Resources Streaming videos SLL 2012 Annual Reports Video Series
Synaptic Labs' 2012 Annual Reports Video Series

 

Table of Contents

2012 Annual Reports Video Series

 

1.Synaptic LabsIntroduction to Synaptic Laboratories Limited (2012)
 
 
2.Synaptic LabsSynaptic Labs' Annual Report Surveying the Global Cyber Safety and Security Status
 
 
3.Synaptic LabsSynaptic Labs' Annual Report Surveying Key Cyber Security Technical Problems, Drivers and Incentives
 
 
4.Synaptic LabsLink to Malta International Cyber Awareness Seminar November 2011 Videos
 
 

Related Cyber Videos

 

A.Brian SnowOur Cyber Security Status is Grim (and the way ahead will be hard)
- Former Technical Director, IAD, U.S. National Security Agency
 
 
B.Robert QuickCyber Protection in the UK
- CEO, BlueLight Global Solutions 

 
C.Synaptic LabsIEEE KMS 2010 - Presentation 1 - Survey of symmetric key distribution techniques
 
 
D.Synaptic LabsIEEE KMS 2010 - Presentation 2 - Synaptic Labs' global-scale Identity Management and Cryptographic Key Management Proposal
 
 
E.Synaptic LabsOn the known problems with PKI as of 2010
 
 

 

See below, or select a link above to take you directly to a video on this page.



About the videos The streaming videos are configured to automatically select the best resolution and bandwidth for your computer.   Switching to full screen mode when playing videos on the web-site will automatically improve the image resolution for most users in about 5 to 10 seconds. 

All videos can also be downloaded in a range of resolutions in MPEG-4 video format.
Need help?A short guide to streaming and downloading videos can be found at the bottom of this page if required.



Videos

1. Introduction to Synaptic Laboratories Limited (2012)


Total video length: 10m 16s
 
Section Time offset | Embedded video clips of experts Time offset
----------------------------------------------------    ---------- | -------------------------------    ----------
Start 0m 00s | Mr. Robert Quick (QPM) 5m 13s
Table of contents 0m 25s | Mr. Brian Snow 7m 16s
1.    Synaptic Labs’ Universal Cyber Safety and Security Vision 1m 17s |
2.    About Synaptic Laboratories Limited 1m 42s |
3.    Synaptic Labs’ community service activities 2m 27s |
3.a.    About the ICT Gozo Malta project 2011 2m 27s |
3.b.    Malta International Cyber Awareness Seminar 2011 3m 55s |
4.    Acknowledgements for Synaptic Labs 4m 36s |
4.a.    Participation in the NITRD Cyber Security Summit 4m 36s |
4.b.    BlueLight Global Solutions Ltd 2011 4m 55s |
4.c.    Brian Snow 2011 6m 01s |
5.    Related videos 7m 58s |
6.    Contact us 9m 55s |

Watch or Download Videos:
 
1280 x 720p HD 1.2 Mb/s iPad 2 + iPhone 4 friendly Save to Disk Open in Browser BitTorrent Link
800 x 450p SD 0.9 Mb/s Slower computers Save to Disk Open in Browser BitTorrent Link
 
PDF Slideshow as Adobe PDF Save to Disk Open in Browser


2. Synaptic Labs' Annual Report Surveying the Global Cyber Safety and Security Status


Total video length: 1h 07m 20s
 
Section Time offset | Embedded video clips of quoted experts Time offset
------------------------------------------    ---------- | -----------------------------------    ----------
Start 0m 00s | Mr. Brian Snow 6m 00s
Table of contents 0m 25s | Vice Admiral J. Mike McConnell 13m 83s
1. High level overview 2m 06s | Ms. Debora Plunkett 22m 27s
2. Global assessments and global responses 15m 08s | Ms. Melissa Hathaway 36m 31s
3. The stability of Nations is at risk 26m 14s | Ms. Melissa Hathaway 40m 24s
4. Our cyber defences are very low 34m 33s | Dr. James Andrew Lewis 54m 57s
5. Experts: The cyber risk is not overstated 59m 25s | Vice Admiral J. Mike McConnell 59m 45s
6. Closing statement 1h 03m 52s | Prof. Joseph S. Nye, Jr 1h 00m 44s
7. Related videos 1h 05m 35s | Dr. James Andrew Lewis 1h 01m 13s
| Vice Admiral J. Mike McConnell 1h 01m 48s
| Ms. Debora Plunkett 1h 03m 14s

Watch or Download Videos:
 
1280 x 720p HD 1.2 Mb/s iPad 2 + iPhone 4 friendly Save to Disk Open in Browser BitTorrent Link
800 x 450p SD 0.9 Mb/s Slower computers Save to Disk Open in Browser BitTorrent Link
 
PDF Slideshow as Adobe PDF Save to Disk Open in Browser
HTML Read transcript of the audio Click here


Video clip sources: (used with permission)

 

Related resources:

