Information session April 2nd, Master 2 in Information System Security Management (ISSM)
|
|
|
- Rachel Day
- 10 years ago
- Views:
Transcription
1 Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM)
2 Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator
3 Master s team Nicolas Mayer Study director Bahija Sebane Training officer Chrystel Petiteville Training assistant
4 Other actors CLUb de la Sécurité des Systèmes d'information Luxembourgeois Portail de la sécurité de l'information du Ministère de l'economie et du Commerce extérieur Collège des Professionnels de la Sécurité de l Information Commission de Surveillance du Secteur Financier
5 Motivation Business relies on information systems The availability of these systems becomes critical The number of security incidents is growing rapidly Security management is now crucial Legal and regulatory constraints are arising Then Needs for training information security professionals and experts! Requires advanced and diverse competencies
6 Public Consultants / auditors Business owner CISO (Chief Information Security Officer) Professional people responsible for information security IT engineers, IT Managers Related Professions (Lawers, cybercops, etc.) Big companies SMEs administrations Financial sector Health sector Industries Public sector Other sectors
7 Objective Train experienced professionals to give skills of the chief information security officer (CISO)
8 The CISO (Chief Information Security Officer) Corporate Executive A job that deals with the whole organisation «Compliance» department «Risk Management» department IT department User services
9 Interdisciplinary training Legislation and regulation Security standards Security Audit Methodologies For information security Organisation Technologies For securing information and systems Enterprise management Project management Risk Management Security management
10 Program
11 Program Module 1 - Understanding organisations and management 9 ECTS Course hours Organisational theory and change 12 Architecture and business strategy 18 Financial Management 6 Project Management 12 IT Service Management 6 TOTAL 54
12 Program Module 2 Regulatory frameworks 8 ECTS Course hours Legal and regulatory aspects 18 Law enforcement 12 Special businesses and impacts 18 TOTAL 48
13 Program Module 3 Information Security Management 12 ECTS Course hours Information Security Management System ISMS 12 Risk analysis practices 6 Risk analysis and management 12 Electronic records management 12 Security Policy 12 Compliance Assurance 12 Business Continuity Management 6 TOTAL 72
14 Program Module 4 Technical aspects 12 ECTS Course hours Information Security Technologies 1 12 Information Security Technologies 2 12 Communication, information processing and persistence 1 Communication, information processing and persistence 2 Threats, attacks and controls TOTAL 72
15 Program Module 5 Human aspects 4 ECTS Course hours Human risk 12 Human communication 12 TOTAL 24
16 Program Module 6 Professional part 15 ECTS Course hours Working in information security management 6 Professional project n/a
17 ISED Information Security Education Day 2015 Theme: Understanding Data Protection challenges The ISED is an event that aims providing each year new knowledge on a hot-topic related to security and privacy. Primarily it targets the current and former students of the professional (Master en management de la sécurité des systèmes d'information). However the ISED also provides an ideal forum where academics and practitioners can learn about the different facets of a key-topic, exchange, discuss ideas, and compare experiences. Friday 22nd May 2015
18 Program = 6 modules 1 9 ECTS Understanding organisations and management 8 ECTS Regulatory frameworks ECTS Professional part 12 ECTS Information security Management ECTS Human aspects 12 ECTS Technical aspects 4
19 Schedule Understanding organisations and management Regulatory frameworks Information security Management Technical aspects Working in information security management Human aspects Professional part semester 1 semester 2 semester 3 semester 4 60 ECTS
20 1st promotion
21 Professional discussions in a good atmosphere!
22 Practical information Calendar 276 hours: academic courses In english Two academic years, in 20/25 sessions of 2 consecutive days Friday and Saturday from 9.00 a.m. to 5.30 p.m. The exact schedule is given at the beginning of each semester 4 to 6 months: professional project Place CRP Henri Tudor on Fridays Université du Luxembourg on Saturdays Fees: 4600 * including Registration at the University of Luxembourg Training fees * FEES MAY CHANGE Electronic communication tool Moodle Course start date September 18th, 2015
23 Registration 1/ Preselection application: April 24th - [email protected] Resumé + cover letter + letter from employer if possible Minimum requirement = BAC+4 level (or 3 years of experience for each missing year) and a background/experience in IT 2/ Interview: TBD 3/ Final registration online via management_de_la_securite_des_systemes_d_information_professionnel 4/ Course start date: September 18th, 2014
24 Contact Rita Giannini
Master in Accounting and Audit. Master académique
Master in Accounting and Audit Master académique " A research centered university with a personal atmosphere and multicultural flair " Students at the University of Luxembourg 2 1 " an international, dynamic
Politique de sécurité de l information Information Security Policy
Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD
Master in Mathematics
Master in Mathematics Master académique General Mathematics Financial Mathematics The numbers of left and right spirals of a sunflower are consecutive numbers of the Fibonacci sequence 0, 1, 1, 2, 3, 5,
Question: 1 Which of the following should be the FIRST step in developing an information security plan?
1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?
Academic Calendar 2015-2016
Academic Calendar 2015-2016 Fall 2015 - Full/TCAT Session August 24, 2015 - December 10, 2015 Fall 2015-1st Session August 24, 2015 - October 9, 2015 Fall 2015-2nd Session October 14, 2015 - December 10,
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
APPLICATION PROCEDURE FOR INCOMING STUDENTS
INSEEC Bordeaux Application procedure for Incoming Students 2013-2014 APPLICATION PROCEDURE FOR INCOMING STUDENTS Dear Colleagues, The application period 2013-2014 for Incoming Students wishing to study
Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer
Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG
11:30 am -12:15 pm Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG Agenda Introduction 20 Questions you should
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges
www.pwc.ru/capital-markets Guide to listing of debt on European stock exchanges 2 PwC A number of European stock exchanges have become major centres for listing debt securities. The London, Irish and Luxembourg
EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements?
Seminar EU Financial Services Law: How Financial Institutions Meet Internal Governance and Risk Management Requirements? Luxembourg, 9-10 November 2015 European Institute of Public Administration European
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
Fund Services Intelligence
Fund Services Intelligence AIF & UCITS platforms Launching or transferring your vehicle Processing risk management Providing investment management Servicing your structure We look after regulatory tasks
Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems
Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems The Research Group on QHSE Sidi Mohamed Ben Abdellah
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Cyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM. g Negotiate with confidence g Do deals that deliver g Get what YOU want
3 STAGE PUBLIC PROGRAMS PROFESSIONAL NEGOTIATION & INFLUENCING PROGRAM g Negotiate with confidence g Do deals that deliver g Get what YOU want THE ENS INTERNATIONAL PROFESSIONAL NEGOTIATION AND INFLUENCING
Records and Document Management
Records and Document Management Policy P3 Current: Updated November 2011 Table of Contents Purpose... 3 Scope... 3 Definitions... 3 Policy statement... 4 Responsibility... 4 Legislative context... 5 Associated
Table of Contents. 1. Organisation and Management (5 ECTS) 1.1. Management
Table of Contents 1. Organisation and Management (5 ECTS)...1 1.1. Management...1 1.2. Personnel Management...2 1.3. Recruitment and Selection...2 1.4. Information Management...2 1.5. Career Planning...2
Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication
Master in Public Management and Policy (PMP) Specialisation in Public Management and Economics Specialisation in Public Communication Agenda Why choose Università della Svizzera italiana () The specialisations
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Specialist Cloud Services. Acumin Cloud Security Resourcing
Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
CASS Europe MBA Healthcare Management Specialization. Program Structure. Individual Module description. Type of course unit (compulsory, optional):
CASS Europe MBA Healthcare Management Specialization Program Structure First Semester Core Modules Class Hours ECTS* Credits Fundamentals of Healthcare Management 45 6 Fundamentals of Public Health 45
Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected].
Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected] Structure of the presentation Data management: need for a clear
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Cybersecurity and the AICPA Cybersecurity Attestation Project
Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity
The Johns Hopkins University School of Medicine Calendar 2015-2016 (all dates are inclusive)
V1: 03//15 The Johns opkins University School Medicine Calendar 2015-2016 (all dates are inclusive) 2015 August 3 Monday. Instruction begins for First Year Medical and Biological Illustration Graduate
TIPA : services based on standards
JOURNEE MONDIALE DE LA NORMALISATION Les normes garantissent des changement positifs 14 octobre 2013 TIPA : services based on standards Bé[email protected] What is TIPA? TIPA: Tudor IT Assessment
TRAINING BROCHURE 2015
CHAMBER CERTIFICATION ASSESSMENT SERVICES LIMITED TRAINING BROCHURE 2015 For the last 20 years, Chamber Certification Assessment Services Limited has been providing highly professional, quality training
Privacy and Security Risk Management Framework
Owner: CISO/CIPO Version: 1.0 Release date: 2015-07-16 Next review: 2016-07 Security classification: Public Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
ISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION
M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION 2015/2016 CPA CERTIFICATION THE FUTURE IS SO BRIGHT THE CPA CREDENTIAL WHY IT S IMPORTANT CPAs are taking care of business in every industry and there
LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015
LEGAL PROFESSION (LEGAL PRACTICE MANAGEMENT COURSE) RULES 2015 S.L. 31 of 2015 Presented to Parliament pursuant to section 185 of the Legal Profession Act. Ordered by Parliament to lie upon the Table:
Call for papers. Experiential marketing applied to watchmaking
7 th Journée de Recherche sur Marketing Horloger (JRMH) (Symposium of Applied Research on Watchmaking Marketing) www.marketinghorloger.ch Call for papers The Association des Journées Internationales du
Master of Communication Studies New Media and Society in Europe
Master of Communication Studies New Media and Society in Europe A one-year programme in English focusing on one of the most dynamic sectors in Europe. Master of Communication Studies The Master of Communication
2015-2016 Academic Calendar - UNDERGRADUATE. All Other Classes Begin; Late Registration Begins. Last Day to Drop a Class without a W on Transcript;
2015-2016 Academic Calendar - UNDERGRADUATE Fall 2015 Semester Monday, August 10 Friday, August 14 Saturday, August 15 Monday, August 17 Friday, August 21 Friday, August 28 Friday, September 4 Monday,
PRACTICAL INFORMATION
International Conference ARCHITECTURAL POLICIES 2.0 Rethinking built environment policy making in Europe Luxembourg, 12-13 November 2015 Date and venue Conference ARCHITECTURAL POLICIES 2.0 - Rethinking
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Pinning and Graduation Ceremony at St. Aloysius. Fall Semester and Term B Classes End. St Francis School of Radiography Seniors Spring Semester
2015 2016 Academic Calendar Fall Session 2015 Saturday, August 15 Monday, August 31 Monday, August 31 Friday, September 4 Monday, September 7 Friday, October 9 Tuesday, October 20 Wednesday, October 21
Investment Funds. Professional Qualification in. Professional Qualification
Professional Qualification in Investment Funds Professional Qualification Luxembourg is recognized as a centre of excellence for the domiciliation and the administration of investment funds. The ever growing
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information
4 WEEK SUMMER PROGRAM - PARIS
4 WEEK SUMMER PROGRAM - PARIS Intensive French Language Course + Fashion & Luxury Goods Marketing The French Wine Business French Culture & Identity International Business and Management School - Paris
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne 77455 Marne-la-Vallée Cedex 2
200 avenue de la République 92001 Nanterre Cedex Secrétariat : Mme Bertoni Tél. : 01 40 97 73 93 Fax : 01 40 97 71 56 6-8, avenue Blaise Pascal Cité Descartes Champs-sur-Marne 77455 Marne-la-Vallée Cedex
Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities
Small and Medium Practices Permanent Task Force September 7, 2005 Request for Proposal: Development of a Guide to International Standards on Auditing for Use in Audits of Small- and Medium-sized Entities
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)
Document Hierarchy of Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Corporate Security Policy Defining Assets,
Graduate Certificate in Internal Auditing
Graduate Certificate in Internal Auditing Your gateway to a rewarding career in Internal Auditing About IIA-Australia The Institute of Internal Auditors Australia is the leading body representing internal
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority
Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority
CYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
Master Programme in Customs & Supply Chain Compliance
Delft TopTech Study load The degree covers at least 60 credits within the European Credit Transfer and Accumulation System (ECTS). One credit corresponds to 28 hours of study. The programme is offered
3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM)
3000_115 Competency Standard: Certified Practitioner in Asset Management (CPAM) Asset Management Council GENERAL Holders of this certificate will have an understanding of the contribution that they make
GENERAL COURSE INFORMATION 2013-2014
GENERAL COURSE INFORMATION 2013-2014 Welcome to Toulouse Business School MSc Program International Relations Office 1 Table of contents : Course Information... 3 MASTER 1 Semester 1 (Fall) International
RISK. Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines
August 31 September 2, 2015 Programme on Outsourcing Risk Management How to Focus on Controlling and Managing IT Vendors under RBI Guidelines Coordinator Prof Sunil Bakshi RISK National Institute of Bank
MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.
MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL
PECIAL EDUCATIONAL NEEDS NEEDS AND DISABILITIES MA ND DISABILITIES MA SPECIAL ECIAL EDUCATIONAL NEEDS AL NEEDS AND DISABILITIES S MA SPECIAL EDUCATIONAL FACULTY OF EDUCATION AND CHILDREN S SERVICES ACADEMIC
Master of Science Industrial Engineering and Operations Research
FACULTY OF ENGINEERING AND ARCHITECTURE Master of Science Industrial Engineering and Operations Research Some useful information for (new) students Prof. Stijn De Vuyst, Prof. Birger Raa Monday 22 september
South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
