OPEN-CSAM INFORMATION AGGREGATOR AND REPORTING TOOL USING AI AND NATURAL LANGUAGE PROCESSING

Size: px
Start display at page:

Download "OPEN-CSAM INFORMATION AGGREGATOR AND REPORTING TOOL USING AI AND NATURAL LANGUAGE PROCESSING"

Transcription

1 OPEN-CSAM INFORMATION AGGREGATOR AND REPORTING TOOL USING AI AND NATURAL LANGUAGE PROCESSING Georgios Chatzichristos Operational Security Unit - ENISA

2 THE GOAL Help Decision Makers take better decisions!

3 THE TRIGGER Technical Operational Operational Technical 3

4 Overview Develop a tool based on latest technologies that will enhance situational awareness and help threat analysts to advise decision makers 4

5 The process Monitor (machine) Search (analyst) Report (machine+analyst) 5

6 NLP What is Natural Language Processing? Field of study focused on making sense of language Using statistics and computers Basics tasks of NLP: Topic identification Text classification NLP applications include: Chatbots Translation, Fake News detection, text summarization Sentiment analysis -> Social Media, Customer reviews etc. SPAM 6 Short name of the powerpoint presentation, maximum length two thirds of the page

7 Information aggregation News aggregator, monitors 24/7 a set of news sources and tweets Uses NLP to isolate trending terms Creates clusters of relevant terms using AI Searches ENISA s own publications Searches ENISA s own recommendations 7

8 NLP Trending terms in Tweets Continuous monitoring Daily/Weekly/Monthly/Yearly Stats Trending terms in News ENISA s topics ENISA s terms 8

9 AI Continuous monitoring Daily/Weekly/Monthly/Yearly Stats 9

10 Knowledge Graph Hardcoded Used to drive AI 10

11 Searching 11

12 12 Searching

13 Reporting 13

14 Elastic Search Kibana Jenkins Knowledge Graph Sources Done Done Done Done Done Latent Dirichlet Allocation (LDA) Non-negative Matrix Factorization (NMF) Done Done User inputs Spiders Scrappers Training Data / features 14

15 Update of Knowledge Graph and sources Latent Dirichlet Allocation (LDA) Non-negative Matrix Factorization (NMF) Elastic Search Kibana Jenkins Knowledge Graph Sources Users Spiders Scrappers Training Data / features 15

16 WAY FORWARD

17 17 Short name of the powerpoint presentation, maximum length two thirds of the page

18 The Vision Develop a dynamic knowledge graph fed by threat analysts and AI that will keep itself up to date by adding 3,4 Hacktivism new terms and delete obsolete ones 9,8 8,3 5,6 9,5 9,2 8,1 8,1 7,6 8,3 9,8 9,1 9,1 18

19 The Vision Develop a dynamic pool of sources fed by threat analysts and AI 3,4 9,8 7,6 9,8 8,3 9,1 5,6 8,1 9,5 7,6 8,3 9,1 9,2 8,1 9,2 Originality Authenticity Popularity Quality Also new types of sources like DarkWeb, Pastebin and sentiment analysis! 19

20 The Vision Make enisa an open source info hub with good training data for AI available for all Use services Contribute to QoS Threat analysts CSIRTs Cyber Security Professionals Training data for AI Academia Essential Services providers Researchers Cyber Security professionals

21 EPILOGUE Beta testers welcomed. Let us know if you are interested! 22

22 THANK YOU FOR YOUR ATTENTION Vasilissis Sofias Str 1, Maroussi , Attiki, Greece

2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS. ENISA Article 19 Team

2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS. ENISA Article 19 Team 2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS ENISA Article 19 Team 23 10 2018 GENERAL MODEL SECURITY SUPERVISION Market operators/providers assess security risks, take appropriate measures, and

More information

The Digitalisation of Finance

The Digitalisation of Finance Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Annual Conference on the Digitalisation of Finance organised by CEPS BRUSSELS, BELGIUM JUNE 2018 www.enisa.europa.eu European Union Agency

More information

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 European Union Agency for Network and Information Security Outline 1. Cybersecurity

More information

STRENGTHENING NETWORK & INFORMATION SECURITY & PROTECTING AGAINST ONLINE DISINFORMATION ( FAKE NEWS )

STRENGTHENING NETWORK & INFORMATION SECURITY & PROTECTING AGAINST ONLINE DISINFORMATION ( FAKE NEWS ) STRENGTHENING NETWORK & INFORMATION SECURITY & PROTECTING AGAINST ONLINE DISINFORMATION ( FAKE NEWS ) April 2018 TABLE OF CONTENTS 1. INTRODUCTION 3 2. CONSIDERATIONS SPECIFIC TO ONLINE DISINFORMATION

More information

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network

More information

Latent Space Model for Road Networks to Predict Time-Varying Traffic. Presented by: Rob Fitzgerald Spring 2017

Latent Space Model for Road Networks to Predict Time-Varying Traffic. Presented by: Rob Fitzgerald Spring 2017 Latent Space Model for Road Networks to Predict Time-Varying Traffic Presented by: Rob Fitzgerald Spring 2017 Definition of Latent https://en.oxforddictionaries.com/definition/latent Latent Space Model?

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

The Network and Information Security Directive - ENISA's contribution

The Network and Information Security Directive - ENISA's contribution The Network and Information Security Directive - ENISA's contribution Konstantinos Moulinos Information Security Expert 3rd IMPROVER- ERNCIP Operators Workshop Lisbon 23.05.2018 European Union Agency for

More information

Guideline on assessing security measures in the context of Article 3(3) of the Open Internet regulation VERSION 1.

Guideline on assessing security measures in the context of Article 3(3) of the Open Internet regulation VERSION 1. Guideline on assessing security measures in the context of Article 3(3) of the Open Internet regulation VERSION 1.0 - DECEMBER 2018 www.enisa.europa.eu European Union Agency For Network and Information

More information

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

Extracting Information from Social Networks

Extracting Information from Social Networks Extracting Information from Social Networks Reminder: Social networks Catch-all term for social networking sites Facebook microblogging sites Twitter blog sites (for some purposes) 1 2 Ways we can use

More information

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification

More information

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA

More information

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 Cyber Threat Intelligence: Integrating the Intelligence Cycle Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 CLASSIFICATION MARKS The Global Domain Network Domain The internet

More information

NIS Directive development The Incident Notification Framework

NIS Directive development The Incident Notification Framework NIS Directive development The Incident Notification Framework Dan Tofan #certcon 30.10.2017 Bucharest European Union Agency for Network and Information Security Topics 01 NISD Short Intro 02 The incident

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8 European Union Agency for Network and Information Security Capacity and community building for CSIRTs 2005 Start up

More information

Οnline privacy tools for the general public. European Union Agency for Network and Information Security 1

Οnline privacy tools for the general public. European Union Agency for Network and Information Security  1 Οnline privacy tools for the general public European Union Agency for Network and Information Security www.enisa.europa.eu 1 Background Increasing need for preservation of online & mobile privacy. Numerous

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Towards a Digital Single Market for NIS products and services Dr. Athanasios Drougkas and Ms. Dimitra Liveri ENISA ENISA Validation Workshop Brussels 12 October 2016 European Union Agency for Network and

More information

The Cyber War on Small Business

The Cyber War on Small Business The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

Contents. Part I Setting the Scene

Contents. Part I Setting the Scene Contents Part I Setting the Scene 1 Introduction... 3 1.1 About Mobility Data... 3 1.1.1 Global Positioning System (GPS)... 5 1.1.2 Format of GPS Data... 6 1.1.3 Examples of Trajectory Datasets... 8 1.2

More information

Appendix A Additional Information

Appendix A Additional Information Appendix A Additional Information In this appendix, we provide more information on building practical applications using the techniques discussed in the chapters of this book. In Sect. A.1, we discuss

More information

ElasticIntel. Scalable Threat Intel Aggregation in AWS

ElasticIntel. Scalable Threat Intel Aggregation in AWS ElasticIntel Scalable Threat Intel Aggregation in AWS Presenter: Matt Jane Obligatory Who I Am slide.. Builder/Automator I put things in clouds Open Source Advocate

More information

An Oracle White Paper October Oracle Social Cloud Platform Text Analytics

An Oracle White Paper October Oracle Social Cloud Platform Text Analytics An Oracle White Paper October 2012 Oracle Social Cloud Platform Text Analytics Executive Overview Oracle s social cloud text analytics platform is able to process unstructured text-based conversations

More information

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors

More information

Opportunities and challenges in personalization of online hotel search

Opportunities and challenges in personalization of online hotel search Opportunities and challenges in personalization of online hotel search David Zibriczky Data Science & Analytics Lead, User Profiling Introduction 2 Introduction About Mission: Helping the travelers to

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

Securing Europe s IoT Devices and Services

Securing Europe s IoT Devices and Services Securing Europe s IoT Devices and Services Dr. Evangelos OUZOUNIS Head of Unit - Secure Infrastructure and Services Validation Workshop Berlin 16 October 2015 European Union Agency for Network and Information

More information

Practical Machine Learning Agenda

Practical Machine Learning Agenda Practical Machine Learning Agenda Starting From Log Management Moving To Machine Learning PunchPlatform team Thales Challenges Thanks 1 Starting From Log Management 2 Starting From Log Management Data

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

hidden vulnerabilities

hidden vulnerabilities hidden vulnerabilities industrial networks in 30 minutes Cyber Security introduction Frank Kemeling Certified Ethical Hacker [CEH] EC-Council Certified Security Analyst [ESCA] Licensed Penetration Tester

More information

Sensors talk and humans sense Part III

Sensors talk and humans sense Part III Sensors talk and humans sense Part III Athena Vakali Palic, 6 th September 2013 OSWINDS group Department of Informatics Aristotle University of Thessaloniki http://oswinds.csd.auth.gr SEN2SOC experiment

More information

jldadmm: A Java package for the LDA and DMM topic models

jldadmm: A Java package for the LDA and DMM topic models jldadmm: A Java package for the LDA and DMM topic models Dat Quoc Nguyen School of Computing and Information Systems The University of Melbourne, Australia dqnguyen@unimelb.edu.au Abstract: In this technical

More information

Next Generation Threats and Utilising Artificial Intelligence and Big Data Analytics. Ian Glover

Next Generation Threats and Utilising Artificial Intelligence and Big Data Analytics. Ian Glover Next Generation Threats and Utilising Artificial Intelligence and Big Data Analytics Ian Glover 0044 7970 817 101 Ian.glover@crest-approved.org The CREST Vision Not For Profit Organisation Industry Support

More information

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet

More information

Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo

Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo 15.9.2017 European Union Agency for Network and Information Security Fighting fraud in school

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks 1 #mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks Bang Hui Lim, Dongyuan Lu Tao Chen, Min-yen Kan Web Information Retrieval / Natural Language Processing Group 1. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

More information

Clustering using Topic Models

Clustering using Topic Models Clustering using Topic Models Compiled by Sujatha Das, Cornelia Caragea Credits for slides: Blei, Allan, Arms, Manning, Rai, Lund, Noble, Page. Clustering Partition unlabeled examples into disjoint subsets

More information

Extracting Attributed Verification and Debunking Reports from Social Media: MediaEval-2015 Trust and Credibility Analysis of Image and Video

Extracting Attributed Verification and Debunking Reports from Social Media: MediaEval-2015 Trust and Credibility Analysis of Image and Video Extracting Attributed Verification and Debunking Reports from Social Media: MediaEval-2015 Trust and Credibility Analysis of Image and Video Stuart E. Middleton University Your Name of Your Southampton

More information

CTI Capability Maturity Model Marco Lourenco

CTI Capability Maturity Model Marco Lourenco 1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information

More information

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How

More information

Enterprise Protection for the Administrator

Enterprise Protection for the Administrator Enterprise Protection for the Administrator Overview The Proofpoint Protection course covers the protection tools that are available as part of the Proofpoint Suite, including our newest module, Targeted

More information

Partner Sociabble Quick Start Guide

Partner Sociabble Quick Start Guide Partner Sociabble Quick Start Guide Welcome to Partner Sociabble Partner Sociabble aggregates Microsoft solution, business news and thought leadership social ready content and makes it available for you

More information

IoT and Smart Infrastructure efforts in ENISA

IoT and Smart Infrastructure efforts in ENISA IoT and Smart Infrastructure efforts in ENISA Dr. Dan Tofan IoT workshop BEREC 01.02.2017, Brussels European Union Agency for Network and Information Security Everything becomes connected Manufacturers

More information

RFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0

RFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0 RFC 2350 YOROI-CSDC Expectations for Computer Security Incident Response Title RFC 2350 YOROI-CSDC Document Type Specification Date 2018/03/26 Version 1.0 Yoroi S.r.l. Parte del gruppo MAM www.yoroi.company

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

ML pipelines at OK. Dmitry Bugaychenko

ML pipelines at OK. Dmitry Bugaychenko ML pipelines at OK Dmitry Bugaychenko OK is 70 000 000+ monthly unique users OK is 800 000 000+ family links in the social graph OK is A place where people share their posi9ve feelings OK is 10000+ servers

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

ENISA activities in ICT security certification Dr. Prokopios Drogkaris NIS Expert NLO Meeting Athens

ENISA activities in ICT security certification Dr. Prokopios Drogkaris NIS Expert NLO Meeting Athens ENISA activities in ICT security certification Dr. Prokopios Drogkaris NIS Expert NLO Meeting Athens 30.01.2018 European Union Agency for Network and Information Security What are these symbols anyway?

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

Configuring Topic Models for Software Engineering Tasks in TraceLab

Configuring Topic Models for Software Engineering Tasks in TraceLab Configuring Topic Models for Software Engineering Tasks in TraceLab Bogdan Dit Annibale Panichella Evan Moritz Rocco Oliveto Massimiliano Di Penta Denys Poshyvanyk Andrea De Lucia TEFSE 13 San Francisco,

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison*

Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison* Tracking Trends: Incorporating Term Volume into Temporal Topic Models Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison* Dept. of Computer Science and Engineering, Lehigh University, Bethlehem, PA,

More information

Course Outline. Writing Reports with Report Builder and SSRS Level 1 Course 55123: 2 days Instructor Led. About this course

Course Outline. Writing Reports with Report Builder and SSRS Level 1 Course 55123: 2 days Instructor Led. About this course About this course Writing Reports with Report Builder and SSRS Level 1 Course 55123: 2 days Instructor Led In this 2-day course, students will continue their learning on the foundations of report writing

More information

Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA

Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA Security and resilience for ehealth Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA European Union Agency For Network And Information Security Securing Europe

More information

Cyber Security. It s not just about technology. May 2017

Cyber Security. It s not just about technology. May 2017 Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE Richard Kerkdijk December 7th 2017 A WORD ABOUT TNO Dutch innovation and advisory body, founded by law in 1932 and currently comprising some 2800

More information

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,

More information

ATT&CKing The Command Line & Hunting For More

ATT&CKing The Command Line & Hunting For More ATT&CKing The Command Line & Hunting For More Evan Gaustad Principal Threat Detection Engineer LogicHub Agenda Threat Hunting Automation Motivation MITRE ATT&CK & LOLBAS Process Execution Logs Artificial

More information

Real-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera

Real-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera Real-time Cyber Situational Awareness for Satellite Ground Networks March 2015 Presenter: Ted Vera Colorado Springs, CO (719) 598 2801 Denver, CO (303) 703 3834 http://www.rtlogic.com Recent Attacks NOAA

More information

ACM Retreat - Today s Topics:

ACM Retreat - Today s Topics: ACM Retreat - Today s Topics: Phase II Cyber Risk Management Services - What s next? Policy Development External Vulnerability Assessment Phishing Assessment Security Awareness Notification Third Party

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

The YAKSHA Cybersecurity Solution and the Ambassadors Programme. Alessandro Guarino YAKSHA Innovation Manager CEO, StudioAG

The YAKSHA Cybersecurity Solution and the Ambassadors Programme. Alessandro Guarino YAKSHA Innovation Manager CEO, StudioAG The YAKSHA Cybersecurity Solution and the Ambassadors Programme Alessandro Guarino YAKSHA Innovation Manager CEO, StudioAG 1st Webinar December 17, 2018 1 Agenda I. Introduction to the YAKSHA project III.

More information

Scalable Object Classification using Range Images

Scalable Object Classification using Range Images Scalable Object Classification using Range Images Eunyoung Kim and Gerard Medioni Institute for Robotics and Intelligent Systems University of Southern California 1 What is a Range Image? Depth measurement

More information

Improving recognition of ICT security standards Recommendations for the Member States for the conformance to NIS Directive

Improving recognition of ICT security standards Recommendations for the Member States for the conformance to NIS Directive Improving recognition of ICT security standards Recommendations for the Member States for the conformance to NIS Directive VERSION: 1.0 DECEMBER 2017 www.enisa.europa.eu European Union Agency For Network

More information

A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts

A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts #RSAC SESSION ID: SPO3-T09 A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts Dan Plastina Partner Director, Threat Protection Microsoft Corporation @DanPlastina Dan Plastina Director,

More information

Web Mining TEAM 8. Professor Anita Wasilewska CSE 634 Data Mining

Web Mining TEAM 8. Professor Anita Wasilewska CSE 634 Data Mining Web Mining TEAM 8 Paper - You Are What You Tweet : Analyzing Twitter for Public Health Authors : Paul, Michael J., and Mark Dredze. Conference : AAAI Publications, Fifth International AAAI Conference on

More information

Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet...

Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet... Twitter is a social networking site allowing users to post thoughts and ideas in 140 characters or less. http://www.twitter.com Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add

More information

Writing Reports with Report Designer and SSRS 2014 Level 1

Writing Reports with Report Designer and SSRS 2014 Level 1 Writing Reports with Report Designer and SSRS 2014 Level 1 Duration- 2days About this course In this 2-day course, students are introduced to the foundations of report writing with Microsoft SQL Server

More information

Active Social Engineering Defense (ASED)

Active Social Engineering Defense (ASED) Active Social Engineering Defense (ASED) Wade Shen/I2O Approved for Public Release, Distribution Unlimited 1 ASED Goal Automatically identify, disrupt and investigate spear-phishing and social engineering

More information

Data Mining and Data Warehousing Introduction to Data Mining

Data Mining and Data Warehousing Introduction to Data Mining Data Mining and Data Warehousing Introduction to Data Mining Quiz Easy Q1. Which of the following is a data warehouse? a. Can be updated by end users. b. Contains numerous naming conventions and formats.

More information

Cyber Threat Intelligence Debbie Janeczek May 24, 2017

Cyber Threat Intelligence Debbie Janeczek May 24, 2017 Cyber Threat Intelligence Debbie Janeczek May 24, 2017 AGENDA Today s Cybersecurity Challenges What is Threat Intelligence? Data, Information, Intelligence Strategic, Operational and Tactical Threat Intelligence

More information

Commission on Parliamentary Reform Statistics on the Scottish Parliament website Key points

Commission on Parliamentary Reform Statistics on the Scottish Parliament website Key points Commission on Parliamentary Reform Statistics on the Scottish Parliament website The website stats were run between May 2015 and May 2016, and social media stats gathered between March 2016 and May 2016

More information

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS Susanne Bieller, EUnited Robotics EC Workshop in the area of autonomous systems / robots / IoT Brussels, 13 July 2017 Different needs according to classification

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures Springer Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web

More information

Security in AI. Alex Healing Senior Research Manager BT Applied Research. British Telecommunications plc 2019

Security in AI. Alex Healing Senior Research Manager BT Applied Research. British Telecommunications plc 2019 Security in AI Alex Healing Senior Research Manager BT Applied Research 1 AI and Security AI and Security 2 3 4 Saturn: intelligent interactive data analytics Give the users the control to do what they

More information

How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania

How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania 1 Outline of the presentation Introduction and survey. NRA actions

More information

Tracking Online Analytics

Tracking Online Analytics Communications Processes Tracking Online Analytics These training materials have been prepared by Aspiration. Who is Aspiration? Aspiration helps nonprofits and foundations use software tools more effectively

More information

FINNISH CYBER DEFENSE MODEL GUIDED TOUR

FINNISH CYBER DEFENSE MODEL GUIDED TOUR FINNISH CYBER DEFENSE MODEL GUIDED TOUR SPAM Botnets Identity theft Phishing Denial of Service Defacements @codenomicon BACKGROUND Sindri Bjarnason - sindri@codenomicon.com Senior Solution Engineer at

More information

Copyright 2018 Trend Micro Incorporated. All rights reserved.

Copyright 2018 Trend Micro Incorporated. All rights reserved. Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent

More information

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access

More information

Avaya Ip Telephony Implementation Guide 2016 READ ONLINE

Avaya Ip Telephony Implementation Guide 2016 READ ONLINE Avaya Ip Telephony Implementation Guide 2016 READ ONLINE AdvanTel Networks has both the expertise and experience to guide you to find the right solution Avaya; Mitel; We partner with IP Telephony or Voice-over

More information

Connect Securely in an Unsecure World. Jon Clay Director: Global Threat

Connect Securely in an Unsecure World. Jon Clay Director: Global Threat Connect Securely in an Unsecure World Jon Clay Director: Global Threat Communications @jonlclay www.cloudsec.com More devices More data More risks Global Risks Landscape 2018 Source: http://www3.weforum.org/docs/wef_grr18_report.pdf

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

Machine Learning at the Limit

Machine Learning at the Limit Machine Learning at the Limit John Canny*^ * Computer Science Division University of California, Berkeley ^ Yahoo Research Labs @GTC, March, 2015 My Other Job(s) Yahoo [Chen, Pavlov, Canny, KDD 2009]*

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Data Science Course Content

Data Science Course Content CHAPTER 1: INTRODUCTION TO DATA SCIENCE Data Science Course Content What is the need for Data Scientists Data Science Foundation Business Intelligence Data Analysis Data Mining Machine Learning Difference

More information

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA RECENT TRENDS IN CYBER ATTACKS Cyber Security Threats From Requests to Ransom Notes Source: www.ripandscam.com Source https://en.wikipedia.org/wiki/wannacry_ransomware_attack

More information