Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium
|
|
- Warren Clarke
- 8 years ago
- Views:
Transcription
1 preliminary Conference Programme Day 1 Tuesday 22 nd October Registration open, morning coffee Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is), Coffee Break Opening Plenary Keynotes. Troels Ørting, Head of European Cybercrime Centre (EC3), Europol, Belgium The European Cyber-Security Strategy and the role for the new European Cybercrime Centre Mayank Upadhyay, Principal Engineer, Google, USA Cyber Security: Human Factors and Authentication Tools John Lyons, Chief Executive, International Cyber Security Protection Alliance The Global Cyber-Security Activities, CISPA and why the Cooperation between EU-US is important? Keynote (Main Conference Sponsor) Opening Panel: Cybersecurity in Europe the Next Steps Lunch Steve Purser, Head of Operations, ENISA, Greece CERT-EU (tbc) Michael Hange, President, BSI Cybersecurity Alliance, Electrabel (tbc) EU Regulation on eid and esignature Roger Dean, Executive Director, EEMA, UK Trust Services and Cloud Security Erik R. van Zuuren, Director, Deloitte, Belgium Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium Aim and Progress of the Legislative Process Paul Timmers, Director, DG CNECT (tbc) DRM for HTML5 - Combining DRM with Document Encryption Bruno Quint, Managing Director, Corisecio, Don't ask what you can do for your Security, but ask what your Security can do for you- Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain B: This presentation is featured within your ISSE 2013 proceedings 1/5
2 Implementation: Single European Market for eidentity Kim Nguyen, Managing Director D-Trust GmbH, Chief Scientist Security, Bundesdruckerei, Draft of a Dynamic Malware Detection System on Trustworthy Endpoints Bridging the Gap - Consumerization in a Regulated Ecosystem Andreas Speier, Research Nader Henein, Director, Advisory Assistant, Institute for Internet Division, Product Security, Security, Westphalian University BlackBerry, UK of Applied Sciences Gelsenkirchen, Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain Notification Concept = Leveling of Security? Sec2: Secure Mobile Solution for Distributed Public Cloud Storages Jos Dumortier, University Andreas Philipp, Head Sales HSM, Professor - ICT Lawyer, KU Leuven, Utimaco Safeware AG, Belgium Social Media - a fictive dialogue between a Chief Marketing Officer and a Chief Security Officer Klaus Schimmer, Information Security Officer, SAP, Coffee Break Plenary Panel: Trust Services for Europe Economical, Technical and Legal Perspectives Chair: Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Andreas Weiss, Euro-Cloud(tbc) Regulation & Policies today eid & Access Management Human Factors, Privacy Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Robert Garskamp, Managing Director, IDentity.Next, Jos Dumortier, University Professor - ICT Lawyer, KU Leuven, Belgium A Practical Signature Policy Framework Jon Ølnes, Senior Advisor, Unibridge AS, Norway The Evolution of Authentication Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs, Inc., Enhancing Transparency with Distributed Privacy-Preserving Logging Roel Peeters, Post-Doctoral Researcher, KU Leuven, Belgium SSEDIC Age Verification B: This presentation is featured within your ISSE 2013 proceedings 2/5
3 Facing the Upheaval: Changing Dynamics for Security Governance in the EU Yves Le Roux, Policy Programme Lead, (ISC)2 EMEA Advisory Board, France Security Challenges of Current Federated eid Architectures Libor Neumann, ALUCID Senior Consultant, ANECT a.s., Czech Republic Data Protection and Data Security by Design Applied to Financial Intelligence Paolo Balboni, Scientific Director, European Privacy Association, Italy SSEDIC Age Verification Alternative authentication services - what do they really provide? Steve Pannifer, Head of Delivery, Consult Hyperion, UK Worldbank s Secure eid Toolkit for Africa Marc Sel, Director, PwC, Belgium A security taxonomy that actually facilitates protecting an industrial ICT production and how it really provides transparency Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems, Day 2 Wednesday 233 th October Keynote (Main Conference Sponsor) ENISA Plenary Panel: esignature and epayment New Landscape Chair: Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium Demosthenes Ikonomou, Senior Expert, Security Tools and Architecture Section, ENISA, Greece Philippe Pelle, Deputy Head of Company Law, Corporate Governance & Financial Crime unit, European Commission, Belgium Jordi Aguilà, IT Security Director, CaixaBank, Spain Oscar Molina, European Program Manager, Merchant Risk Council, Spain Coffee Break B: This presentation is featured within your ISSE 2013 proceedings 3/5