  • J. R. Clapper. Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence. Unclassified statement for the record, Director of (U.S.) National Intelligence, Feb. 2012.
  • B. Grauman. Cyber-security: The vexed question of global rules. Report (with the support of McAfee), Security & Defence Agenda, Brussels, Belgium, Jan. 2012.
  • UK Goverment. The UK Cyber Security Strategy - Protecting and promoting the UK in a digital world. UK Cabinet Office, 22 Whitehall, London SWIA 2WH, UK, Nov. 2011.
  • USOWH. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. United States, Office of the White House, May 2011.
  • USOWH. Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure (may 26, 2009). United States, Office of the White House, May 2009.
  • McAfee and CSIS. In the Dark - Crucial Industries Confront Cyberattacks. 2nd annual critical infras- tructure protection report, Center for Strategic & International Studies, 2012.
  • Cisco. Cisco 2Q11 Global Threat Report. Technical report, Cisco Systems, Inc., Aug. 2011.
  • S. Viehböck. Brute forcing Wi-Fi Protected Setup - When poor design meets poor implementation. Technical report, Dec. 2011.
  • J. Brenner. America the Vulnerable - Inside the new threat matrix of digital espionage, crime and warfare. Penguin Press HC, The, Sep. 2011.
  • Advisory board of RISEPTIS. Trust in the Information Soceity. Report, Research & Innovation Security, Privacy and Trusworthiness in the Information Society, Oct. 2009.
  • O. Sami Saydjari's Testimony before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, 2007.
  • Brian Snow, "We Need Assurance!", in ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 3-10, Washington, DC, USA, Dec. 2005. IEEE Computer Society.
 


3. Synaptic Labs' Annual Report Surveying Key Cyber Security Technical Problems, Drivers and Incentives


Total video length: 1h 33m 50s
 
Section Time offset | Embedded video clips of experts Time offset
----------------------------------------------------    ---------- | -------------------------------    ----------
Start 0m 00s | Mr. Brian Snow 4m 53s
Table of contents 0m 25s | Ms. Melissa Hathaway 7m 05s
1.    Key points of this presentation 1m 55s | Mr. Brian Snow 18m 41s
2.    Understanding why the community is in this mess 4m 26s | Prof. Jeannette Wing 29m 02s
2.a.    Cyber risks are different to natural risks 9m 50s | Prof. Jeannette Wing 33m 59s
2.b.    Computers not built for safety or security 24m 16s | Mr. Brian Snow 35m 34s
2.c.    Internet not built for security 35m 15s | Mr. Paul Earsy 46m 48s
2.d.    IdM, CKM and transactions are not trustworthy 44m 41s | Mr. Landon Curt Noll 47m 28s
3.   Community failed to address the problems 1h 04m 03s | Mr. Brian Snow 49m 03s
4.   Governments calling for strong civilian cyber security 1h 10m 03s | Ms. Melissa Hathaway 58m 53s
5.   Government and commercial drivers and incentives 1h 14m 48s | Mr. Brian Snow 1h 08m 03s
6.   Closing statement (by Brian Snow) 1h 30m 20s | Prof. Jeannette Wing 1h 11m 30s
7.   Related videos 1h 31m 56s | Mr. Robert Quick (QPM) 1h 14m 58s
| Mr. Brian Snow 1h 22m 20s
| Mr. Brian Snow 1h 30m 20s

Watch or Download Videos:
 
1440 x 720p HD 1.2 Mb/s iPad 2 + iPhone 4 friendly Save to Disk Open in Browser BitTorrent Link
800 x 450p SD 0.9 Mb/s Slower computers Save to Disk Open in Browser BitTorrent Link
 
PDF Slideshow as Adobe PDF Save to Disk Open in Browser
HTML Read transcript of the audio Click here


Video clip sources: (used with permission)

 

Related resources:

  • J. R. Clapper. Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence. Unclassified statement for the record, Director of (U.S.) National Intelligence, Feb. 2012.
  • B. Grauman. Cyber-security: The vexed question of global rules. Report (with the support of McAfee), Security & Defence Agenda, Brussels, Belgium, Jan. 2012.
  • UK Goverment. The UK Cyber Security Strategy - Protecting and promoting the UK in a digital world. UK Cabinet Office, 22 Whitehall, London SWIA 2WH, UK, Nov. 2011.
  • USOWH. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. United States, Office of the White House, May 2011.
  • USOWH. Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure (may 26, 2009). United States, Office of the White House, May 2009.
  • J. Brenner. America the Vulnerable - Inside the new threat matrix of digital espionage, crime and warfare. Penguin Press HC, The, Sep. 2011.
  • O. Sami Saydjari's Testimony before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, 2007.
  • Brian Snow, "We Need Assurance!", in ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 3-10, Washington, DC, USA, Dec. 2005. IEEE Computer Society.
  • Brasil Security Leaders Congress, November 2011.
 


