|Invitation to Join|
Sunday 25th June – Saturday 1 July 2023
The Annual AU/NZ Cyber & Data Security Study Tour to Israel
To coincide with Israel’s world renowned annual Cyber Week in Tel Aviv
Join us for this week of high-level engagement with world leaders in Cyber designed for CIOs, CISOs, Directors, Regulators, C-level executives, risk managers, and cyber professionals.
Is your organisation ready for a cyber crisis?
Cyber-attacks on corporations and government agencies are becoming more frequent and will continue to rise as our world becomes more digitalized and hybrid work models become norm.
Zero-Day and Social Engineering attacks are more common than ever and organizations needs to be proactive.
Take initiative, prepare your organisation, create a strong infrastructure.
Join our annual Cyber & Data Security Study Tour to Israel to coincide with the world renowned Cyber Week in Tel Aviv, Israel.
Israel is at the centre of the global cybersecurity ecosystem. Spurred by record funding in 2021, Israeli cybersecurity is well-positioned to provide solutions for all organisations. In light of Digitalisation, high-profile attacks have brought cybersecurity to the forefront of the world’s attention – a trend expected to continue.
This delegation is an excellent opportunity for business and government leaders in innovation, data analytics, governance, and cyber security to gain an understanding of Israel’s cybersecurity eco-system, emerging cybersecurity trends and to partner with the vendors providing cutting-edge solutions.
As the most prominent business organisation and partner for Government and business in both AU & NZ, the Israel Trade Commission in partnership with the Circle, are committed to expanding our work in this area. For the past few years, we have been dedicating much of our program to Cyber Security as well as our ongoing Study Tour program to Israel, most recently led by Mr. Alastair MacGibbon – a copy of our 2022 program is available upon request.
The six-day Study Tour will comprehensively include: Latest trends in cyber defence strategies for government and the private sector Key cyber solutions being developed for the market, from corporates to consumers Meeting with established cybersecurity solution vendors and new Israeli cybersecurity start-ups including 1:1 business meetings per your specific field of interest Cyber accelerators, incubators, and strategic VC funders Understand the role of STEM education in developing cyber capabilities Cyber Security workshop conducted by senior figures in the Israeli industry
Date: Sunday 25 June – Saturday 1 July 2023
Cost: Will be provided upon expression of interest
Covers Full program for the duration of the Tour (including 2 day cultural programme) VIP entry to Cyber Week and special events All ground costs including transport and meals included in the official group program (Please note that the fees do not include transfers, accommodation costs, international and internal airfare, and local travel undertaken on a private basis or travel for individual meetings whether or not accompanied by ITC or TTBC staff)
After the success of this year’s Israel Cyber Week conference and exhibition we expect a strong turnout for 2023; please do let us know early if you’ll be attending so we can arrange bespoke B2B meetings for you throughout the week in Israel.
Expression of interest/Registration
Jeremy Ungar, Senior Trade Officer, Israel Trade Commission – email@example.com
Category: Events & Exhibitions
Save the Date: Nov 6-10, 2022 // Tel Aviv
Israel’s AgriFood Week is back!
Leap into a week full of opportunities filled with knowledge sharing, networking, collaboration and second-to-none interactions with leading investors, multinational AgriFood corporations and dozens of cutting-edge technologies.
The Entrepreneurship and Innovation Ecosystems team invites you to attend an exclusive virtual Fireside Chat with Dr. Tal David and Professor Michael J. Biercuk on the future of quantum technology on Wednesday 15th June, at 4:00pm AEDT.
Dr. David is Co-Founder and CEO of Quantum Art, and formerly he was the Head of the Israel National Quantum Initiative; Michael Biercuk is CEO & Founder of Australian quantum technology startup Q-CTRL and Professor of Quantum Physics and Quantum Technology at the University of Sydney.
The discussion will be facilitated by Dr. Simon Devitt, Research Director at the Centre for Quantum Software and Information at the University of Technology Sydney, and co-founder and managing director of the quantum technology consultancy firm, h-bar.
This one-hour virtual discussion will provide an opportunity to hear directly from leading quantum experts to gain a better understanding of the vision, strategy and plans referring to the quantum landscape in Australia and Israel with the ability to ask questions during the live discussions.
Throughout this engaging format, we will explore:
- How is quantum technology likely to impact the economy?
- How does the industry effectively collaborate?
- How will Quantum technology impact our future?
- How do we build a national strategy?
Don’t miss these exciting conversations and more with the greatest minds in this field and gain insights on quantum from an industry perspective in both jurisdictions.
Register for your spot now!
