Topics
Cyber Situational Awareness
- Situational Awareness Assessments
- Social Media Analysis, Collaborative Defense Approach
- Cyber Situational Awareness Tools & Techniques
- Network Situational Awareness
- Human Factor Cognitive
- National and Critical Infrastructure Security Issues
- Situation Awareness in Military Operations
- Cyber Situational Analytics
- Cyber Situational Awareness Frameworks
- Fusion Centres
- Situational Awareness Applications
- Cyber Situational Awareness Designs
- Solutions and Services
- Situational Awareness Training Cyber Attack Scenarios
- Situation-Aware and Context-Aware Network Applications
- Artificial Intelligence (AI)
- Machine Learning & Deep Learning,
- Ethics, Transparency and Trustworthy AI.
Artificial Intelligence & Robotics
- Predictive Data Analytics for Situation Awareness
- Machine Learning for Cyber Situation Awareness
- Artificial Intelligence for Cyber Situation Awareness
- Artificial Intelligence & Machine Learning for Cybersecurity
- Autonomous & Self-driving
- Self-Healing, Domestic Assistance
- Autonomous Healthcare and Assistance
- Industrial Manufacturing Robotics
- Search and Rescue Operations
Human Factor Cognition
- Workload
- Perception
- Stress
- Knowledge
- Training and Expertise
- Risk Assessment and Decision Making,
- Forecasting and Prediction Operator SA & Team SA
- Knowledge, Skills and Abilities (KSA)
Blockchain Technologies
- Cryptocurrency
- Regulation of Cryptocurrencies
- Mechanisms to address Environmental
- Social and Governance (ESG) concerns with Blockchain Technologies
- Bitcoin & Bit-everything
- Blockchain in Manufacturing,
- Blockchain in Banking & Financial Systems,
- Blockchain in Aviation
- Blockchain in Pharmaceuticals
- Blockchain in IoT
- Blockchain in Defence
- Blockchain in Cybersecurity Operations
- Blockchain in Publications
- Blockchain in Smart Contracts
- Blockchain in the Energy Sector & Utilities
STEM & Cyber Security Education
- Cyber Security in childhood education,
- Code – Teaching Coding for Kids, Teens and Colleges
- Secure by Code
- Secure by Design
- Secure by Default
- Immersive learning for Cyber
- Metaverse and Cybersecurity Education
Social Media, Wearable and Web Analytics
- Advances in Social Media
- Trust and privacy in Social Media
- Social Medial Big Data Analysis
- Social Network Analysis
- Social Media Technologies Advances in Wearable
- Wearable in e-Health
- Wearable in Fitness
- Wearable and Security
- Trust and Privacy in Wearable
- Wearable Technologies
- Economic Importance of Wearable
- Web Analytics & Cyber Intelligence
- Advances in Web Analytics Web
- Analytics for Law Enforcement and Security Monitoring
- Legal Issues of Web Analytics
- Law, Legislation and Compliance
- Security, Trust, Privacy
- Web Analytics for Business Intelligence
- Responsible use of Social Media
- Geolocation Content-Aware analytics
- Digital Content
- Customer-centric Analysis
- Social Network Analysis
- Cyber Intelligence
Cyber Security
Application Container Platform Security
Cyber Incident Response
- Cyber Incident Analysis
- Cyber Incident Correlation and Assessment,
- Coordination, Containment
- Root Cause Analysis (RCA)
- Cyber Incident Management
- Emergence Services
- Preparedness & Readiness
- Human in the Loop
- Training, Processes and Procedures
- Policy and Standards,
- Emergency Services
- Forensic Readiness and Investigations
- Cyber Incident Notification and Announcements
- Cyber Incident Management Tool, Framework and Methodology
- Expertise, Skills, Knowledge and Resource
- Maturity Model and Goal Setting
- Certification and Accreditation
- Cyber Incident Responders
- Incident Response Organisation
- Investigation Techniques – Rule-Based Systems & Expert Systems
- Adaptive Learning Systems & Predictive Systems
- The use of Biometrics to aid Forensic Investigations
- Speak, audio and voice Recognition for forensics
- Correlation and cross-correlation for Incident Analysis
- Cross-Domain Analysis, Training, Processes and Procedures, Policy and Standards, Emergency Services
- Chain of Custody, Forensic Readiness and Investigations
- Cyber Incident Notification and Announcements
- Cyber Incident Management Tool, Standardisation, Framework and Methodology
- Expertise, Skills, Knowledge and Resource
- Maturity Model and Goal Setting
- Certification and Accreditation
- Memberships to Cyber Incident Responders
- Incident Response Organisation.