 

5. Link to Malta International Cyber Awareness Seminar November 2011 Videos




A. Brian Snow - Former Technical Director of the Information Assurance Directorate of the U.S. National Security Agency


Total Video Length: 23 minutes 27 seconds
Introduction starts at: 0 minutes 00 seconds
Presentation starts at: 2 minutes 10 seconds

1280 x 720p HD 1.2 Mb/s iPad 2 + iPhone 4 friendly Save to Disk Open in Browser BitTorrent Link
960 x 540p SD 0.8 Mb/s iPad + iPod + iPhone friendly Save to Disk Open in Browser BitTorrent Link
800 x 450p SD 0.8 Mb/s Slower computers Save to Disk Open in Browser BitTorrent Link
640 x 360p SD 0.6 Mb/s First generation iPod / iPhone Save to Disk Open in Browser BitTorrent Link

Additional resources on this page that provide more quotes from Brian Snow, and also extensively quote world-leading cyber security experts:


B. Robert Quick - CEO, BlueLight Global Solutions


Total Video Length: 23 minutes 49 seconds
Introduction starts at: 0 minutes 00 seconds
Presentation starts at: 2 minutes 10 seconds

1900 x 1080p HD 2 Mb/s Very fast computers Save to Disk Open in Browser BitTorrent Link
1900 x 1080p HD 1.5 Mb/s Very large screens Save to Disk Open in Browser BitTorrent Link
1440 x 808p HD 1.2 Mb/s 15 to 20 inch screens Save to Disk Open in Browser BitTorrent Link
1280 x 720p HD 1.2 Mb/s iPad 2 + iPhone 4 friendly Save to Disk Open in Browser BitTorrent Link
960 x 540p SD 0.8 Mb/s iPad + iPod + iPhone friendly Save to Disk Open in Browser BitTorrent Link
800 x 450p SD 0.8 Mb/s Slower computers Save to Disk Open in Browser BitTorrent Link
640 x 360p SD 0.6 Mb/s First generation iPod / iPhone Save to Disk Open in Browser BitTorrent Link

Resources referred to by Bob Quick:


C. Synaptic Labs - IEEE KMS 2010 - Presentation 1 - Survey of symmetric key distribution techniques


Duration: 1 hour 19 minutes
Revision: Third July 7, 2010
PDF Slideshow: Save To Disk Open in Browser
720p HD: Save to Disk Open in Browser BitTorrent Link
360p SD: Save to Disk Open in Browser BitTorrent Link


D. Synaptic Labs - IEEE KMS 2010 - Presentation 2 - Synaptic Labs' global-scale Identity Management and Cryptographic Key Management Proposal


Duration: 54 minutes
PDF Slideshow: Save To Disk Open in Browser
720p HD: Save to Disk Open in Browser BitTorrent Link
360p SD: Save to Disk Open in Browser BitTorrent Link


E. Synaptic Labs - On the known problems with PKI as of 2010


PDF Slideshow: Save To Disk Open in Browser




 
Guide to Streaming Videos All videos on this website can be streamed directly from this webpage.  Select and play a video by simply clicking on it's Green Start button.  The streaming videos are configured to select the best resolution and bandwidth for your computer.  Streaming is the preferred playing method for Windows, Un*x, OS X and all platforms where Adobe/Macromedia Flash Player is supported and installed.  You can move forwards and backwards through the video as you like.

If you are having problems playing any of the streaming videos, it is most likely that you have and old version of the Flash Player installed. You can download the most recent version of Adobe/Macromedia Flash Player here.

The MPEG 4 videos are available for streaming in various resolutions ranging from 640x360p to 1900x1080p. The higher the video resolution, the more powerful your computer has to be to view it. Playing videos full screen will automatically improve the image resolution from 800x480p to 1280x720p or 1440x808 for most users.

If you see frequent pausing of video image while the audio continues without problem, there is a strong probability that your computer is having difficulty keeping up. You might try exiting full screen mode to reduce the resolution again.

Guide to MPEG 4 Videos

MPEG 4 is a modern standard for encoding high-quality videos. MPEG 4 files is ideal for all Apple products (OS X, video iPod, iPad, iPhone, Apple TV) and other platforms (or users) who do not have, or prefer not to use, Macromedia Flash.

To download the MPEG 4 files, simply click on the Save To Disk link. After saving the .MP4 file, you can play the video on most operating systems (Windows, Linux, ...) using the free VLC video player.   You can also drag the file into iTunes and then copy it onto your iPod or other portable device.

Some, but not all, web-browsers can play MPEG4 files directly. Click on Open in Browser to try this method.

For power-users, the BitTorrent link allows you to download the large files fast using any BitTorrent compliant client.

The MPEG 4 videos are available for download in various resolutions ranging from 640x360p to 1900x1080p. The higher the video resolution, the more powerful your computer has to be to view it.

If you see frequent pausing of video image while the audio continues without problem, there is a strong probability that your computer is having difficulty keeping up. Try selecting a video with lower resolution and/or downloading the video to disk before playing. The standard video size used on the website is 800x450p.

 

 

 
This website uses cookies to manage authentication, navigation, and to provide you with a better and more personal service. By continuing to use this website, you are consenting to this use. Find out more here.
Synaptic Laboratories Limited: Technologies For A Safe and Secure High Performance Computing and Communications Ecosystem.