Date: October 5-6, 2017
The annual Cyber3 Conference focused on Japan’s cybersecurity goals for 2020 and global cooperation on cybersecurity. The conference took place at Keio University’s Mita Campus in Tokyo on October 5th and 6th, 2017.
Date: March 2-3, 2017
This two-day conference jointly hosted by Keio University and Sasakawa USA in Tokyo explored the human talent component of Cybersecurity, focusing on education, training, and use cases while discussing exciting innovative technology and policy.
Tags: admiral dennis blair, bud roth, cyber, cyber threats, cybersecurity, Dennis Blair, education, industry, Japan, keio university, policy, security, Technology, us-japan cooperation, william bud roth, workforce
U.S. policymakers are moving too slowly in dealing with the dynamic threat from cyberspace, Sasakawa USA’s Adm. Dennis Blair said October 31 at an event rolling out the publication of “Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats.”
Author: William "Bud" Roth
There has been a lot of legal debate about whether Bitcoin is a currency, a security, or a commodity. That judgement will ultimately determine whether Bitcoins used to pay ransom are treated as stolen money (fungible) or stolen goods (reclaimable). Law enforcement should treat Bitcoin as a commodity and, in doing so, the victims of ransomware who pay would have recourse against all future owners of the ransomed Bitcoins to reclaim them.
Tags: bitcoin, blackmail, blog, commodity, currency, cyber, cyber beat, cyber blog, cyber crime, cyber law, encrypt, encryption, exchanges, fungible, money, ransomeware, reclaimable, security, stolen goods, stolen money, william bud roth
Author: Graham Cadwell Dietz
Ethical hackers are helpful, certified security professionals. Ethical hacking is an established security. Japan’s METI is smart to leverage it.
Tags: Bramah, cyber, cyber beat, cyber blog, cyber security, cybersecurity, cybersecurity law, ethical hacker, hacker, Japan, METI, penetration test, Pentagon, Science & Technology, Science and Technology, security, Technology, white hat