Workshop on Collaborative Security and Privacy Technologies

Size: px
Start display at page:

Download "Workshop on Collaborative Security and Privacy Technologies"

Transcription

1 Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, CSP EU FORUM 2012, 25 April 2012, Berlin

2 Trust and Society Trustworthy systems essential in society: E.g. legal code, democratic institutions, moral code, justice, identity, accountability and auditing, transparency In digital life: secure, reliable systems and services, that protect privacy, and can be trusted to deliver properly; e-identity; data protection Resulting trust strongly influences economic growth. It took generations to build our democratic values One must nurture them into the digital age.

3 Security, Privacy, Trust Interplay in the Information Society Technology & Innovation Complexity, ease of use Role of end-users Society-protecting business models End-Users & the Society Global ICT - national frontiers Economics of security Policies for privacy-respecting Trust and Identity? TRUST in ICT Networks and Services Security, privacy, identity Protection of human values Transparency, accountability Auditing and Law enforcement Policy & Regulation

4 Network Monitoring Network Traffic monitoring: a must To operate & manage network To guarantee network infrastructure security To provide citizen s safety and public interest To enforce data retention and security laws To supply research activities devised to understand and improve network dynamics Network Traffic monitoring: a threat Against users privacy Infringement of data protection laws Profiling and wiretapping abuses Even by highly reputed national operators (at least three recent scandals only in ) Measurement data misuse

5 FP7 Project : DEMONS DEMONS: Decentralised, Cooperative and Privacy Preserving Monitoring for Trustworthiness Consortium of 13 European organisations TID (ES), NEC (UK/GE), CNIT (IT), FTW (AT), Polish Telecom (PL), FT (FR), Intitut Telecom FR), ETHZ (CH), InveatTech (CZ), Singularlogic (GR), ICCS/NTUA (GR), OPTENET (ES), KYOS (CH) Duration of 30 months, from Sept Budget: 8.3 M s

6 Motivation Collector Collector Today s monitoring systems Centralized Huge amount of exported/collected data Hard/no cooperation across domains Poor flexibility in access control to monitored data (little more than Y/N) Hardly coping with - Higher link rates and traffic volumes - Networks pervasiveness & capillarity - distributed, cross-domain, threats 5

7 Vision and Overlay of in-network monitoring devices From data-gathering probes to collaborative P2P computing and filtering devices Innovation pillars In-network processing and distributed intelligence Application-tailored data reduction and protection Resilient autonomic monitoring overlay Cross-domain interworking Target Impact Scalability Privacy preservation Flexibility and resilience Cross-domain threat detection and mitigation Exchange only the information strictly necessary for a given monitoring and analysis objective 6

8 Workshop Agenda Inter-domain secure collaborative network monitoring: challenges and data protection approaches Giuseppe Bianchi, CNIT, Italy, DEMONS project Blockmon A modular high performance data analysis framework Nico dheuruse, Maurizio Dusi, NEC, Germany, DEMONS project Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos, Ioannis Sotiris, FORTH, Greece, SYSSEC NOE project Some preliminary analysis of the economics of malware kits and traffic brokers Fabio Massacci, Luca Allodi, University of Trento, Italy, SECONOMICS project Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios Lioudakis, ICCS; NTUA; Greece, DEMONS Project COFFEE BREAK Hardware acceleration enhancing network security Petr Kastovsky, INVEA-TECH, Czech Republic, DEMONS project MASSIF: A Highly Scalable Security Information and Event Management (SIEM) Ricardo Jimenez-Peris, Universidad Politecnica de Madrid, Spain, MASSIF project Architecture concept of trustworthy industrial sensor network deployments Markus Wehner, University of Applied Sciences, Dresden, Germany, TWISNET project Managed Incident Lightweight Exchange: Standards for Cross-Domain Incident Handling Brian Trammell, ETH Zurich, Switzerland, DEMONS project Conclusions CSP EU FORUM 2012, 25 April 2012, Berlin

9 Thank you! Questions? Contact: Tel: CSP EU FORUM 2012, 25 April 2012, Berlin

Coordinating Attack Response at Internet Scale (CARIS)

Coordinating Attack Response at Internet Scale (CARIS) Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF Kathleen.Moriarty.ietf@gmail.com Agenda Coordinating Attack Response

More information

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring The DEMONS Integrated Access Control Model for Collaborative Network Monitoring Eugenia I. Papagiannakopoulou Maria N. Koukovini Georgios V. Lioudakis Dimitra I. Kaklamani Iakovos S. Venieris The 4 th

