[bsa_pro_ad_space id=1]

NATO’s largest Cyber Security Conference, NIAS (NATO Information Assurance Symposium), organized by the NCI Agency, will take place in Mons, Belgium on 15-17 October.

This 15th edition of the annual symposium, will focus on: ‘Digital transformation: smart machines for smarter decisions’.

As smart machines proliferate, NATO must be prepared to tap into the potential of these technologies so that Allied leaders can make the right decisions at the right time to protect our infrastructures, troops and populations.

Artificial Intelligence, Machine Learning and Big Data are just some of the innovations, which could both threaten NATO missions or support them.

The three-day event offers a unique opportunityfor NATO and national leaders, as well as cyber security specialists from across the Alliance, industry and academia to discuss best practices, exchange views and explore innovative cyber security solutions.

This annual symposium also serves as a platform for frontline IT staff and product developers to exhibit their innovations and share their knowledge of these cutting-edge technologies, which could benefit the Alliance.



Quality Keynote speakers from NATO, Academia and Industry.



Cutting edge technology tracks and exhibition of latest technology and products.


Cyber Talent

Attracting diverse cyber security talent..



Showcasing the latest Industry Innovations


Download the official NIAS2019 Conference app to access the day’s schedule, full exhibitor listings, maps, speaker bios and more.




Traditional and AI-Enabled Information Assurance

Artificial Intelligence (AI) has the capacity to enormously benefit NATO as it speeds up information collection and analysis, and improves decision-making.In the cyber space domain, artificial intelligence can help companies automatically detect anomalies, and neutralize common threats. It can be used for incident triage, determining the urgency of each attack, so experts can focus their efforts on the most important threats.

Machine learning can also be applied to cyber security, learning from previous threats to the organization, in order to foresee and prevent future attacks.
But can information assurance become completely automated? Can we rely on AI to conduct all cyber security?

In this topic, we will discuss the applications of Artificial Intelligence to information assurance, and whether human contribution is still necessary.


Addressing Supply Chain Security challenges

In cyberspace, the Alliance faces very similar threats to other large organizations from the private sector. For this reason, it is increasingly reliant on commercial technology to provide cyber security but as the supply chain gets longer, the risk of device tampering and malicious components grows.

Securing the supply chain consists in ensuring that no piece of hardware or software, no cyber and cloud services has been compromised.

Manufacturers, suppliers, wholesalers and distributors must work collaboratively to preserve the integrity of this supply chain as the Alliance is only as strong as its weakest link.

In this discussion, we will exchange best practices and review ways of addressing supply chain security challenges.


Data as a Strategic Resource

Timely access to accurate information is critical to decision-making in any organization.

For NATO, this information can be the difference between the safety of Allied infrastructure, territory and population, and its insecurity. It can be the difference between life and death.

It is therefore critical that the vast amount of open-source and commercial data available in the public sphere is collected and quickly analyzed, so Allied leaders receive accurate intelligence to inform their decisions.

It is safe to say that Big Data analytics and the development of predictive tools to identify the early signs of a crisis will play a key role in supporting NATO’s mission in the future.

These modern capabilities could help detect trends and signals to inform decision-makers of an impending threat or to detect disinformation campaigns.

In this topic, we will discuss how to make the most of this new strategic resource – data – to preserve the safety of the Alliance.

Moving from Information Assurance to Mission Assurance

IA to MA

One of the key roles of the NCI Agency in cyberspace is to protect NATO networks.

Every day, the Agency’s cyber warriors ensure that vital data is not compromised by potential adversaries and that it is remains readily available to commanders.

But their mission goes beyond this defensive task. The Cyber Security team must also evaluate the risk and potential impact of cyber-attacks so that it is understood by the organization and managed accordingly.

Military commanders must be assured that command and control capabilities will remain available and reliable at all times in a highly-contested cyberspace, as technology failure could have devastating results for troops.

In this topic, we will discuss cyber risk management and the move from information assurance to mission assurance.


Adoption of Cloud Technologies

The adoption of cloud technology presents opportunities for NATO, not least by providing flexibility to decision-makers, scientists and forces in the field.

It also provides greater infrastructure and service resiliency thanks to a distributed, redundant and state-of-the-art IT architecture.

But rolling out an enterprise-wide solution is not without its challenges, especially as a secure cloud service is based on trust and commercial arrangements.

And the Alliance faces specific difficulties, unique to the organization, such as ensuring the compliancy of the cloud with NATO security policies, and moving the enterprise to multiple cloud providers while maintaining the same security posture across the board.

In this topic, we will discuss how to create an operating environment that is more secure in the cloud than it was on-premises.

Share and Enjoy !

0 0