NATO MULTIMEDIA ACCOUNT

Access NATO’s broadcast-quality video content free of charge

Register

Create an account

Create an account

Check your inbox and enter verification code

We have sent a verification code to your email address. . Enter the code to verify your account. This code will expire in 30 minutes.
Verification code

Didn't receive a code? Send new Code

You have successfully created your account

From now on you can download videos from our website

Subscribe to our newsletter

If you would also like to subscribe to the newsletter and receive our latest updates, click on the button below.

Reset password

Enter the email address you registered with and we will send you a code to reset your password.

Reset password
Check your inbox and enter verification code
We have sent a verification code to your email address. Enter the code to verify your account. This code will expire in 30 minutes.
Verification code

Didn't receive a code? Send new Code

Create a new password

The password must be at least 12 characters long, no spaces, include upper/lowercase letters, numbers and symbols.

Your password has been updated

Click the button to return to the page you were on and log in with your new password.

Some of the brightest minds in computer, network, and national security issues spoke at a conference on cyber warfare in Tallinn, Estonia, from 17 to 19 June. The event was organized by the NATO Cooperative Cyber Defence Centre of Excellence in cooperation with the International Institute for Defence Studies.

Experts in the field from academia, government, business and the military addressed different aspects of the the emerging field of cyber warfare, covering theory and practice from both strategic and tactical perspectives. 

Conference highlights included :

  • Jaak Aaviksoo, Estonian Defence Minister
  • Information Warfare Monitor: Tracking GhostNet: Investigating a Cyber Espionage Network
  • James Lewis, CSIS: Securing Cyberspace for the 44th Presidency
  • Mikko Hypponen, CRO, F-Secure: Evolution of the Cyber Threat
  • Jose Nazario, Arbor Networks: Measuring Global Denial of Service Attacks
  • Amit Yoran, CEO, NetWitness: Information Risk Management: Removing the Uncertainty
  • Felix Leder and Tillmann Werner: Proactive Botnet Countermeasures: An Offensive Approach
  • Andrew Cutts, Director, Cybersecurity Policy (DHS): Cyber Risk from a Homeland Security Perspective
  • Billy Rios and Jeff Carr, Microsoft: Examination of a Real World Cyber Attack
  • Dr Rex B. Hughes, Cambridge-MIT Institute: Towards a Global Regime for Cyber Defense
  • Dr. Stuart H. Starr, NDU: Towards a (Preliminary) Theory of Cyberpower
  • Roelof Temmingh, CEO, Paterva: Evaluating the Credibility of a Cyber Threat
  • Scott Borg, Director, U.S. Cyber Consequences Unit: The Cyber-Defence Revolution