About the Speakers
Dr. Tal David is the Co-Founder and CEO of Quantum Art. Formerly, he was the Head of the Israel National Quantum Initiative (INQI), a joint venture of the leading R&D Israel government agencies, promoting the quantum ecosystem in a variety of tools and components. Previously, he was a researcher in a lasers start-up and Quantum Technology Group Head at Israel Aerospace Industries (IAI) forming a quantum magnetic sensing group.
Professor Michael J Biercuk is a global science and technology innovator, one of the world’s leading experts in the new emerging field of quantum technology. Michael is the CEO and Founder of Q-CTRL, a venture-capital-backed company that provides control engineering solutions to harness the power of quantum physics for next-generation technologies. An award-winning experimental quantum physicist, Michael serves as professor of Quantum Physics and Quantum Technology at the University of Sydney.He leads teams in both the technology industry and academia, with a focus on commercialising quantum technologies including quantum computing and quantum sensing. Michael founded Q-CTRL based on the research he led at the university’s Quantum Control Lab.
About the Facilitator
Dr. Simon Devitt is the Senior Lecturer at the Centre for Quantum Software and Information (QSI) at the University of Technology, Sydney and co-founder and managing director of the quantum technology consultancy firm, h-bar. Dr. Devitt has invented key quantum computing architectures in atom-optics, diamond and ion trap systems, he has also been the inventor of three separate quantum communications designs, 2nd and 3rd generation repeaters and the quantum sneakernet. Dr. Devitt’s work has focused on the design of programming, compilation and optimisation of large-scale quantum technology. Along with over 100 academic publications, he has worked with numerous corporations and VC firms on their expansion into the quantum technology space and advised multiple government agencies on multimillion dollar R&D initiatives. In 2020, he was awarded the inaugural Warren Prize from the Royal Society of NSW for his service to global quantum technology development and was elected fellow in 2021.
About the Entrepreneurship and Innovation Ecosystems team
Our role within Investment NSW is to enrich the size and strength of the existing NSW Innovation Ecosystem which will deliver significant economic opportunity across NSW. We will do this by fostering startup creation and industry growth, addressing barriers and market gaps, and providing education programs and access to networks, funding, and mentors.
RSA Conference is where the cybersecurity world comes together. For four days, you’ll gain insights, join conversations and experience solutions that could make a huge impact on your organization and your career. With so much change happening in our industry, we’re here to help you stay ahead of it all. We’re excited to be back in San Francisco, but a Digital Pass is also available for those who cannot attend live.
Featuring 40 Israeli Cyber Companies
|Company Name||Company Description||Main Sub-sectoral Affiliation||Main Target industries|
|AirEye||AirEye Dome protects against airborne attacks launched against the organizational network. The platform monitors wireless communications in real time, automatically detecting and blocking any corporate security violations.||Network Security||Healthcare Providers, Retail, Financial Sector, Manufacturing|
|Astrix Security||Astrix Security is focused on protecting the modern enterprise’s growing third-party app interconnectivity. By leveraging its specialized “attacker point of view,” the company has designed a novel zero-trust solution for addressing a leading cybersecurity threat to businesses’ critical systems.||GRC and Vulnerability Management||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Authomize||Authomize continuously monitors your identities, access privileges, assets, and activities to secure all apps and cloud services. We enable organizations to mitigate IAM risk with unprecedented visibility and granular control across all apps and cloud services (IaaS, Saas, Data).||Cloud and Infrastructure Security||Automotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, Software|
|Bright Security||Bright Security combines machine-learning algorithms and an offensive approach to application security testing (AST). We aim to eliminate the need for complex integration and usage, and handling false positives in the AST market. We developed NexPloit, an AI-based IAST tool that mirrors human’s critical-thinking process when looking for vulnerabilities.||Application and Website Security||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|Canonic Security||Canonic is a SaaS application security platform that continuously profiles apps and user accounts, identifies suspicious behavior and automatically reduces the SaaS attack surface. Our patent-pending App captures any add-on and integration behavior, providing access intelligence as well as threat and vulnerability insights.||SaaS App Security||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Centraleyes||Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. This platform provides the ability to analyze and react to growing risks and gaps in companies’ cyber vulnerability.||GRC and Vulnerability Management||Healthcare Providers, Financial Sector, Insurance, Higher Education|
|Commugen||Commugen’s Cyber GRC automation platform helps security teams focus on protecting their organizations by simplifying work processes and eliminating 80% of redundant manual tasks. Our agile no-code platform automates control workflow, prioritizes vulnerabilities and visualizes risk posture for clear communication with stakeholders.||GRC and Vulnerability Management||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Highly regulated markets|
