I am beyond grateful for the opportunity to have presented “Cyber Shield Up: They Shall Not Pass” at the University of Crete, Department of Computer Science. A huge thank you to Professor Evangelos Markatos for the invitation and for fostering such an engaging and curious academic environment.

The interaction with the students was rewarding, sparking insightful discussions and sharing ideas on cyber security. We delved into the anatomy of cyber threats, explored the robust controls organizations can deploy, and discussed how to nurture the next generation of cyber defenders. The enthusiasm and insight from the students were truly inspiring!

For those interested, I’ve shared the slides from my presentation on SlideShare :

I’m excited to share these insights and discussions with more (academic) communities. If your university is interested in exploring the landscape of cyber security, I would be thrilled to present and engage with more bright minds.

Special Highlight: the iconic VAX 8600 and VAX 11/780 computers. These pictures serve as a fascinating reminder of the evolutionary journey of computing technology, marking a time when they were at the cutting edge of computational power.

The abstract of the presentation can be found below:

Cyber Shield Up: They Shall Not Pass

Abstract:

Cyber Shield Up: They Shall Not Pass” is a lecture aimed at demystifying the complex world of cyber defense for computer science students. This presentation is structured into three parts, each designed to equip students with an understanding of cybersecurity’s challenges and opportunities.

Part A: Anatomy of Cyber Threats — The first part is a deep dive into the vast array of cyber threats that challenge the integrity of our digital ecosystem. This exploration ranges from financial motivated threats, hacktivism to more sophisticated cyber espionage and Advanced Persistent Threats (APTs). By examining the tactics, techniques, and procedures (TTPs) of cyber adversaries, students will gain an understanding of the threat landscape and the importance of staying ahead in the cyber security game.

Part B: The Corporate Cyber Shield — This part will provide insights about how organisations stay protected against modern cyber threats (explained in the first part of the lecture). Students will explore the disciplines that organizations adopt, including threat intelligence, security operations centers (SOCs), vulnerability management, and others. The goal for the students is to understand how today’s cyber defense teams are structured.

Part C: Building the Cyber Defenders — The final part focuses on the next generation of cyber security professionals. It outlines the essential technical skills, such as system security, application security, and incident response, and pairs them with critical core skills like analytical thinking and effective communication. Students will leave with actionable advice on how to embark on their cyber security careers, including certifications, networking, and continuous education pathways.

“Cyber Shield Up: They Shall Not Pass” aims not only to highlight the threats and defenses but also to inspire students to envision their roles in safeguarding our digital ecosystem.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.