4 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Security Ammar Alkassar, Chairman/Board Member, Sirrix AG/TeleTrusT, Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment Claire Vishik, Trust & Security Technology & Policy Manager, Intel, UK Exploring Executive Careers in Information Security Management Peter Berlich, Head of Competence Center Information Security, Lucerne University of Applied Sciences and Arts, Switzerland Digital Forensics as a Big Data Challenge Alessandro Guarino, CEO, StudioAG, Italy Security in critical infrastructures - future precondition for operating license? Volker Burgers, Consultant, Siemens Enterprise Communications, Using trusted tags with NFC smartphones to verify the authenticity, value and ownership of physical items with confidence Philip Hoyer, Director Strategic Solutions, HID Global, UK Securing Communication Devices via Physical Unclonable Functions (PUFs) Nicolas Sklavos, Assistant Professor, KNOSSOSnet Research Group, Technological Educational Institute of Patras, Greece Future ID Major initiatives in international architectures for citizen access to government services, and related trusted identity schemes, focussing leveraging third party identities and credentials to include an EU, US, UK, NL panel James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Positioning Information Security roles, processes and interactions. Dimitrios Papadopoulos, Researcher, Gjovik University College, Norway Emerging Security Threats: Trends & Risks to be aware of for 2013 and beyond Leslie Horacek, IBM X-Force Threat Response Manager, IBM, Belgium Protected module architectures: a new kind of security architecture for extensible networked devices Job Noorman, Researcher, KU Leuven, Belgium Lunch Afternoon Keynote (Main Conference Sponsor) The TeleTrusT Award Presentation B: This presentation is featured within your ISSE 2013 proceedings 4/5
5 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Payment Rick Chandler, Treasurer and Board Member, EEMA, Belgium Safer Surfing Norbert Schirmer, Head of Cloud Endpoint Security and Projects, Sirrix AG, Security Compliance Monitoring - the next evolution of information security management?! A Practical Approach for an IT Security Risk Analysis in Hospitals Reiner Kraft, Researcher, Fraunhofer SIT, When does 'Abuse' of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context Secure Mobile Government and Mobile Banking Systems Based on Android Clients Milan Marković, Information Security Specialist, Banca Intesa ad Beograd, Serbia Round Table / Panel: A Personalized Identity Management Ecosystem Infrastructure: The role of intermediate Operators in a market for privacy-aware identity services offering individual choice Lefteris Leontaridis, CEO, NetSmart S.A., Greece End user panel Roger Dean, Executive Director, EEMA, UK Marko Vogel, Manager, KPMG, Murdoch Watney, Professor of Law, University of Johannesburg, South Africa Pitfalls of Vulnerability Rating & The ERNW Rapid Rating System Matthias Luft, Senior Security Analysts, ERNW GmbH, ; Michael Thumann, Senior Security Analyst, ERNW GmbH, Coffee Break Closing Plenary Please note: this programme is subject to change B: This presentation is featured within your ISSE 2013 proceedings 5/5
Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium
preliminary Conference Programme Day 1 Tuesday 22 nd October 2013 09.00 10.00 Registration and coffee 10.00 11.30 Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is), Opening
More informationWhat is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
More informationENISA workshop on Security Certification of ICT products in Europe
ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationH2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu
More informationProf. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationCYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationSecuring Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
More informationDay 1 (November 10) 09:00-10:15 10:15-11:30
