SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity

Size: px
Start display at page:

Download "SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity"

Transcription

1 SBA Research Angewandte Forschung Angewandtes Wissen

2 SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how in Forschung, Audits, Consulting, Implementierung und Betrieb unter einem Dach über 90 Personen und ca. 70+ VZÄs angestellt

3 3 Main Areas Research Information Security Services Software Engineering

4 Research Area 1 (GRC): Governance, Risk and Compliance Area 2 (DSP): Data Security and Privacy Area 3 (SCA): Secure Coding and Code Analysis Area 4 (HNS): Hardware and Network Security P1.1: Risk Management and Analysis P1.2: Secure BP Modeling, Simulation and Verification P1.3: Computer Security Incident Response Team P1.4: Awareness and E-Learning P2.1: Privacy Enhancing Technologies P2.2: Enterprise Rights Management P2.3: Digital Preservation P3.1: Malware Detection and Botnet Economics P3.2: Systems and Software Security P3.3: Digital Forensics P4.1: Hardware Security and Differential Fault Analysis P4.2: Pervasive Computing P4.3: Network Security of the Future Internet

5 Empirical Research Dropbox Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar R. Weippl. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. USENIX Security, 8/2011. WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012), Feb Facebook Markus Huber, Sebastian Schrittwieser, Martin Mulazzani, and Edgar Weippl. Appinspect: Large-scale evaluation of social networking apps. In ACM Conference on Online Social Networks (COSN), Amazon Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, Cloudoscopy: Services Discovery and Topology Mapping, in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, Tor Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, Spoiled Onions: Exposing Malicious Tor Exit Relays, in Proceedings of the 14th Privacy Enhancing Technologies Symposium, 2014 GSM Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, and Edgar R. Weippl, IMSI-Catch Me If You Can: IMSI-Catcher-Catchers in Proceedings of ACSAC, 2014

6 Research Network Universities of Applied Science FH Technikum Wien FH Campus Vienna FH OÖ / Hagenberg FH St. Pölten Donau Univ. Krems Non-Univ. Research Institutions AIT A-SIT SBA Salzburg Research Joanneum University of Economics University of Vienna Vienna University of Techn. Univ. Graz Univ. Innsbruck Univ. Linz Universities

7 Research Network Imperial College UK Bar Ilan University Israel IPICS Consortium U.C. Santa Barbara USA University of Manheim NII, Japan SBA EURECOM, France North Eastern University USA Vietnam Purdue University, Indiana University of Regensburg Darmstadt Germany Silesian Univ. of Technology Poland

8 Information Security Services Security Management Security Testing & Guidance Trusted Services Business Impact & Risk Analysis IT/IS Audit ISO GAP Analysis ISO / ISMS Consulting Security Awareness & Perception Penetration Testing Cyber Security SDLC Consulting Source Code Analysis A7700 Security Architecture Review Vulnerability Management APT Protection/Response & Lastline Control Review & IS ControlPoint Source Code Review & Checkmarx Incident Response Training Coaching Talks

9 Information Security Services Analysis & Design Security Strategy Security Organization Business Impact Analysis Risk Analysis ISO27001 Gap Analysis SDLC Gap Analysis Security Architecture Review Security Technology Review Implementation Security (Management) Processes ISO27001 Consulting SDLC Consulting Continuous Jour-Fixe Vulnerability Management Service Lastline (APT Protection) ISControlPoint (ISMS Support) Incident Response Improvement Audit Penetration Testing Source Code Analysis Control Review Security Awareness Trainings Security Measures Maturity Level Improvement

10 Software Engineering Consulting Implementation Research Development Life Cycle Architecture Development Concepts System Migration Secure Software Development SharePoint Development (.Net & Java) SQL Analytics / Reporting Mobile Applications Support/Automization/Scripting Prototypes Algorithms Machine Learning Community Versions (ISContolPoint) Evaluations Training Coaching Speeches & Talks

11 Partner und Kunden Government: Financial Institutions:

12 Partner und Kunden

13 Forschungskooperation

14 Auftragsforschung Innovationsscheck (PLUS) Feasibility Studie Basisprogramm Einzelprojekt Competence Headquarters

15 Forschungsprojekte Kooperative Forschungsprojekte im Rahmen von nationalen und internationalen Ausschreibungen FFG: IKT der Zukunft, Produktion der Zukunft, Mobilität der Zukunft, Energieforschung KIRAS: Nationale Sicherheitsforschung H2020: Europäische Forschungsprojekte

16 sbaprime

17 Leistungsüberblick Quartalsweise Events Regelmäßige Informationsupdates Zwei Kurse pro Jahr Analystengespräch Evaluierte Security-Lösungen Entwicklungen aus dem Forschungsumfeld ohne zusätzliche Lizenzkosten

18 SBA Accelerator Programm

19 Strategische Ziele Unterstützung von Gründern, die Lösungen im Informationssicherheitsumfeld entwicklen Förderung von Europäischen Security Lösungen & Forschung Fokussierung auf die DACH Region & angrenzende Länder

20 3 Phasen 1. Security Ideen Wettbewerb 2. Forschung & Entwicklung 3. Business Development & Support

21 Timeline Start des Wettbewerbs: Ende Mai 2015 Einreichungen bis: 1. Oktober Ideen/Start-Ups bekommen die Möglichkeit zu einem 1-wöchigen Workshop in Wien im Oktober Jurysitzung & Ergebnisse: Ende Oktober

22 Daniela Friedl SBA Research ggmbh Favoritenstraße 16, 1040 Wien

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)

More information

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R. EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research

More information

Observa(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems

Observa(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems 17/03/15 Advanced Persistent Threats & Social Engineering SBA Research & Vienna University of Technology Edgar R. Weippl Observa(on & Empirical Research Observa(on of complex systems 1 Impact Real- World

More information

Cloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl

Cloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl Cloud Security and Mobile Application Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security but no

More information

Organizational Details Summer 2015

Organizational Details Summer 2015 Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research Cooperation for all security

More information

3 rd Young Researcher s Day 2013

3 rd Young Researcher s Day 2013 Einladung zum 3 rd Young Researcher s Day 2013 Nach zwei erfolgreichen Young Researcher s Days starten wir kurz vor dem Sommer in Runde drei. Frau Ingrid Schaumüller-Bichl und Herr Edgar Weippl laden ganz

More information

Big Data & Security. Edgar Weippl SBA Research

Big Data & Security. Edgar Weippl SBA Research Big Data & Security Edgar Weippl SBA Research Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability

More information

Cloud Security and Mobile Applica4on Security

Cloud Security and Mobile Applica4on Security 2/22/13 Cloud Security and Mobile Applica4on Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security

More information

Spoiled Onions: Exposing Malicious Tor Exit Relays

Spoiled Onions: Exposing Malicious Tor Exit Relays Spoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl Outline This talk is about: Detecting

More information

COSMOS events, activities and trainings in Austria, BM:UKK

COSMOS events, activities and trainings in Austria, BM:UKK This is a summary of events, activities and trainings in Austria. By: Jutta Jerlich, Elisabeth Zistler, Christian Reimers, Thomas Lebzelter The following summary is listed according to the date of the

More information

Model-based analysis of market integration and congestion in the

Model-based analysis of market integration and congestion in the Energiewirtschaftliches Institut an der Universität zu Köln Model-based analysis of market integration and congestion in the European gas market Stefan Lochner, Caroline Dieckhöner, Dietmar Lindenberger

More information

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft.

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft. Cloud OS Network Die Bedeutung einer Partner Managed Cloud für Kunden. Uwe Lüthy, Partner Technology Strategiest uwelu@microsoft.com Die Cloud Opportunity Definition von Buzzwords Cloud OS Strategie Wichtig

More information

Place photo here Executive Customer Briefing

Place photo here Executive Customer Briefing Place photo here Executive Customer Briefing Walldorf, 06. Mai 2013 Agenda Uhrzeit Thema Referent 09:00 Begrüßung & Vorstellung Peter Rupp, IBM IBM SAP Strategische Allianz und Partnerschaft Erwartungen

More information

Vertrauen in Cloud Dienste schaffen

Vertrauen in Cloud Dienste schaffen Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com

More information

AppInspect: Large-scale Evaluation of Social Networking Apps

AppInspect: Large-scale Evaluation of Social Networking Apps AppInspect: Large-scale Evaluation of Social Networking Apps ACM COSN, Boston, 10/08/2013 Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl mhuber[at]sba-research[dot]org Main Contributions

More information

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl

More information

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl

More information

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Institute of Energy Economics at the University of Cologne Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Stefan Lochner Project Proposal

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Produktfamilienentwicklung

Produktfamilienentwicklung Produktfamilienentwicklung Bericht über die ITEA-Projekte ESAPS, CAFÉ und Families Günter Böckle Siemens CT SE 3 Motivation Drei große ITEA Projekte über Produktfamilien- Engineering: ESAPS (1.7.99 30.6.01),

More information

Introduction to Business Informatics

Introduction to Business Informatics Introduction to Business Informatics Wirtschaftsinformatik = Business Informatics Gerti Kappel Business Informatics Group Institute of Software Technology and Interactive Systems Vienna University of Technology

More information

Other activities. Research interests. Publications. Refereed journals. Chapters in books

Other activities. Research interests. Publications. Refereed journals. Chapters in books Curriculum Vitae Klaus NOWOTNY University of Salzburg Residenzplatz 9 A-5010 Salzburg Austria Tel.: +43 (662) 8044-3722 Fax: +43 (662) 8044-623 E-mail: Klaus.Nowotny@sbg.ac.at Current positions Since 03/2012:

More information

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner: 1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit

More information

Curriculum Vitae. Contact details. Current positions. Personal. Education and qualications

Curriculum Vitae. Contact details. Current positions. Personal. Education and qualications Curriculum Vitae Contact details Klaus NOWOTNY University of Salzburg Residenzplatz 9 A-5010 Salzburg Austria Tel.: +43 (662) 8044-3722 Fax: +43 (662) 8044-623 E-mail: Klaus.Nowotny@sbg.ac.at Current positions

More information

Cloud Computing Architecture and Forensic Investigation Challenges

Cloud Computing Architecture and Forensic Investigation Challenges Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional

More information

How To Write An Article For Ibm.Com

How To Write An Article For Ibm.Com Reinventing business operations with Smarter Process Dr. Stefan Kollakowski IBM Partner & Leader Smarter Process DACH BPM ist mehr als eine Technologie - BPM ist ein Managementkonzept zur prozessorientierten

More information

Big Data-Anwendungsbeispiele aus Industrie und Forschung

Big Data-Anwendungsbeispiele aus Industrie und Forschung Big Data-Anwendungsbeispiele aus Industrie und Forschung Dr. Patrick Traxler +43 7236 3343 898 Patrick.traxler@scch.at www.scch.at Das SCCH ist eine Initiative der Das SCCH befindet sich im Organizational

More information

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Talking to you. FH-Prof. Dipl.-Ing. Dr. techn. Udo TRAUSSNIGG CAMPUS 02 Fachhochschule der Wirtschaft, Graz, Austria

Talking to you. FH-Prof. Dipl.-Ing. Dr. techn. Udo TRAUSSNIGG CAMPUS 02 Fachhochschule der Wirtschaft, Graz, Austria Talking to you FH-Prof. Dipl.-Ing. Dr. techn. Udo TRAUSSNIGG CAMPUS 02 Fachhochschule der Wirtschaft, Graz, Austria Head of Bachelor Degree Program Automation Technology Head of Master Degree Program Automation

More information

Security Protocols and Infrastructures. Chapter 0: Formalities and Contents

Security Protocols and Infrastructures. Chapter 0: Formalities and Contents Nicolas Buchmann (Harald Baier) and Contents / Winter Term 2014/2015 1/20 Security Protocols and Infrastructures Chapter 0: and Contents Nicolas Buchmann (Harald Baier) Hochschule Darmstadt, CASED Winter

More information

Innovations for Flexible and Sustainable. Supply Chains. 11 th meeting of the European Section MIT Forum Supply Chain Innovation

Innovations for Flexible and Sustainable. Supply Chains. 11 th meeting of the European Section MIT Forum Supply Chain Innovation 11 th meeting of the European Section MIT Forum Supply Chain Innovation Innovations for Flexible and Sustainable 20.09.2011 16:00 22:00 21.09.2011 09:00 16:15 Festsaal Augasse 2, 1090 Vienna Take the chance

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

How To Research Security And Privacy Using Data Science

How To Research Security And Privacy Using Data Science Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline

More information

Zielgruppe Dieses Training eignet sich für System Engineers und an SCCM- Administratoren.

Zielgruppe Dieses Training eignet sich für System Engineers und an SCCM- Administratoren. Deploying System Center 2012 Configuration Manager - SCCM MOC 10748 In dieser Schulung lernen Sie die Planung und Bereitstellung einer System Center 2012 Configuration Manager-Hierarchie, einschließlich

More information

Leveraging User Interactions for In-Depth Testing of Web Applications

Leveraging User Interactions for In-Depth Testing of Web Applications Leveraging User Interactions for In-Depth Testing of Web Applications Sean Mc Allister, Technical University Vienna (sean@iseclab.org) Christopher Kruegel, University California, Santa Barbara (chris@iseclab.org)

More information

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL MUK-IT 63. Roundtable Herzlich Willkommen bei der Software AG Anton Hofmeier VP Sales Terracotta DACH / MdGL Überblick February 15, 2013 2 Software AG www.softwareag.com 5.500 Mitarbeiter >1Mrd Umsatz

More information

10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes

10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes November 19, 2015 10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes Knowledge of the needs Requirements from the Business / Users Challenges within IT s Capabilities

More information

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Service Engineering, Business Process Management and Design

Service Engineering, Business Process Management and Design 7 th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE Baia Mare, Romania, May 17-18, 2007 ISSN-1224-3264 BUSINESS PROCESS MANAGEMENT SOFTWARE IN THE FIELD OF SERVICE ENGINEERING Helmut, Aschbacher DI (FH), university

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233 Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft

More information

Analytics To Go: Mobile BI. Mike Schiebel / Business Analytics Center of Excellence (CoE) SAP Switzerland June, 2013

Analytics To Go: Mobile BI. Mike Schiebel / Business Analytics Center of Excellence (CoE) SAP Switzerland June, 2013 Analytics To Go: Mobile BI Mike Schiebel / Business Analytics Center of Excellence (CoE) SAP Switzerland June, 2013 Agenda Trends & Benefits Mobile Analytics Suite from SAP SAP BusinessObjects Mobile Security

More information

Übersetzerbau in der Industrie: CacaoVM

Übersetzerbau in der Industrie: CacaoVM work-items with acceptance criteria Übersetzerbau in der Industrie: CacaoVM Michael Starzinger Theobroma Systems Design und Consulting GmbH Gutheil-Schoder Gasse 17, 1230 Wien, Austria www.-.com 1 Agenda

More information

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect

More information

Advanced Internet Security

Advanced Internet Security Advanced Internet Security (aka InetSec 2) 183.222 Lecturers Adrian Dabrowski Markus Kammerstetter Georg Merzdoznik Stefan Riegler Challenge Gurus Felix Winter Administrative Issues Mode Weekly lectures

More information

Smart grid security analysis

Smart grid security analysis Smart grid security analysis Paul Smith et al. paul.smith@ait.ac.at SPARKS Stakeholder Workshop 20 th May, 2014, Graz SPARKS Objectives The SPARKS project has three main objectives regarding security analysis:

More information

Study on multimedial work in journalism (Feb. 2005) EU-project TRIMEDIAL Author: Dr. Stefan Weber. 1. Description of the actual demand in Austria

Study on multimedial work in journalism (Feb. 2005) EU-project TRIMEDIAL Author: Dr. Stefan Weber. 1. Description of the actual demand in Austria 1 Study on multimedial work in journalism (Feb. 25) EU-project TRIMEDIAL Author: Dr. Stefan Weber 1. Description of the actual demand in Austria The main empirically proven tendency in Austria is a trend

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Formal Methods and the Internet of Things

Formal Methods and the Internet of Things Formal Methods and the Internet of Things Definition of an Internet-of-Things-Platform and its reference implementation in conjunction with an exemplary usage of Formal Methods. Bachelor thesis Heinrich

More information

Reif für die Insel? Multi-Channel-Marketing in einer digitalen Ökonomie andreas.helios@adobe.com

Reif für die Insel? Multi-Channel-Marketing in einer digitalen Ökonomie andreas.helios@adobe.com Reif für die Insel? Multi-Channel-Marketing in einer digitalen Ökonomie andreas.helios@adobe.com Sonntag Abend, 13.07.2014, 0:30 Uhr Multi-Channel-Marketing Brauch ich das? Umsatz Gewinn Source: Cap Gemini

More information

Groups Inside FHNW: Why it s not just another AAI SP

Groups Inside FHNW: Why it s not just another AAI SP Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple

More information

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

exceet Secure Solutions Smart & Secure Network From Vision to Reality

exceet Secure Solutions Smart & Secure Network From Vision to Reality exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Die Schweiz als aktiver und kompetenter Partner in der Sicherheitsforschung

Die Schweiz als aktiver und kompetenter Partner in der Sicherheitsforschung Die Schweiz als aktiver und kompetenter Partner in der Sicherheitsforschung Dr Nicole Wyss National Contact Point Security & Transport Euresearch nicole.wyss@euresearch.ch +41 31 380 60 04 Agenda Die schweizer

More information

DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software

DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING SEPTEMBER 2015 Wir verkaufen nur Original-Microsoft

More information

Secure Data Transmission Technique for iphone using Quick Response (QR) Code

Secure Data Transmission Technique for iphone using Quick Response (QR) Code Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015

More information

Embedded Software Development and Test in 2011 using a mini- HIL approach

Embedded Software Development and Test in 2011 using a mini- HIL approach Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des

More information

Molecular Biotechnology Master s Degree Program

Molecular Biotechnology Master s Degree Program > APPLIED LIFE SCIENCES Master s Degree Program: > FULL TIME Molecular Biotechnology Master s Degree Program www.fh-campuswien.ac.at My Occupational Future. Your Career Opportunities Biotechnology is one

More information

Servermigrationen zu Hyper-V / Azure mit Double-Take Move

Servermigrationen zu Hyper-V / Azure mit Double-Take Move Servermigrationen zu Hyper-V / Azure mit Double-Take Move Agenda Über Vision Solutions Double-Take Move Live Demos Lizenzierung Über Vision Solutions HQ in Irvine, Kalifornien 25+ Jahre Erfahrung im HA/DR

More information

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to

More information

Open Data Open Government

Open Data Open Government Open Data Open Government Perspective of the Austrian federal level Prague public sector open data meeting Parliament of the Czech Republic, Chamber of Deputies 28th February 2012 Austrian Federal Chancellery

More information

Developing a game to deal with shadow IT

Developing a game to deal with shadow IT Skill 2015 Developing a game to deal with shadow IT Theory, Prototyping, Testing. Markus Bless HTWG Konstanz Agenda Shadow IT Learning through playing The game Testing the game Q&A (3 slides) (1 slide)

More information

Big Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed

More information

Kapitel 2 Unternehmensarchitektur III

Kapitel 2 Unternehmensarchitektur III Kapitel 2 Unternehmensarchitektur III Software Architecture, Quality, and Testing FS 2015 Prof. Dr. Jana Köhler jana.koehler@hslu.ch IT Strategie Entwicklung "Foundation for Execution" "Because experts

More information

Business, Institute for Social Policy. Institute for Social Policy Welthandelsplatz.1 1020 Vienna Tel: +43-1-31336-4189 Helene.Dearing@wu.ac.

Business, Institute for Social Policy. Institute for Social Policy Welthandelsplatz.1 1020 Vienna Tel: +43-1-31336-4189 Helene.Dearing@wu.ac. CURRICULUM VITAE Helene Dearing Mag.rer.soc.oec. April 2015 PRESENT POSITION Research Assistant at the Vienna University of Economics and Business, Institute for Social Policy CONTACT Helene Dearing Institute

More information

Symantec Managed Security Services The Power To Protect

Symantec Managed Security Services The Power To Protect Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

AnyWeb AG 2008 www.anyweb.ch

AnyWeb AG 2008 www.anyweb.ch HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look

More information

(A) DESNET (DEmand & Supply NETwork) Identification. Identification

(A) DESNET (DEmand & Supply NETwork) Identification. Identification V-LAB-Instruction Ver 4.0.doc (A) DESNET (DEmand & Supply NETwork) Identification Name RPD-Tech 2 Address Web site E - mail Coachulting, Johanniterstrasse 36, D-73207 Plochingen www.coachulting.de info@coachulting.de

More information

CURRICULUM VITAE. http://marketing.univie.ac.at/mitarbeiter0/garaus/

CURRICULUM VITAE. http://marketing.univie.ac.at/mitarbeiter0/garaus/ CURRICULUM VITAE PERSONAL DATA Name Mag. Marion Garaus (PhD) Date of birth 16.11.1983 Nationality Austria, Vienna E-Mail marion.garaus@univie.ac.at Website MAIN RESEARCH AREAS http://marketing.univie.ac.at/mitarbeiter0/garaus/

More information

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact What we do Cashless payment in the form of card transactions has become an indispensable part of point-of-sale

More information

Product Quality and Environmental Standards: The Effect of an International Environmental Agreement on Tropical Timber Trade

Product Quality and Environmental Standards: The Effect of an International Environmental Agreement on Tropical Timber Trade Please scroll down for the English version Sehr geehrte Abonnentinnen und Abonnenten, wir freuen uns, Sie per Newsletter über die neuesten Entwicklungen des FIW-Projekts informieren zu dürfen. Dieses Mal

More information

SharePoint Community Tools fürs Web 2.0

SharePoint Community Tools fürs Web 2.0 SharePoint Convention 2009 SharePoint Community Tools fürs Web 2.0 Michael Greth mg@sharepointcommunity.de Michael Greth Trainer, Consultant für SharePoint Microsoft MVP für Office SharePoint Server SharePointCommunity.de

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SOLUTION BRIEF. Next Generation APT Defense for Healthcare SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their

More information

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

ICT-based Solutions for (Self-)Management of Daily Life Activities of Older Adults at Home

ICT-based Solutions for (Self-)Management of Daily Life Activities of Older Adults at Home ICT-based Solutions for (Self-)Management of Daily Life Activities of Older Adults at Home Dr Gerda Geyer Chair of the Task Force for Call 5 Preparation Transnationaler Infoday, Innsbruck 5. März 2012

More information

UNIVERSITÄTSBIBLIOTHEK

UNIVERSITÄTSBIBLIOTHEK UNIVERSITÄTSBLIOTHEK Zeitschriften im Abonnement Fach: Informatik : Elektronische Zeitschriften finden Sie in der Elektronischen Zeitschriftenbibliothek EZB. Standort : Bereichsbibliothek Informatik Standort

More information

Smartphone applications Common Criteria is going Mobile ICCC2012 Paris

Smartphone applications Common Criteria is going Mobile ICCC2012 Paris Dr. Jens Oberender SRC Security Research & Consulting GmbH Smartphone applications ICCC2012 Paris How to CC-evaluate smartphone apps? Agenda Specify Security Target TOE scope Application specific SFRs

More information

HAT SOFTWARE AUS DER SCHWEIZ NOCH EINE CHANCE? MIT ROUNDTABLE-DISKUSSION

HAT SOFTWARE AUS DER SCHWEIZ NOCH EINE CHANCE? MIT ROUNDTABLE-DISKUSSION MO. 24. NOV. 2004, 17:00 UHR SOFTWARE DEVELOPMENT ON-SHORE & OFF-SHORE IT-PROJEKTE IM GLOBALISIERTEN MARKT: HAT SOFTWARE AUS DER SCHWEIZ NOCH EINE CHANCE? Copyright 2002, TKS, TKS, TKS-TEKNOSOFT are registered

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Cisco ASA und FirePOWER Services

Cisco ASA und FirePOWER Services Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle

More information

Does Swiss IT Matter?

Does Swiss IT Matter? Does Swiss IT Matter? Perspektiven des Informatikstandorts Schweiz Eine Fachtagung der Java User Group Schweiz und der Credit Suisse im Rahmen der informatica08 Montag, 29. September 2008 im Forum St.

More information

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,

More information

Cisco Master Security Specialization Practice Areas Summary. June 2015

Cisco Master Security Specialization Practice Areas Summary. June 2015 Cisco Master Security Specialization Practice Areas Summary June 2015 New Master Security Model Prerequisites Advanced Security Architecture Specialization (ASAS) (1) CCIE Security (1) CCNP Security (1)

More information

Ayla Networks, Inc. SOC 3 SysTrust 2015

Ayla Networks, Inc. SOC 3 SysTrust 2015 Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2

More information

Cyber Security Threats: What s Next and How Do We Reduce the Risks?

Cyber Security Threats: What s Next and How Do We Reduce the Risks? Cyber Security Threats: What s Next and How Do We Reduce the Risks? Agenda Cyber Security: A necessity! What threats exist today? What does the future hold? How do we reduce the risks? Key for Risk Reduction

More information

Doctoral research assistant and lecturer in International Relations.

Doctoral research assistant and lecturer in International Relations. Moritz Weiß, Ph.D. Ludwig Maximilians University (LMU) Munich Geschwister Scholl Institute of Political Science Oettingenstr. 67, 80538 Munich E Mail: moritz.weiss@gsi.lmu.de Born on 30 April, 1977 in

More information

Cloud Infrastructure Security Management

Cloud Infrastructure Security Management www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your

More information