|Continuity||Continuity brings the industry’s ONLY vulnerability management solution for storage & backup systems, helping protect your most valuable data, and ensuring data recoverability in case of a breach. This provides complete visibility of security risks across storage & backup systems.||Cloud and Infrastructure Security||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|Cyberint||CyberInt provides detection and response services to digital businesses in multiple industries. We provide end-to-end protection through a platform that acts as a global cyber analyst team managing: security operations center, threat hunting, deep investigations, real-time incident response, and cyber readiness assessments.||Threat Intelligence||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector|
|Cyberpion||Cyberpion has developed a platform that protects organizations from vulnerabilities in their external attack surface and digital supply chain. Once vulnerabilities and risks are discovered this platform actively prevents digital supply chain attacks.||Cloud and Infrastructure Security||Automotive, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|Cybersixgill||Cybersixgill developed advanced security algorithms to automatically monitor the dark web. The undetectable proprietary crawlers gather information on potential hackers and cyber criminals, leading to actionable intelligence prior to cyberattacks and sensitive data leaks.||Cyber security Threat Intelligence||Aerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector, all|
|Cynet||Cynet enables security teams to reach comprehensive, effective protection and visibility across endpoints, users, networks, SaaS, and cloud applications, regardless of their resources. The end-to-end XDR platform automates visibility, prevention, detection, correlation, investigation, and response through a single, unified platform.||End Point Security||Healthcare Providers, Retail, Transportation (Railway), Financial Sector|
|Dig Security||Dig provides full discovery, data context, detection and response capabilities for data stores in the public cloud. This unprecedented visibility is gained across clouds, deployment types and services – giving you a single pane of glass view into your cloud data estate.||Data Protection Encryption and Privacy||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Flow Security||Flow secures data in application environments by continuously detecting all data-related risks for an improved data security posture. Our simple to use, intuitive solution allows for mapping application assets, discovering data-centric risks, and guiding through the remediation workflows based on contextual information||Cloud and Infrastructure Security||Healthcare Providers, E-commerce, Financial Sector|
|Gytpol||GYTpol identifies problems with group policy objects (GPOs). This comprehensive monitoring and interactive visualization system finds discrepancies between GPO definitions and actual policies applied to target servers, computers, and users. Main features include: compliance status, detailed error reporting, security threats and performance optimization||Security Configuration Management||Aerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector|
|Infinidome||Infini Dome provides front-end cyber solutions that protect wireless communications from jamming attacks. Our GPS protection solutions defend the GPS systems at the heart of drones and other unmanned systems, vehicle fleets, critical networks, and defense applications.||Wireless Security||GNSS Security, Commercial and Military GPS anti-jammer / anti-spoofer|
|Infinipoint||Our cloud-based endpoint visibility and control platform enables enterprises to easily manage their assets and align them with IT and security policies and is designed for complex, heterogeneous, and constantly changing networks. We cover conventional endpoints, cloud, IoT and more and enable IT and security teams to see, query, and control everything.||End Point Security||Enterprise & Professional Services|
|Intezer||Intezer helps security teams close skill gaps and speeds up incident response by automating processes for alert triage, incident response, and threat hunting. With our platform analysts can quickly identify malware families and extract artifacts for detection and hunting.||Security Automation||Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector, Government , Manufacturing|
|KAZUAR||KAZUAR cyber specialists redesigned IT architecture to enable secure remote access to your organization’s most critical data. We provide your organization with state level security and a commercially convenient user experience. Our purpose-built laptop creates hardware isolated workspaces and enables access to the open (blue) workspace and secure (black) workspace.||End Point Security||Automotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Manufacturing (electric cars, scientific components, chemicals); Federal / government and semi-government entities|
|KELA||KELA offers proprietary cyber-intelligence solutions for enterprises and government agencies worldwide. Our automated technologies monitor a curated set of darknet sources that alert clients to targeted threats. Threats are analyzed and qualified by KELA’s analysts to ensure that the intelligence is 100% actionable.||Cybercrime threat intelligence||Automotive, Aerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector|
|KOVRR||Kovrr provides insurers and reinsurers with transparent, real-time, data-driven insights into their affirmative and non-affirmative single, accumulated, and catastrophic cyber risk exposures. Our platform helps financially quantify and manage cyber risk by utilizing AI-powered predictive risk models that evolve in real time to reflect cyber threats.||Cyber Risk Quantification (CRQ)||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|L7 Defense||L7 Defense helps organizations protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. Ammune™, L7 Defense’s platform technology, is the only software product protecting APIs within the organization. The novel unsupervised learning AI removes the need for third party involvement.||Application and Website Security||Healthcare Providers, Retail, E-commerce, Financial Sector|
