Eclipse Authors: Pat Romanski, Elizabeth White, Liz McMillan, David H Deans, JP Morgenthal

Blog Feed Post

Cyber Defenders and Strategic Thinkers Note: InfoWarCon 2014 will be held January 22-24 in Nashville, TN


interconnect-via-niem-1324316544The conference that has been at the forefront of the entire cyber operations revolution, InfoWarCon, is back and is better than ever.

If you are an enterprise security professional, a corporate risk management executive, a military strategist or a cyber security entrepreneur you will want to engage with this event.

To learn more and to register see:  http://ctolink.us/1bOLjmj

The number one reason to attend: You will mix with the greatest thinkers on cyber security and risk assessment ever gathered in one room.  Interact with peers.  The greats attend this event.  And the greats speak at this event.  Speakers include famous names like Winn Schwartau, Michelle Markoff, Melissa Hathaway, Matt Devost, Jason Healey, Marcus Sachs, Eneken Tikk-Ringas, Scott Boarg, Bill Gertz, Tim Thomas, Richard Forno and many more (see current list here).  Advisors include many other great champions and famous thought leaders (see list here).

Here is some background from InfoWarCon’s founder Winn Schwartau:

More than 20 years ago, security experts predicted that Information Warfare would dominate conflict and would engage private companies, the individual and nation-states in ways they did not understand.

Some governments and most companies ignored the warnings. As one U.S. Congressman said in open testimony, “Mr. Schwartau, why would the bad guys ever want to use the internet…?” Ignorance, arrogance and apathy prevailed.

Other nations have successfully adapted the weaponization of technology as a means of force projection. The results are staggering losses in intellectual property and deep penetrating threats to national security. Can we even catch up?

Over the last two years, in conversation with colleagues around the world, it was made clear that InfowarCon must be revived – returned to its original cutting edge nature – for four compelling reasons.


In order to defend, you have to know how to attack.


1. We are defending against the past, not protecting against the future. The West severely lags behind our adversaries in cyberwar. The past 16 InfowarCons (held in the U.S. and E.U. from 1994-2010) brought together military, private sector and law enforcement under the meme, “we are all in this together.” The so-called ‘Black’ areas of the intelligence community have cloaked much of the offensive side of Information Warfare in secrecy. Many of those actors agree that we must demystify the offensive view and, as with defense, teach offense, as the bad guys typically have better access to such information than even the defenders of critical infrastructures.
2. As new technologies are introduced, economic interests have dominated the benefits. The upside? They bring humanity. We ignore the downside.InfowarCon will explore the weaponization of today’s technologies, laboratory and pre-commercialization developments and the future technologies. (We will treat Kinetic, Nuclear, Biological and Chemical weapons only as payloads of information systems. Other training congresses will delve more deeply into these areas.)3. New technologies are, sooner or later, used against us. GPS. The internet. Mobile devices. Drones. InfowarCon will examine how technological innovation should and can build in additional layers of safeguards at the design stage.

 4. It is incumbent upon the defenders to thoroughly understand how technologies can be repurposed for hostile application. If you can’t attack, how can you defend? InfowarCon is designed to provide open source access to perceptions and views from the attacking side of the equation. What Poor-Man’s Terrorist Weapons can be built “on the cheap” yet offer our adversaries strategic and tactical advantage?


InfowarCon is not just another security conference with an endless parade of Pay-to-Play speeches with little or no value. InfowarCon is not the Same Old Thing at an overpriced hotel that looks the same as the last conference. It’s not at a convention center where sponsors and exhibitors have to spend absurd amounts of money to put up their banners, get electricity and internet.


I want to put on the kind of conference Infowarcon was when I started it twenty years ago. I want to make InfowarCon a truly immersive experience, a compelling interactive “Show Me, Don’t Tell Me” discussion, an event where non-attendees will self-flagellate for not coming. I want thousands of remote attendees around the world to be able to participate over InfowarCon.TV. I want to build an event that makes a difference in today’s world. With your esteemed help, I believe we are well on our way to achieving that.


As it always has, InfowarCon 2014 will bring together political, military, academic, DIY-er, and commercial leaders from around the world to examine the current, future, and potential hostile use of information technologies and how to neutralize current ones. InfowarCon 2014 will provide training and demonstrations in two broad areas: Technology & Policy.

Winn Schwartau

[email protected]

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.