Presentation of AMBASEC A Model-Based Approach to SEcurityCulture
|
|
- Phillip Parrish
- 6 years ago
- Views:
Transcription
1 Presentation of AMBASEC A Model-Based Approach to SEcurityCulture Prof. Jose J Gonzalez Dept. of ICT Security Group Research cell Security & Quality in Organizations IKTSoS WS March Dept. of ICT Position dr. techn. & dr. rer. nat. Professor II, Professor II, Dr. scient. Dr. rer. nat. Professor II, Dr. techn. & Dr. ing. habil. Name Jose J. Gonzalez Vladimir Oleshchuk B. John Oommen N.N. Rolf Nossum Andreas Prinz Christian S. Jensen Matthias Pätzold Frank Reichert Areas of expertise System dynamics methodology and modelling applied to 1) incident response & mngt in CERTs and CSIRTs; 2) vulnerabilities and code-driven attacks; 3) security data quality; 4) integration of technical, organizational and user aspects in security. Security & privacy frameworks, protocols and algorithms in mobile systems. Application formal methods to security related aspects of mobile systems. Ontology-based knowledge acquisition and retrieval, technologies for risk management and security. Learning automata and their applications within security and mobile communications. This includes routing, medium access control, capacity assignment, and network monitoring. Pattern recognition, adaptive data structures, and data compression. Packet switched networks, protocols (in particular Internet protocols) and security. Formal theories of context, context-sensitive knowledge processing & mgmt, mechan. reasoning by autonomous agents, ontology-based knowledge acquisition & retrieval. Software engineering, specification languages for mobile and distributed systems, communication protocols, compilers, operating systems. Multidimensional and spatio-temporal data management, data warehousing and locationbased services, aspects such as data modelling, database design, user-level languages, indexing and query processing. Propagation, mobile fading channels, multiple-input multiple-output systems, coding theory, system performance evaluation, error models for mobile communication systems Protocols for mobile systems, cellular system architectures mobile Internet applications, HW and SW communication system design. IKTSoS WS March
2 Security Group Two professors and two adjunct professors Two associated professors Three post-doctoral fellows Seven doctoral fellows One project secretary (M.Sc.) IKTSoS WS March Research Cell Security and Quality in Organizations Professor Jose J. Gonzalez Assist. Professor NN Postdoc Dr. Agata Sawicka Dr. Stefanie Hillen Ph. D. Students Magne Myrtveit Johannes Wiik Ying (Iris) Qian Yueping Chen secretary M. Sc. Maren S. Assev International (Albany, CERT/CC, Sandia Nat. Lab., European) & Norwegian (SINTEF, UiB, HiG?) collaboration *** Collaboration with & sponsing from industry IKTSoS WS March
3 ICT Research Portfolio (1) Mobile Student V. Oleshchuk 3Q01 4Q04 6,6, Ericsson, Telenor Security in Mobile Health Information Systems V. Oleshchuk 4Q03 1Q07 1,6 Mobile Communication Systems and Applications M. Pätzold 1Q03 4Q06 4,7 European Internet Accessibility Observatory M. Snaprud 3Q04 3Q07 26 EU New Generation of Dynamic Planning Tools 2Q03 1Q06 SCA Packaging Dynamics of CSIRTs 3Q03 2Q06 1,6 UFD Disseminating Insights from Complex Models to a Broader Audience Agata Sawicka (J.J. Gonzalez) 3Q04 2Q06 IKTSoS WS March ICT Research Portfolio (2) Mobile and Channel Integrating Electronic Commerce P. E. Pedersen 2Q02 1Q05 4,5 (total) Telenor, Ericsson, DnB, Easy Park, A-pressen, SNF, Consuming Adventure Oriented Digital Services P. E. Pedersen 2Q03 1Q06 4,0 (total) Telenor, NRK, Norsk Tipping, SNF, ROBACC M. Snaprud 3Q03 4Q04 0,47 IT Funk,, all partners AMBASEC (A Model- Based Approach to Security Culture) 1Q04 4Q07 3,1 Total project budget 56, AUC part of man-hours approximately 70 % IKTSoS WS March
4 New Generation of Dynamic Planning Tools New Generation of Dynamic Planning Tools 2Q03 1Q06 SCA Packaging Goals Objectives Develop a methodology encompassing the flexibility and userfriendliness of spreadsheets with dynamic simulation capabilities and enhanced data quality and security. Apply to SCA Packaging problem 1 short term, 2 more students long term PhD Students Magne Myrtveit Results Participants Papers published and submitted: Papers planned: 6 PhD theses : 1 Master theses: 3++ The project is embedded within the Research group Security and Quality in Organizations. Problem owner is SCA Packaging IKTSoS WS March Disseminating Insights from Complex Models to a Broader Audience Disseminating Insights from Complex Models to a Broader Audience Agata Sawicka (J.J. Gonzalez) 3Q04 2Q06 NFR Goals Objectives Postdoc Defining key design principles that should guide model communication. Develop methods and tools for model communication. Improve the applicability of model-based results, especially in information security. Enhance information security in organizations. Agata Sawicka Results Participants Papers published and submitted: 3 Papers planned: 4 (at least) Seminars: Master theses: 4 The project is embedded within the Research group Security and Quality in Organizations. IKTSoS WS March
5 Dynamics of CSIRTs Dynamics of CSIRTs 3Q03 2Q06 1,6 AUC Goals Objectives Modelling the factors influencing the effectiveness of Computer Security Incident Response Teams (CSIRTs) over time. Improve organizational security and survivability. PhD degree PhD Students Johannes Wiik Results Participants Papers published and submitted: 3 Papers planned: 6 PhD theses: 1 Master theses: 1++ The project is embedded within the Research group Security and Quality in Organizations. IKTSoS WS March AMBASEC (A Model-Based Approach to SEcurity Culture) Main Objective Advance the quality of reporting and use of ICT security incident data by extending and evaluating qualitative and quantitative data analysis methods in dual setting of Interactive Learning Environments (ILE s) and audit instruments applied to an IRMArelevant CSIRT (Computer Security Incident Response Team). IKTSoS WS March
