Credit: REUTERS/Baz Ratner Last week, I attended the Cybertech 2016 conference in Tel Aviv along with a delegation of other U.S.-based bloggers and journalists, courtesy of the America–Israel Friendship League and the Israeli Foreign Ministry. The conference is a showcase for about 100 established Israeli information security related firms, in addition to an equal number of startups. Now in its third year, the organizers wrote that there were nearly 11,000 people in attendance; albeit it didn’t seem that there were that many people there.[ See part 2 from Cybertech: CyberTech – The Golden Globes of information security ]The majority of the attendees and firms represented were Israeli based, but there was a strong international attendance also. Marina Kaljurand, the Estonian Minister for Foreign Affairs gave one of the keynotes, and there was also a large delegation from Japan, with JETRO (Japan External Trade Organization) having a large booth on the expo floor.Attesting to the importance of information security, Israeli Prime Minister Benjamin Netanyahu gave one of the keynotes. To my knowledge, this is the first time a current head of state has given a keynote at an information security conference. In his keynote, Netanyahu emphasized the need to establish international standards that will increase cybersecurity effectiveness. He noted that “there’s a critical need for like-minded governments to have serious discussions about cooperation in the broader international realm.” He felt that once that is done, it will then be easier for countries to establish international standards that will increase cybersecurity.CyberTech is similar to other large information security conferences; one significant difference is that those behind the booths are generally much more technical. I spoke to numerous engineers at many vendor booths who were able to give highly technical overviews of their products and the information security challenges they were attempting to mitigate. All of the presentations were in English, and nearly everyone in the vendor booths spoke English. The Israelis have taken a huge, and I mean massive, liking to the word cyber. Not only is it in the conference name, but every Israeli speaker used it in their presentations. Israelis seem to use it as a term for anything computer/network/information/data security related.Ron Moritz is a founding partner of TrueBit CyberPartners and attended CyberTech. He noted that if you look at the CyberTech conference and Israel’s other major cyber security event, Tel Aviv University’s CyberWeek as benchmarks, what is notable is the diversity of attendees. Both events draw individuals, companies and government officials from a very diverse group of countries. Although less notable this year, military men and women in dress uniform from across the globe were seen at past CyberTech conferences. Information security in Israel is truly representative of Israel’s historic role as a geographic trade cross-roads.Moritz also observed that not only are investment dollars that fuel the industry growth flowing in freely from a variety of nations but Israeli cyber security companies are able to sell solutions into many more countries than traditional western information security firms. This puts Israel at the economic epicenter of information security and has allowed the country to emerge as a serious and credible leader in the information security space.Marty Leidner, who is the chief information security officer at The Rockefeller University in New York City, notes that he thought CyberTech was an excellent top tier conference. He said that it was not so much any one individual company or presenter that impressed him, but rather the overall impressive lineup of multiple distinguished speakers from all over the world. This wide spectrum of information security personalities ranged from his fellow CISOs, to white hat hackers.While at the conference, Leidner saw someone demonstrate how it was possible to compromise a fully patched Android phone in under 30 seconds. This demonstration reminded him to never lend your phone to someone you don’t trust; even for one call!Chenxi Wang wrote a superb blog piece on why firms should showcase technology simply by celebrating the ideas and ingenuity that went into the creation of their products and solutions and not fill their conference booths with eye-candy. Wang would be pleased that there was not a single booth babe at the conference. With a much more technical focus, the booths were not only absent of booth babes but also of marketing teams aggressively attempting to scan your badge for t-shirt or squeeze ball giveaways. CyberTech is a venue for getting business done, not a place for free beer or vendor parties. It is also a dry-run for tweaking presentations ahead of the biggest cyber security show, the RSA Security Conference.Up nextMy next piece will be about some of the more interesting firms I met with at the conference.I will follow up with a final piece about how Israel has become one of the world’s most important incubators for information security software and hardware solutions. Related content opinion What is the CCPA and why should you care? CCPA is the law and the only way for a business to opt-out of it is to go out of business. For businesses that want to stay in business, however, CCPA is just the beginning of things to come. By Ben Rothke Aug 02, 2019 8 mins Government Legal Compliance opinion Where Chicken Little meets information security Outside of a movie theater, your plane won’t be hacked out of the sky. By Ben Rothke Aug 14, 2018 12 mins Cyberattacks Hacking Technology Industry opinion Information security lessons from Theranos An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been. By Ben Rothke Jul 24, 2018 8 mins Data and Information Security Security opinion It was 35 days to GDPR, and a lot of sleepless nights GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready. By Ben Rothke Jun 20, 2018 3 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe