterranean Program initiated by the TASAM National Defence and Security Institute and the Near East South Asia Strategic Studies Center (NESA) affiliated to the US Ministry of Defense, is held at Sheraton ...;
After the end of the Cold War, relations between the People's Republic of China (PRC) and the Russian Federation (RF) have developed dynamically, albeit seemingly unevenly. The possibility of a genuine strategic partnership between Russia and China seemed to be downplayed.;
One of the economic and foreign policy objectives of Turkiye is the development of the Middle Corridor on the New Silk Road route and thus becoming a logistics base in the terrestrial East-West trade via Eurasia and being a center in the supply chain.;
Turkish stance towards the ongoing Russian aggression in Ukraine is based on the national interest that implies avoiding risks and profiting from opportunities created by the conflict. The ultimate aim is to make its own place in the post-war international system more optimal than it was in the pre-...;
From the understanding of security in the past, which focused only on military threats from the Cold War period, which prioritized the security of states; in addition to the state actor, there is a transformation towards a new security understanding that deepens and expands in the political, economi...;
We have seen strong Muslim states destabilized, we have seen the UN Security Council role under the chapter seven of the charter undermined by the notion of so called “Coalitions of the Willing“. We have seen extension of out of area operations of NATO resulting in aggravation of regional conflicts ...;
-
17 Jul 2023 - 19 Jul 2023
- Sheraton Istanbul City Center -
- İstanbul - Türkiye
-
23 Nov 2023 - 24 Nov 2023
- İstanbul - Türkiye
The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.
-
03 Nov 2022 - 03 Nov 2022
- Ramada Hotel & Suites by Wyndham İstanbul Merter -
- İstanbul - Turkey