Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium

Size: px
Start display at page:

Download "Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium"

Transcription

1 preliminary Conference Programme Day 1 Tuesday 22 nd October Registration open, morning coffee Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is), Coffee Break Opening Plenary Keynotes. Troels Ørting, Head of European Cybercrime Centre (EC3), Europol, Belgium The European Cyber-Security Strategy and the role for the new European Cybercrime Centre Mayank Upadhyay, Principal Engineer, Google, USA Cyber Security: Human Factors and Authentication Tools John Lyons, Chief Executive, International Cyber Security Protection Alliance The Global Cyber-Security Activities, CISPA and why the Cooperation between EU-US is important? Keynote (Main Conference Sponsor) Opening Panel: Cybersecurity in Europe the Next Steps Lunch Steve Purser, Head of Operations, ENISA, Greece CERT-EU (tbc) Michael Hange, President, BSI Cybersecurity Alliance, Electrabel (tbc) EU Regulation on eid and esignature Roger Dean, Executive Director, EEMA, UK Trust Services and Cloud Security Erik R. van Zuuren, Director, Deloitte, Belgium Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium Aim and Progress of the Legislative Process Paul Timmers, Director, DG CNECT (tbc) DRM for HTML5 - Combining DRM with Document Encryption Bruno Quint, Managing Director, Corisecio, Don't ask what you can do for your Security, but ask what your Security can do for you- Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain B: This presentation is featured within your ISSE 2013 proceedings 1/5

2 Implementation: Single European Market for eidentity Kim Nguyen, Managing Director D-Trust GmbH, Chief Scientist Security, Bundesdruckerei, Draft of a Dynamic Malware Detection System on Trustworthy Endpoints Bridging the Gap - Consumerization in a Regulated Ecosystem Andreas Speier, Research Nader Henein, Director, Advisory Assistant, Institute for Internet Division, Product Security, Security, Westphalian University BlackBerry, UK of Applied Sciences Gelsenkirchen, Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain Notification Concept = Leveling of Security? Sec2: Secure Mobile Solution for Distributed Public Cloud Storages Jos Dumortier, University Andreas Philipp, Head Sales HSM, Professor - ICT Lawyer, KU Leuven, Utimaco Safeware AG, Belgium Social Media - a fictive dialogue between a Chief Marketing Officer and a Chief Security Officer Klaus Schimmer, Information Security Officer, SAP, Coffee Break Plenary Panel: Trust Services for Europe Economical, Technical and Legal Perspectives Chair: Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Andreas Weiss, Euro-Cloud(tbc) Regulation & Policies today eid & Access Management Human Factors, Privacy Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Robert Garskamp, Managing Director, IDentity.Next, Jos Dumortier, University Professor - ICT Lawyer, KU Leuven, Belgium A Practical Signature Policy Framework Jon Ølnes, Senior Advisor, Unibridge AS, Norway The Evolution of Authentication Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs, Inc., Enhancing Transparency with Distributed Privacy-Preserving Logging Roel Peeters, Post-Doctoral Researcher, KU Leuven, Belgium SSEDIC Age Verification B: This presentation is featured within your ISSE 2013 proceedings 2/5

3 Facing the Upheaval: Changing Dynamics for Security Governance in the EU Yves Le Roux, Policy Programme Lead, (ISC)2 EMEA Advisory Board, France Security Challenges of Current Federated eid Architectures Libor Neumann, ALUCID Senior Consultant, ANECT a.s., Czech Republic Data Protection and Data Security by Design Applied to Financial Intelligence Paolo Balboni, Scientific Director, European Privacy Association, Italy SSEDIC Age Verification Alternative authentication services - what do they really provide? Steve Pannifer, Head of Delivery, Consult Hyperion, UK Worldbank s Secure eid Toolkit for Africa Marc Sel, Director, PwC, Belgium A security taxonomy that actually facilitates protecting an industrial ICT production and how it really provides transparency Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems, Day 2 Wednesday 233 th October Keynote (Main Conference Sponsor) ENISA Plenary Panel: esignature and epayment New Landscape Chair: Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium Demosthenes Ikonomou, Senior Expert, Security Tools and Architecture Section, ENISA, Greece Philippe Pelle, Deputy Head of Company Law, Corporate Governance & Financial Crime unit, European Commission, Belgium Jordi Aguilà, IT Security Director, CaixaBank, Spain Oscar Molina, European Program Manager, Merchant Risk Council, Spain Coffee Break B: This presentation is featured within your ISSE 2013 proceedings 3/5

