NCSRA. SYMPOSIUM Sharing knowledge, Meeting and Exposure. ICT-Innovation Platform Security and Privacy

Size: px
Start display at page:

Download "NCSRA. SYMPOSIUM Sharing knowledge, Meeting and Exposure. ICT-Innovation Platform Security and Privacy"

Transcription

1 NCSRA DISCOVERING SYMPOSIUM Sharing knowledge, Meeting and Exposure June 2nd MEASURING BUILDING ICT-Innovation Platform Security and Privacy

2 Welcome Preface Program booklet NCSRA Symposium June 2nd 2014 In 20 years, the information security research community in The Netherlands has grown from a handful of brilliant mathematicians to a large community of cyber security researchers with representatives from many of the technical and the social sciences. During these years NWO, STW, six Dutch ministries and the European Commission have provided over a hundred million Euros of funding. This has led to dozens of new businesses, hundreds of highly skilled employees in all major corporations, government departments and universities, and thousands of scientific publications and patents. As of 2007 the ICT Innovation Platform Security & Privacy (IIP-VV) plays an important role in: 1. connecting supply and demand, i.e. connecting the cyber security research community to companies and societal parties dealing with cyber security; 2. developing subsequent research agendas in the area of security and privacy. The IIP-VV welcomes experts from different disciplines, such as technical, social, legal and economic. By bringing these experts together, a community is formed that may act as a breeding place of security solutions and innovations where society and companies could benefit from. That is why the IIP-VV addresses (information) security and privacy research challenges through an ambitious multidisciplinary National Cyber Security Research Agenda (NCSRA), covering all strategic sectors of the Dutch economy. The themes from the first Strategic Research Agenda (SRA, 2007) resulted in a number of thematic research projects, mainly related to reliable food. After closing the third and last call-for-proposals in the, so called, Sentinels program around information security (2009), the IIP-VV decided to write a new research agenda focusing completely on cyber security. The relationship with the National Cyber Security Strategy (NCSS, 2011) is reflected in the agenda title (NCSRA, 2011). The evaluation of the first tender, based on this agenda and held by its funding partners, turned out to be positive. This resulted in asking the IIP- VV to develop a second version (NCSRA-II, 2013). And again this agenda became 3

3 Welcome the frame of reference for a tender, using the SBIR instrument and a NWO call for long term research. The primary mission of the founders of the IIP-VV is still valid: strengthen and grow security research in the Netherlands and create a close connection with industry, market-parties and end-users. Thus creating a strong foundation, which will also enable us to participate in meaningful international cyber security (research) initiatives. To demonstrate progress and achievements in the execution of subsequent research agendas, of which the NCSRA II is the most recent one, the ministries and NWO, the national funding parties of the cyber security R&D programs, organize this NCSRA Symposium. I do hope this afternoon you will get a lot of new information, an exchange of ideas and useful new contacts. Dick Brandt Chairman of the board of the IIP-VV and Chairman of the program committee of the NCSRA-symposium Notes from Michel Verhagen A network of experts in industry, science and government is indispensable for innovation in cyber security. The dynamics of the sector call for a platform for new ideas and exchanging knowledge. Not only about the technical aspects, but even more about sharing opinions and views between scientists and entrepreneurs who are active in this sector. The cyber security research tenders aim to enhance the relationship between science and industry. Collaboration between science and industry is the starting point for stimulating R&D via the SBIR instrument and the more fundamental science with the calls of NWO. These tenders have had a scope of 110 companies and 50 knowledge institutions. The symposium of today means a step forward to enlarge this community and offers the opportunity for exposure and sharing of knowledge. In this way this event contributes to the action item in the National Cyber Security Strategy to offer a platform to companies, knowledge institutions and its students. Therefore I wish you an interactive day that leads to a further widening of your network. Michel Verhagen Deputy General Manager Telecom market, Ministry of Economic Affairs Also on behalf of: Security and Justice, Defense, Interior and Kingdom Relations, Infrastructure and the Environment, Finance Notes from Louis Vertegaal A number of six ministries and three scientific disciplines within NWO fund the execution of the NCSRA. Such a concerted support is rather unique, and a clear illustration of a broad national interest in cyber security research and development. On top of this, the global dimension of cyber security challenges requires cooperation at an international level. The contribution of a couple of the principal investigators from the USA who will kick off their projects with their Dutch peers illustrates this dimension, and commonality in our vision. The symposium has been announced using keywords like: sharing knowledge, meeting and exposure. Looking into the program I come across words like SBIR salon and organization gallery. They raise another keyword in my mind: inviting. The Symposium Project Team and the IIP-VV managed to compose an exciting program that invites to participate, learn a lot, meet many people and strengthen relationship, become inspired to proceed in R&D activities under the NCSRA umbrella, thereby improving the security of our society. Have a great afternoon! Louis Vertegaal NWO Director Chemical and Physical Sciences Also on behalf of Technology Foundation (STW) and Social Sciences (MagW) 2 3

