TOPICS

Topics

Cyber Situational Awareness

  • Situational Awareness Assessments
  • Cyber Situational Awareness Tools & Techniques
  • Human Factor Cognitive
  • Situation Awareness in Military Operations
  • Cyber Situational Awareness Frameworks & Fusion Centres
  • Situational Awareness Applications, Design & Operations
  • Cyber Situational Awareness Designs
  • Situational Awareness Training 

Artificial Intelligence & Robotics

  • Predictive Data Analytics for Situation Awareness
  • Machine Learning for Cyber Situation Awareness
  • Artificial Intelligence for Cyber Situation Awareness
  • Artificial Intelligence & Machine Learning for Cybersecurity
  • Autonomous & Self-driving
  • Self-Healing, Domestic Assistance
  • Autonomous Healthcare and Assistance
  • Industrial Manufacturing Robotics
  • Search and Rescue Operations

Human Factor Cognition

  • Workload
  • Perception
  • Stress
  • Knowledge
  • Training and Expertise
  • Risk Assessment and Decision Making,
  • Forecasting and Prediction Operator SA & Team SA
  • Knowledge, Skills and Abilities (KSA)

Blockchain Technologies

  • Regulation of Cryptocurrencies
  • Social and Governance (ESG) concerns with Blockchain Technologies
  • Blockchain Applications, in Manufacturing, Banking & Financial Systems, Aviation, Pharmaceuticals, IoT & Publications
  • Blockchain in Defence & Cybersecurity Operations
  • Blockchain & Smart Contracts
  • Blockchain in the Energy Sector & Utilities

STEM & Cyber Security Education

  • Cyber Security in childhood education,
  • Code – Teaching Coding for Kids, Teens and Colleges
  • Secure by Code
  • Secure by Design
  • Secure by Default
  • Immersive learning for Cyber
  • Metaverse and Cybersecurity Education

Social Media, Wearable and Web Analytics

  • Advances in Social Media
  • Trust and privacy in Social Media
  • Social Medial Big Data Analysis
  • Social Network Analysis
  • Trust and Privacy in Wearable
  • Advances in Web Analytics Web
  • Security, Trust, Privacy

Cyber Security

  • Cyber Security
  • App, Web & Mobile Security
  • Wireless & Sensor Network Security
  • Software Coding Security
  • Digital Trust and Reputation
  • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
  • Security Standardisation
  • Intrusion Detection Systems
  • Protection of Digital Services
  • Security, Trust, Privacy, Security in Online Gaming Systems
  • Security in e-Government and Electoral Systems
  • Content Security
  • Protection of Public Online Content Distribution Systems
  • Secure practices, processes and procedures in Public Online Services
  • Cryptography & Quantum Computing

Cyber Incident Response

  • Cyber Incident Analysis
  • Cyber Incident Correlation and Assessment, Management
  • Forensic Readiness and Investigations
  • Cyber Incident Management Tool, Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • The use of Biometrics to aid Forensic Investigations, speech, audio and voice Recognition for forensics
  • Cross-Domain Analysis, Training, Processes and Procedures, Policy and Standards, Emergency Services
  • Cyber Incident Management Tool, Standardisation, Framework and Methodology.

Cyber Operations

  • Security Operations Centre (SOC) Operations
  • Security Operations Centre (SOC) Architecting & Engineering
  • Cyber Threat Detection & Threat hunting
  • Detection Engineering
  • Operational Technology (OT) & Critical Infrastructure Security
  • Green & Sustainable Cyber/IT