More information

MASSIF: A Highly Scalable SIEM

MASSIF: A Highly Scalable SIEM MASSIF: A Highly Scalable SIEM Ricardo Jimenez-Peris Univ. Politecnica de Madrid (UPM) rjimenez@fi.upm.es DEMONS Workshop Berlin, April 25 th 2012 MASSIF in a Nutshell MASSIF aims at developing the next

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

Briefing note. Survey of environmental liability insurance developments

Briefing note. Survey of environmental liability insurance developments Briefing note Survey of environmental liability insurance developments June 2014 Introduction This paper responds to the consideration by the European Commission (EC) of a possible EU-wide compulsory insurance

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu

More information

PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland

PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland PRACE An Introduction Tim Stitt PhD. CSCS, Switzerland High Performance Computing A Key Technology 1. Supercomputing is the tool for solving the most challenging problems through simulations; 2. Access

More information

H2020 "Secure Societies" Work Programme Digital Security 2015

H2020 Secure Societies Work Programme Digital Security 2015 H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

More information

MASSIF: A Promising Solution to Enhance Olympic Games IT Security

MASSIF: A Promising Solution to Enhance Olympic Games IT Security MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th

More information

Track 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security

Track 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.

More information

SELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks

SELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks SELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks SELFNET Project Jose M. Alcaraz Calero & Qi Wang, University of the West of Scotland Technical Coordinators

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Enhancing Security and Trustworthiness with Next-Generation Security Information and Event Management

Enhancing Security and Trustworthiness with Next-Generation Security Information and Event Management WHITE PAPER Enhancing Security and Trustworthiness with Next-Generation Security Information and Event Management June 2012 MASSIF is a project co-funded under contract FP7-257475 of the Seventh Framework

More information

SESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006

SESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006 Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006 SESAR Christian Pusch EUROCONTROL Experimental Centre European page 1Organisation of 22 for the Safety

More information

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events

More information

DIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D)

DIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) Fact sheet 7 partners from 6 countries 4 academic partners: University of Tübingen (germany),

More information

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security

More information

A Resilient Protection Device for SIEM Systems

A Resilient Protection Device for SIEM Systems A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

FP7 215225 (a.k.a. MOMENT)

FP7 215225 (a.k.a. MOMENT) FP7 215225 (a.k.a. MOMENT) Dr. Daniel Morató FP7? FP7 EU 7 th Framework Programme for Research and Technological Development (7º Programa Marco de la UE) Principal instrumento de financiación de proyectos

More information

Monitoring applications to increase security in 40G and 100G networks

Monitoring applications to increase security in 40G and 100G networks Monitoring applications to increase security in 40G and 100G networks Cyber Security and Today s Communication Technologies TPEB workshop, 30.1.2014 Petr Kastovsky kastovsky@invea.com Company Introduction

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

Online/Cloud Services Trust challenges & eidentity-aspects

Online/Cloud Services Trust challenges & eidentity-aspects Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast

More information

Trustworthy ICT Research in FP7

Trustworthy ICT Research in FP7 Trustworthy ICT Research in FP7 BuIldINg a SECuRE and TRuSTwoRThy INFoRmaTIoN SoCIETy European Commission Information Society and Media LEGAL NOTICE By the Commission of the European Communities, Information

More information

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM)

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM) OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012 ICT statistical report for annual monitoring (StReAM) 12 June 2013 ACRONYMS AAL: ACC: ARTEMIS: ASS: BPN: CA: CIP: CP: CSA: EEA: EPO: FP: FET: GBAORD:

More information

Privacy Rights Management Using DRM Is this a good idea?

Privacy Rights Management Using DRM Is this a good idea? Privacy Rights Management Using DRM Is this a good idea? Larry Korba Information Security Group Black Hat Europe, May 19-20, 2004 Agenda Introduction Caveats About this Work and the Speaker Privacy in

More information

HP Security Framework. Jakub Andrle

HP Security Framework. Jakub Andrle HP Security Framework Jakub Andrle Hewlett-Packard 11.place in Fortune Magazine chart In fiscal year 2007 we achieved $7bilions growth CEO HP - Mark Hurd, company residence - Palo Alto, California, USA

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Cyber security initiatives in European Union and Greece The role of the Regulators

Cyber security initiatives in European Union and Greece The role of the Regulators Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Cybercrime & Cybersecurity

Cybercrime & Cybersecurity Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational

More information

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project

More information

Schengen routing or Schengen encryption?