4 Program Program Registration and simple lunch at information market SBIR Salon & Gallery Plenary part I: Residentiezaal Gerben Klein Baltink Secretary of the Dutch National Cyber Security Council will be the day s chairman and welcomes the participants. Lodewijk van Zwieten National Prosecutor for High Tech Crime, puts high tech crime and cybercrime in a historic perspective. Willem Jonker Currently CEO of EIT ICTLabs, and former chair of the Sentinels program committee, officially concludes the Sentinels research program and gives his view on the development and growth of the current cyber security research community. Conclude Sentinels research program Wilma van Dijk The new director Cyber Security at the office of the National Coordinator for Counterterrorism and Security (NCTV), will share her thoughts on the importance of both education and research in the cybersecurity domain and the joint responsibility for public, private and academic parties that comes along with it Healthy bar at information market SBIR Salon & Gallery 14: Tracks: Discovering, Building and Measuring Track Discovering: Residentiezaal Page Chair Sandro Etalle, University of Eindhoven Discovering concentrates on what it takes to detect and discover hacker s attacks and malicious activities. Track Measuring: Oranjezaal Page Chair Michel van Eeten, TU Delft Measuring explores how security threats can be reliably measured and quantified, so we can make informed decisions. Track Building: Statenzaal Page Chair Erik Poll, Radboud University Nijmegen Building deals with the building of ICT solutions - solutions that should be secure enough. To find out if that is the case one has to look at the breaking as well as the making of security solutions T-time at information market SBIR Salon & Gallery Plenary part II: Residentiezaal Inald Lagendijk Member of Physical Sciences Board of NWO, kicks off nine long term research projects. Kick off 9 NWO long term research projects Douglas Maughan Cyber Security Division Director of the U.S. Department of Homeland Security gives his view on international partnership research. Kick off 2 DHS-NWO joint research projects Gerben Klein Baltink Secretary of the Dutch National Cyber Security Council chairman, announces the 2 winners of the PhD competition (page 30-31) and rounds up the day Drinks & Bites at information market SBIR Salon & Gallery Interactive search with the public by Rob van der Veer (SBIR winner) The Software Improvement Group measures software quality (security, maintainability, etc.) and provides actionable recommendations for improvement. Their SBIR-funded research aims to further improve their method to analyse security by design. What are typical mistakes in secure software development and how can you prevent them? 4 5

5 Two cyber security tenders The Netherlands Enterprise Agency (RVO) and the Netherlands Organization for Scientific Research (NWO) jointly organized two cyber security tenders (each with two different calls for proposals) under the umbrella of the NCSRA. SBIR cyber security NWO long term cyber security research RVO organized two SBIR (Small Business Innovation Research) cyber security calls. They organized the first one on behalf of four, the second one on behalf of six Dutch Ministries. The first call resulted in 17 feasibility studies and 8 R&D projects. As a result of the second call 21 SBIR feasibility studies were awarded. One of the conditions of the second SBIR cyber security call was that proposals fit policy objectives: 1. To improve the safety and trust in ICT infrastructure and services 2. To prepare the Netherlands for safety challenges ( ) 3. To stimulate the Dutch cyber security economy 4. High-quality content of vital cyber security sectors 5. To strengthen and widen cyber security knowledge and innovation 6. To connect cyber security research initiatives. The SBIR projects are related to the National Cyber Security Research Agenda (NCSRA), a frame of reference for the various ICT security research initiatives in the public and private sector in the Netherlands. Many scientists and entrepreneurs work together in research and SBIR projects. Threats to a safe and reliable use of the Dutch internet are international. So inno vative solutions and research must have an international focus too. The Dutch government stimulates cyber security proposals for the Horizon 2020 programme of the European Commission. NWO organized two calls for long term cyber security research, the first one in 2012, the second one in As a result of the first call 9 long term projects receive a grant. These 9 projects will be officially kicked off during the symposium. In response to the second call 31 Letters of Intent were received, of which 22 were followed up by a full proposal. Brief intro to the NCSRA and the challenges of cyber security research The National Cyber Security Research Agenda (NCSRA) concentrates on two areas: 1. Security and Trust of Citizens: This includes privacy protection, security of mobile services, data and policy management, and accountability. 2. Security and Trustworthiness of Infrastructure: This includes malware detection and removal, intrusion detection and prevention, trustworthiness of networks and hardware, software security, security of SCADA/industrial control systems (ICS) and secure operating systems. Cyber security research on these areas requires active involvement from different disciplines: technical (computer science, mathematics, engineering) and human (law, economics, ethics, criminology), etc. Cyber security research programming as jointly executed by NWO (long term research) and RVO (SBIR) is the interpretation of one of the action lines in the national cyber security strategy (NCSS2) dealing with cyber security knowledge, ability and innovation and is based on the agenda mentioned above, developed by the cyber security field. Relevant and big scientific challenges are related to the development of compromisetolerant systems, computers, and communication means like smartphones. 6 7

6 NCSRA SYMPOSIUM Keynote Speakers Chanpipat, Shutterstock 8 9

7 Keynote Speakers Chairman Gerben Klein Baltink Secretary of the Dutch National Cyber Security Council chairman, announces the winners of the PhD competition (page 30-31) and rounds up the day. Keynote Lodewijk van Zwieten National Prosecutor for High Tech Crime, puts high tech crime and cybercrime in a historic perspective. After his training at the Royal Military Academy, Mr Gerben Klein Baltink fulfilled several functions within the 1st Army Corps. In 1994 Mr Klein Baltink joined TNO (the Netherlands Organization for Applied Scientific Research) and held several positions as junior and senior manager within the Physics and Electronics Laboratory and the Prins Maurits Laboratory. He was Director of TNO Physics and Electronics Laboratory until the 2005 reorganization, resulting in TNO Defence, Security and Safety. Until 2011 he was Director in that new organization, with a total staff of around 950 R&D professionals. Since June 30th 2011 Mr Klein Baltink is Secretary of the new established National Cyber Security Council. Besides this, he holds several advisory positions, both related to General Management as well as specific R&D topics. He has his own consultancy firm, KBBa, that deals with security advice and solutions for both government and private companies. As Board member of IT-VITAE, he is also active in creating access to the labor market for those that need to bridge the gap between their abilities and common market requirements. Mr. Lodewijk van Zwieten graduated as a Master of Law at Leiden University in 1997, specializing in criminal law. He wrote his Master s thesis on the use of special inter rogation techniques in criminal cases. After his studies, he clerked at the Amsterdam Court of Appeals, before working as criminal defence counsel at Vink & Veldman Attorneys in Amsterdam. In 2002, Van Zwieten entered into a traineeship for prospective judges or prosecutors (RAIO). Since 2002 he has been working as a public prosecutor in Rotterdam, Alkmaar and Haarlem (Schiphol). As the Dutch National Prosecutor for Cybercrime & Lawful Intercept, Van Zwieten is responsible for the criminal investigations into high tech crime, that are handled by the National High Tech Crime Unit of the Dutch National Police. Furthermore, Van Zwieten is involved with policy making concerning cybercrime and lawful intercept and advising in matters of legislation

8 Keynote Speakers Keynote Willem Jonker Currently CEO of EIT ICTLabs, and former chair of the Sentinels program committee, officially concludes the Sentinels research program and gives his view on the development and growth of the current cyber security research community. Keynote Wilma van Dijk The new director Cyber Security at the office of the National Coordinator for Counterterrorism and Security (NCTV), will share her thoughts on the importance of both education and research in the cybersecurity domain and the joint responsibility for public, private and academic parties that comes along with it. Prof. dr. Willem Jonker (1962) has a broad background in ICT, both in industry as well as in academia. He studied mathematics and computer science at Groningen University, worked at Delft University of Technology, received his PhD from the University of Utrecht, and is a part-time full professor in computer science at Twente University. Jonkers industrial experience covers telecommunications (KPN), IT (European Computer industry Research Centre, Munich) and consumer electronics (Philips).He held several positions as researcher, international project leader, department head, sector head, and account manager. In 2006 he was appointed Vice President Philips Research. Jonker has served European ICT research in various ways amongst others as project leader, reviewer, and advisor. Willem Jonker is now CEO of the EIT ICT Labs. Sjoerd van der Hucht Wilma van Dijk has taken up the position of Director of Cyber Security at the office of the National Coordinator for Security and Counterterrorism (NCTV) as of June 1st Ms Van Dijk has been the Director of Surveillance, Protection and Civil Aviation Security at the NCTV since In the period 2012 to 2014 she was, as project director, responsible for security at the investiture of King Willem- Alexander and the Nuclear Security Summit (NSS). Between 2009 and 2011 she held a number of positions at what was then known as the office of the National Coordinator for Counterterrorism (NCTb), including Director of Civil Aviation Security. Ms Van Dijk also worked as a project planner on the creation of the NCTV. Ms Van Dijk studied Dutch law at Tilburg University, then known as the Catholic University of Brabant, specialising in private law. She graduated in

9 Keynote Speakers Keynote Inald Lagendijk Member of Physical Sciences Board of NOW, kicks off nine long term research projects. Keynote Douglas Maughan Cyber Security Division Director of the U.S. Department of Homeland Security gives his view on international partnership research. Prof. dr. ir. Inald Lagendijk (Delft University of Technology) is full professor in the field of multimedia signal processing, and holds the chair of Information and Communication Theory. He is Head of the Department Intelligent Systems at Delft University of Technology. Lagendijk is co-director of COMMIT, the Dutch public-private research collaboration in Information and Communication Technology. He is elected member of the Royal Netherlands Academy of Arts and Sciences (KNAW), elected member of the Royal Holland Society of Sciences and Humanities (KHMW), and a Fellow of the IEEE (for Contributions to Image Processing). Since 2013 he has been elected board member of the Physical Science department of the Netherlands Organisation of Scientific Research (NWO). Sjoerd van der Hucht Dr. Douglas Maughan is a Branch Chief in Homeland Security Advanced Research Projects Agency (HSARPA) within the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). Doug is directing the Cyber Security Research and Development activities at HSARPA. Prior to his appointment at DHS, Doug was a Program Manager in the Advanced Techno logy Office (ATO) of the Defense Advanced Research Projects Agency (DARPA) in Arlington, Virginia. His research interests and related programs were in the areas of networking and information assurance. Prior to his appointment at DARPA, Doug worked for the National Security Agency (NSA) as a senior computer scientist and led several research teams performing network security research. Doug received bachelors degrees in Computer Science and Applied Statistics from Utah State University, a master s degree in Computer Science from Johns Hopkins University, and a PhD in Computer Science from the University of Maryland, Baltimore County (UMBC)

10 NCSRA SYMPOSIUM Track Discovering Chanpipat, Shutterstock 16 17

11 Track Discovering Biographies of the track speakers Chair of Track Discovering Chair of Track Discovering Sandro Etalle, University of Eindhoven Nowadays, cyber attacks are increasingly difficult to detect. The time is long past that having an updated anti-virus was a good enough protection. Hackers have become well-paid professionals and most of the hacking has become stealth: Advanced persistent threats, targeted attacks, cyber-espionage are becoming common words: they all refer to attacks that are practically invisible to today s detection technology. This track concentrates on what it takes to detect and discover hacker s attacks and malicious activities. It starts from the consideration we are in need of a new generation of detection and monitoring tools, and features a number of talks about some of the latest advances in monitoring and detection. Sandro Etalle holds an MSc in mathematics from the University of Padova (Italy) and a PhD in Computer Science from the University of Amsterdam (the Netherlands). He is full professor and the head of the security of embedded systems group at the University of Eindhoven, and works part-time for the University of Twente. He is a co-founder of the 3-TU spin-off SecurityMatters. His research interests include intrusion detection, security of industrial control systems, trust management, access control and policy compliance. Protecting your Golden Nuggets Roy Jansen is Global Lead Cyber Security Services within Atos Consulting & Systems Integration (C&SI) and responsible for the development and alignment of cyber capabilities between all Centers of Excellence across the globe. With a military background combined with profound knowledge of governance, risk and security principles Roy leads international teams that advise organizations on the strategic implementation of Cyber Security. Besides his role at Atos, Roy is a member of the Cyber Security Advisory board of Nederland ICT to the Dutch government and board member of the Cyber Cluster within the NIDV (The Netherlands Industries for Defence & Security) and the Platform for Information Security (PvIB). Intrusion Detection in Industrial Control Systems Alfonso Valdes is Managing Director of Smart Grid Technologies, M.S., Operations Research at Stanford University. He is responsible for a portfolio of diverse research activities, including the Trust worthy Cyber Infrastructure for the Power Grid (TCIPG) Center and the Illinois Center for a Smarter Electric Grid (ICSEG). He was formerly a Senior Computer Scientist in the Computer Sciences Laboratory at SRI International, where he led several projects in information security for such clients as the Defense Advanced Research Projects Agency (DARPA) and the Advanced Research and Development Activity (ARDA), the Department of Homeland Security, and the Department of Energy. His recent research has focused on critical infrastructure systems in the oil & gas and electric sectors. He is a co-inventor on two patents in cyber security. Situation and Threat Understanding by Correlating Contextual Observations John Goodall is Research Scientist in the Cyber and Information Security Research group at Oak Ridge National Laboratory. There, he leads the Situation Awareness and Visual Analytics team. His research experience and interests include: visual analytics, information visualization, human-computer interaction, computer network defense, and computersupported cooperative work; he is particularly interested in the intersection between these areas. His work has included research into the work practice and collaborative work flows among Computer Network Defense analysts and the design of systems to facilitate the exploration and knowledge building activities inherent in that domain. PhD students presenting in competition See more information about this competition at page Dennis Andriesse, VU University Amsterdam Stealthy Reconnaissance in Peer-to-Peer Botnets Rick Hofstede, University of Twente SSHCure: Flow-based Intrusion Detection for SSH 18 19