Day 1 (November 10) 09:00-10:15 10:15-11:30 Registration Opening Morning Coffee Welcome and Moderation Norbert Pohlmann, Chairman/Director, TeleTrusT/if(is), Opening Keynotes Requirements on new regulations
More informationCyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationIT-Security. Perspective, History, Present and Future
IT-Security Perspective, History, Present and Future Prof. Dr. Norbert Pohlmann Chairman of the Board TeleTrusT Germany Association http://www.teletrust.de Content TeleTrusT Germany IT Security and Trustworthiness
More informationBuilding up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
More informationGraduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation
Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France
More informationAmmar Alkassar Sirrix AG Trusted Clouds: Chances for Security, Resilience and Scalability
More information
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationGeorgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
More informationTrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationRolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market
Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European
More informationCYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -
CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - SECURITY TRAINING DAYS Monday 21 September Wednesday 23 September 2015 AWARENESS DAY Wednesday, 23 September 2015 LIVE DEMONSTRATIONS, CONGRESS 1 st DAY Thursday,
More informationIt s all about Europe s future with Cloud. EUROCLOUD FORUM 2015. 6 th EuroCloud Congress Barcelona, October 7 9
It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015 6 th EuroCloud Congress Barcelona, October 7 9 EuroCloud Europe is the European umbrella organization of more than 20 national EuroCloud
More informationINFORMATION SECURITY AWARENESS & TRAINING PROGRAM
INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated
More informationA New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack
A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,
More informationSpeaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees
Speaking Notes Meeting of Chairpersons of EU Communications, Education and Transport Committees Thank you for the invitation to join you here today, on this important week in Ireland and Europe s digital
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA
More informationData Protection Compliance in the EU
Advanced Training Course Data Protection Compliance in the EU Maastricht (NL), 7-9 December 2015 European Institute of Public Administration Institut européen d administration publique Introduction Target
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationRemoving barriers to Cloud Computing in Europe Open Workshop
Removing barriers to Cloud Computing in Europe Open Workshop SMART 2011/0045 - Open workshop By David Bradshaw, Gabriella Cattaneo, Giuliana Folco, IDC Thursday May 10, 2012- Brussels Copyright IDC. Reproduction
More informationBuilding International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech
Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationDraft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on
Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationCyber Security Review
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationOnline/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
More information2015 Analyst and Advisor Summit
2015 Analyst and Advisor Summit Solutions for Government Venkatapathi Puvvada, Senior Vice President and President, Unisys Federal Systems David Leichner, Vice President, Public Sector, US & Canada Agenda
More informationRUSI Cyber Security Conference 2011 Cyber Challenges for National Security
RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,
More informationCYBER SECURITY FOUNDATION - OUTLINE
CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)
More informationCBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION
CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION THURSDAY, 2 DECEMBER MORNING PROVISIONAL AGENDA 8.30 a.m. Participant registration
More informationHow To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
More informationTrack 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security
Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.
More informationContributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study
Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Véronique Pevtschin Engineering Ingegneria Informatica S.p.A CSP Innovation Forum 2015
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationSeminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK
DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) AGENDA DAY ONE TUESDAY 27 OCTOBER 8.00 Event Registration 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationTaking down digital barriers to cross- border business
Taking down digital barriers to cross- border business HOW? Services Directive- EUGO egovernment Action Plan 2011-2015 egovernment Ministerial Declaration EU 2020-7 flagship initiatives Digital Agenda
More informationREGISTER AT IIF.COM/TRAINING
IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE
More informationImplementation: Single European Market for eidentity
Implementation: Single European Market for eidentity January 16th 2014 Berlin Dr. Kim Nguyen, Chief Scientist Security (Bundesdruckerei GmbH) & Managing Director D-TRUST GmbH Intern/Vertraulich 1 eidentity
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness
ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction:
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More information3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015
3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015 In cooperation with Program Hotel Vier Jahreszeiten Kempinski Maximilianstraße 17 80539 Munich, Germany www.gaif.de Organised by Afrika-Verein
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationAsia Pacific the Future of Cloud Computing
Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationCybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations
More informationApril 9, 2010. The International Forum "Baltic IT&T 2010: ebaltics" Dear colleagues and partners:
April 9, 2010 The International Forum "Baltic IT&T 2010: ebaltics" Dear colleagues and partners: We would like to invite you to participate in the forthcoming international Forum Baltic IT&T 2010 Forum
More informationCloud Computing in Japan: Trends and Issues. January-21-2011. NAKATA Yusaku
Cloud Computing in Japan: Trends and Issues January-21-2011 NAKATA Yusaku 0 Agenda 1. IPA Overview 2. Trend and topics on Cloud Computing 3. IPA s report on Cloud Computing (2010FY) 4. Issues on Cloud
More informationISSE/SECURE 2007 Securing Electronic Business Processes
Norbert Pohlmann Helmut Reimer Wolfgang Schneider ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference With 140 illustrations
More information8 th European Quality Conference. Draft Programme. 1 st & 2 nd October 2015 Esch-Belval, Luxembourg
8 th European Quality Conference Strengthening the capacity of public in tackling current and future challenges - Public as part of the solution 1 st & 2 nd October 2015 Esch-Belval, Luxembourg Draft Programme
More informationPrivate Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically
More informationCyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
More informationVolker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
More informationtrust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE
trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationStudents: undergraduate and graduate students who are currently enrolled in universities
DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationAn enabling volunteering infrastructure in Europe: Situation Trends Outlook
General Assembly Conference: An enabling volunteering infrastructure in Europe: Situation Trends Outlook 14-16 October 2009 Malmö, Sweden What do we mean when talking about an enabling volunteering infrastructure
More informationMARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014
MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014 CONTENT Background of European Union of Supported Employment
More informationATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
More informationTRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
More informationSYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
More informationDe-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
More informationAustralian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY?
Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY? A symposium for lawyers, forensic scientists, medical professionals and others 24 25 August 2013
More informationPrivacy in the Digital Age of Encryption and Anonymity Online
The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol
More informationCooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
More informationGSR 13. 4th Generation regulation: driving digital communications ahead
GSR 13 4th Generation regulation: driving digital communications ahead 3-5 July 2013 Hilton Warsaw Hotel Warsaw, Poland Organized by the International Telecommunication Union (ITU), in collaboration with
More informationImplementation of the Cybersecurity Executive Order
Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group
More informatione-sens Electronic Simple European Networked Services Rome, 16.10.2015
e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable
More informationParadigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage
Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Ammar Alkassar, CEO 8. Oktober 2013 It-sa Forum Rot Sirrix AG Founded in 2001 as a technology spin-off from the
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationSecure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
More informationGLOBALISATION OF TECHNOLOGY TRANSFER
Organized by TII, the Association for the Transfer of Technologies, Innovation and Industrial Information Hosted by GLOBALISATION OF TECHNOLOGY TRANSFER In collaboration with 5-10 MAY 2013 BEIJING, CHINA
More informationCYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group
1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is
More informationRegulatory Issues - Review of the Cullen International Economic System
MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective
More informationENSREG Conference Programme 2015
ENSREG Conference Programme 2015 Day 1 29 June 2015 Time Session Session Title number 8:45 9:30 Registration Suggested Moderator Topics Proposed speakers 9:30 10:30 Opening The EU approach to Nuclear Safety
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More informationDay 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationData Protection Compliance for the Public and Private Sector in the EU
Seminar Data Protection Compliance for the Public and Private Sector in the EU Maastricht (NL), 8-9 December 2014 European Institute of Public Administration Institut européen d administration publique
More informationCYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
More information