January 17, 2017 By Dr. Yaron Wolfsthal 2 min read


CyberTech Israel 2017, one of the country’s most prominent security trade shows, will be held in Tel Aviv from Jan. 30 to Feb. 1. There, security experts, researchers and vendors from all over the world will share the latest innovations and solutions with the international cybersecurity community.

Traditionally, the event has been a unique meeting place for security professionals and enthusiasts to present recent achievements and upcoming plans. Panels typically include government officials, corporate leaders and security luminaries from around the world, all of whom are eager to share insights and key announcements.

For example, IBM Senior Vice President and Group Executive for Software and Systems Steven A. Mills announced the inauguration of IBM’s Cybersecurity Center of Excellence at Ben-Gurion University in Be’er Sheva, Israel, during a special keynote session honored by the presence of Israel Prime Minister Benjamin Netanyahu at CyberTech 2014.

Don’t Miss the Action at CyberTech Israel 2017

CyberTech 2017 is expected to be every bit as inspiring as previous iterations of the conference. The action begins on Jan. 30 with an exhibition warm up. The real action, however, starts on the morning of Jan. 31 with a plenary session featuring keynotes by Netanyahu and corporate leaders such as IBM Vice President for Security Development and Technology Denis Kennelly and T-Systems Senior Vice President for Telekom Security Dirk Backofer.

In the afternoon, participants will have an opportunity to select from several parallel sessions. I plan to attend the session titled “National-Level Cyber Centers — Challenges and Opportunities,” mainly due to my team’s proximity to the Israeli Computer Emergency Response Team (CERT) in Be’er Sheva and IBM’s involvement in that project. Other interesting sessions include “FinSec — Cyber Security for the Finance Industry,” which will feature a presentation on IBM’s antifraud technology, and “Proactive and Active Cyber Security,” which will teach attendees how to defeat cybercriminals using their own malicious techniques.

The plenary session on Feb. 1, the third day of CyberTech 2017, will also include keynotes by security thought leaders including Buky Carmeli, head of the Israeli National Cyber Security Authority, and Dr. Danny Gold, head of Israel’s Administration for the Development of Weapons and Technological Infrastructure (MAFAT). Gold is the mastermind behind Israel’s Iron Dome antimissile defense system and, according to the Israel Defense magazine, now leads an effort to produce a similar “Cyber Dome.”

I signed up to moderate one of the many parallel sessions that will run that afternoon, titled “From Artificial Intelligence to Cognitive Computing: Innovative Solutions for Modern Cyber Challenges.” Panelists in this session include Vijay Dheap, who leads IBM’s Watson for Cyber Security offering; Dr. Robert Moskovich, an artificial intelligence expert from Ben-Gurion University; Dr. Eli David, an industrial expert on deep learning and natural language processing; and Isaac Dvir, a threat intelligence expert.

Rub Elbows With Experts

Additionally, CyberTech Israel 2017 will feature an inspiring Start-Up Pavilion where attendees can sample the latest and greatest inventions from over 200 emerging companies and pick the brains of the researchers behind them. Attendees will also be able to experience what big company names in the industry have to offer.

Representatives at IBM’s booth will conduct live demonstrations continuously and concurrently at five separate stations. If you see nothing else, be sure to check out our Cyber Research & Innovation and Cognitive Security stations. Members of IBM’s Cybersecurity Center of Excellence will be there to answer any questions you may have and discuss potential collaborations with partners.

Learn more and register to attend CyberTech 2017

More from

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Operationalize cyber risk quantification for smart security

4 min read - Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes that accurately identify, measure, manage and communicate cyber risks. As a result, executives and board members remain uninformed and ill-prepared to manage organizational risk effectively.…

Pentesting vs. Pentesting as a Service: Which is better?

5 min read - In today's quickly evolving cybersecurity landscape, organizations constantly seek the most effective ways to secure their digital assets. Penetration testing (pentesting) has emerged as a leading solution for identifying potential system vulnerabilities while closing security gaps that can lead to an attack. At the same time, a newer entrant into the security arena is Pentesting as a Service (PTaaS). Although PTaaS shares some similarities with pentesting, distinct differences make them two separate solutions. This article will discuss how these methodologies…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today