SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity
|
|
- Jacob Gordon
- 8 years ago
- Views:
Transcription
1 SBA Research Angewandte Forschung Angewandtes Wissen
2 SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how in Forschung, Audits, Consulting, Implementierung und Betrieb unter einem Dach über 90 Personen und ca. 70+ VZÄs angestellt
3 3 Main Areas Research Information Security Services Software Engineering
4 Research Area 1 (GRC): Governance, Risk and Compliance Area 2 (DSP): Data Security and Privacy Area 3 (SCA): Secure Coding and Code Analysis Area 4 (HNS): Hardware and Network Security P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet
5 Empirical Research Dropbox Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar R. Weippl. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. USENIX Security, 8/2011. WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012), Feb Facebook Markus Huber, Sebastian Schrittwieser, Martin Mulazzani, and Edgar Weippl. Appinspect: Large-scale evaluation of social networking apps. In ACM Conference on Online Social Networks (COSN), Amazon Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, Cloudoscopy: Services Discovery and Topology Mapping, in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, Tor Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, Spoiled Onions: Exposing Malicious Tor Exit Relays, in Proceedings of the 14th Privacy Enhancing Technologies Symposium, 2014 GSM Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, and Edgar R. Weippl, IMSI-Catch Me If You Can: IMSI-Catcher-Catchers in Proceedings of ACSAC, 2014
6 Research Network Universities of Applied Science FH Technikum Wien FH Campus Vienna FH OÖ / Hagenberg FH St. Pölten Donau Univ. Krems Non-Univ. Research Institutions AIT A-SIT SBA Salzburg Research Joanneum University of Economics University of Vienna Vienna University of Techn. Univ. Graz Univ. Innsbruck Univ. Linz Universities
7 Research Network Imperial College UK Bar Ilan University Israel IPICS Consortium U.C. Santa Barbara USA University of Manheim NII, Japan SBA EURECOM, France North Eastern University USA Vietnam Purdue University, Indiana University of Regensburg Darmstadt Germany Silesian Univ. of Technology Poland
8 Information Security Services Security Management Security Testing & Guidance Trusted Services Business Impact & Risk Analysis IT/IS Audit ISO GAP Analysis ISO / ISMS Consulting Security Awareness & Perception Penetration Testing Cyber Security SDLC Consulting Source Code Analysis A7700 Security Architecture Review Vulnerability Management APT Protection/Response & Lastline Control Review & IS ControlPoint Source Code Review & Checkmarx Incident Response Training Coaching Talks
9 Information Security Services Analysis & Design Security Strategy Security Organization Business Impact Analysis Risk Analysis ISO27001 Gap Analysis SDLC Gap Analysis Security Architecture Review Security Technology Review Implementation Security (Management) Processes ISO27001 Consulting SDLC Consulting Continuous Jour-Fixe Vulnerability Management Service Lastline (APT Protection) ISControlPoint (ISMS Support) Incident Response Improvement Audit Penetration Testing Source Code Analysis Control Review Security Awareness Trainings Security Measures Maturity Level Improvement
10 Software Engineering Consulting Implementation Research Development Life Cycle Architecture Development Concepts System Migration Secure Software Development SharePoint Development (.Net & Java) SQL Analytics / Reporting Mobile Applications Support/Automization/Scripting Prototypes Algorithms Machine Learning Community Versions (ISContolPoint) Evaluations Training Coaching Speeches & Talks
11 Partner und Kunden Government: Financial Institutions:
12 Partner und Kunden
13 Forschungskooperation
14 Auftragsforschung Innovationsscheck (PLUS) Feasibility Studie Basisprogramm Einzelprojekt Competence Headquarters
15 Forschungsprojekte Kooperative Forschungsprojekte im Rahmen von nationalen und internationalen Ausschreibungen FFG: IKT der Zukunft, Produktion der Zukunft, Mobilität der Zukunft, Energieforschung KIRAS: Nationale Sicherheitsforschung H2020: Europäische Forschungsprojekte
16 sbaprime
17 Leistungsüberblick Quartalsweise Events Regelmäßige Informationsupdates Zwei Kurse pro Jahr Analystengespräch Evaluierte Security-Lösungen Entwicklungen aus dem Forschungsumfeld ohne zusätzliche Lizenzkosten
18 SBA Accelerator Programm
19 Strategische Ziele Unterstützung von Gründern, die Lösungen im Informationssicherheitsumfeld entwicklen Förderung von Europäischen Security Lösungen & Forschung Fokussierung auf die DACH Region & angrenzende Länder
20 3 Phasen 1. Security Ideen Wettbewerb 2. Forschung & Entwicklung 3. Business Development & Support
21 Timeline Start des Wettbewerbs: Ende Mai 2015 Einreichungen bis: 1. Oktober Ideen/Start-Ups bekommen die Möglichkeit zu einem 1-wöchigen Workshop in Wien im Oktober Jurysitzung & Ergebnisse: Ende Oktober
22 Daniela Friedl SBA Research ggmbh Favoritenstraße 16, 1040 Wien
Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015
Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)
More informationEHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.
EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research
More informationObserva(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems
17/03/15 Advanced Persistent Threats & Social Engineering SBA Research & Vienna University of Technology Edgar R. Weippl Observa(on & Empirical Research Observa(on of complex systems 1 Impact Real- World
More informationCloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl
Cloud Security and Mobile Application Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security but no
More informationOrganizational Details Summer 2015
Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research Cooperation for all security
More information3 rd Young Researcher s Day 2013
Einladung zum 3 rd Young Researcher s Day 2013 Nach zwei erfolgreichen Young Researcher s Days starten wir kurz vor dem Sommer in Runde drei. Frau Ingrid Schaumüller-Bichl und Herr Edgar Weippl laden ganz
More informationBig Data & Security. Edgar Weippl SBA Research
Big Data & Security Edgar Weippl SBA Research Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability
More informationCloud Security and Mobile Applica4on Security
2/22/13 Cloud Security and Mobile Applica4on Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security
More informationSpoiled Onions: Exposing Malicious Tor Exit Relays
Spoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl Outline This talk is about: Detecting
More informationCOSMOS events, activities and trainings in Austria, BM:UKK
This is a summary of events, activities and trainings in Austria. By: Jutta Jerlich, Elisabeth Zistler, Christian Reimers, Thomas Lebzelter The following summary is listed according to the date of the
More informationModel-based analysis of market integration and congestion in the
Energiewirtschaftliches Institut an der Universität zu Köln Model-based analysis of market integration and congestion in the European gas market Stefan Lochner, Caroline Dieckhöner, Dietmar Lindenberger
More informationCloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft.
Cloud OS Network Die Bedeutung einer Partner Managed Cloud für Kunden. Uwe Lüthy, Partner Technology Strategiest uwelu@microsoft.com Die Cloud Opportunity Definition von Buzzwords Cloud OS Strategie Wichtig
More informationPlace photo here Executive Customer Briefing
Place photo here Executive Customer Briefing Walldorf, 06. Mai 2013 Agenda Uhrzeit Thema Referent 09:00 Begrüßung & Vorstellung Peter Rupp, IBM IBM SAP Strategische Allianz und Partnerschaft Erwartungen
More informationVertrauen in Cloud Dienste schaffen
Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com
More informationAppInspect: Large-scale Evaluation of Social Networking Apps
AppInspect: Large-scale Evaluation of Social Networking Apps ACM COSN, Boston, 10/08/2013 Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl mhuber[at]sba-research[dot]org Main Contributions
More informationGuess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications
Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl
More informationGuess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications
Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl
More informationModel-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe
Institute of Energy Economics at the University of Cologne Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Stefan Lochner Project Proposal
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationProduktfamilienentwicklung
Produktfamilienentwicklung Bericht über die ITEA-Projekte ESAPS, CAFÉ und Families Günter Böckle Siemens CT SE 3 Motivation Drei große ITEA Projekte über Produktfamilien- Engineering: ESAPS (1.7.99 30.6.01),
More informationIntroduction to Business Informatics
Introduction to Business Informatics Wirtschaftsinformatik = Business Informatics Gerti Kappel Business Informatics Group Institute of Software Technology and Interactive Systems Vienna University of Technology
More informationOther activities. Research interests. Publications. Refereed journals. Chapters in books
Curriculum Vitae Klaus NOWOTNY University of Salzburg Residenzplatz 9 A-5010 Salzburg Austria Tel.: +43 (662) 8044-3722 Fax: +43 (662) 8044-623 E-mail: Klaus.Nowotny@sbg.ac.at Current positions Since 03/2012:
More informationDigicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:
1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit
More informationCurriculum Vitae. Contact details. Current positions. Personal. Education and qualications
Curriculum Vitae Contact details Klaus NOWOTNY University of Salzburg Residenzplatz 9 A-5010 Salzburg Austria Tel.: +43 (662) 8044-3722 Fax: +43 (662) 8044-623 E-mail: Klaus.Nowotny@sbg.ac.at Current positions
More informationCloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
More informationHow To Write An Article For Ibm.Com
Reinventing business operations with Smarter Process Dr. Stefan Kollakowski IBM Partner & Leader Smarter Process DACH BPM ist mehr als eine Technologie - BPM ist ein Managementkonzept zur prozessorientierten
More informationBig Data-Anwendungsbeispiele aus Industrie und Forschung
Big Data-Anwendungsbeispiele aus Industrie und Forschung Dr. Patrick Traxler +43 7236 3343 898 Patrick.traxler@scch.at www.scch.at Das SCCH ist eine Initiative der Das SCCH befindet sich im Organizational
More informationSPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE
SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur
More informationAn Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
More informationTalking to you. FH-Prof. Dipl.-Ing. Dr. techn. Udo TRAUSSNIGG CAMPUS 02 Fachhochschule der Wirtschaft, Graz, Austria
Talking to you FH-Prof. Dipl.-Ing. Dr. techn. Udo TRAUSSNIGG CAMPUS 02 Fachhochschule der Wirtschaft, Graz, Austria Head of Bachelor Degree Program Automation Technology Head of Master Degree Program Automation
More informationSecurity Protocols and Infrastructures. Chapter 0: Formalities and Contents
Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 1/20 Security Protocols and Infrastructures Chapter 0: and Contents Nicolas Buchmann (Harald Baier) Hochschule Darmstadt, CASED Winter
More informationInnovations for Flexible and Sustainable. Supply Chains. 11 th meeting of the European Section MIT Forum Supply Chain Innovation
11 th meeting of the European Section MIT Forum Supply Chain Innovation Innovations for Flexible and Sustainable 20.09.2011 16:00 22:00 21.09.2011 09:00 16:15 Festsaal Augasse 2, 1090 Vienna Take the chance
More informationApplied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
More informationHow To Research Security And Privacy Using Data Science
Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline
More informationZielgruppe Dieses Training eignet sich für System Engineers und an SCCM- Administratoren.
Deploying System Center 2012 Configuration Manager - SCCM MOC 10748 In dieser Schulung lernen Sie die Planung und Bereitstellung einer System Center 2012 Configuration Manager-Hierarchie, einschließlich
More informationLeveraging User Interactions for In-Depth Testing of Web Applications
Leveraging User Interactions for In-Depth Testing of Web Applications Sean Mc Allister, Technical University Vienna (sean@iseclab.org) Christopher Kruegel, University California, Santa Barbara (chris@iseclab.org)
More informationMUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL
MUK-IT 63. Roundtable Herzlich Willkommen bei der Software AG Anton Hofmeier VP Sales Terracotta DACH / MdGL Überblick February 15, 2013 2 Software AG www.softwareag.com 5.500 Mitarbeiter >1Mrd Umsatz
More information10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes
November 19, 2015 10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes Knowledge of the needs Requirements from the Business / Users Challenges within IT s Capabilities
More informationCA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg
CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationCertificate in Cyber Security
Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationService Engineering, Business Process Management and Design
7 th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE Baia Mare, Romania, May 17-18, 2007 ISSN-1224-3264 BUSINESS PROCESS MANAGEMENT SOFTWARE IN THE FIELD OF SERVICE ENGINEERING Helmut, Aschbacher DI (FH), university
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft
More informationAnalytics To Go: Mobile BI. Mike Schiebel / Business Analytics Center of Excellence (CoE) SAP Switzerland June, 2013
Analytics To Go: Mobile BI Mike Schiebel / Business Analytics Center of Excellence (CoE) SAP Switzerland June, 2013 Agenda Trends & Benefits Mobile Analytics Suite from SAP SAP BusinessObjects Mobile Security
More informationÜbersetzerbau in der Industrie: CacaoVM
work-items with acceptance criteria Übersetzerbau in der Industrie: CacaoVM Michael Starzinger Theobroma Systems Design und Consulting GmbH Gutheil-Schoder Gasse 17, 1230 Wien, Austria www.-.com 1 Agenda
More informationAddressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
More informationAdvanced Internet Security
Advanced Internet Security (aka InetSec 2) 183.222 Lecturers Adrian Dabrowski Markus Kammerstetter Georg Merzdoznik Stefan Riegler Challenge Gurus Felix Winter Administrative Issues Mode Weekly lectures
More informationSmart grid security analysis
Smart grid security analysis Paul Smith et al. paul.smith@ait.ac.at SPARKS Stakeholder Workshop 20 th May, 2014, Graz SPARKS Objectives The SPARKS project has three main objectives regarding security analysis:
More informationStudy on multimedial work in journalism (Feb. 2005) EU-project TRIMEDIAL Author: Dr. Stefan Weber. 1. Description of the actual demand in Austria
1 Study on multimedial work in journalism (Feb. 25) EU-project TRIMEDIAL Author: Dr. Stefan Weber 1. Description of the actual demand in Austria The main empirically proven tendency in Austria is a trend
More information3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More informationFormal Methods and the Internet of Things
Formal Methods and the Internet of Things Definition of an Internet-of-Things-Platform and its reference implementation in conjunction with an exemplary usage of Formal Methods. Bachelor thesis Heinrich
More informationReif für die Insel? Multi-Channel-Marketing in einer digitalen Ökonomie andreas.helios@adobe.com
Reif für die Insel? Multi-Channel-Marketing in einer digitalen Ökonomie andreas.helios@adobe.com Sonntag Abend, 13.07.2014, 0:30 Uhr Multi-Channel-Marketing Brauch ich das? Umsatz Gewinn Source: Cap Gemini
More informationGroups Inside FHNW: Why it s not just another AAI SP
Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple
More informationLASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
More informationCourse Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
More informationexceet Secure Solutions Smart & Secure Network From Vision to Reality
exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.
More informationCritical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
More informationDie Schweiz als aktiver und kompetenter Partner in der Sicherheitsforschung
Die Schweiz als aktiver und kompetenter Partner in der Sicherheitsforschung Dr Nicole Wyss National Contact Point Security & Transport Euresearch nicole.wyss@euresearch.ch +41 31 380 60 04 Agenda Die schweizer
More informationDAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software
DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING SEPTEMBER 2015 Wir verkaufen nur Original-Microsoft
More informationSecure Data Transmission Technique for iphone using Quick Response (QR) Code
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015
More informationEmbedded Software Development and Test in 2011 using a mini- HIL approach
Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des
More informationMolecular Biotechnology Master s Degree Program
> APPLIED LIFE SCIENCES Master s Degree Program: > FULL TIME Molecular Biotechnology Master s Degree Program www.fh-campuswien.ac.at My Occupational Future. Your Career Opportunities Biotechnology is one
More informationServermigrationen zu Hyper-V / Azure mit Double-Take Move
Servermigrationen zu Hyper-V / Azure mit Double-Take Move Agenda Über Vision Solutions Double-Take Move Live Demos Lizenzierung Über Vision Solutions HQ in Irvine, Kalifornien 25+ Jahre Erfahrung im HA/DR
More informationBREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
More informationOpen Data Open Government
Open Data Open Government Perspective of the Austrian federal level Prague public sector open data meeting Parliament of the Czech Republic, Chamber of Deputies 28th February 2012 Austrian Federal Chancellery
More informationDeveloping a game to deal with shadow IT
Skill 2015 Developing a game to deal with shadow IT Theory, Prototyping, Testing. Markus Bless HTWG Konstanz Agenda Shadow IT Learning through playing The game Testing the game Q&A (3 slides) (1 slide)
More informationBig Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed
More informationKapitel 2 Unternehmensarchitektur III
Kapitel 2 Unternehmensarchitektur III Software Architecture, Quality, and Testing FS 2015 Prof. Dr. Jana Köhler jana.koehler@hslu.ch IT Strategie Entwicklung "Foundation for Execution" "Because experts
More informationBusiness, Institute for Social Policy. Institute for Social Policy Welthandelsplatz.1 1020 Vienna Tel: +43-1-31336-4189 Helene.Dearing@wu.ac.
CURRICULUM VITAE Helene Dearing Mag.rer.soc.oec. April 2015 PRESENT POSITION Research Assistant at the Vienna University of Economics and Business, Institute for Social Policy CONTACT Helene Dearing Institute
More informationSymantec Managed Security Services The Power To Protect
Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding
More informationCorporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
More informationSeminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
More information1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
More informationAnyWeb AG 2008 www.anyweb.ch
HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look
More information(A) DESNET (DEmand & Supply NETwork) Identification. Identification
V-LAB-Instruction Ver 4.0.doc (A) DESNET (DEmand & Supply NETwork) Identification Name RPD-Tech 2 Address Web site E - mail Coachulting, Johanniterstrasse 36, D-73207 Plochingen www.coachulting.de info@coachulting.de
More informationCURRICULUM VITAE. http://marketing.univie.ac.at/mitarbeiter0/garaus/
CURRICULUM VITAE PERSONAL DATA Name Mag. Marion Garaus (PhD) Date of birth 16.11.1983 Nationality Austria, Vienna E-Mail marion.garaus@univie.ac.at Website MAIN RESEARCH AREAS http://marketing.univie.ac.at/mitarbeiter0/garaus/
More informationbenefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact
benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact What we do Cashless payment in the form of card transactions has become an indispensable part of point-of-sale
More informationProduct Quality and Environmental Standards: The Effect of an International Environmental Agreement on Tropical Timber Trade
Please scroll down for the English version Sehr geehrte Abonnentinnen und Abonnenten, wir freuen uns, Sie per Newsletter über die neuesten Entwicklungen des FIW-Projekts informieren zu dürfen. Dieses Mal
More informationSharePoint Community Tools fürs Web 2.0
SharePoint Convention 2009 SharePoint Community Tools fürs Web 2.0 Michael Greth mg@sharepointcommunity.de Michael Greth Trainer, Consultant für SharePoint Microsoft MVP für Office SharePoint Server SharePointCommunity.de
More informationChristos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
More informationSOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
More informationMaintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper
Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationICT-based Solutions for (Self-)Management of Daily Life Activities of Older Adults at Home
ICT-based Solutions for (Self-)Management of Daily Life Activities of Older Adults at Home Dr Gerda Geyer Chair of the Task Force for Call 5 Preparation Transnationaler Infoday, Innsbruck 5. März 2012
More informationUNIVERSITÄTSBIBLIOTHEK
UNIVERSITÄTSBLIOTHEK Zeitschriften im Abonnement Fach: Informatik : Elektronische Zeitschriften finden Sie in der Elektronischen Zeitschriftenbibliothek EZB. Standort : Bereichsbibliothek Informatik Standort
More informationSmartphone applications Common Criteria is going Mobile ICCC2012 Paris
Dr. Jens Oberender SRC Security Research & Consulting GmbH Smartphone applications ICCC2012 Paris How to CC-evaluate smartphone apps? Agenda Specify Security Target TOE scope Application specific SFRs
More informationHAT SOFTWARE AUS DER SCHWEIZ NOCH EINE CHANCE? MIT ROUNDTABLE-DISKUSSION
MO. 24. NOV. 2004, 17:00 UHR SOFTWARE DEVELOPMENT ON-SHORE & OFF-SHORE IT-PROJEKTE IM GLOBALISIERTEN MARKT: HAT SOFTWARE AUS DER SCHWEIZ NOCH EINE CHANCE? Copyright 2002, TKS, TKS, TKS-TEKNOSOFT are registered
More informationIntelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
More informationCisco ASA und FirePOWER Services
Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle
More informationDoes Swiss IT Matter?
Does Swiss IT Matter? Perspektiven des Informatikstandorts Schweiz Eine Fachtagung der Java User Group Schweiz und der Credit Suisse im Rahmen der informatica08 Montag, 29. September 2008 im Forum St.
More informationThe Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com
The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,
More informationCisco Master Security Specialization Practice Areas Summary. June 2015
Cisco Master Security Specialization Practice Areas Summary June 2015 New Master Security Model Prerequisites Advanced Security Architecture Specialization (ASAS) (1) CCIE Security (1) CCNP Security (1)
More informationAyla Networks, Inc. SOC 3 SysTrust 2015
Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2
More informationCyber Security Threats: What s Next and How Do We Reduce the Risks?
Cyber Security Threats: What s Next and How Do We Reduce the Risks? Agenda Cyber Security: A necessity! What threats exist today? What does the future hold? How do we reduce the risks? Key for Risk Reduction
More informationDoctoral research assistant and lecturer in International Relations.
Moritz Weiß, Ph.D. Ludwig Maximilians University (LMU) Munich Geschwister Scholl Institute of Political Science Oettingenstr. 67, 80538 Munich E Mail: moritz.weiss@gsi.lmu.de Born on 30 April, 1977 in
More informationCloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
More information