Director, Brunswick Group
From the office of the UN Secretary General to the executive offices of SpaceX, Facebook, and Google, Dex has advised the world’s most influential leaders and organizations on issues surrounding global connectivity and emerging technologies. He has advised major tech companies, UK and US political leaders on strategic communications and works to educate audiences on how technology can and will impact global operations, human safety, and the progress of communities and businesses.
A New York Times-bestselling ghostwriter, Dex holds an MPhil in Russian & East European Studies from the University of Oxford, and a BA in Politics & East European Studies from University College London.
Stress Testing Global Aviation Operations: An Interactive, Real-World Scenario Crisis Management Exercise
Facilitated by Crowdstrike, this year’s tabletop will put participants in the metaphorical hot seat of a simulated real-world, real-time major aviation cybersecurity incident.
Participants will engage with their private and public sector counterparts to work through incident response, identify strengths and weaknesses, and determine an improved path forward to help improve resiliency should a worst case event occur.
Attendees will see first-hand how industry responds and be able to leave the exercise with best practice improvements they can incorporate into their incident response plans.
Please note, we are finalizing all sessions and will release the full slate of topics very soon. For scheduling purposes, a timeline agenda will be distributed early next week.
GDPR: One Year In
Your Friends Love Seeing Your Boarding Pass on Social Media . . .And So Do Cybersecurity Thieves Hunting Passenger Loyalty Accounts: A University Research Analysis of More Than 100,000 #Boardingpass Instagram Posts
Aircraft Systems and the Data You Need to Protect
Landing the Right Security Metrics with your Board: A Fireside Chat with Aviation ISAC Member CISOs
The Black Box of Business Email Compromise: Dispatches from the Fight Against BEC Scammers
Take Cyber Security Beyond the Absolute Ceiling: The Evolving Nature of Cyber Threats and how Security Teams can Expand their Coverage beyond the Traditional Perimeter to include ‘Un-agentable’ Devices and Systems
Implementing a Product Secure Development Life Cycle: Development, Deployment, and Maintenance Challenges
Ideas Whose Time Has Come for Aviation: Coordinated Vulnerability Disclosure (CVD), Software Bill of Materials (SBoM), and Secure Over-The-Air (SOTA) updates
The Theoretical and Practical Security Vulnerabilities of Current Aviation Wireless Communication Technologies
More to come!