SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Size: px
Start display at page:

Download "SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities"

Transcription

1 SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive

2 What is SICSA? Collaboration of Scottish Universities whose goal is to develop and extend Scotland s position as a world leader in informatics and Computer Science research and Education 30 SICSA Funded research Staff Offered more than 90 PhD prize studentships Summer Schools Fellowships Informatics Ventures Supporting Scotland s technology innovators and entrepreneurs (CEO Masterclass, EIE, DEMOfest, IV Tuesday)

3 SICSA Universities University of Aberdeen University of Abertay University of Dundee University of Edinburgh Edinburgh Napier University University of Glasgow Glasgow Caledonian University Heriot-Watt University Robert Gordon University University of St Andrews University of Stirling University of Strathclyde University of West of Scotland

4 Cyber Security Research by Sector Anonymity Social Network Analysis Biometrics Systems Security CCTV/Image Recognition Usability Cloud Testing/Validation Complexity Cybercrime Cryptography Fraud Digital Forensics Steganography Ethical Hacking Natural Language Formal Methods Communication protocols/networking Human-Computer Interaction Authentication Intelligence Analysis Self-Healing Interfaces Quantum Modelling Text Mining Privacy Database Security Proofs Identity Management Trust

5 Examples of Research Jinchang Ren University of Strathclyde Visual Surveillance, Archive Restoration, Intelligent Information Processing, Pattern Recognition.. George Weir University of Strathclyde Cybercrime, digital forensics and network security Karen Renaud University of Glasgow Usability of Security Systems, Graphical Authentication Mechanisms, Electronic Voting, Privacy Ishbel Duncan University of St Andrews Cloud Security, Computer Security and Terrorism, Network Security, Penetration Testing, Privacy, Security and Trust in Software Systems and the Internet

6 Why Partner with an HEI? Mandatory Requirement Track Record Financial Credibility Established Frameworks for Leading Researchers Requiring Impact SDI/SE/Scotland Europa Funding University of Edinburgh 27M (top 5 in UK) Heriot Watt 10M University of Glasgow 10M University of Dundee 5M University of St Andrews 3M University of Strathclyde 3M

7 How do I partner with an HEI in Cyber Security? Find partner group(s) Existing relationships Contact Interface/Universities Contact Cyber Security Business Development Find other European Partners Universities can help Contact Cyber Security Business Development

8 Interface Journey of Engagement Funding Scottish SMEs HEI Collaboration 5000 Fact finding Travel

9 PEER Funding SICSA Funding (SFC & SE) Support to enable engagement of Scottish SMEs in collaborative European Projects 1000/ 3000/ 10000

10 Horizon2020 Security Calls DS Privacy DS Access Control DS The role of ICT in Critical Infrastructure Protection DS Secure Information Sharing DS Trust eservices DS Risk management and assurance models FCT Tools and infrastructure for the fusion of big data include cyber offences generated data for forensic investigation FCT Law Enforcement capabilities 2: Detection and analysis of terroristrelated content on the Internet FCT Ethical/Societal Dimension Topic 4 - Investigate the role of social, psychological and economic aspects of the processes that lead to organised crime (including cyber related offences) DRS Critical Infrastructure Protection topic 1: Critical Infrastructure smart grid protection and resilience under smart meters threats DRS Critical Infrastructure Protection topic 3: Critical Infrastructure resilience indicator - analysis and development of methods for assessing resilience

11 Contact Martin Beaton Rm 8.11 Appleton Tower 11 Crichton Street University of Edinburgh EH8 9AB Cyber Breakfast 25 th February

SUPA the Scottish Universities Physics Alliance Prof Jim Hough

SUPA the Scottish Universities Physics Alliance Prof Jim Hough SUPA the Scottish Universities Physics Alliance Prof Jim Hough University of Glasgow Chief Executive www.supa.ac.uk Scottish Research Pools The current Scottish Pooling initiatives are: Scottish Universities

More information

Christmas Cyber Security Lecture Series 2013. Teacher Information Pack. Edinburgh GLASGOW EDINBURGH DUNDEE ABERDEEN

Christmas Cyber Security Lecture Series 2013. Teacher Information Pack. Edinburgh GLASGOW EDINBURGH DUNDEE ABERDEEN Christmas Cyber Security Lecture Series 2013 GLASGOW EDINBURGH DUNDEE ABERDEEN Teacher Information Pack Edinburgh Welcome SICSA are very proud to welcome you to the second Cyber Security Lecture Series.

More information

Instructions for applying for Exemptions:

Instructions for applying for Exemptions: Instructions for applying for Exemptions: ICAS Accredited Degrees These are degrees which have been accredited by ICAS and with the appropriate module choices may attract up to a maximum of five exemptions.

More information

Student Awards Agency for Scotland

Student Awards Agency for Scotland Student Awards Agency for Scotland List of courses eligible for Postgraduate Funding 2015-2016 Click on the relevant link below to find out which courses we support at each institution. Aberdeen University

More information

CASE STUDIES ON CYBER SECURITY

CASE STUDIES ON CYBER SECURITY CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING MANAGER @DAVID_CROZIER Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision

More information

The Scottish Informatics and Computer Science Alliance (SICSA) Annual Collaborative Progress Report 2012

The Scottish Informatics and Computer Science Alliance (SICSA) Annual Collaborative Progress Report 2012 The Scottish Informatics and Computer Science Alliance (SICSA) Annual Collaborative Progress Report 2012 Purpose of this document This document contains the report to the Scottish Funding Council on the

More information

Supporting the Transition From HND Social Sciences into BPS Accredited Second Year Psychology Degrees.

Supporting the Transition From HND Social Sciences into BPS Accredited Second Year Psychology Degrees. Supporting the Transition From HND Social Sciences into BPS Accredited Second Year Psychology Degrees. Report from a Joint Further Education and Higher Education Psychology Working group, Facilitated by

More information

How effective is the use of social media by the top ten Scottish Universities?

How effective is the use of social media by the top ten Scottish Universities? How effective is the use of social media by the top ten Scottish Universities? Contents Effective use of social media by the top ten Scottish universities 2015 I. Introduction... 3 II. Methodology... 4

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

EUTHANASIA IN EUROPE FIRST EUROPEAN SYMPOSIUM ON EUTHANASIA AND ASSISTED SUICIDE EDINBURGH CONFERENCE CENTRE

EUTHANASIA IN EUROPE FIRST EUROPEAN SYMPOSIUM ON EUTHANASIA AND ASSISTED SUICIDE EDINBURGH CONFERENCE CENTRE CARENOTKILLING 6-8 SEPTEMBER 2012 FIRST EUROPEAN SYMPOSIUM ON EUTHANASIA AND ASSISTED SUICIDE EDINBURGH CONFERENCE CENTRE EUTHANASIA IN EUROPE WHERE HAVE WE COME FROM AND WHERE ARE WE GOING? CARENOTKILLING

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

Higher Education Outcome Agreements: Achievements and Ambitions

Higher Education Outcome Agreements: Achievements and Ambitions 1 Higher Education Outcome Agreements: Achievements and Ambitions May 2014 Today we are publishing the university Outcome Agreements for 2014-15, which demonstrate the outcomes that universities both individually

More information

Architecture and the Built Environment; building science, civil engineering, construction

Architecture and the Built Environment; building science, civil engineering, construction UK universities were selected to participate in Science without Borders UK based on their excellence in the SwB priority areas; this was determined either by an exceptionally high student satisfaction

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

National Guidance for Clinical Academic Research Careers for Nursing, Midwifery and Allied Health Professions in Scotland ENTER

National Guidance for Clinical Academic Research Careers for Nursing, Midwifery and Allied Health Professions in Scotland ENTER National Guidance for Clinical Academic Research Careers for Nursing, Midwifery and Allied Health Professions in Scotland ENTER Introduction This document presents national guidance to support the development

More information

From. HNC/D to Degree

From. HNC/D to Degree From HNC/D to Degree DID Y KNOW You can study the first two years of your degree at Fife College before progressing to third and fourth year at university?* 2 Think Fife College www.fife.ac.uk Make Fife

More information

MSc in Physical Activity for Health PROPOSAL

MSc in Physical Activity for Health PROPOSAL MSc in Physical Activity for Health PROPOSAL Moray House School of Education Revised June 2012 Address for Correspondence: Dr Samantha Fawkner St Leonard s Land Holyrood Road Edinburgh EH8 8AQ Telephone:

More information

By Pauline Robertson Mar 2015

By Pauline Robertson Mar 2015 By Pauline Robertson Mar 2015 ISSC, IS Shared Service Catalyst, is part of UCSS Created by Sector in response to sectoral interest in further developing shared services, combined with the John McClelland

More information

P2 ESF Time Critical Bid LUPS/2009/3/2/0117. LUPS/09/04/09 Annex 3

P2 ESF Time Critical Bid LUPS/2009/3/2/0117. LUPS/09/04/09 Annex 3 P2 ESF Time Critical Bid LUPS/2009/3/2/0117 LUPS/09/04/09 1. A full and detailed breakdown of the cost to be incurred under the Consultancy heading, and providing some text detail on each of the activities

More information

School of BUSINESS & ENTERPRISE

School of BUSINESS & ENTERPRISE School of BUSINESS & ENTERPRISE NC BUSINESS NC ADMINISTRATION HNC/D ADMINISTRATION & INFORMATION TECHNOLOGY HNC/D BUSINESS HNC/D HUMAN RESOURCE MANAGEMENT DIPLOMA OF HIGHER EDUCATION (BUSINESS) NC ACCOUNTING

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

List of courses eligible for Postgraduate Funding 2016-2017

List of courses eligible for Postgraduate Funding 2016-2017 List of courses eligible for Postgraduate Funding 2016-2017 Click on the relevant link below to find out which courses we support at each institution. Aberdeen University Abertay University Dundee University

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Qualification Information Profiles (QIPs) for Access to HE Diploma and Scottish Wider Access Programme (SWAP)

Qualification Information Profiles (QIPs) for Access to HE Diploma and Scottish Wider Access Programme (SWAP) 2015 Qualification Information Profiles (QIPs) for Access to HE Diploma and Scottish Wider Access Programme (SWAP) Published by: UCAS Rosehill New Barn Lane Cheltenham GL52 3LZ UCAS 2015 All rights reserved.

More information

Cairngorms National Park Business Support Audit 2010. User Guide. The Cairngorms National Park Area as a whole

Cairngorms National Park Business Support Audit 2010. User Guide. The Cairngorms National Park Area as a whole Cairngorms National Park Business Support Audit 2010 User Guide This document, available from the Cairngorms National Park Authority (CNPA) in hard copy or on its website (www.cairngorms.co.uk), updates

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

H2020 "Secure Societies" Work Programme Digital Security 2015

H2020 Secure Societies Work Programme Digital Security 2015 H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity 18 November 2015 grance@nist.gov cyberframework@nist.gov National Institute of Standards and Technology About NIST NIST s mission is to develop

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

Cyber Security and Digital Forensics Training Platform

Cyber Security and Digital Forensics Training Platform Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement

More information

Big Data and Society: The Use of Big Data in the ATHENA project

Big Data and Society: The Use of Big Data in the ATHENA project Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder d.p.waddington@shu.ac.uk Helen Gibson CENTRIC Researcher h.gibson@shu.ac.uk

More information

Data Opportunity Action Plan October 2014

Data Opportunity Action Plan October 2014 October 2014 An Action Plan within the Framework for Action for the Technology and Engineering Sector in Scotland TECHNOLOGY ADVISORY GROUP 1 INTRODUCTION The phenomenal growth in Data is a consequence

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

Progression to University Guide

Progression to University Guide Progression to University Guide www.borderscollege.ac.uk 08700 50 51 52 Student Advice Centre 01896 662516 General Enquiries enquiries@borderscollege.ac.uk Online www.borderscollege.ac.uk Scottish Borders

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

Improving Analytical Tools The Future of Interrogating Data London, October 26 2010

Improving Analytical Tools The Future of Interrogating Data London, October 26 2010 Improving Analytical Tools The Future of Interrogating Data London, October 26 2010 OrbisIP Technology Services Consultancy Technology scouting and evaluation Product Distribution Technology Readiness

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Transformational Smart Cities: cyber security and resilience

Transformational Smart Cities: cyber security and resilience We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy

More information

Developments in Supervision

Developments in Supervision Developments in Supervision supervisors of research students; an opportunity to share Date Host Institution Topic or title for Facilitator(s) session Thursday 24 th October Edinburgh Napier Supervising

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR

More information

The Edinburgh Centre for Carbon Innovation

The Edinburgh Centre for Carbon Innovation The Edinburgh Centre for Carbon Innovation Ed Craig Head of Business Innovation Ed.craig@ed.ac.uk What is the ECCi? The ECCI and its resources, will play a leading roll in lowering carbon emissions. We

More information

Outline Investment Roadmap

Outline Investment Roadmap Journey to a Smart City? Outline Investment Roadmap Smart Cities Readiness Assessment Date: May 2015 In partnership with: FINAL REPORT Scottish Cities Alliance Operational Plan Infrastructure Low Carbon

More information

University Business & Start-up Support

University Business & Start-up Support University Business & Start-up Support Below you will find a list of business and start-up support offer by Santander UK partner Universities: University of Aberdeen Scottish Institute for Enterprise Link:

More information

Module 3 Applications of Information Systems: Enterprise Systems

Module 3 Applications of Information Systems: Enterprise Systems Contents Module 1 Introduction to MIS Define management information systems and explain its key attributes Describe information as an asset and explain its core attributes Explain how information technology

More information

Géraud Guilloud Horizon-2020 appels 2016-2017 Atelier Big Data Technologies & Application

Géraud Guilloud Horizon-2020 appels 2016-2017 Atelier Big Data Technologies & Application Géraud Guilloud Horizon-2020 appels 2016-2017 Atelier Big Data Technologies & Application 24/09/2015 Rappel l impact 24/09/2015-2 - Très récurrent dans ces thématiques 25/07/2014-3 - 2 approches dans cet

More information

Consultation on proposal for a Cyber Resilience Strategy for Scotland

Consultation on proposal for a Cyber Resilience Strategy for Scotland Consultation on proposal for a Cyber Resilience Strategy for Scotland June 2015 CONTENTS Page Number Purpose of this consultation 3 Responding to this consultation paper 3 Consultation questions 5 1 A

More information

Digital War in e-business

Digital War in e-business Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

B.A. in Information Systems

B.A. in Information Systems New Jersey Institute of Technology 1 B.A. in Information Systems (129 credit) First Year Term Credits CS 100 Roadmap to Computing HUM 101 English Composition: Writing, Speaking, Thinking I MATH 18 General

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

An enterprise grade information security & forensic technical team

An enterprise grade information security & forensic technical team An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

a response to the Scottish Funding Council

a response to the Scottish Funding Council APRIL 2009 REQUEST FOR STRATEGIC ADVICE ON BUSINESS SCHOOLS IN SCOTTISH UNIVERSITIES: a response to the Scottish Funding Council Summary a) Scotland has many university business schools with a spectrum

More information

Supporting the transition from HND social sciences into BPS accredited second year psychology degrees.

Supporting the transition from HND social sciences into BPS accredited second year psychology degrees. Supporting the transition from HND social sciences into BPS accredited second year psychology degrees. Report from a joint Further Education and Higher Education psychology working group, facilitated by

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

The Challenge of Criminal Investigations in the Virtual World. DSU Steven Wilson DI Eamonn Keane May 2013

The Challenge of Criminal Investigations in the Virtual World. DSU Steven Wilson DI Eamonn Keane May 2013 The Challenge of Criminal Investigations in the Virtual World DSU Steven Wilson DI Eamonn Keane May 2013 What is e Crime/ Cybercrime Old Crimes Facilitated by Internet/ Digital Means Theft Fraud IP Crime

More information

Information Commissioner s Office. ICO response to the discussion paper on the Rehabilitation of Offenders Act 1974

Information Commissioner s Office. ICO response to the discussion paper on the Rehabilitation of Offenders Act 1974 Information Commissioner s Office ICO response to the discussion paper on the Rehabilitation of Offenders Act 1974 14 November 2013 1 Contents Introduction Response Further issues About the ICO The ICO

More information

Taxi And Private Hire Car Licensing Consultation on The Impact of Modern Technology

Taxi And Private Hire Car Licensing Consultation on The Impact of Modern Technology Taxi And Private Hire Car Licensing Consultation on The Impact of Modern Technology March 2016 TAXI AND PRIVATE HIRE CAR LICENSING CONSULTATION ON THE IMPACT OF MODERN TECHNOLOGY Background 1. The Civic

More information

2010 No. 2618 EDUCATION, ENGLAND. The Education (Recognised Bodies) (England) Order 2010

2010 No. 2618 EDUCATION, ENGLAND. The Education (Recognised Bodies) (England) Order 2010 STATUTORY INSTRUMENTS 2010 No. 2618 EDUCATION, ENGLAND The Education (Recognised Bodies) (England) Order 2010 Made - - - - 26th October 2010 Coming into force - - 30th November 2010 The Secretary of State

More information

Security in the Cloud an end to end Problem

Security in the Cloud an end to end Problem ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

How To Research Security And Privacy Using Data Science

How To Research Security And Privacy Using Data Science Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline

More information

Symposium on Health Informatics

Symposium on Health Informatics Symposium on Health Informatics Hosted by the Faculty of Pharmaceutical Sciences and Faculty of Medicine Tuesday, April 5, 2016 8:30 a.m. 5:30 p.m. Life Sciences Institute, LSC3 2350 Health Sciences Mall,

More information

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Project 2020: Preparing Your Organization for Future Cyber Threats Today Project 2020: Preparing Your Organization for Future Cyber Threats Today SESSION ID: CLE-T08 Ken Low CISSP GSLC Director of Cybersecurity Programs, Asia Pacific TREND MICRO 2 PROJECT 2020 An initiative

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

14. Secure societies Protecting freedom and security of Europe and its citizens '' Revised

14. Secure societies Protecting freedom and security of Europe and its citizens '' Revised EN HORIZON 2020 WORK PROGRAMME 2014 2015 14. Secure societies Protecting freedom and security of Europe and its citizens '' Revised This Work Programme was adopted on 10 December 2013. The parts that relate

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

14. Secure societies Protecting freedom and security of Europe and its citizens

14. Secure societies Protecting freedom and security of Europe and its citizens HORIZON 2020 WORK PROGRAMME 2014 2015 14. Secure societies Protecting freedom and security of Europe and its citizens Important Notice on the First Horizon 2020 Work Programme This Work Programme covers

More information

Digital Healthcare in Scotland

Digital Healthcare in Scotland Digital Healthcare in Scotland Healthcare at your fingertips Scottish Development International Digital Healthcare in Scotland The face of healthcare delivery has changed radically and at its core is a

More information

master of research Digital Health & Care Institute

master of research Digital Health & Care Institute master of research Digital Health & Care Institute in partnership with Throughout this book you will see images that by the DHI team during field research and workshops of various projects. About The

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

Farr Institute of Health Informatics Research Harnessing Data for Health Science and e-health Innovation

Farr Institute of Health Informatics Research Harnessing Data for Health Science and e-health Innovation Farr Institute of Health Informatics Research Harnessing Data for Health Science and e-health Innovation Georgina Evans Industry Engagement Manager Farr Institute Who is Farr? Diseases are more easily

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills

Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills March 2013 amee 4th Floor, 70/74 City Road London EC1Y 2BJ 1 amee amee s mission is to provide

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information