12 NCSRA SYMPOSIUM Track Measuring Chanpipat, Shutterstock 20 21

13 Track Measuring Chair of Track Measuring Michel van Eeten, TU Delft Everywhere in society in boardrooms, political offices and our homes we face a plethora of risk around cybersecurity. We can never protect ourselves from all risks all the time. Where should decision makers allocate their resources? Answering this question adequately requires insight into the magnitude and impact of different risks. In practice, many of these decisions are based on little more than intuition, hype, recent incidents or some poorly conceived indicators. For years now, research has tried to provide us with better methods and approaches to measure risk. Some of these methods have been empirical, trying to measure ongoing incidents and vulnerabilities to estimate their impact and trend. Others are more analytical, estimating risk based on assumptions and models. Some of these attempts have been helpful, others have failed to live up to their promise. Everyone who has looked at recent reports of security vendors or at national cybersecurity threat reports knows how hard it is to produce helpful assessments on which one can base decisions. In this session we look at the past what has worked? what hasn t? why not? and at the future where are new opportunities? how do we avoid the pitfalls of earlier attempts? during a discussing among researchers and entrepreneurs who developing new approaches and services to better measure risk. Biographies of the track speakers Michel van Eeten is professor at TU Delft. His chair focuses on the Governance of Cyber security. He studies the interplay between technological design and economic incentives in Internet security. His team analyses large-scale Internet measurement and incident data to identify how the markets for Internet services deal with security risks. Tyler Moore is an Assistant Professor of Computer Science and Engineering at Southern Methodist University in Dallas, Texas, where he serves as Director of the Economics and Social Sciences program at the Deason Institute for Cyber Security. Moore holds a PhD in Computer Science from the University of Cambridge. Previously, he has held positions at Harvard University s Center for Research on Computation and Society and Wellesley College. He is a 2004 Marshall Scholar. Jaap van Ekris is the leading IT safety and security specialist for Delta Pi, a Dutch risk and asset management organization. He has been involved in high profile safety and security projects in government and industry for 15 years. Projects included the Dutch passport production, Internet Voting, the Oosterschelde storm surge barrier and nuclear power plant Borssele. Dick Snel, ethical hacker and specialised in the security of digital information, is co-founder of Onvio Information Security. Dick has a background in e-commerce and has strong technical knowledge on information systems. At Onvio he is responsible for the development of innovative solutions that support organisations in realising a more secure IT infrastructure. PhD students presenting in competition See more information about this PhD competition at page Marleen Weulen Kranenbarg, NSCR Cyber Crime Offender Profiling (CyberCOP), the human factor examined Samaneh Tajalizadehkhoob, Delft University of Technology Why them? Extracting Intelligence about target selection from banking Trojans

14 NCSRA SYMPOSIUM Track Building Everything xxxx, Shutterstock possible, Shutterstock 24 25

15 Track Building Building deals with the building of ICT solutions - solutions that should be secure enough. To find out if that is the case one has to look at the breaking as well as the making of security solutions. Chair of Track Building Erik Poll, Radboud University Nijmegen Erik Poll is associate professor in the Digital Security group at the Radboud University Nijmegen. He studies the security of software, protocols, smartcards and the use of formal methods for security analysis. PhD students presenting in competition See more information about this PhD competition at page Lucian Cojocar, VU University Amsterdam On the difficulty of security assessment of embedded systems. From black-box to white-box testing. Gergely Alpar, Radboud University Nijmegen Privacy, close to be deployed. SBIR Project Bring Your Own Security by Vincent van der Leest, Intrinsic-ID Intrinsic-ID ( Philips research spin-off) has developed Hardware Intrinsic Security. This patented technology allows secure storage of cryptographic keys based on electronic fingerprinting of hardware. Extracting / copying keys is physically impossible. In SBIR project Bring Your Own Security this technology will be integrated into mobile devices to create two-factor authentication. The mobile device is the security token that unlock access to security services. SBIR Project PURE Checkout Services by Joris Portegies Zwart, Chess-iX Chess-iX builds businesscritical applications for innovative companies. Its software solutions are proven in Financial Services, Sports & Events, Mobility markets. Chess ix chooses to use prebuild components (faster time to market, lower project costs). SBIR: PURE Checkout Services is an online platform to sits between merchants and payment service providers. It offers safe storage and routing of payment data, anonymous checkout, and integrated delivery options. SBIR Project Trans Reality Battle by Erwin Borgmeier and Ed Fennema, Sightes Erwin Borgmeier Ed Fennema Sightes is a research performing SME, dedicated to development and comarketing of transreality products. These are combinations of real time data from the physical world in a virtual context. Sets of raw data become practical tools to support people in reaching objectives, similar to the ones in the real world. SBIR: Threat Battle is a cyber threat battle game to support cyber security awareness. Sentinels project Kindred Spirits by Phd Arjan Jeckmans Kindred Spirits focuses on improving privacy in recommendation systems. Protocols were developed that transmits information from a client in an encoded form to the provider, computes relevant recommendations there and then sends this back in an encoded form. The encoding is only lifted when the information reaches the client. These protocols were applied in two case studies. Arjan Jeckmans was involved as PhD student. SBIR Alert project, management awareness game CLUEDO by Wilbert Pijnenburg, Infosecure BeOne InfoSecure has been developing awareness programmes in the field of information security, cyber security, intellectual property protection, privacy and BCM since InfoSecure is a global market leader in training solutions with a lasting change in employee behaviour. SBIR: Infosecure developes an awareness toolbox for critical infrastructure in the field of cybercrime with e-learning programmes, a training App, a phishing simulation programme and games

16 NCSRA SYMPOSIUM PhD competition Chanpipat, Shutterstock 28 29

17 PhD competition PhD students in different tracks Discovering: Residentiezaal Stealthy Reconnaissance in Peer-to-Peer Botnets 30 PhD competition Another element of this symposium is the PhD competition. Six PhD students are chosen to give a presentation in the three track sessions. A pre-selection has carefully been made by a jury based on the submitted abstracts. The price for the two best PhD presentations is an invitation to present again at the big international NCSC Conference in The Hague on the 4th of June. A mobile jury at the NCSRA conference will attend all the talks held consecutively and will judge them on originality, relevance, presentation style, quality of arguments, engagements and so on. Dennis Andriesse VU University Amsterdam Botnets are among the biggest threats today. Peer-to-Peer (P2P) botnets are the latest and most resilient incarnation of botnets. Reconnaissance is commonly based on crawlers, which map the botnet by actively contacting bots. We discuss strategies and best practices to improve the stealthiness of future reconnaissance, and show that passive monitoring provides more accurate results than crawlers. SSHCure: Flow-based Intrusion Detection for SSH Rick Hofstede University of Twente Dictionary attacks against SSH daemons are a common type of brute-force attack, in which attackers perform authenti cation attempts on a remote machine. SSHCure is a flow-based Intrusion Detection System (IDS) and is capable of analyzing the SSH traffic of a backbone network in real-time and can therefore be deployed in any network with flow export enabled. Measuring: Oranjezaal Cyber Crime Offender Profiling (CyberCOP), the human factor examined Marleen Weulen Kranenbarg NSCR Understanding the causes of cybercrime requires insight into offender motivations, personality, social networks, and the development of criminal careers. Elements of a profile of the typical offline criminal will be compared with the profile of a typical cybercriminal. Yet, while the latter may be able to defuse a threat, they do little to tackle its causes. Why them? Extracting Intelligence about target selection from banking Trojans Samaneh Tajalizadehkhoob Delft University of Technology Financial malware being used in online banking fraud causes millions of Euros in damages each year. Not every financial service provider is equally popular among cyber criminals. We found that attacks are concentrated and not only driven by target size. Attack persistence also varies widely. This project explores the incentives and strategies of attackers from the instructions sent to machines infected with Zeus malware. Building: Statenzaal On the difficulty of security assessment of embedded systems. From black-box to white-box testing Lucian Cojocar VU University Amsterdam Many embedded systems are part of critical infrastructure. They are responsible for the safety and security of larger ecosystem. Often, these are interconnected and expose communication interfaces to external and untrusted world. Besides normal operation, these embedded devices have to cope with security challenges. Our tool tries to make an automatic transition from black-box testing to white-box testing by identifying error prone code. Privacy, close to be deployed Gergely Alpar Radboud University Nijmegen Privacy is hard to define and perhaps harder to implement in technology. Even if there are successful projects, we can see few cases when privacy-enhancing technologies are deployed. But the law increasingly emphasises the importance of rights to privacy, so businesses have to encompass it. Cryptography can offer a lot when the tension between security and privacy has to be mitigated. Our project bridges important chasms: security and privacy, theory and practice, difficult cryptography and intuitive usage. 31

18 SBIR - Salon SBIR - Salon Information market SBIR - Salon (A to Z, with reservation) Compumatica Ad Koolen Intrinsic ID Vincent van der Leest ZiuZ Forensics Ed van den Brand Aimvalley Gert Manhoudt Delta pi Jaap van Ekris Onvio Dick Snel Artibit Rutger ter Borg Digital Intelligence Group Roland Vergeer O2MC Stefan de Kraker Atmos UAV Sander Huisman European Network Cyber Security (ENCS) Anjos van Dijk Sense Observation Systems Jan Peter Larsen Atos Elisa Costante IC3D Media Loren Roosendaal Sightes Erwin Borgmeier BusinessForensics Tames Rietdijk Information Security Academy Fred Hendriks Software Improvement Group Rob van der Veer Chess it International Rene Hodde Coblue Friso Stoffer Infosecure Wilbert Pijnenburg InnoValor Martijn Oostdijk Synerscope Jan-Kees Buenen Thales Frans Jansen Junede, Shutterstock 32 33

19 Links to significant websites Gallery Information Links to significant websites Information market Gallery (A to Z, with reservation) Netherlands Enterprice Agency (RVO) The National Cyber Security Centre ALERT Online (min V&J) Nelly Ghaoui ICT-Innovation Platform Security and Privacy (IIPVV) Juul Brouwers National Cyber Security Center (NCSC) Kas Clark Netherlands Forensic Institute (NFI) Zeno Geradts Technology Foundation STW Kitty Puijk Team High Tech Crime (THTC) Floor Jansen The Hague/Holland Security Delta (HSD) Joris den Bruinen Research and Documentation Centre (WODC) Paul Platenburg The Netherlands Organisation for Scientific Research, Physical Sciences Netherlands Enterprice Agency ICT-Innovation Platform Security and Privacy Veilig Verbonden The Sentinels Program Netherlands Organisation for Applied Scientific Research (TNO) Robin de Haas Netherlands Organisation for Scientific Research, Exact Science (NWO-EW) Jan Piet Barthel 34 35

20 Notes Notes 36 37

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Cyber security guide for boardroom members

Cyber security guide for boardroom members Cyber security guide for boardroom members 2 Cyber security guide for boardroom members Cyber security at strategic level Our society is rapidly digitising, and we are all reaping the benefits. Our country

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

HSD Corporate presentation

HSD Corporate presentation HSD Corporate presentation Ida Haisma Director HSD ETTIS Project 20 november 2014 www.thehaguesecuritydelta.com @HSD_NL Europe s largest security cluster Gateway to Europe and connected with the North

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree master s degree Computer Science Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! For us the world is flat. Electrical Engineering, Mathematics and Computer Science have

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

I m visualizing large datasets to generate

I m visualizing large datasets to generate GRADUATE SCHOOL 2015-2016 I m visualizing large datasets to generate new insights Graduate program Computer Science * This major is formally part of the Computer Science & Engineering Bachelor program

More information

Netherlands School of Public Administration

Netherlands School of Public Administration Netherlands School of Public Administration A welcome from our deans The Netherlands School of Public Administration (NSOB) seeks to make sense of what is happening in government by reflecting on politics

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

European Commission Per email: CNECT-H4@ec.europa.eu

European Commission Per email: CNECT-H4@ec.europa.eu Post Bits of Freedom Bank 55 47 06 512 M +31(0)646282693 Postbus 10746 KvK 34 12 12 86 E simone.halink@bof.nl 1001 ES Amsterdam W https://www.bof.nl European Commission Per email: CNECT-H4@ec.europa.eu

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Delft Data Science Seminar January 26, 2015

Delft Data Science Seminar January 26, 2015 Delft Data Science Seminar January 26, 2015 Big Data Analytics for Cyber Situational Awareness 1 100 billions in economic and societal value Content Creation millions of new jobs and millions of new talent

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security

Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security Prof. dr. Wouter Stol NHL UoAS Police Academy Open University An Overview Why? Because going somewhere demands that

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

3TU Master of Science in Systems and Control. An essential engineering qualification for future decades

3TU Master of Science in Systems and Control. An essential engineering qualification for future decades 3TU Master of Science in Systems and Control An essential engineering qualification for future decades The challenge of Systems and Control As the complexity and importance of our many industrial structures

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

More information

Douglas M. DePeppe Cyberlaw Attorney

Douglas M. DePeppe Cyberlaw Attorney Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate

More information

Project number Applicant Title Partners + Collaboration

Project number Applicant Title Partners + Collaboration Applicant Title Partners + Collaboration CYBSEC.12.001 Prof. dr. R.J. Wieringa Personal Information Security Assistant (PISA) CYBSEC.12.002 Prof. dr. ir. W.M.P. van Privacy Compliance and Enforcement der

More information

Eindhoven December 4, 2014

Eindhoven December 4, 2014 Eindhoven December 4, 2014 Waves: Visualizing spatio-temporal Soccer Data Insight Reports of sport events can be enhanced by real-time feature analysis. Solutions Complex spatio-temporal sports-analytics

More information

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Summary. 1 http://www.jobfeed.nl/

Summary. 1 http://www.jobfeed.nl/ Summary Reason and purpose of the study A shortage of Cyber Security Professionals (CSPs) is a great vulnerability to the resilience of the vital sectors. In the National Cyber Security Strategy 2 (NCSS2):

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

The Netherlands Forensic Institute. Strengthening the rule of law together

The Netherlands Forensic Institute. Strengthening the rule of law together The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Welcome Skåne September 18, 2013

Welcome Skåne September 18, 2013 Welcome Skåne September 18, 2013 Programme Welcome by Director Resilience Mr. Paul Gelton Presentation NL DCM-system + PPP + risk/crisis info by Mr. Corsmas Goemans Pause Presentation NL Strategy NS&S

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Turning data into business. Exploiting big data requires fundamental rethinking of how we do business.