6 AMBASEC Sub-goals Knowledge capture and qualitative modelling of a CSIRT WP1.1 Qualitative system dynamics (SD) map of a CSIRT (1 st group modelling workshop) WP1.2 Qualitative analysis (dynamic stories) of a CSIRT WP1.3 Improving SD map of CSIRT (2 nd group modelling workshop) WP1.4 Preliminary calibrated and validated quantitative SD model of a CSIRT WP1.5 First paper on SD modelling of a CSIRT WP1.6 First paper on model analysis and policy recommendations Model refinement of a CSIRT Model-based learning and reality feedback IKTSoS WS March AMBASEC First project year (2005): Group modelling workshops May and 5-9 September Extensive preparatory activities (planning & data mining before the workshops) Follow up activities (detail modelling, information exchange, reports and papers) Group modelling team: Prof. David Andersen, Prof. George Richardson and assoc. prof. Eliot Rich, Nelson Rockefeller Center for Policy Studies, University at Albany Prof. Jose J. Gonzalez, PhD fellows Iris Qian & Johannes Wiik, AUC The domain expert group: our IRMA partners Odd-Helge Longva, Stig O. Johnsen and Maria B. Dahl and OLF The group modelling WS will deliver AMBASEC WP For IRMA the group modelling WS will contribute to the intended survey of incident response management in ICT systems by helping create a coherent, model-based structure & establish specific links between the activities to improve security culture in both projects. IKTSoS WS March
7 AMBASEC Second project year (2006): The IRMA WP3 Implement IRMA at the industrial partners and AMBASEC work packages 2.3 & 2.4 (design, implementation & evaluation of ILE & audit instrument) will be coordinated for best implementation and deployment at OLF partners. Synergies between IRMA and AMBASEC will be fostered by regular collaboration. IKTSoS WS March AMBASEC Third project year (2007): The IRMA WP4 Strengthen the Security Awareness in the participating enterprises and AMBASEC work packages 3.1, 3.2, 3.3 (evaluation of improvement of security culture and cyber data) will be coordinated for best implementation and deployment at OLF partners. Synergies between IRMA and AMBASEC will be fostered by regular collaboration IKTSoS WS March
Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More informationCEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT
2017-2 CEF Telecom Calls: CEF-TC-2017-2: Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT CEF-TC-2017-2: Cyber Security Funding under this call will allow the Member States to limit the economic
More informationOverview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project
Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT
More informationImplementing a National Strategy : the case of the Tunisian CERT
Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end
More informationThe cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of
CERT@VDE The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of CERT@VDE What is a Computer Emergency Response Team (CERT)? A CERT (sometimes called
More informationCYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE
CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE Richard Kerkdijk December 7th 2017 A WORD ABOUT TNO Dutch innovation and advisory body, founded by law in 1932 and currently comprising some 2800
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationEricsson R&D Hungary
Ericsson R&D Hungary 104 YEARS OF ERICSSON IN HUNGARY 1876 First factory in Sweden 1897 Saint Petersburg, Russia 1904 Beeston, England 1906 Buffalo, USA 1911 Budapest, Hungary 1912 Paris, France 1912 Vienna,
More informationA Risk Management Platform
A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention
More informationRegional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar
Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationIST FP6 Co-ordination Action Project: CI 2 RCO
IST FP6 Co-ordination Action Project: CI 2 RCO http://www.ci2rco.org Critical Information Infrastructure Research Co-ordination Conference on Network and Information Security Roma - November 04, 2005 Sandro
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationGlobal Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009
Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access
More informationExploitation Strategies - a Practice Case from Research. (aka from FP to IP to Marketable Products)
Exploitation Strategies - a Practice Case from Research (aka from FP to IP to Marketable Products) Stratos Papadimitriou & Ioannis Koliousis TIPS Training Academy Lyon February 4 th 6 th, 2014 Topics of
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationSecure Societies in 2015
Secure Societies in 2015 In the Horizon 2020 work programme Nicole Wyss National Contact Point Security & Transport Euresearch Head Office Nicole.wyss@euresearch.ch +41 31 380 60 04 Agenda 1. Why participate
More informationCybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European
Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning
More informationIP Networking Fundamentals Theory and Practice
IP ing Fundamentals Theory and Practice Introductory course into computer networking Prof. Dr. Károly Farkas Guest Professor Department of Informatics, UZH farkas@ifi.uzh.ch Introduction Reader: Prof.
