SDN An opportunity for security by design?
|
|
- Eugene Lynch
- 5 years ago
- Views:
Transcription
1 SDN An opportunity for security by design? IEEE NetSoft Sec-VirtNet 2016 Sandra Scott-Hayward 10 June
2 Presenter Bio Dr Sandra Scott-Hayward, CEng CISSP CEH OCSA Senior Research Engineer Network Security, Queen s University Belfast ONF Research Associate Vice-Chair, ONF Security WG Project Leader, OSSDN Project Delta Research Interests: Network Security Security Protocols and Architectures Software-Defined Networking Optimization Techniques Wireless Communication Introduction Network Security - SDN Security Secure Network Vision
3 Centre for Secure Information Technologies Est.2009, Based in The ECIT Institute Initial funding over 30M (CSIT 2-38M) GLOBAL INNOVATION HUB FOR CYBER SECURITY 90 People Researchers Engineers Business Development Largest UK University lab for cyber security technology research GCHQ Academic Centre of Excellence Industry Informed Open Innovation Model Strong international links ETRI, CyLab, GTRI, SRI International Cyber Security Technology Summit Introduction Network Security - SDN Security Secure Network Vision
4 Outline of the Talk Network Security Today Network Security Tomorrow (or soon!) SDN Security Challenges and Opportunities SDN Secure Network Vision Introduction Network Security - SDN Security Secure Network Vision
5 Network Security - Today Cloud IoT 5G Industry 4.0 ICS Smart Grid Introduction Network Security - SDN Security Secure Network Vision
6 Introduction Network Security - SDN Security Secure Network Vision Network Security - Today
7 Introduction Network Security - SDN Security Secure Network Vision Network Security Tomorrow
8 Introduction Network Security - SDN Security Secure Network Vision No Interruptions
9 SDN Security
10 SDN Characteristics SDN characteristics can counter the lack of visibility and manageability; Virtualized services supported by SDN control; S. Scott-Hayward, S. Natarajan, S. Sezer, A Survey of Security in Software Defined Networks, IEEE Communications Surveys & Tutorials, Introduction Network Security - SDN Security Secure Network Vision
11 Introduction Network Security - SDN Security Secure Network Vision SDN Potential Attacks and Vulnerabilities
12 Introduction Network Security - SDN Security Secure Network Vision SDN Security Opportunities
13 Introduction Network Security - SDN Security Secure Network Vision SDN Security Solutions
14 SDN Security Evolution Dec. 2009: OpenFlow published (Stanford) Aug. 2012: FortNox (SRI) Jun. 2013: ITU-T SDN Security Questions Aug. 2014: 1 st ODL CVE (Raised by Gregory Pickett) Mar. 2015: Formalization of ODL Security Response Team Sept. 2015: Security-Mode ONOS Released (Drake) Apr. 2012: HSA (Stanford) Apr. 2013: OF Security Analysis (R. Kloti) ONF SecDG launched Nov. 2014: ONF SecDG becomes Working Group Aug. 2015: ODL Controller Shield Project launched May 2014: ODL Security Analysis Introduction Network Security - SDN Security Secure Network Vision
15 Secure Network Vision Exploiting the characteristics of SDN for the secure network vision Visibility and programmability can support - Flexible network configuration - Dynamic network reconfiguration Near-term: - Automate existing security model - Accelerate techniques in monitoring, analysis, detection and protection - Moving target defense dispersion, fractionalization and longer-term? Introduction Network Security - SDN Security Secure Network Vision
16 Call for Chapters Guide to Security in SDN and NFV Challenges, Opportunities, and Applications Chapter proposal due: 15 August 2016 Full chapters due: 20 November 2016 Submission Details: Contact: Introduction Network Security - SDN Security Secure Network Vision
17 Thank you! Questions?
ECIT Institute (Est.2003)
ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems
More informationSDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018
SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018 Queen s University Belfast Lanyon Building Est. 1845 Centre for Secure Information Technologies
More informationHuawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei
Huawei European Research University Partnerships Michael Hill-King European Research Institute, Huawei Next 20 30 Years: The World Will Become Intelligent All things Sensing All things Connected All things
More informationSecond Workshop of India-EU Collaboration on Standardization for Select Technologies
Second Workshop of India-EU Collaboration on Standardization for Select Technologies TSDSI s Vision & Roadmap for 5G Nov 05, 2015 Vinosh James Lead, Technical Standards for Qualcomm, and Chair, 5G WG of
More informationCALENDAR FOR THE YEAR 2018
27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationInstructor training course schedule v3 Confirmed courses due completion by 31 st July 2019
Confirmed courses due completion by 31 st July 2019 Courses: 2 Orientation 2 IoT Fundamentals 2 Networking Essentials 2 Cybersecurity Essentials 2 IT Essentials: PC Hardware and Software 2 CCNA Routing
More informationSMART. Investing in urban innovation
SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.