4 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Security Ammar Alkassar, Chairman/Board Member, Sirrix AG/TeleTrusT, Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment Claire Vishik, Trust & Security Technology & Policy Manager, Intel, UK Exploring Executive Careers in Information Security Management Peter Berlich, Head of Competence Center Information Security, Lucerne University of Applied Sciences and Arts, Switzerland Digital Forensics as a Big Data Challenge Alessandro Guarino, CEO, StudioAG, Italy Security in critical infrastructures - future precondition for operating license? Volker Burgers, Consultant, Siemens Enterprise Communications, Using trusted tags with NFC smartphones to verify the authenticity, value and ownership of physical items with confidence Philip Hoyer, Director Strategic Solutions, HID Global, UK Securing Communication Devices via Physical Unclonable Functions (PUFs) Nicolas Sklavos, Assistant Professor, KNOSSOSnet Research Group, Technological Educational Institute of Patras, Greece Future ID Major initiatives in international architectures for citizen access to government services, and related trusted identity schemes, focussing leveraging third party identities and credentials to include an EU, US, UK, NL panel James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Positioning Information Security roles, processes and interactions. Dimitrios Papadopoulos, Researcher, Gjovik University College, Norway Emerging Security Threats: Trends & Risks to be aware of for 2013 and beyond Leslie Horacek, IBM X-Force Threat Response Manager, IBM, Belgium Protected module architectures: a new kind of security architecture for extensible networked devices Job Noorman, Researcher, KU Leuven, Belgium Lunch Afternoon Keynote (Main Conference Sponsor) The TeleTrusT Award Presentation B: This presentation is featured within your ISSE 2013 proceedings 4/5

5 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Payment Rick Chandler, Treasurer and Board Member, EEMA, Belgium Safer Surfing Norbert Schirmer, Head of Cloud Endpoint Security and Projects, Sirrix AG, Security Compliance Monitoring - the next evolution of information security management?! A Practical Approach for an IT Security Risk Analysis in Hospitals Reiner Kraft, Researcher, Fraunhofer SIT, When does 'Abuse' of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context Secure Mobile Government and Mobile Banking Systems Based on Android Clients Milan Marković, Information Security Specialist, Banca Intesa ad Beograd, Serbia Round Table / Panel: A Personalized Identity Management Ecosystem Infrastructure: The role of intermediate Operators in a market for privacy-aware identity services offering individual choice Lefteris Leontaridis, CEO, NetSmart S.A., Greece End user panel Roger Dean, Executive Director, EEMA, UK Marko Vogel, Manager, KPMG, Murdoch Watney, Professor of Law, University of Johannesburg, South Africa Pitfalls of Vulnerability Rating & The ERNW Rapid Rating System Matthias Luft, Senior Security Analysts, ERNW GmbH, ; Michael Thumann, Senior Security Analyst, ERNW GmbH, Coffee Break Closing Plenary Please note: this programme is subject to change B: This presentation is featured within your ISSE 2013 proceedings 5/5

Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium

Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium preliminary Conference Programme Day 1 Tuesday 22 nd October 2013 09.00 10.00 Registration and coffee 10.00 11.30 Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is), Opening

More information

What is the Right Security Solution for Mobile Computing? #RSAC

What is the Right Security Solution for Mobile Computing? #RSAC SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for

More information

ENISA workshop on Security Certification of ICT products in Europe

ENISA workshop on Security Certification of ICT products in Europe ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

H2020 "Secure Societies" Work Programme Digital Security 2015

H2020 Secure Societies Work Programme Digital Security 2015 H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

CYSPA launch event - Turkey

CYSPA launch event - Turkey CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June

More information

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Securing Identities & Trust

Securing Identities & Trust Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About

More information

Day 1 (November 10) 09:00-10:15 10:15-11:30

Day 1 (November 10) 09:00-10:15 10:15-11:30 Day 1 (November 10) 09:00-10:15 10:15-11:30 Registration Opening Morning Coffee Welcome and Moderation Norbert Pohlmann, Chairman/Director, TeleTrusT/if(is), Opening Keynotes Requirements on new regulations