Schengen routing or Schengen encryption? Schengen routing or Schengen encryption? Secure communication and digital sovereignty in Europe Prof. Norbert Pohlmann Internet Key Figure System (IKS) act with the right key figure IKS performs continuous

More information

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

Using Ontologies for Privacy-Awareness in Network Monitoring Workflows

Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios V. Lioudakis Institute of Communication and Computer Systems National Technical University of Athens Workshop on Collaborative

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Overview of DG INFSO R&D on Trust & Security

Overview of DG INFSO R&D on Trust & Security Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Data Masking Best Practices

Data Masking Best Practices Data Masking Best Practices 1 Information Security Risk The risk that sensitive information becomes public 2 Information Security Risk Government systems store a huge amount of sensitive information Vital

More information

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the

More information

Deliverable D4.2a: First LOBSTER Workshop Proceedings and Summary

Deliverable D4.2a: First LOBSTER Workshop Proceedings and Summary INFORMATION SOCIETY TECHNOLOGIES (IST) PROGRAMME Large Scale Monitoring of BroadBand Internet Infrastructure Contract No. 004336 Deliverable D4.2a: First LOBSTER Workshop Proceedings and Summary Abstract:

More information

and the world is built on information

and the world is built on information Let s Build a Smarter Planet Starting with a more dynamic and the world is built on information Guy England Storage sales manager CEEMEA englag@ae.ibm.com Tel: +971 50 55 77 614 IBM Building a Smarter

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

The Common Assessment Framework (CAF) Presentation 1. General overview : criteria and sub-criteria

The Common Assessment Framework (CAF) Presentation 1. General overview : criteria and sub-criteria The Common Assessment Framework (CAF) Presentation 1. General overview : criteria and sub-criteria Outline 1. Context of TQM 2. Start and growth of CAF 3. The model: general overview: criteria and subcriteria

More information

Deliverable 1.2 Project Presentation

Deliverable 1.2 Project Presentation FP7-PEOPLE-2012-ITN EID Grant agreement no.: 317387 www.secentis.eu Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the

More information

The Legal Protection Insurance Market in Europe. October 2013

The Legal Protection Insurance Market in Europe. October 2013 The Legal Protection Insurance Market in Europe October 2013 The Legal Protection Insurance Market in Europe October 2013 In its latest publication RIAD, the International Association of Legal Protection

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

EFFECTS+ - Systems & Networks Cluster. Draft Agenda

EFFECTS+ - Systems & Networks Cluster. Draft Agenda EFFECTS+ - Systems & Networks Cluster Technical Workshop on Models Draft Agenda Location: Breakout Rooms VU University Amsterdam Chairman: Roland Rieke Date Time Description 04-Jul-2011 14:45-17:00 Part

More information

Social dumping and free movement: Overview of current issues from an economic point of view

Social dumping and free movement: Overview of current issues from an economic point of view Social dumping and free movement: Overview of current issues from an economic point of view Prof. dr. Jozef Pacolet & Frederic De Wispelaere Design Charles & Ray Eames - Hang it all Vitra Statistics on

More information

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project!

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project! move us ICT CLOUD-BASED PLATFORM AND MOBILITY SERVICES : AVAILABLE, UNIVERSAL AND SAFE FOR ALL USERS MoveUs has successfully finished the first year of the project! Newsletter 2014 Welcome to MoveUs newsletter.

More information

Mobile Cloud Networking

Mobile Cloud Networking Mobile Cloud Networking Outline Project overview, motivation, vision, scope Objectives, assumptions and key research issues Partner perspectives and project dimensions Architecture overview Preliminary

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

e-sens Electronic Simple European Networked Services Rome, 16.10.2015

e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable

More information

Implementing the cooperation mechanisms of the RES directive current status and open questions

Implementing the cooperation mechanisms of the RES directive current status and open questions Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy

More information

Network Security Deployment Obligation and Expenditure Report

Network Security Deployment Obligation and Expenditure Report Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate

More information

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

WWRF Cloud Implications to Security, Privacy, and Trust

WWRF Cloud Implications to Security, Privacy, and Trust ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust

More information

Information Security Management at the Olympics: Finding the Needle in the Haystack

Information Security Management at the Olympics: Finding the Needle in the Haystack Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider mjk@netiq.com Chris Van Den Abbeele Solution Manager ISRM chris.vandenabbeele@atos.net

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

FLEXIANT. Utility Computing on Demand

FLEXIANT. Utility Computing on Demand FLEXIANT Utility Computing on Demand Flexiant Flexiant is a software and services company, one of the world's first public/private Cloud providers. We provide cloud infrastructure software and services

