Workshop on Collaborative Security and Privacy Technologies
|
|
|
- Hubert Marshall
- 10 years ago
- Views:
Transcription
1 Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, CSP EU FORUM 2012, 25 April 2012, Berlin
2 Trust and Society Trustworthy systems essential in society: E.g. legal code, democratic institutions, moral code, justice, identity, accountability and auditing, transparency In digital life: secure, reliable systems and services, that protect privacy, and can be trusted to deliver properly; e-identity; data protection Resulting trust strongly influences economic growth. It took generations to build our democratic values One must nurture them into the digital age.
3 Security, Privacy, Trust Interplay in the Information Society Technology & Innovation Complexity, ease of use Role of end-users Society-protecting business models End-Users & the Society Global ICT - national frontiers Economics of security Policies for privacy-respecting Trust and Identity? TRUST in ICT Networks and Services Security, privacy, identity Protection of human values Transparency, accountability Auditing and Law enforcement Policy & Regulation
4 Network Monitoring Network Traffic monitoring: a must To operate & manage network To guarantee network infrastructure security To provide citizen s safety and public interest To enforce data retention and security laws To supply research activities devised to understand and improve network dynamics Network Traffic monitoring: a threat Against users privacy Infringement of data protection laws Profiling and wiretapping abuses Even by highly reputed national operators (at least three recent scandals only in ) Measurement data misuse
5 FP7 Project : DEMONS DEMONS: Decentralised, Cooperative and Privacy Preserving Monitoring for Trustworthiness Consortium of 13 European organisations TID (ES), NEC (UK/GE), CNIT (IT), FTW (AT), Polish Telecom (PL), FT (FR), Intitut Telecom FR), ETHZ (CH), InveatTech (CZ), Singularlogic (GR), ICCS/NTUA (GR), OPTENET (ES), KYOS (CH) Duration of 30 months, from Sept Budget: 8.3 M s
6 Motivation Collector Collector Today s monitoring systems Centralized Huge amount of exported/collected data Hard/no cooperation across domains Poor flexibility in access control to monitored data (little more than Y/N) Hardly coping with - Higher link rates and traffic volumes - Networks pervasiveness & capillarity - distributed, cross-domain, threats 5
7 Vision and Overlay of in-network monitoring devices From data-gathering probes to collaborative P2P computing and filtering devices Innovation pillars In-network processing and distributed intelligence Application-tailored data reduction and protection Resilient autonomic monitoring overlay Cross-domain interworking Target Impact Scalability Privacy preservation Flexibility and resilience Cross-domain threat detection and mitigation Exchange only the information strictly necessary for a given monitoring and analysis objective 6
8 Workshop Agenda Inter-domain secure collaborative network monitoring: challenges and data protection approaches Giuseppe Bianchi, CNIT, Italy, DEMONS project Blockmon A modular high performance data analysis framework Nico dheuruse, Maurizio Dusi, NEC, Germany, DEMONS project Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos, Ioannis Sotiris, FORTH, Greece, SYSSEC NOE project Some preliminary analysis of the economics of malware kits and traffic brokers Fabio Massacci, Luca Allodi, University of Trento, Italy, SECONOMICS project Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios Lioudakis, ICCS; NTUA; Greece, DEMONS Project COFFEE BREAK Hardware acceleration enhancing network security Petr Kastovsky, INVEA-TECH, Czech Republic, DEMONS project MASSIF: A Highly Scalable Security Information and Event Management (SIEM) Ricardo Jimenez-Peris, Universidad Politecnica de Madrid, Spain, MASSIF project Architecture concept of trustworthy industrial sensor network deployments Markus Wehner, University of Applied Sciences, Dresden, Germany, TWISNET project Managed Incident Lightweight Exchange: Standards for Cross-Domain Incident Handling Brian Trammell, ETH Zurich, Switzerland, DEMONS project Conclusions CSP EU FORUM 2012, 25 April 2012, Berlin
9 Thank you! Questions? Contact: Tel: CSP EU FORUM 2012, 25 April 2012, Berlin
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF [email protected] Agenda Coordinating Attack Response
MASSIF: A Highly Scalable SIEM
MASSIF: A Highly Scalable SIEM Ricardo Jimenez-Peris Univ. Politecnica de Madrid (UPM) [email protected] DEMONS Workshop Berlin, April 25 th 2012 MASSIF in a Nutshell MASSIF aims at developing the next
Briefing note. Survey of environmental liability insurance developments
Briefing note Survey of environmental liability insurance developments June 2014 Introduction This paper responds to the consideration by the European Commission (EC) of a possible EU-wide compulsory insurance
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
H2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission [email protected]
MASSIF: A Promising Solution to Enhance Olympic Games IT Security
MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
SESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006
Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006 SESAR Christian Pusch EUROCONTROL Experimental Centre European page 1Organisation of 22 for the Safety
European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga
European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Information Services Strategy 2011-2013
Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Online/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
The internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Cyber security initiatives in European Union and Greece The role of the Regulators
Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives
FlowMon. Complete solution for network monitoring and security. INVEA-TECH [email protected]
FlowMon Complete solution for network monitoring and security INVEA-TECH [email protected] INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project
Cybercrime & Cybersecurity
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
Schengen routing or Schengen encryption?
Schengen routing or Schengen encryption? Secure communication and digital sovereignty in Europe Prof. Norbert Pohlmann Internet Key Figure System (IKS) act with the right key figure IKS performs continuous
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Overview of DG INFSO R&D on Trust & Security
Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are
Data Masking Best Practices
Data Masking Best Practices 1 Information Security Risk The risk that sensitive information becomes public 2 Information Security Risk Government systems store a huge amount of sensitive information Vital
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM)
OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012 ICT statistical report for annual monitoring (StReAM) 12 June 2013 ACRONYMS AAL: ACC: ARTEMIS: ASS: BPN: CA: CIP: CP: CSA: EEA: EPO: FP: FET: GBAORD:
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
The Legal Protection Insurance Market in Europe. October 2013
The Legal Protection Insurance Market in Europe October 2013 The Legal Protection Insurance Market in Europe October 2013 In its latest publication RIAD, the International Association of Legal Protection
Deliverable 1.2 Project Presentation
FP7-PEOPLE-2012-ITN EID Grant agreement no.: 317387 www.secentis.eu Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
Mobile Cloud Networking
Mobile Cloud Networking Outline Project overview, motivation, vision, scope Objectives, assumptions and key research issues Partner perspectives and project dimensions Architecture overview Preliminary
Social dumping and free movement: Overview of current issues from an economic point of view
Social dumping and free movement: Overview of current issues from an economic point of view Prof. dr. Jozef Pacolet & Frederic De Wispelaere Design Charles & Ray Eames - Hang it all Vitra Statistics on
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
Implementing the cooperation mechanisms of the RES directive current status and open questions
Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy
How To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Network Security Deployment Obligation and Expenditure Report
Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate
WWRF Cloud Implications to Security, Privacy, and Trust
ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
Information Security Management at the Olympics: Finding the Needle in the Haystack
Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider [email protected] Chris Van Den Abbeele Solution Manager ISRM [email protected]
GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington
GEOG 482/582 : GIS Data Management Lesson 10: Enterprise GIS Data Management Strategies Overview Learning Objective Questions: 1. What are challenges for multi-user database environments? 2. What is Enterprise
Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity
MARKET RESEARCH STORE Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity The report outlines the evolution of enterprise IT security technologies, and identifies
How To Help The European Single Market With Data And Information Technology
Connecting Europe for New Horizon European activities in the area of Big Data Márta Nagy-Rothengass DG CONNECT, Head of Unit "Data Value Chain" META-Forum 2013, 19 September 2013, Berlin OUTLINE 1. Data
INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE
TURNKEY AND CUSTOM MADE DSwiss AG Badenerstr. 281 CH 8003 Zürich Switzerland +41 (0)44 515 11 11 [email protected] www.dswiss.com Management Summary Internet data safes are web based solutions that enable
FLEXIANT. Utility Computing on Demand
FLEXIANT Utility Computing on Demand Flexiant Flexiant is a software and services company, one of the world's first public/private Cloud providers. We provide cloud infrastructure software and services
Nokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
IAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
Towards a Cloud of Public Services
Towards a Cloud of Public Services Public administrations are often organised in silos: monolithic architecture models make it difficult to re-use services for the development of new applications. What
INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES
Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General
Protecting Communication in SIEM systems
Protecting Communication in SIEM systems Valerio Formicola Università di Napoli Parthenope Winter School: Hot Topics in Secure and Dependable Computing for Critical Infrastructures SDCI 2012 January 15th
New Frontiers for Official Statistics
European Data Forum 2015 November 16-17, 2015, Luxembourg New Frontiers for Official Statistics Mariana KOTZEVA EUROSTAT, Deputy Director General Key issues 1. A dynamically changing data ecosystem 2.
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
The Pan-European In-depth Accident Investigation Network
Session 6 Improving our Understanding of Crashes Friday 23 rd November 2012 Julian Hill, Loughborough University Project co-financed by the European Commission, Directorate-General for Mobility and Transport
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering
Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures
M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication
ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States.
ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT An area without internal borders where EU citizens and non-eu nationals may move freely EU Schengen States Non-Schengen EU States IS Azores
PV GRID. Efficient Grid Integration of European PV: Project Results. Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar)
PV GRID Efficient Grid Integration of European PV: Project Results Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar) 16th September 2014 1 PV GRID Key facts An Intelligent Energy
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *
[Selezionare la data] INNOVERY GROUP COMPANY PROFILE [Digitare il sottotitolo del documento] * * INNOVERY GROUP ITALY - SPAIN MEXICO - ALBANIA Company Profile 1. BUSINESS... 3 2. MANAGEMENT... 3 3. COMPETENCE...
honeytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
IT Governance Regulatory. P.K.Patel AGM, MoF
IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation
Securing the E-Health Cloud
Securing the E-Health Cloud Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy 1st ACM International Health Informatics Symposium (IHI 2010) Arlington, Virginia, USA, 11-12 November 2010 Introduction Buzzwords