More informationJames Won-Ki Hong. Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea.
James Won-Ki Hong Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea jwkhong@postech.ac.kr 2017. 7. 6 DPNM Lab., POSTECH NetSoft 2017 DEP Network
More informationNetwork. Gediz SEZGİN CAPITAL MARKETS DAY 2018
Gediz SEZGİN 95 1 THE BEST NETWORK 2 NETWORK CAPABILITIES 3 READINESS FOR FUTURE 96 THE WIDEST SPECTRUM Turkey Europe TURKCELL Turkcell EE Telekom Slovenije A1 Slovenija Telekom Austria TTG TDC T-Mobile
More informationThe People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK
The People to Secure Our Future Judy Baker, Director Cyber Security Challenge UK A story Starts in the US, Comes to the UK Results in more and better people in UK jobs The US Discovery Skills shortage
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationProject Progress Report
ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee
More informationThe Transformation in Security How RSA is responding to the Changing Threat Landscape
The Transformation in Security How RSA is responding to the Changing Threat Landscape Dr. Robert Griffin Chief Security Architect RSA, the Security Division of EMC 1 Agenda The changing threat landscape
More informationWe are innovating in security
We are innovating in security Security Network Network Innovation Day Day 2018 2018 We are We in are in threat and defense Complex mix of multiple vendors without effective orchestration IoT connected
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationBig Data for Smart Cities Connected Vehicles in the Wireless World
Big Data for Smart Cities Connected Vehicles in the Wireless World Dr Nigel Jefferies WWRF Chairman Huawei Technologies 3rd March 2016 Will IoT trigger next industrial revolution? Size of the IoT opportunity
More information5G IOT Security. Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3
4 th Global Wireless Summit, 28 November, 2016 5G IOT Security Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3 Disclaimer: This
More informationIOT Security More than just the network..
IOT Security More than just the network.. Adrian Winckles Cyber Lead - Anglia Ruskin University & OWASP Cambridge Chapter Leader Adrian.Winckles@anglia.ac.uk Bio Adrian Winckles Adrian Winckles is Course
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationThe trouble with referees is that they know the rules, but they do not know the game.
The trouble with referees is that they know the rules, but they do not know the game. Bill Shankly s typically insightful comment is fast becoming as relevant to the cyber security profession as it was
More informationA C H I E V E B O T H W I T H K E Y S I G H T. Company Profile
A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years
More informationDetecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017
Feeling lucky? Detecting breach There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Industry average is 100 days to detect a breach,
More informationResearch Institute in Secure Hardware & Embedded Systems (RISE) Máire O Neill
Research Institute in Secure Hardware & Embedded Systems (RISE) Máire O Neill UK Research Institutes in Cyber Security RISE is 1 of 4 multi-institutional Research Institutes in Cyber Security funded by
More informationSecurity Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018
Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they
More information2015 China Future Network Development and Innovation Forum Held
2015 China Future Network Development and Innovation Forum Held On December 10 th and 11 th 2015, 2015 China Future Network Development and Innovation Forum, co-hosted by the Chinese Academy of Engineering
More informationThe NIH Big Data to Knowledge Initiative: Raising the Prominence of Data
The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data Michael F. Huerta, Ph.D. Associate Director, National Library of Medicine Director, Office of Health Information Programs Development
More informationin Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM
Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean
More informationBuilding world-class security response and secure development processes
Building world-class security response and secure development processes David Jorm, Senior Manager of Product Security, IIX Outline Introduction SDN attack surface Recent OpenDaylight vulnerabilities Defensive
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationSDN RG IAB Review. Daniel King (SDN RG Chair) IETF 94 Yokohama
SDN RG IAB Review Daniel King (SDN RG Chair) d.king@lancaster.ac.uk IETF 94 Yokohama Nanos gigantum humeris insidentes Standing on the shoulders of giants Previous (founding) SDN RG Chairs: Nick Feamster
More informationWP1. Semantic System Description. by Olaf Owe (UiO)
WP1 Semantic System Description by Olaf Owe (UiO) WP1 team Olaf Owe (PMA group leader, leader Conserns) Josef Noll (at UNIK and Movation as well) Christian Johansen (50% IoTSec), senior researcher (UNIK
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationManagement in SDN/NFV
