Istanbul Cyber-Security Forum

News

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. ...

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background. This has caused the basic architecture and services of the Internet to cause privacy and integrity problems over time. Due to the rapid growth, problems related to “accessibility“ have also increased over time, causing the concept of security to be one step behind in developments.

The expected effects of new and emerging technologies on the cyber threat environment; It has been confirmed by the authorities that the future will shape the multidimensional security environment, artificial intelligence, and machine learning, autonomous devices and systems, telecommunications and computing technologies, satellites and space assets, human-machine interfaces, quantum computing and threats in cyberspace are within the scope of hybrid warfare. And “cyber-space“ was accepted as the 5th dimension of the war.

While new technologies bring dynamism to business and daily life, they also contain unpredictable dangers. Today, we are faced with many new phenomena that start with the word "cyber". “Cyber-crime“, “cyber-fraud“, “cyber-bullying“, “cyber-war“ etc. And social awareness of these concepts is increasing day by day. Awareness, which has been started with the need for cyber-security, has already taken its place in business life as a new profession with the education and training of experts in the field of cyber-security.

The new pandemic expected after the Covid-19 outbreak maintains its importance as a strong thesis that "there may be problems in cyber-security and competitive governance of the ecosystem". Because the multidimensional cyber-security field has now become the nature of life. On the other hand, the business and sustainable development model is changing rapidly under the leadership of concepts such as "green economy" and "digital revolution", as it is better understood that moving from linear economy to "circular economy" is not an option but a necessity in the current pandemic process. This transformation, which also means new global standards, has the potential to radically change the competitive indexes. Knowledge economies focused on the "digital revolution", which redefines the meaning and value of power and property, will be the determinants of today and the future.

In this context, the Istanbul Cyber-Security Forum with the main theme of "Post-Security, Digital Revolution, Circular Economy and Cyber ​​Ecosystem"; will be organized with the following sub-themes concerning generating policy options for public, private sector and civil society decision-makers, offering proactive collaboration, model project/program proposals, and making a strategic contribution to global academic/expertise accumulation.

SUB-THEMES

Cyber-Security in the MENA (Middle East and North Africa) and Other Regions

Standards and Norms in Cyber-Security

Industrial Cyber-Security

IoT and Cyber-Security

Mobility and Cyber-Security

DeepFake and Cyber-Security

Artificial Intelligence, Virtual Reality, and Cybersecurity

Cyber-Security in Critical Infrastructures

Cyber-Security for Decision Makers

SECTORIAL WORKSHOPS AND SPECIAL PRESENTATIONS

Global Industrial Cyber Security Standards and Norms (led by Eurofins – France)

Mobility and IoT Cyber Security (led by IRIS – Germany)

Cyber Security in Critical Infrastructures (led by Derovis – Germany)

Academia, Education and Secure Coding (led by Secure Code Warriors – Australia)

Executive Cyber Security for Decision-makers (led by Teligencia – Germany)

BRAINS TURKEY (Biotechnology, Robotics, AI, Nanotechnology, Space and Strategic Services)

Cyber Security in Deepfake Product and Defence Ecosystem

Event Page
 
Event details and vision document can be accessed from the link below:

https://tasam.org/en/Etkinlik/18330/istanbul_cyber-security_forum_

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 465 ) Actiivities ( 219 )
Areas
Africa 0 148
Asia 0 234
Europe 0 40
Latin America & Carribean 0 34
North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 176 ) Actiivities ( 53 )
Areas
Balkans 0 93
Middle East 0 61
Black Sea and Caucasus 0 16
Mediterranean 0 6
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 74 )
Areas
Islamic World 0 147
Turkish World 0 29
Turkey ( 1 Fields )
Action
 Contents ( 221 ) Actiivities ( 59 )
Areas
Turkey 0 221

Historically, quality and numerical superiority have been vital, enabling modern armies to gain superiority on the battlefield. Rapid military-technological change in Artificial Intelligence-AI and robotic weapon systems due to the political and economic developments that led to the Second World War...;

Just beyond the Russian-Ukrainian War of February 24, 2022, Turkey has made great efforts to play the role of mediator between the two Black Sea states. Turkey has recently emerged as a reasonable and rational diplomatic player and has assumed a historically peaceful role in the conflict between Rus...;

Countries with strong historical consciousness and long political traditions often have to adapt their strategy to be able to face contemporary challenges. But even in the postmodern, information-oriented world, experience (even a bitter one) may be an advantage and not a burden. ;

Following the fall of the Soviet Union in 1991, the three Caucasian countries Armenia, Azerbaijan, and Georgia underwent an eventful process of democratization. Of the three, Georgia’s journey to Western-style democracy has witnessed civil uprisings, revolution, corruption, judicial reforms, and mil...;

As it was firstly held in Türkiye in 2015, the 9th of Istanbul Security Conference with the main theme of "Strategic Transformation in the Ecosystem: Climate, Nourishment, Demography, Meritocracy, Economy, Health, Education, Employment, Family-Youth and City Security" will be held by TASAM National ...;

As the West uses the issue of representation of Africa in international organizations as a tool to strengthen their relations with states in the continent, the sparks of global challenges spread to the U.N., G-20 and BRICS.;

Belt and Road Initiative; US-China competition; Biden-Xi talks; peacebuilding; Middle East;

Turkish Asian Center for Strategic Studies (TASAM) and the Institute for Strategic Studies of National Security Council of Mongolia (ISS) have signed a Memorandum of Understanding (MoU) agreement. ;

5th Marine and Maritime Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

2nd Istanbul Cyber-Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

7th Türkiye - Gulf Defence and Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

6th Türkiye - Africa Defence Security and Aerospace Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

9th Istanbul Security Conference (2023)

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey