Workshop on Collaborative Security and Privacy Technologies
|
|
- Hubert Marshall
- 8 years ago
- Views:
Transcription
1 Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, CSP EU FORUM 2012, 25 April 2012, Berlin
2 Trust and Society Trustworthy systems essential in society: E.g. legal code, democratic institutions, moral code, justice, identity, accountability and auditing, transparency In digital life: secure, reliable systems and services, that protect privacy, and can be trusted to deliver properly; e-identity; data protection Resulting trust strongly influences economic growth. It took generations to build our democratic values One must nurture them into the digital age.
3 Security, Privacy, Trust Interplay in the Information Society Technology & Innovation Complexity, ease of use Role of end-users Society-protecting business models End-Users & the Society Global ICT - national frontiers Economics of security Policies for privacy-respecting Trust and Identity? TRUST in ICT Networks and Services Security, privacy, identity Protection of human values Transparency, accountability Auditing and Law enforcement Policy & Regulation
4 Network Monitoring Network Traffic monitoring: a must To operate & manage network To guarantee network infrastructure security To provide citizen s safety and public interest To enforce data retention and security laws To supply research activities devised to understand and improve network dynamics Network Traffic monitoring: a threat Against users privacy Infringement of data protection laws Profiling and wiretapping abuses Even by highly reputed national operators (at least three recent scandals only in ) Measurement data misuse
5 FP7 Project : DEMONS DEMONS: Decentralised, Cooperative and Privacy Preserving Monitoring for Trustworthiness Consortium of 13 European organisations TID (ES), NEC (UK/GE), CNIT (IT), FTW (AT), Polish Telecom (PL), FT (FR), Intitut Telecom FR), ETHZ (CH), InveatTech (CZ), Singularlogic (GR), ICCS/NTUA (GR), OPTENET (ES), KYOS (CH) Duration of 30 months, from Sept Budget: 8.3 M s
6 Motivation Collector Collector Today s monitoring systems Centralized Huge amount of exported/collected data Hard/no cooperation across domains Poor flexibility in access control to monitored data (little more than Y/N) Hardly coping with - Higher link rates and traffic volumes - Networks pervasiveness & capillarity - distributed, cross-domain, threats 5
7 Vision and Overlay of in-network monitoring devices From data-gathering probes to collaborative P2P computing and filtering devices Innovation pillars In-network processing and distributed intelligence Application-tailored data reduction and protection Resilient autonomic monitoring overlay Cross-domain interworking Target Impact Scalability Privacy preservation Flexibility and resilience Cross-domain threat detection and mitigation Exchange only the information strictly necessary for a given monitoring and analysis objective 6
8 Workshop Agenda Inter-domain secure collaborative network monitoring: challenges and data protection approaches Giuseppe Bianchi, CNIT, Italy, DEMONS project Blockmon A modular high performance data analysis framework Nico dheuruse, Maurizio Dusi, NEC, Germany, DEMONS project Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos, Ioannis Sotiris, FORTH, Greece, SYSSEC NOE project Some preliminary analysis of the economics of malware kits and traffic brokers Fabio Massacci, Luca Allodi, University of Trento, Italy, SECONOMICS project Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios Lioudakis, ICCS; NTUA; Greece, DEMONS Project COFFEE BREAK Hardware acceleration enhancing network security Petr Kastovsky, INVEA-TECH, Czech Republic, DEMONS project MASSIF: A Highly Scalable Security Information and Event Management (SIEM) Ricardo Jimenez-Peris, Universidad Politecnica de Madrid, Spain, MASSIF project Architecture concept of trustworthy industrial sensor network deployments Markus Wehner, University of Applied Sciences, Dresden, Germany, TWISNET project Managed Incident Lightweight Exchange: Standards for Cross-Domain Incident Handling Brian Trammell, ETH Zurich, Switzerland, DEMONS project Conclusions CSP EU FORUM 2012, 25 April 2012, Berlin
9 Thank you! Questions? Contact: Tel: CSP EU FORUM 2012, 25 April 2012, Berlin
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF Kathleen.Moriarty.ietf@gmail.com Agenda Coordinating Attack Response
More informationThe DEMONS Integrated Access Control Model for Collaborative Network Monitoring
The DEMONS Integrated Access Control Model for Collaborative Network Monitoring Eugenia I. Papagiannakopoulou Maria N. Koukovini Georgios V. Lioudakis Dimitra I. Kaklamani Iakovos S. Venieris The 4 th
More informationMASSIF: A Highly Scalable SIEM
MASSIF: A Highly Scalable SIEM Ricardo Jimenez-Peris Univ. Politecnica de Madrid (UPM) rjimenez@fi.upm.es DEMONS Workshop Berlin, April 25 th 2012 MASSIF in a Nutshell MASSIF aims at developing the next
More informationInnovative means to exchange telecom fraud and network security risks information
Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing
More informationBriefing note. Survey of environmental liability insurance developments
Briefing note Survey of environmental liability insurance developments June 2014 Introduction This paper responds to the consideration by the European Commission (EC) of a possible EU-wide compulsory insurance
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationUsing MASSIF to Protect a Critical Infrastructure: Dam Use Case
Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu
More informationH2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu
More informationPRACE An Introduction Tim Stitt PhD. CSCS, Switzerland
PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland High Performance Computing A Key Technology 1. Supercomputing is the tool for solving the most challenging problems through simulations; 2. Access
More informationMASSIF: A Promising Solution to Enhance Olympic Games IT Security
MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th
More informationTrack 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security
Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.
More informationSELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks
SELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks SELFNET Project Jose M. Alcaraz Calero & Qi Wang, University of the West of Scotland Technical Coordinators
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationEnhancing Security and Trustworthiness with Next-Generation Security Information and Event Management
WHITE PAPER Enhancing Security and Trustworthiness with Next-Generation Security Information and Event Management June 2012 MASSIF is a project co-funded under contract FP7-257475 of the Seventh Framework
More informationManagement of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
More informationSESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006
Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006 SESAR Christian Pusch EUROCONTROL Experimental Centre European page 1Organisation of 22 for the Safety
More informationPRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS
PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events
More informationDIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D)
(Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) Fact sheet 7 partners from 6 countries 4 academic partners: University of Tübingen (germany),
More informationA Resilient Protection Device for SIEM Systems
A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo
More informationEuropean Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga
European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security
More informationTrust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de
More informationInformation Services Strategy 2011-2013
Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at
More informationFP7 215225 (a.k.a. MOMENT)
FP7 215225 (a.k.a. MOMENT) Dr. Daniel Morató FP7? FP7 EU 7 th Framework Programme for Research and Technological Development (7º Programa Marco de la UE) Principal instrumento de financiación de proyectos
More informationMonitoring applications to increase security in 40G and 100G networks
Monitoring applications to increase security in 40G and 100G networks Cyber Security and Today s Communication Technologies TPEB workshop, 30.1.2014 Petr Kastovsky kastovsky@invea.com Company Introduction
More informationCloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationOnline/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
More informationORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
More informationTrustworthy ICT Research in FP7
Trustworthy ICT Research in FP7 BuIldINg a SECuRE and TRuSTwoRThy INFoRmaTIoN SoCIETy European Commission Information Society and Media LEGAL NOTICE By the Commission of the European Communities, Information
More informationPrivacy Rights Management Using DRM Is this a good idea?
Privacy Rights Management Using DRM Is this a good idea? Larry Korba Information Security Group Black Hat Europe, May 19-20, 2004 Agenda Introduction Caveats About this Work and the Speaker Privacy in
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationHP Security Framework. Jakub Andrle
HP Security Framework Jakub Andrle Hewlett-Packard 11.place in Fortune Magazine chart In fiscal year 2007 we achieved $7bilions growth CEO HP - Mark Hurd, company residence - Palo Alto, California, USA
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationCyber security initiatives in European Union and Greece The role of the Regulators
Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives
More informationFlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com
FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project
More informationCybercrime & Cybersecurity
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
More informationSchengen routing or Schengen encryption?
Schengen routing or Schengen encryption? Secure communication and digital sovereignty in Europe Prof. Norbert Pohlmann Internet Key Figure System (IKS) act with the right key figure IKS performs continuous
More informationUsing Ontologies for Privacy-Awareness in Network Monitoring Workflows
Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios V. Lioudakis Institute of Communication and Computer Systems National Technical University of Athens Workshop on Collaborative
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationCLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationOverview of DG INFSO R&D on Trust & Security
Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are
More informationData Masking Best Practices
Data Masking Best Practices 1 Information Security Risk The risk that sensitive information becomes public 2 Information Security Risk Government systems store a huge amount of sensitive information Vital
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationCALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
More informationDeliverable D4.2a: First LOBSTER Workshop Proceedings and Summary
INFORMATION SOCIETY TECHNOLOGIES (IST) PROGRAMME Large Scale Monitoring of BroadBand Internet Infrastructure Contract No. 004336 Deliverable D4.2a: First LOBSTER Workshop Proceedings and Summary Abstract:
More informationMEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
More informationOVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM)
OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012 ICT statistical report for annual monitoring (StReAM) 12 June 2013 ACRONYMS AAL: ACC: ARTEMIS: ASS: BPN: CA: CIP: CP: CSA: EEA: EPO: FP: FET: GBAORD:
More informationand the world is built on information
Let s Build a Smarter Planet Starting with a more dynamic and the world is built on information Guy England Storage sales manager CEEMEA englag@ae.ibm.com Tel: +971 50 55 77 614 IBM Building a Smarter
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationThe Legal Protection Insurance Market in Europe. October 2013
The Legal Protection Insurance Market in Europe October 2013 The Legal Protection Insurance Market in Europe October 2013 In its latest publication RIAD, the International Association of Legal Protection
More informationDeliverable 1.2 Project Presentation
FP7-PEOPLE-2012-ITN EID Grant agreement no.: 317387 www.secentis.eu Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the
More informationEcom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
More informationEFFECTS+ - Systems & Networks Cluster. Draft Agenda
EFFECTS+ - Systems & Networks Cluster Technical Workshop on Models Draft Agenda Location: Breakout Rooms VU University Amsterdam Chairman: Roland Rieke Date Time Description 04-Jul-2011 14:45-17:00 Part
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationMobile Cloud Networking
Mobile Cloud Networking Outline Project overview, motivation, vision, scope Objectives, assumptions and key research issues Partner perspectives and project dimensions Architecture overview Preliminary
More informationmove move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project!
move us ICT CLOUD-BASED PLATFORM AND MOBILITY SERVICES : AVAILABLE, UNIVERSAL AND SAFE FOR ALL USERS MoveUs has successfully finished the first year of the project! Newsletter 2014 Welcome to MoveUs newsletter.
More informationSocial dumping and free movement: Overview of current issues from an economic point of view
Social dumping and free movement: Overview of current issues from an economic point of view Prof. dr. Jozef Pacolet & Frederic De Wispelaere Design Charles & Ray Eames - Hang it all Vitra Statistics on
More informationaecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
More informationImplementing the cooperation mechanisms of the RES directive current status and open questions
Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy
More informationHow To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
More informatione-sens Electronic Simple European Networked Services Rome, 16.10.2015
e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationNetwork Security Deployment Obligation and Expenditure Report
Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate
More informationWWRF Cloud Implications to Security, Privacy, and Trust
ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationInformation Security Management at the Olympics: Finding the Needle in the Haystack
Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider mjk@netiq.com Chris Van Den Abbeele Solution Manager ISRM chris.vandenabbeele@atos.net
More informationGEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington
GEOG 482/582 : GIS Data Management Lesson 10: Enterprise GIS Data Management Strategies Overview Learning Objective Questions: 1. What are challenges for multi-user database environments? 2. What is Enterprise
More informationEnterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity
MARKET RESEARCH STORE Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity The report outlines the evolution of enterprise IT security technologies, and identifies
More informationHow To Help The European Single Market With Data And Information Technology
Connecting Europe for New Horizon European activities in the area of Big Data Márta Nagy-Rothengass DG CONNECT, Head of Unit "Data Value Chain" META-Forum 2013, 19 September 2013, Berlin OUTLINE 1. Data
More informationINTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE
TURNKEY AND CUSTOM MADE DSwiss AG Badenerstr. 281 CH 8003 Zürich Switzerland +41 (0)44 515 11 11 info@dswiss.com www.dswiss.com Management Summary Internet data safes are web based solutions that enable
More informationFLEXIANT. Utility Computing on Demand
FLEXIANT Utility Computing on Demand Flexiant Flexiant is a software and services company, one of the world's first public/private Cloud providers. We provide cloud infrastructure software and services
More informationNokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
More informationHow To Improve Cloud Infrastructure
Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services Rapporteur: David Griffin Presentation to EC DG CONNECT, E.2, Software & Services, Cloud, Brussels,
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationStatus of OpenFlow research and test facilities in Europe
Status of OpenFlow research and test facilities in Europe Cape Town, Nov 14-15, 2011 Dr.-Ing. Hagen Woesner EICT GmbH, Berlin, Germany Agenda Software Defined Networks and OpenFlow Architectural Splits
More informationIAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
More informationTowards a Cloud of Public Services
Towards a Cloud of Public Services Public administrations are often organised in silos: monolithic architecture models make it difficult to re-use services for the development of new applications. What
More informationINNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES
Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General
More informationProtecting Communication in SIEM systems
Protecting Communication in SIEM systems Valerio Formicola Università di Napoli Parthenope Winter School: Hot Topics in Secure and Dependable Computing for Critical Infrastructures SDCI 2012 January 15th
More informationNew Frontiers for Official Statistics
European Data Forum 2015 November 16-17, 2015, Luxembourg New Frontiers for Official Statistics Mariana KOTZEVA EUROSTAT, Deputy Director General Key issues 1. A dynamically changing data ecosystem 2.
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationThe Pan-European In-depth Accident Investigation Network
Session 6 Improving our Understanding of Crashes Friday 23 rd November 2012 Julian Hill, Loughborough University Project co-financed by the European Commission, Directorate-General for Mobility and Transport
More informationENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
More informationObjective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering
Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures
More informationM2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication
More informationENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States.
ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT An area without internal borders where EU citizens and non-eu nationals may move freely EU Schengen States Non-Schengen EU States IS Azores
More informationPV GRID. Efficient Grid Integration of European PV: Project Results. Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar)
PV GRID Efficient Grid Integration of European PV: Project Results Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar) 16th September 2014 1 PV GRID Key facts An Intelligent Energy
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More information[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *
[Selezionare la data] INNOVERY GROUP COMPANY PROFILE [Digitare il sottotitolo del documento] * * INNOVERY GROUP ITALY - SPAIN MEXICO - ALBANIA Company Profile 1. BUSINESS... 3 2. MANAGEMENT... 3 3. COMPETENCE...
More informationhoneytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves mhp@cert.br! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More informationMicrosoft Research Worldwide Presence
Microsoft Research Worldwide Presence MSR India MSR New England Redmond Redmond, Washington Sept, 1991 San Francisco, California Jun, 1995 Cambridge, United Kingdom July, 1997 Beijing, China Nov, 1998
More informationTowards Trustworthy Clouds
IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable
More informationLOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
More informationIT Governance Regulatory. P.K.Patel AGM, MoF
IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation
More informationSecuring the E-Health Cloud
Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords
More information