Management in SDN/NFV Network Management Spring 2018 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Outline Introduction What is the SDN? NM in SDN What is the NFV? NM in NFV Summary
More informationSESSION 206 Wednesday, November 2, 11:30am - 12:30pm Track: People, Culture and Value
SESSION 206 Wednesday, November 2, 11:30am - 12:30pm Track: People, Culture and Value The Value of ITSM: An Executive Perspective Anthony Iorio Former, Senior Vice President, Information Technology Group
More informationTHE THREE WAYS OF SECURITY. Jeff Williams Co-founder and CTO Contrast Security
THE THREE WAYS OF SECURITY Jeff Williams Co-founder and CTO Contrast Security 1. TODAY S AVERAGE APPLICATION IS A SECURITY DISASTER 2. SOFTWARE IS LEAVING SECURITY IN THE DUST SOFTWARE Typical enterprise
More informationSecurity improvement in IOT based on Software
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the
More informationDigital Transformation through Open Software Defined Infrastructure Justin Dustzadeh, Vice President and Head of Global Infrastructure Network
Digital Transformation through Open Software Defined Infrastructure Justin Dustzadeh, Vice President and Head of Global Infrastructure Network Services, Visa Digital Transformation Through! Open Software-Defined
More informationTraining 120 seconds at a time. Sandra Lammas. Manager ICT Training University of Southern Queensland
Training 120 seconds at a time Sandra Lammas Manager ICT Training University of Southern Queensland The Problem Important Info to convey Can't force staff to read our stuff 1200-1500 staff Limited comms
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationInternet of Things and M2M
Internet of Things and M2M Pedram Radmand, Ph.D. Wireless Sensor Network Research Newracom Inc Wireless Technology and IoT newracom.com Direct 949-390-7111 pedrad@gmail.com pedram.radmand@newracom.com
More informationOverview of ITU capacity building activities
Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity
More informationBristol Is Open. Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15
Bristol Is Open Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15 The first Joint Venture between the Council & the University Why are we doing this? How are we doing
More informationThirtieth Annual. Electrical & Computer Engineering Day
\ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day
More informationETSI and GRID Standardisation. Mike Fisher, BT ETSI TC GRID Chair. 23 October 2006 ITU-T/OGF Workshop on Next Generation Networks and Grids
ETSI and GRID Standardisation Mike Fisher, BT ETSI TC GRID Chair 1 ETSI and GRID GRID#2: 2 nd ETSI TC GRID Meeting, 1 Dec 2006 (Sophia- Antipolis) 3 rd ETSI GRID Plugtests, 27 Nov 1 Dec 2006 (Sophia- Antipolis)
More informationEXPLORING INTERNATIONAL COLLABORATION ON CYBER EDUCATION, RESEARCH & TRAINING
ROYAL HOLLOWAY UMBC KEIO EXPLORING INTERNATIONAL COLLABORATION ON CYBER EDUCATION, RESEARCH & TRAINING PROF. ANUPAM JOSHI PROF. KEITH MAYES KAZUO NOGUCHI UMBC NSA/DHS CENTER OF EXCELLENCE ROYAL HOLLOWAY
More informationOptical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking
Optical network virtualization Optical network virtualization Transport SDN for cloud-centric networking 1 Transport SDN for the cloud Manually initiated and managed provisioning processes do not provide
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationEUROCONTROL SWIM Specifications. NM B2B Tech Forum June 2018
EUROCONTROL SWIM Specifications NM B2B Tech Forum June 2018 Where do Specifications (Standardisation) come into play 2 Context Supporting: Coordinated by: Members and Observers: EUROCAE EUROCONTROL European
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationSDN RG State of the Nation. Daniel King Kohei Shiomoto IETF 95 Buenos Aires
SDN RG State of the Nation Daniel King Kohei Shiomoto IETF 95 Buenos Aires Origins SDN Bar BoF IETF 81 (July 2011) SDNP List created Software Driven Networks BoF (400 participants) IETF 82 (Nov, 2011)
More informationCommonwealth Cyber Initiative Blueprint Development
Commonwealth Cyber Initiative Blueprint Development Theresa Mayer and Laurel Miner Virginia Tech Presented to VRIC on August 14, 2018 https://www.networkworld.com/article/3235124/internet-of-things/internet-of-things-definitions-a-handy-guide-to-essential-iot-terms.html
More informationAccelerating SDN and NFV Deployments. Malathi Malla Spirent Communications
Accelerating SDN and NFV Deployments Malathi Malla Spirent Communications 2 Traditional Networks Vertically integrated Closed, proprietary Slow innovation 3 Infinite Complexity of Testing Across virtual
More informationPowering Your Website Content with Magento PageBuilder
Powering Your Website Content with Magento PageBuilder Olena Tkacheva Product Manager Magento Adobe Company tkacheva@adobe.com John Hughes Head of Magento Fisheye Media Ltd. johnh@fisheyehq.com Experience-driven
More information1/8. Note by the Chair. Executive Summary. 24 th Senior Officials Meeting of the Environment Management Group. EMGSOM.24(a)_4_Work Plan_2019
24 th Senior Officials Meeting of the Environment Management Group Technical Segment, 17 th September 2018 (15:00-17:00 Geneva time) Via audio-video conference EMGSOM.24(a)_4_Work Plan_2019 Distribution:
More informationIPv6 From Developing Country Perspective
International Telecommunication Union IPv6 From Developing Country Perspective Baher Esmat Chair Egypt IPv6 Task Force Outline o Egypt Information Society o Growth in Internet and mobile services o CIT
More informationIntroduction of the Industrial Internet Consortium. May 2016
Introduction of the Industrial Internet Consortium May 2016 An Open Membership Consortium now 250 companies strong May 26, 2016 2 IIC Founders, Contributing Members, & Large Industry Members IIC Founding
More informationIEEE NetSoft 2016 Keynote. June 7, 2016
IEEE NetSoft 2016 Keynote June 7, 2016 0 Contents Introduction - Network Evolution & Operator Challenges Re-architecting the RAN SDRAN: Software-defined RAN - Overview & Enabling Features SDRAN Opportunities
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course
More informationThe ESA Cyber Range in Redu: Why it is important for ESA, EDA and all of us
The ESA Cyber Range in Redu: Why it is important for ESA, EDA and all of us Stefano Zatti Head of ESA Security Office 14/05/2018 ESA UNCLASSIFIED - Releasable to the Public What is a Training Range? ESA
More informationThe Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015
The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 Utilities Telecom Council Global Focus on Utility Information and Communications Technology (ICT) Formed more than
More informationCENTRE OF EXCELLENCE (COE) in WIPRO TELECOM R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY
CENTRE OF EXCELLENCE (COE) in WIPRO TELECOM R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY CoE Objectives -Importance and Its Opportunities Training and certifications, skill assessments, team building and
More informationWorld Summit on the Information Society (WSIS) and the Digital Divide
World Summit on the Information Society (WSIS) and the Digital Divide Dr Tim Kelly, Head, Strategy and Policy Unit International Telecommunication Union KADO/APWINC Digital Opportunity Conference, Seoul,
More informationInsert Title Here. Middleware Architecture for Cloud Based Services 11/18/2014
Insert Title Here Middleware Architecture for Cloud Based Services 11/18/2014 1 Team Prof. Mohammed Samaka Qatar University Dr. Subharthi Paul Washington Univ in STL Prof. Raj Jain Washington Univ in STL
More informationIntegrated Consortium of Laboratory Networks (ICLN)
Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps
More informationSQS Academy Stepping ahead
SQS Academy Stepping ahead sqs.com Public Schedule Ireland 2018 All public courses also run as private events May 2018 8 May 3 days BCS Certificate in Business Analysis Foundation 1,550.00* 9 May 3 days
More informationCommunications Security, Reliability & Interoperability Council
Communications Security, Reliability & Interoperability Council William Smith, AT&T Co-Chair Chris Fischer, APCO Co-Chair Council Members Steering Committee Julie Thomas, AT&T Steering Committee Co-Chair
More informationEffective Partnerships: Security and Privacy in Smart Cities
SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation
More informationInformation Technology (CCHIT): Report on Activities and Progress
Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT
More informationWhat makes a hot topic hot? An NSF Perspective
What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance
More informationCoaching emerit Certified Event Find out what level you are ready for and what you need to JHB
For more information on these courses, please visit www.exsaacademy.co.za/courses or contact 011 467 6771 or e-mail: info@exsaacademy.co.za DATE NAME OF COURSE COURSE OUTLINE WHERE DURATION MARCH 07-Mar
More informationBuilding Open Source IoT Ecosystems. November 2017
Building Open Source IoT Ecosystems November 2017 Jim White, Dell Distinguished Engineer & Senior Software Architect james_white2@dell.com Dell Project Fuse Architect EdgeX Foundry Technical Steering Committee
More informationHigh Speed Powerline Communication for the Smart Grid
High Speed Powerline Communication for the Smart Grid UPA Vision for the Future Chris Graham-Fielding Freedom Digital Networks Freedom Digital Networks Privately funded UK company Formed in 2004 Deploy
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationTowards Wireless Sensor Network Softwarization
Paper presentation at The 2nd IEEE Conference on Network Softwarization (NetSoft 2016), Workshop on SDN and IoT (SDN-IoT 2016) 06-10 June 2016, Seoul, Korea. Towards Wireless Sensor Network Softwarization
More informationApp Economy Market analysis for Economic Development
App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationContents. Huawei 5G Research Progress
August, 2015 Contents 5G Vision Huawei 5G Research Progress Huawei 5G Collaboration Mobile, One Decade for a Leap 1980s 1990s 2000s 2010s 1G 2G 3G 4G 5G Analog Voice Digital Voice Mobile Broad Band Better
More informationOutcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June.
Outcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June. EuCNC - the best venue to present the work of the Security WG after one year of activities.
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationVelammal Engineering College Department of Computer Science and Engineering
Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal
More informationONOS Mini-Summit, Beijing, China
1 ONOS Mini-Summit, Beijing, China Aseem Parikh, VP Solutions and Partnerships, ONF August 2017 About ONF 3 New ONF Being Formed to Lead in this New Open Source Era ONF Champion For SDN Standards SDN/NFV
More informationMcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<
Mcafee Network Intrusion Detection System Project Report Selecting an intrusion detection and prevention system vendor can be a IDS/IPS protection, the current network configuration and the project budget,
More informationUsing Flexibility as a Measure to Evaluate Softwarized Networks
Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Using Flexibility as a Measure to Evaluate Softwarized Networks Wolfgang Kellerer Technical
More informationMedia Pack 2017 OVER REACHING 14,000 SOFTWARE TESTING AND QA PROFESSIONALS
Media Pack 2017 TEST Magazine was specifically created as a voice for the modern-day software testing and quality assurance professional. Launched in 2008 and published in print and online, the publication
More informationDate of Birth
ALEXANDER ANTUKH General information Date of Birth 26.08.1989 E-mail alexander@antukh.com Location Moscow, Russia Languages Russian (Native) English (Full professional proficiency) Polish (Full working
More informationNIS Directive : Call for Proposals
National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday
More informationACM/IEEE MODELS 2018, København, Denmark. Ta id Holmes
ACM/IEEE MODELS 2018, København, Denmark Ta id Holmes New Ideas and Vision Paper @ Foundations Track Motivation Vision Idea Application Discussion Customization of Architecture Models Automated Model Refactoring
More informationRTM SDN Webinar & Panel Discussion. Using SDN to Simplify and Automate UC and Real-Time Media Cloud Deployments
SDN Webinar & Panel Discussion Using SDN to Simplify and Automate UC and Real-Time Media Cloud Deployments A welcome from our moderator Jim Burton Co-founder of CT Link LLC, UCStrategies and UC Expert
More informationSeminar Course 392N Spring2012 EE392N. April 3, Dan O Neill Dimitry Gorinevsky
Seminar Course 392N Spring2012 EE392N April 3, 2012 Dan O Neill Dimitry Gorinevsky Outline Class logistics Introductory lecture on Intelligent Energy Systems Instructors Daniel O Neill, Consulting Professor
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationINFORMATION TECHNOLOGY ONE-YEAR PLAN
INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by
More informationOPERA. Low Power Heterogeneous Architecture for the Next Generation of Smart Infrastructure and Platforms in Industrial and Societal Applications
OPERA Low Power Heterogeneous Architecture for the Next Generation of Smart Infrastructure and Platforms in Industrial and Societal Applications Co-funded by the Horizon 2020 Framework Programme of the
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationPROTECTING MANUFACTURING and UTILITIES Industrial Control Systems
PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA
More informationUniversity of Dublin Trinity College
University of Dublin Trinity College Library & Information Policy Committee Minutes of the meeting held on Monday 8 th November 2011 at 15.15 in the Henry Jones Room, Old Library. Present: Apologies: Professor
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More information