|odix||Odix develops and markets advanced anti-malware tools based on its patented content disarm and reconstruction technology (TrueCDR) for preventative cyber security in enterprises of all sizes. This technology prevents malware infiltration into organizational networks by removing all malicious code from a wide range of file types.||Cloud business applications security||Critical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Retail, Financial Sector|
|Orchestra Group||Orchestra Group developed a single proactive cross-vendor cybersecurity automation platform. Our integration platform is centered on the NIST Cybersecurity Framework’s Identify and Protect functions. The first version of the platform is focused on policy control of all devices, both legitimate and ghost.||IoT||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|Panorays||Panorays offers an automated, comprehensive and easy-to-use third-party security platform that covers everything from inherent to residual risk, remediation and ongoing monitoring. We combine automated, dynamic security questionnaires with external attack surface assessments and business context to provide organizations with an accurate view of supplier cyber risk.||GRC and Vulnerability Management||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector|
|Pentera||The Pentera platform uses an algorithm to scan and challenge the entire attack surface, providing real-time security validation at scale. Our platform safely performs the actions of a malicious adversary — reconnaissance, sniffing, spoofing, cracking, malware injection and more. The platform requires no agents or pre-installations||Security Operations and Orchestration||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector|
|Perception Point||Perception Point is a Prevention-as-a-Service company that prevents phishing, BEC, spam, malware, Zero-days, ATO, and other advanced attacks well before they reach end-users. We are the fastest and most accurate next-generation detection and response to any content-borne attack across email, web, and cloud collaboration channels.||Email, Web Browser & Cloud Storage/Collaboration Channel Security||Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, We sell in every industry, we are a SaaS product.|
|Red Access||The Red Access platform provides comprehensive coverage against browser-based exploits and threats, without disruption to companies’ existing infrastructure, browser preferences, or user experience.||Web and Browsing Security||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Reflectiz||Reflectiz helps businesses utilize digital applications without compromising security. The platform identifies and mitigates risks using a single, comprehensive SaaS solution. Our platform scans and monitors any online asset, creating a unique inventory within minutes.||Application and Website Security||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Reposify||Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so CISOs can best secure their digital perimeter. Its intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required.||Network Security||Healthcare Providers, Retail, E-commerce, Financial Sector|
|Resec||ReSec Technologies provides organizations protection from known and unknown (zero-day) file-based malware threats from email, removable devices, and file-transfer threat vectors. Our patented content disarm and reconstruction technology ensures safe delivery of threat-free files in real time, balancing security and usability.||Gateway Security, Network Security, Email Security, Cloud Security||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Telecommunications and Airlines|
|Sasa Software||Sasa Software developed the GateScanner® modular solution that delivers extreme file sanitization to all content routes, providing government-grade security for enterprise email, managed file-shares, portable media importing and secure web download.||Network Security||Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Financial Sector, Government|
|Semperis||Semperis helps thwart ransomware attacks and strengthen hybrid Active Directory environments by offering the industry’s most comprehensive cybersecurity solutions for AD and Azure AD. Supported by a global incident response team, we prevent unwanted access to AD, capture AD changes that bypass security logs, automatically remediate malicious changes and more.||Identity Threat Detection and Response||Cyber-First Active Directory Backup and Recovery, Hybrid AD protection, AD and Azure AD security, IoE/IoC discovery and monitoring, AD recovery, incident response|
|Sepio||Sepio Systems provides rogue device mitigation solutions. The company is the developer of Sepio Prime, a SaaS solution for protecting organizations from hardware-based attacks and threats.||Hardware Access Control||Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector|
|Suridata||Suridata.ai specializes in helping organizations gain visibility and obtain control over their sensitive data in unstructured repositories allowing organizations to protect, remove, or manage access to the data and comply with privacy regulations. Our learning AI requires no personnel training or advanced technical skills.||Application and Website Security||Healthcare Providers, E-commerce, Financial Sector, Technology|
|Sygnia||Sygnia provides incident response and cyber security consulting services, helping organizations to contain and remediate attacks and proactively enhance their cyber resilience.||Network Security||we provide cyber security consulting services across all industries|
|Torq||Torq is a no-code automation platform for security teams. Fortune 100 enterprises and cutting edge startups alike trust Torq to help them maximize their cybersecurity investments, respond to threats faster, and deliver protection at the speed of business.||Security Automation||Banking, Financial Services, & Insurance, Critical Infrastructure, eCommerce/Retail, Enterprise, Government & Municipality, Healthcare, Integrators, Resellers, & Distributors, IT & Telecom, Manufacturing, Utilities|
|Vicarius||Vicarius developed an autonomous vulnerability remediation platform helping teams protect their assets against software exploitation. The platform allows organizations to identify known and unknown vulnerabilities in real-time, automatically prioritize and remediate them using world-class patch management, patchless protection and configuration management.||GRC and Vulnerability Management||Healthcare Providers, Retail, E-commerce, Financial Sector|
|ZecOps||ZecOps is a cybersecurity firm that automates threat analysis and digital forensics investigations, accelerating organization-wide disinfection. Our agentless platform learns from each attacker’s mistakes in order to fully disinfect the organization and eradicate that threat actor.||Mobile Security||Aerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Governments|
|Zero Networks||Zero Networks is a patented platform that automatically takes every asset and restricts network access to exactly what is needed – applying protection for client, server, home, office, on-premises or in the cloud. Our platform deploys in minutes to automate segmentation for normal usage while applying MFA-based restrictions against privileged protocols||Network Security||Agnostic|
The OurCrowd Global Investor Summit will take place in Jerusalem on February 15, 2023, once again bringing the entire startup ecosystem together. The Summit, which provides unique access to private companies you can invest in, is one of the premier events in the startup world and the biggest investor event in the Middle East, with 23,259 people registering from 183 countries in 2020. As Forbes reported, Summit Week in Israel was “the place to be.”
The Summit provides exclusive exposure to cutting-edge technologies, the entrepreneurs behind them, and the corporate leaders deploying them. Dramatic plenary sessions are filled with the unexpected, breakout sessions aren’t just panels, and OurCrowd University teaches the essentials for successful investing. None of the outstanding speakers is paid or pays for onstage appearance – passion and expertise are the only criteria. VentureBeat reported: “Excellent content… and the quality of the attendees is exemplary.”
Top investors, venture capitalists, innovation executives, entrepreneurs and journalists come to the heart of Startup Nation to get business done. The Summit is expected to draw hundreds of major business figures from the Gulf, reflecting the historic growth of commercial ties between Israel and its neighbors and OurCrowd’s leadership in regional cooperation. A week of surrounding events includes corporate meetups, VC forums, insider access to accelerators and labs, and opportunities for great food, drink, and networking with the global crowd. As one venture investor said, “Best conference I’ve ever been at. I’m sold on Israel. I’ll definitely be back next year.”
Future Sport Israel 2022, the leading sports business event in Israel, aims to create the perfect setting where leading sports and media companies of the world get a front row seat to the breakthrough technologies coming out of Israel.
In a focused three days event (May 30-June 1, 2022 | Tel Aviv -Israel) opportunities will be created for B2B meetings, networking and experiencing Israel’s unique technology and innovation ecosystem, including meeting more than 50 leading Israeli sport tech startups in the fields of: AR/VR, Broadcasting, Engagement, eSports, Fitness & Nutrition, Marketing Analytics, Performance Enhancement, Sponsorship, Ticketing & Smart Stadium and Video & Media.
The event will include live demos in Bloomfield stadium, professional seminar, sport lectures, round table and F2F meetings.
Expected to attend are representatives of sports leagues, sports teams, TV networks, investors, brands that associated to the sport world and different Sport organizations.
Future Sport 2022 is organized by the Israel Export Institute together with the Foreign Trade Administration at the Ministry of Economy and Industry.
Contact us to learn more about free entry and booking accommodation in Tel Aviv.
The Israel Export Institute is initiating a series of Automotive & Smart Mobility Open-Mic events.
The first event will focus on the subject of **Autonomous Mobility**.
Each event will have four Israeli companies that will present a brief pitch.
Please find the invitation and the companies’ descriptions attached below.
Asia-Europe: April 6th, 10:00-11:00 (IL time)–https://export-israel.zoom.us/webinar/register/WN_Dl_4J3UDTO2j2f7Iv4xlpA
Start Time: Mar 23, 2022 04:49 PM
Cyber Week 2022
Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Over the past 12 years, Cyber Week has become internationally acclaimed as one of the top cybersecurity events in the world.
Cyber Week offers a unique gathering of cybersecurity experts, industry leaders, startups, investors, academics, diplomats, and government officials. With more than 9,000 attendees from more than 80 countries, this conference offers a thought-provoking exchange of knowledge, methods, and ideas that you won’t want to miss.
Events will run for a full week and include over 50 roundtables, panels, workshops, forums, BSides, competitions, and more.
Cyber Week is held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), The Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Directorate under the Prime Minister’s Office and the Ministry of Foreign Affairs is a leading international conference in cybersecurity.