More informationLaCoMoCo Crossroads Copenhagen March 7, 2002
LaCoMoCo Crossroads Copenhagen March 7, 2002 Lars Birkedal [birkedal@itu.dk] The IT University of Copenhagen LaCoMoCo March 20, 2002 p.1/22 My background Cand. Scient. from University of Copenhagen, 1994
More informationCERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University
CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon
More informationPanel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013
Panel: Research on Complex Enterprise Systems of Systems Complex Adaptive Systems Conference 14-NOV-2013 Dan DeLaurentis School of Aeronautics & Astronautics and Center for Integrated Systems in Aerospace
More informationSecurity Aspects of Trust Services Providers
Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00
More informationCybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus
Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,
More informationCERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria
CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic
More informationNational Cybersecurity Center of Excellence
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationPresentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT
Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert
More informationLindström Tomas Cyber security from ABB System 800xA PA-SE-XA
Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber
More informationEISAS Enhanced Roadmap 2012
[Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationInformation Security Program Audit Introduction and Survival Guide
Information Security Program Audit Introduction and Survival Guide Cyber Security Symposium 2016, Sacramento Convention Center September 28, 2016 INTRODUCTION Welcome Presenters Background Carl Salmonsen,
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationDigital Service Management (DSM)
Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is
More information1.What are critical infrastructures in Switzerland? CIP concept in Switzerland
Session 4 Addressing new frontiers in CI resilience Cyber risks and beyond Swiss application and insights Joint OECD-JRC Workshop on Critical Infrastructure Resilience Paris, 25 September 2018 Dr. Stefan
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationENISA S WORK ON ICS AND SMART GRID SECURITY
AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and
More informationBuilding Global CSIRT Capabilities
Building Global CSIRT Capabilities Barbara Laswell, Ph.D. September 2003 CERT Centers Software Engineering Institute Carnegie Mellon Pittsburgh, PA 15213 Sponsored by the U.S. Department of Defense 1 2003
More informationThe Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017
The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA
More informationM.S. in Information Systems
M.S. in Information Systems 1 M.S. in Information Systems (30 Credits) M.S. in Information Systems IS Core Courses IS 601 Web Systems Development 3 IS 663 System Analysis and Design 3 IS 631 Enterprise
More informationAccounting Ethics and Auditing
Accounting Ethics and Auditing Only three percent of adults have career-boosting professional certifications you can be one of them. And you can earn while meeting Colorado CPA licensure requirements including
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More informationAfter completing this course, participants will be able to:
Designing a Business Intelligence Solution by Using Microsoft SQL Server 2008 T h i s f i v e - d a y i n s t r u c t o r - l e d c o u r s e p r o v i d e s i n - d e p t h k n o w l e d g e o n d e s
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationARRA State & Local Energy Assurance Planning & Implementation
State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity
More informationExperience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country
Prof. Olfa ZERIBI-BEN SLIMANE DG & National NCP Coordinator Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Dr. Yosr Z. HAFFANI Management
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationThesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel
Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/
More informationCURRICULUM MASTER OF DISASTER MANAGEMENT
CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationVasileios Gkioulos PostDoc, NTNU Nils Kalstad Svendsen Head of Department and Center Host
NTNU CCIS En resurs for energisektoren Vasileios Gkioulos (vasileios.gkioulos@ntnu.no) PostDoc, NTNU Nils Kalstad Svendsen (nils.svendsen@ntnu.no) Head of Department and Center Host Department of Information
More informationBirgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT)
Digital transformation of health and care in the Digital Single Market Harnessing the potential of data to empower citizens and build a healthier society DG Communications Networks, Content and Technology
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationDelivering on the Web: The NYS Internet Services Testbed
Delivering on the Web: The NYS Internet Services Testbed Project Report 96-1 Center for Technology in Government University at Albany / SUNY ª 1996 Center for Technology in Government The Center grants
More informationKaspersky Security Awareness
Kaspersky for Business Kaspersky Security Awareness Gamified training programs for all organizational levels www.kaspersky.com #truecybersecurity An effective way of building cybersafety across an organization
More informationLabs being conducted in CS dept.
The Structure of the Curriculum: Science & Uttar Pradesh Technical University encapsulates Science and as an Undergraduate Programme program having tenure of VIII semesters and designed to have a total
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationMASTER OF INFORMATION TECHNOLOGY (Structure B)
PROGRAM INFO The MIT (Master of Information Technology) program aims at providing Master s Degree holders with advanced knowledge and skills in dealing with an organization s computing requirements and
More informationMaster & Doctor of Philosophy Programs in Computer Science
Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For
More informationTourism applications of Artificial Intelligence techniques. Dr. Antonio Moreno, ITAKA research group, URV
Tourism applications of Artificial Intelligence techniques Dr. Antonio Moreno, ITAKA research group, URV ITAKA Basic research lines Multi-agent systems Ontology Learning Information Extraction Automated
More informationAdvanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP
Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP 2005-06 06 IST Call 5 Preparatory Workshop Brussels, 31 Jan 1 Feb 2005 Enabling application Max Lemke Deputy Head
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationThe ITIL Process Map for Microsoft Visio. Examples and Overview of Contents
The ITIL Process Map for Microsoft Visio Examples and Overview of Contents Contents Structure of the ITIL Process Map Page 3 ITIL Process Diagrams Examples Page 4 Index of Process Diagrams contained in
More informationKYPO Cyber Range Design and Use Cases
KYPO Cyber Range Design and Use Cases ICSOFT CONFERENCE 24.7.-26.7. 2017 Daniel Tovarňák Masaryk University (ICS) tovarnak@ics.muni.cz Cyber Ranges Cyber Range is a platform for cyber security research
More informationGraduate Student Orientation
Graduate Student Orientation Department of Computer Science The Volgenau School of Engineering Professor Sanjeev Setia, Chair Fall 2018 http://cs.gmu.edu Presented by: Professor Alex Brodsky Outline CS
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationWorld Meteorological Organization Working together in weather, climate and water
WMO World Meteorological Organization Working together in weather, climate and water Workshop on Multi-Hazard Early Warning Systems for Urban Areas Dr Maryam Golnaraghi Chief of Disaster Risk Reduction
More informationCOMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY
COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationMaster of Computer Applications
FIRST SEMESTER EXAMINATION ID 044101 MCA 101 Fundamentals of IT 3 1 4 044103 MCA 103 Programming in C 3 1 4 044105 MCA 105 Discrete Mathematics 3 1 4 044107 MCA 107 Computer Organization 3 1 4 044109 MCA
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationIDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationMedia (NEM) Initiative
Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom
More informationInformation Systems. Courses. Information Systems 1
Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use
More informationWP2 Metrics of Cyber Security
WP2 Metrics of Cyber Security WP2 Athens March 2018 CYBE Presented by: Jart Armin This work is performed within the SAINT Project (Systemic Analyser in Network Threats), with the support of the European
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationNaval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17)
Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date:
More informationRomania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security
Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information
More informationNASDAQ BWISE ACADEMY COURSE CATALOG
NASDAQ BWISE ACADEMY COURSE CATALOG 1 MANUAL TITLE HERE Copyright 2014, The NASDAQ OMX Group, Inc. All Rights Reserved. Q14-NUMBER. DATE TABLE OF CONTENTS 1 NASDAQ BWISE ACADEMY COURSE CATALOG 4 1.1 Introduction
More informationAn overview of the CERT/CC and CSIRT Community
An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion
More informationCyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte
Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable
More informationSurvey of Research Data Management Practices at the University of Pretoria
Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationBIBL NEEDS REVISION INTRODUCTION
BIBL NEEDS REVISION FCSM Statistical Policy Seminar Session Title: Integrating Electronic Systems for Disseminating Statistics Paper Title: Interacting with Tabular Data Through the World Wide Web Paper
More information