More information

Cyber Security and Privacy

Cyber Security and Privacy Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

IT-Security. Perspective, History, Present and Future

IT-Security. Perspective, History, Present and Future IT-Security Perspective, History, Present and Future Prof. Dr. Norbert Pohlmann Chairman of the Board TeleTrusT Germany Association http://www.teletrust.de Content TeleTrusT Germany IT Security and Trustworthiness

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

TrustedX: eidas Platform

TrustedX: eidas Platform TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market

Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European

More information

CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -

CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - SECURITY TRAINING DAYS Monday 21 September Wednesday 23 September 2015 AWARENESS DAY Wednesday, 23 September 2015 LIVE DEMONSTRATIONS, CONGRESS 1 st DAY Thursday,

More information

It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015. 6 th EuroCloud Congress Barcelona, October 7 9

It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015. 6 th EuroCloud Congress Barcelona, October 7 9 It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015 6 th EuroCloud Congress Barcelona, October 7 9 EuroCloud Europe is the European umbrella organization of more than 20 national EuroCloud

More information

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees

Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees Speaking Notes Meeting of Chairpersons of EU Communications, Education and Transport Committees Thank you for the invitation to join you here today, on this important week in Ireland and Europe s digital

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA

More information

Data Protection Compliance in the EU

Data Protection Compliance in the EU Advanced Training Course Data Protection Compliance in the EU Maastricht (NL), 7-9 December 2015 European Institute of Public Administration Institut européen d administration publique Introduction Target

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Removing barriers to Cloud Computing in Europe Open Workshop

Removing barriers to Cloud Computing in Europe Open Workshop Removing barriers to Cloud Computing in Europe Open Workshop SMART 2011/0045 - Open workshop By David Bradshaw, Gabriella Cattaneo, Giuliana Folco, IDC Thursday May 10, 2012- Brussels Copyright IDC. Reproduction

More information

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Draft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on

Draft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

Cyber Security Review

Cyber Security Review ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Online/Cloud Services Trust challenges & eidentity-aspects

Online/Cloud Services Trust challenges & eidentity-aspects Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast

More information

2015 Analyst and Advisor Summit

2015 Analyst and Advisor Summit 2015 Analyst and Advisor Summit Solutions for Government Venkatapathi Puvvada, Senior Vice President and President, Unisys Federal Systems David Leichner, Vice President, Public Sector, US & Canada Agenda

More information

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,

More information

CYBER SECURITY FOUNDATION - OUTLINE

CYBER SECURITY FOUNDATION - OUTLINE CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)

More information

CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION

CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION THURSDAY, 2 DECEMBER MORNING PROVISIONAL AGENDA 8.30 a.m. Participant registration

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

Track 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security

Track 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.

More information

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Véronique Pevtschin Engineering Ingegneria Informatica S.p.A CSP Innovation Forum 2015

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK

Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) AGENDA DAY ONE TUESDAY 27 OCTOBER 8.00 Event Registration 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

Taking down digital barriers to cross- border business

Taking down digital barriers to cross- border business Taking down digital barriers to cross- border business HOW? Services Directive- EUGO egovernment Action Plan 2011-2015 egovernment Ministerial Declaration EU 2020-7 flagship initiatives Digital Agenda

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

Implementation: Single European Market for eidentity

Implementation: Single European Market for eidentity Implementation: Single European Market for eidentity January 16th 2014 Berlin Dr. Kim Nguyen, Chief Scientist Security (Bundesdruckerei GmbH) & Managing Director D-TRUST GmbH Intern/Vertraulich 1 eidentity

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction:

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

DS-05-2015: Trust eservices. The policy context: eidas Regulation

DS-05-2015: Trust eservices. The policy context: eidas Regulation DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task

More information

3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015

3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015 3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015 In cooperation with Program Hotel Vier Jahreszeiten Kempinski Maximilianstraße 17 80539 Munich, Germany www.gaif.de Organised by Afrika-Verein

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Asia Pacific the Future of Cloud Computing

Asia Pacific the Future of Cloud Computing Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations

More information

April 9, 2010. The International Forum "Baltic IT&T 2010: ebaltics" Dear colleagues and partners:

April 9, 2010. The International Forum Baltic IT&T 2010: ebaltics Dear colleagues and partners: April 9, 2010 The International Forum "Baltic IT&T 2010: ebaltics" Dear colleagues and partners: We would like to invite you to participate in the forthcoming international Forum Baltic IT&T 2010 Forum

More information

Cloud Computing in Japan: Trends and Issues. January-21-2011. NAKATA Yusaku

Cloud Computing in Japan: Trends and Issues. January-21-2011. NAKATA Yusaku Cloud Computing in Japan: Trends and Issues January-21-2011 NAKATA Yusaku 0 Agenda 1. IPA Overview 2. Trend and topics on Cloud Computing 3. IPA s report on Cloud Computing (2010FY) 4. Issues on Cloud

More information

ISSE/SECURE 2007 Securing Electronic Business Processes

ISSE/SECURE 2007 Securing Electronic Business Processes Norbert Pohlmann Helmut Reimer Wolfgang Schneider ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference With 140 illustrations

More information

8 th European Quality Conference. Draft Programme. 1 st & 2 nd October 2015 Esch-Belval, Luxembourg

8 th European Quality Conference. Draft Programme. 1 st & 2 nd October 2015 Esch-Belval, Luxembourg 8 th European Quality Conference Strengthening the capacity of public in tackling current and future challenges - Public as part of the solution 1 st & 2 nd October 2015 Esch-Belval, Luxembourg Draft Programme

More information

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015

Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC

More information

trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE

trust and confidence draw me a sheep POLICY AND REGULATION FOR EUROPE trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Students: undergraduate and graduate students who are currently enrolled in universities

Students: undergraduate and graduate students who are currently enrolled in universities DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

An enabling volunteering infrastructure in Europe: Situation Trends Outlook

An enabling volunteering infrastructure in Europe: Situation Trends Outlook General Assembly Conference: An enabling volunteering infrastructure in Europe: Situation Trends Outlook 14-16 October 2009 Malmö, Sweden What do we mean when talking about an enabling volunteering infrastructure

More information

MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014

MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014 MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014 CONTENT Background of European Union of Supported Employment

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

SYMPOSIUM PROGRAM DAY ONE

SYMPOSIUM PROGRAM DAY ONE Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY?

Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY? Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY? A symposium for lawyers, forensic scientists, medical professionals and others 24 25 August 2013

More information

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol

More information

Cooperation in Securing National Critical Infrastructure

Cooperation in Securing National Critical Infrastructure Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information

More information

GSR 13. 4th Generation regulation: driving digital communications ahead

GSR 13. 4th Generation regulation: driving digital communications ahead GSR 13 4th Generation regulation: driving digital communications ahead 3-5 July 2013 Hilton Warsaw Hotel Warsaw, Poland Organized by the International Telecommunication Union (ITU), in collaboration with

More information

Implementation of the Cybersecurity Executive Order

Implementation of the Cybersecurity Executive Order Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

More information

e-sens Electronic Simple European Networked Services Rome, 16.10.2015

e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Electronic Simple European Networked Services Rome, 16.10.2015 e-sens Goal To improve the cross-border access of - citizens - businesses to public services in Europe by provision of interoperable

More information

Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage

Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Ammar Alkassar, CEO 8. Oktober 2013 It-sa Forum Rot Sirrix AG Founded in 2001 as a technology spin-off from the

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

GLOBALISATION OF TECHNOLOGY TRANSFER

GLOBALISATION OF TECHNOLOGY TRANSFER Organized by TII, the Association for the Transfer of Technologies, Innovation and Industrial Information Hosted by GLOBALISATION OF TECHNOLOGY TRANSFER In collaboration with 5-10 MAY 2013 BEIJING, CHINA

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Regulatory Issues - Review of the Cullen International Economic System

Regulatory Issues - Review of the Cullen International Economic System MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective

More information

ENSREG Conference Programme 2015

ENSREG Conference Programme 2015 ENSREG Conference Programme 2015 Day 1 29 June 2015 Time Session Session Title number 8:45 9:30 Registration Suggested Moderator Topics Proposed speakers 9:30 10:30 Opening The EU approach to Nuclear Safety

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

Day 3-24 April 2013. Day 2-23 April 2013

Day 3-24 April 2013. Day 2-23 April 2013 Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

Data Protection Compliance for the Public and Private Sector in the EU

Data Protection Compliance for the Public and Private Sector in the EU Seminar Data Protection Compliance for the Public and Private Sector in the EU Maastricht (NL), 8-9 December 2014 European Institute of Public Administration Institut européen d administration publique

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information