More information

GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington

GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington GEOG 482/582 : GIS Data Management Lesson 10: Enterprise GIS Data Management Strategies Overview Learning Objective Questions: 1. What are challenges for multi-user database environments? 2. What is Enterprise

More information

Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services

Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services Rapporteur: David Griffin Presentation to EC DG CONNECT, E.2, Software & Services, Cloud, Brussels,

More information

Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity

Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity MARKET RESEARCH STORE Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity The report outlines the evolution of enterprise IT security technologies, and identifies

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

9/03/2014. Reducing barriers hampering large scale integration of PV electricity into the distribution GRID PV GRID IEE PROJECT WORKFLOW

9/03/2014. Reducing barriers hampering large scale integration of PV electricity into the distribution GRID PV GRID IEE PROJECT WORKFLOW PV GRID Stockholm 2014 03 11 Jan Olof Dalenbäck Svensk solenergi Reducing barriers hampering large scale integration of PV electricity into the distribution GRID 1 IEE PROJECT Carried out by 21 project

More information

European activities in the area of Big Data

European activities in the area of Big Data Connecting Europe for New Horizon European activities in the area of Big Data Márta Nagy-Rothengass DG CONNECT, Head of Unit "Data Value Chain" META-Forum 2013, 19 September 2013, Berlin OUTLINE 1. Data

More information

Status of OpenFlow research and test facilities in Europe

Status of OpenFlow research and test facilities in Europe Status of OpenFlow research and test facilities in Europe Cape Town, Nov 14-15, 2011 Dr.-Ing. Hagen Woesner EICT GmbH, Berlin, Germany Agenda Software Defined Networks and OpenFlow Architectural Splits

More information

New Frontiers for Official Statistics

New Frontiers for Official Statistics European Data Forum 2015 November 16-17, 2015, Luxembourg New Frontiers for Official Statistics Mariana KOTZEVA EUROSTAT, Deputy Director General Key issues 1. A dynamically changing data ecosystem 2.

More information

INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES

INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General

More information

Protecting Communication in SIEM systems

Protecting Communication in SIEM systems Protecting Communication in SIEM systems Valerio Formicola Università di Napoli Parthenope Winter School: Hot Topics in Secure and Dependable Computing for Critical Infrastructures SDCI 2012 January 15th

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE TURNKEY AND CUSTOM MADE DSwiss AG Badenerstr. 281 CH 8003 Zürich Switzerland +41 (0)44 515 11 11 info@dswiss.com www.dswiss.com Management Summary Internet data safes are web based solutions that enable

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering

Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures

More information

Towards a Cloud of Public Services

Towards a Cloud of Public Services Towards a Cloud of Public Services Public administrations are often organised in silos: monolithic architecture models make it difficult to re-use services for the development of new applications. What

More information

ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States.

ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States. ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT An area without internal borders where EU citizens and non-eu nationals may move freely EU Schengen States Non-Schengen EU States IS Azores

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

IAAS CLOUD EXCHANGE WHITEPAPER

IAAS CLOUD EXCHANGE WHITEPAPER IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support

More information

PV GRID. Efficient Grid Integration of European PV: Project Results. Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar)

PV GRID. Efficient Grid Integration of European PV: Project Results. Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar) PV GRID Efficient Grid Integration of European PV: Project Results Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar) 16th September 2014 1 PV GRID Key facts An Intelligent Energy

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

honeytarg Chapter Activities

honeytarg Chapter Activities honeytarg Chapter Activities Marcelo Chaves mhp@cert.br! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda

More information

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * * [Selezionare la data] INNOVERY GROUP COMPANY PROFILE [Digitare il sottotitolo del documento] * * INNOVERY GROUP ITALY - SPAIN MEXICO - ALBANIA Company Profile 1. BUSINESS... 3 2. MANAGEMENT... 3 3. COMPETENCE...

More information

Microsoft Research Worldwide Presence

Microsoft Research Worldwide Presence Microsoft Research Worldwide Presence MSR India MSR New England Redmond Redmond, Washington Sept, 1991 San Francisco, California Jun, 1995 Cambridge, United Kingdom July, 1997 Beijing, China Nov, 1998

More information

Towards Trustworthy Clouds

Towards Trustworthy Clouds IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable

More information

State of Security Monitoring of Public Cloud

State of Security Monitoring of Public Cloud State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd Highlights

More information

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas Cloud e-mail services: Security, Compliance and Privacy Nasos Kladakis Solutions Specialist Microsoft Hellas Risk Management Program Overview Information Security Policy Security Privacy & Regulatory Service

More information