CyberTech Israel 2017, one of the country’s most prominent security trade shows, will be held in Tel Aviv from Jan. 30 to Feb. 1. There, security experts, researchers and vendors from all over the world will share the latest innovations and solutions with the international cybersecurity community.

Traditionally, the event has been a unique meeting place for security professionals and enthusiasts to present recent achievements and upcoming plans. Panels typically include government officials, corporate leaders and security luminaries from around the world, all of whom are eager to share insights and key announcements.

For example, IBM Senior Vice President and Group Executive for Software and Systems Steven A. Mills announced the inauguration of IBM’s Cybersecurity Center of Excellence at Ben-Gurion University in Be’er Sheva, Israel, during a special keynote session honored by the presence of Israel Prime Minister Benjamin Netanyahu at CyberTech 2014.

Don’t Miss the Action at CyberTech Israel 2017

CyberTech 2017 is expected to be every bit as inspiring as previous iterations of the conference. The action begins on Jan. 30 with an exhibition warm up. The real action, however, starts on the morning of Jan. 31 with a plenary session featuring keynotes by Netanyahu and corporate leaders such as IBM Vice President for Security Development and Technology Denis Kennelly and T-Systems Senior Vice President for Telekom Security Dirk Backofer.

In the afternoon, participants will have an opportunity to select from several parallel sessions. I plan to attend the session titled “National-Level Cyber Centers — Challenges and Opportunities,” mainly due to my team’s proximity to the Israeli Computer Emergency Response Team (CERT) in Be’er Sheva and IBM’s involvement in that project. Other interesting sessions include “FinSec — Cyber Security for the Finance Industry,” which will feature a presentation on IBM’s antifraud technology, and “Proactive and Active Cyber Security,” which will teach attendees how to defeat cybercriminals using their own malicious techniques.

The plenary session on Feb. 1, the third day of CyberTech 2017, will also include keynotes by security thought leaders including Buky Carmeli, head of the Israeli National Cyber Security Authority, and Dr. Danny Gold, head of Israel’s Administration for the Development of Weapons and Technological Infrastructure (MAFAT). Gold is the mastermind behind Israel’s Iron Dome antimissile defense system and, according to the Israel Defense magazine, now leads an effort to produce a similar “Cyber Dome.”

I signed up to moderate one of the many parallel sessions that will run that afternoon, titled “From Artificial Intelligence to Cognitive Computing: Innovative Solutions for Modern Cyber Challenges.” Panelists in this session include Vijay Dheap, who leads IBM’s Watson for Cyber Security offering; Dr. Robert Moskovich, an artificial intelligence expert from Ben-Gurion University; Dr. Eli David, an industrial expert on deep learning and natural language processing; and Isaac Dvir, a threat intelligence expert.

Rub Elbows With Experts

Additionally, CyberTech Israel 2017 will feature an inspiring Start-Up Pavilion where attendees can sample the latest and greatest inventions from over 200 emerging companies and pick the brains of the researchers behind them. Attendees will also be able to experience what big company names in the industry have to offer.

Representatives at IBM’s booth will conduct live demonstrations continuously and concurrently at five separate stations. If you see nothing else, be sure to check out our Cyber Research & Innovation and Cognitive Security stations. Members of IBM’s Cybersecurity Center of Excellence will be there to answer any questions you may have and discuss potential collaborations with partners.

Learn more and register to attend CyberTech 2017

More from

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Why Operational Technology Security Cannot Be Avoided

Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack. From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially…

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…