Data will never be 100 percent secure

On the issue of state-sponsored hacking, Kasparov said the West lacked the political will to create cyber deterrence against Russia, China, and other countries, as well as non-state actors. “The US government shows no appetite for confrontation… Europeans show very little appetite and no political will, or worse, they are willing to collaborate with dictators on some business projects, ignoring the fact that countries like Russia or China creating a real existential threat to cybersecurity, be it at the state level, corporate level, or individual level. It’s a political solution and we know neither Europe nor North America show some appetite and show some political will to fight back.

Global experts, government officials and leading Israeli technology companies participated in the IMPROVATE Cyber-Tech conference and discussed a wide range of topics, including combating cyber threat scenarios and fake news, and legal frameworks for combating cybercrime.

Representatives from various countries including: Bulgaria, Romania, and Ethiopia participated in the conference along with leading Israeli technology companies Cyberint, Protex and Zimperium.

IMPROVE Advisory Board Member and Former Bulgarian President Rosen Plevneliev said European countries were looking for Israel’s experience and technology to protect themselves in the cybersphere. “Every 30 seconds a cyber attack is launched in the world, no one is immune, no one is safe, and that’s why we need to provide solutions that work. And that’s why we have so many regions of Southeast and Central Europe, and other regions of the world listening to the leading industry, that of Israel, and in hopes of working together so we can benefit together.”

Former Romanian Prime Minister, Victor Ponta told the conference that national governments need to understand that there is no greater risk to their national security or easier transnational crime than cybercrime. “We need more cooperation at the national level,” Ponta said. “Now that I’m in the private sector, but previously worked in politics for 20 years, I firmly believe that collaboration between public institutions, law enforcement and private companies is the key to success in the fight against cybercrime.”

Ethiopian ambassador in Israel, HE Reta Alemu Nega said Africa presented a huge opportunity for the Israeli technology sector in general and for cyber technology companies in particular. “African countries have now started to adapt to technologies and have started to use cyberspace for different aspects of life – education, health, telecommunications, etc. In that context, there is enormous potential for Israeli companies to invest in the high-tech sector. , and also to invest in the cybersecurity sector.One area of ​​investment could be building the necessary infrastructure to counter cyber-attacks, while another area could be manpower creation. Ethiopia for example, we have a young, highly skilled workforce, we have more than 45 universities, which focus on educating the young generation in the tech sector, where there is huge potential for Israeli companies to use that manpower to work in different parts of Africa.”

dr. Nimrod Kozlovskic, a law professor, venture capitalist and cybersecurity consultant, and a partner at the law firm Herzog, Fox & Neeman said that while Israel has a very strong cyber security industry, with strong cyber investigation and cyber litigation practices, regulation had not kept up with technology. Kozlovski said international cooperation requires an agreed valid regulatory framework, and said the “EU has done a tremendous amount of work drafting the GDPR, the privacy regulations that govern how you handle private information, how you protect it, how you respond to a breach.” , what is the right of the data subject… I think the EU is really kind of an example to the world of how to do solid regulation.”

Gilbert Ohana, co-founder and managing partner at FinTLV companies, and a cybersecurity advisor to financial firms said that with increasing risks from cybercrime, financial firms needed to invest more in their response and recovery processes to build their resilience capabilities. He also called on companies to “provide training for top management and the board of directors, how to run simulations of breaches, detection and response. These are of great value because they can expose the procedures that companies lack and allow participants to get used to the stress associated with decision making when a breach occurs.”

IMPROVE board member Can. Gene (right) Amos Gilead, Executive Director of the Institute of Policy and Strategy at IDC Herzliya, said cyber-attacks are one of the biggest threats facing states because they are invisible and therefore undeniable. “You have to know your enemy, follow their systems and models, and be able to protect yourself and retaliate in ways that will share a real message of deterrence with them, and it must rely on cost-effective capabilities.”

IMPROVE Co-founder and CEO Ronit Hasin-Hochman said the conference showed how Israel was a global leader in cyber technologies. “We have seen today that while Israeli technology is in high demand in the cyber space and Israeli companies are experiencing tremendous success, there are still many untapped markets and opportunities for them to explore.”

Cyberint provides actionable intelligence and insights into the threats most relevant and important to proactively protect organizations from cyberattacks beyond the perimeter. CEO of Cyberint Yochai Corem explained: “Every organization has digital assets, whether they are domain IP addresses, and common cloud assets today that are widely used. And if it is a large organization, it is very difficult to manage and understand what those assets are actually, the organization keeps. What Cyberint does is discover those assets. We scan the entire internet a few times a week, we try to make an association between a name of an organization where all we need is a starting point for all different cloud assets and IP addresses and domains, etc. And once we have this attack surface mapping, which is a very sophisticated task for many organizations these days, we continuously scan it for any misconfiguration issues, or whatever in the industry shadow IT.”

Asaf Peleg is Vice President of Strategic Projects & Director of Business Development at empire. a global leader in mobile security and the only mobile security platform built specifically for enterprise environments. “Mobile phones are a very easy gateway for an attacker to jump from the mobile endpoint to the desktop or laptop or servers or anything else within the organization. What organizations need to consider is the need to protect their mobile devices and mobile applications. secure, and understand what’s happening on these devices.”

Arie Franklach, the founder of Protex, the industry’s first security platform for B2C communications, said his company was unique because of its model, which it believes offers a SAS solution. “The customer doesn’t need to install anything on their site, they just need to use our technology. And actually we cover all three main elements, the three main risks of the telecom industry: one is authentication, the second is data integrity and data protection, and the third is that the customer doesn’t need protection.”

For upcoming conferences visit






Leave a Comment

Your email address will not be published.