Turning data into business. Exploiting big data requires fundamental rethinking of how we do business. rotterdam school of management erasmus university executive education Prof. Eric van Heck Exploiting big data requires fundamental rethinking of how we do business. business was usual LEADERSHIP CHALLENGES

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Cyber Security Research and Development a Homeland Security Perspective

Cyber Security Research and Development a Homeland Security Perspective FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT 1 From From information information security security to cyber cyber warfare: warfare: some some paradigm paradigm shifts shifts and and research research challenges challenges Jan van den Berg Delft University

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

3TU MSc in Construction Management and Engineering. Creating the construction leaders of the future

3TU MSc in Construction Management and Engineering. Creating the construction leaders of the future 3TU MSc in Construction Management and Engineering Creating the construction leaders of the future The challenge of Construction Management and Engineering Today s construction industry is changing fast.

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence

More information

SID Current Topic Series

SID Current Topic Series SID Current Topic Series Forum: The Secrets and Art of Cyber Security Organised by : Singapore Institute of Directors in collaboration with PwC & Quann Date : Friday, 29 th July 2016 Time : 9.00 am to

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Memorandum Cybersecurity - how should the legislation meet the new challenges?

Memorandum Cybersecurity - how should the legislation meet the new challenges? ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

3TU MSc in Sustainable Energy Technology. Creating the sustainable energy specialists of the future

3TU MSc in Sustainable Energy Technology. Creating the sustainable energy specialists of the future 3TU MSc in Sustainable Energy Technology Creating the sustainable energy specialists of the future The challenge of Sustainable Energy Technology The world is becoming acutely aware of the urgency of resolving

More information

Journey of a Lifetime

Journey of a Lifetime 3rd of March 2015 Journey of a Lifetime the cycle of aircraft development VISION introduction Journey of a Lifetime The cycle of aircraft development Every year 3 billion people travel around the globe

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

27 th August 2012, Eindhoven

27 th August 2012, Eindhoven 27 th August 2012, Eindhoven Welcome to the EIT ICT Labs Master School Jaap van der Heijden EIT ICT Labs COO office Master School Meet & Greet Programme 09:45-10:00 Registration & Coffee 10:00-10:15 Welcome

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

As the things are today!

As the things are today! Central Reporting service and As the things are today! Henk Bronk Agenda 1.Cybercrime Manual 2.Reporting Service 3.New services 4.Symposium Cybercrime manual Motives: To recognize cyber crime To prevent

More information

Operationalizing Threat Intelligence.

Operationalizing Threat Intelligence. Operationalizing Threat Intelligence. Key Takeaways Time is becoming more and more compressed when it comes to protecting the enterprise Security teams must be able to rapidly and effectively translate

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

MARE Policy Day 2015

MARE Policy Day 2015 MARE Policy Day 2015 Geopolitics of the Arctic Ocean: A Social License to Operate in the Arctic Amsterdam, The Netherlands www.marecentre.nl 23 June 2015 Register now! WELCOME from the PROGRAM CHAIR On

More information

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond

Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond 118 Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-118

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Forensics in Nuclear Security. by the Netherlands Forensic Institute Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than

More information

Professor / Chair Electrical Energy Systems (full-time)

Professor / Chair Electrical Energy Systems (full-time) Professor / Chair Electrical Energy Systems (full-time) Eindhoven University of Technology, Department Electrical Engineering The mission of the Electrical Energy Systems (EES) group is the creation, dissemination

More information

Overview of the Entrepreneurial courses and Activities at TU Delft

Overview of the Entrepreneurial courses and Activities at TU Delft Overview of the Entrepreneurial courses and Activities at TU Delft Delft University of Technology Delft University of Technology Ever thought about starting up your own company? The TU Delft offers loads

More information

AMSTERDAM INSTITUTE FOR ADVANCED METROPOLITAN SOLUTIONS (working title)

AMSTERDAM INSTITUTE FOR ADVANCED METROPOLITAN SOLUTIONS (working title) (working title) Prof. ir. Karin Laglas Dean of the Faculty Architecture and the Built Environment, Delft University of Technology RESEARCH APPROACH FOR SENSE The City PHYSICAL ENGINEERING NATURAL SCIENCES

More information

Master Class. Scenario Based Strategy. Navigate the Future. 11 & 12 June 2015

Master Class. Scenario Based Strategy. Navigate the Future. 11 & 12 June 2015 Scenario Based Strategy Master Class Navigate the Future 11 & 12 June 2015 Presented by Paul de Ruijter, scenario planner since 1992 and co-author of Scenarios for Success and author of Scenario Based

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

Master Programme in Customs & Supply Chain Compliance

Master Programme in Customs & Supply Chain Compliance Delft TopTech Study load The degree covers at least 60 credits within the European Credit Transfer and Accumulation System (ECTS). One credit corresponds to 28 hours of study. The programme is offered

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information