Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium
|
|
|
- Warren Clarke
- 10 years ago
- Views:
Transcription
1 preliminary Conference Programme Day 1 Tuesday 22 nd October Registration open, morning coffee Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is), Coffee Break Opening Plenary Keynotes. Troels Ørting, Head of European Cybercrime Centre (EC3), Europol, Belgium The European Cyber-Security Strategy and the role for the new European Cybercrime Centre Mayank Upadhyay, Principal Engineer, Google, USA Cyber Security: Human Factors and Authentication Tools John Lyons, Chief Executive, International Cyber Security Protection Alliance The Global Cyber-Security Activities, CISPA and why the Cooperation between EU-US is important? Keynote (Main Conference Sponsor) Opening Panel: Cybersecurity in Europe the Next Steps Lunch Steve Purser, Head of Operations, ENISA, Greece CERT-EU (tbc) Michael Hange, President, BSI Cybersecurity Alliance, Electrabel (tbc) EU Regulation on eid and esignature Roger Dean, Executive Director, EEMA, UK Trust Services and Cloud Security Erik R. van Zuuren, Director, Deloitte, Belgium Human Factors, Awareness Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium Aim and Progress of the Legislative Process Paul Timmers, Director, DG CNECT (tbc) DRM for HTML5 - Combining DRM with Document Encryption Bruno Quint, Managing Director, Corisecio, Don't ask what you can do for your Security, but ask what your Security can do for you- Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain B: This presentation is featured within your ISSE 2013 proceedings 1/5
2 Implementation: Single European Market for eidentity Kim Nguyen, Managing Director D-Trust GmbH, Chief Scientist Security, Bundesdruckerei, Draft of a Dynamic Malware Detection System on Trustworthy Endpoints Bridging the Gap - Consumerization in a Regulated Ecosystem Andreas Speier, Research Nader Henein, Director, Advisory Assistant, Institute for Internet Division, Product Security, Security, Westphalian University BlackBerry, UK of Applied Sciences Gelsenkirchen, Integrating STORK Building Block for Smarter eid Access Alberto Crespo, Head of Secure Identity, Atos Spain S.A., Spain Notification Concept = Leveling of Security? Sec2: Secure Mobile Solution for Distributed Public Cloud Storages Jos Dumortier, University Andreas Philipp, Head Sales HSM, Professor - ICT Lawyer, KU Leuven, Utimaco Safeware AG, Belgium Social Media - a fictive dialogue between a Chief Marketing Officer and a Chief Security Officer Klaus Schimmer, Information Security Officer, SAP, Coffee Break Plenary Panel: Trust Services for Europe Economical, Technical and Legal Perspectives Chair: Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Andreas Weiss, Euro-Cloud(tbc) Regulation & Policies today eid & Access Management Human Factors, Privacy Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Robert Garskamp, Managing Director, IDentity.Next, Jos Dumortier, University Professor - ICT Lawyer, KU Leuven, Belgium A Practical Signature Policy Framework Jon Ølnes, Senior Advisor, Unibridge AS, Norway The Evolution of Authentication Rolf Lindemann, Senior Director Products & Technology, Nok Nok Labs, Inc., Enhancing Transparency with Distributed Privacy-Preserving Logging Roel Peeters, Post-Doctoral Researcher, KU Leuven, Belgium SSEDIC Age Verification B: This presentation is featured within your ISSE 2013 proceedings 2/5
3 Facing the Upheaval: Changing Dynamics for Security Governance in the EU Yves Le Roux, Policy Programme Lead, (ISC)2 EMEA Advisory Board, France Security Challenges of Current Federated eid Architectures Libor Neumann, ALUCID Senior Consultant, ANECT a.s., Czech Republic Data Protection and Data Security by Design Applied to Financial Intelligence Paolo Balboni, Scientific Director, European Privacy Association, Italy SSEDIC Age Verification Alternative authentication services - what do they really provide? Steve Pannifer, Head of Delivery, Consult Hyperion, UK Worldbank s Secure eid Toolkit for Africa Marc Sel, Director, PwC, Belgium A security taxonomy that actually facilitates protecting an industrial ICT production and how it really provides transparency Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems, Day 2 Wednesday 233 th October Keynote (Main Conference Sponsor) ENISA Plenary Panel: esignature and epayment New Landscape Chair: Manel Medina, Senior Risk Analysis Expert, ENISA, Greece Andrea Servida, Head of the Task Force "Legislation Team (eidas)", European Commission, Belgium Demosthenes Ikonomou, Senior Expert, Security Tools and Architecture Section, ENISA, Greece Philippe Pelle, Deputy Head of Company Law, Corporate Governance & Financial Crime unit, European Commission, Belgium Jordi Aguilà, IT Security Director, CaixaBank, Spain Oscar Molina, European Program Manager, Merchant Risk Council, Spain Coffee Break B: This presentation is featured within your ISSE 2013 proceedings 3/5
4 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Security Ammar Alkassar, Chairman/Board Member, Sirrix AG/TeleTrusT, Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment Claire Vishik, Trust & Security Technology & Policy Manager, Intel, UK Exploring Executive Careers in Information Security Management Peter Berlich, Head of Competence Center Information Security, Lucerne University of Applied Sciences and Arts, Switzerland Digital Forensics as a Big Data Challenge Alessandro Guarino, CEO, StudioAG, Italy Security in critical infrastructures - future precondition for operating license? Volker Burgers, Consultant, Siemens Enterprise Communications, Using trusted tags with NFC smartphones to verify the authenticity, value and ownership of physical items with confidence Philip Hoyer, Director Strategic Solutions, HID Global, UK Securing Communication Devices via Physical Unclonable Functions (PUFs) Nicolas Sklavos, Assistant Professor, KNOSSOSnet Research Group, Technological Educational Institute of Patras, Greece Future ID Major initiatives in international architectures for citizen access to government services, and related trusted identity schemes, focussing leveraging third party identities and credentials to include an EU, US, UK, NL panel James B.Sheire, Senior Advisor, US Department of Commerce, NIST, USA Positioning Information Security roles, processes and interactions. Dimitrios Papadopoulos, Researcher, Gjovik University College, Norway Emerging Security Threats: Trends & Risks to be aware of for 2013 and beyond Leslie Horacek, IBM X-Force Threat Response Manager, IBM, Belgium Protected module architectures: a new kind of security architecture for extensible networked devices Job Noorman, Researcher, KU Leuven, Belgium Lunch Afternoon Keynote (Main Conference Sponsor) The TeleTrusT Award Presentation B: This presentation is featured within your ISSE 2013 proceedings 4/5
5 Security Management Cybersecurity, Cybercrime, Critical Infrastructures Hasse Kristiansen, Senior Vice President, Chief Information Security Officer, Nets, Norway Mobile Payment Rick Chandler, Treasurer and Board Member, EEMA, Belgium Safer Surfing Norbert Schirmer, Head of Cloud Endpoint Security and Projects, Sirrix AG, Security Compliance Monitoring - the next evolution of information security management?! A Practical Approach for an IT Security Risk Analysis in Hospitals Reiner Kraft, Researcher, Fraunhofer SIT, When does 'Abuse' of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context Secure Mobile Government and Mobile Banking Systems Based on Android Clients Milan Marković, Information Security Specialist, Banca Intesa ad Beograd, Serbia Round Table / Panel: A Personalized Identity Management Ecosystem Infrastructure: The role of intermediate Operators in a market for privacy-aware identity services offering individual choice Lefteris Leontaridis, CEO, NetSmart S.A., Greece End user panel Roger Dean, Executive Director, EEMA, UK Marko Vogel, Manager, KPMG, Murdoch Watney, Professor of Law, University of Johannesburg, South Africa Pitfalls of Vulnerability Rating & The ERNW Rapid Rating System Matthias Luft, Senior Security Analysts, ERNW GmbH, ; Michael Thumann, Senior Security Analyst, ERNW GmbH, Coffee Break Closing Plenary Please note: this programme is subject to change B: This presentation is featured within your ISSE 2013 proceedings 5/5
What is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
ENISA workshop on Security Certification of ICT products in Europe
ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
H2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission [email protected]
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
CYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Securing Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
Cyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
IT-Security. Perspective, History, Present and Future
IT-Security Perspective, History, Present and Future Prof. Dr. Norbert Pohlmann Chairman of the Board TeleTrusT Germany Association http://www.teletrust.de Content TeleTrusT Germany IT Security and Trustworthiness
Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation
Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market
Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European
CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -
CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - SECURITY TRAINING DAYS Monday 21 September Wednesday 23 September 2015 AWARENESS DAY Wednesday, 23 September 2015 LIVE DEMONSTRATIONS, CONGRESS 1 st DAY Thursday,
It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015. 6 th EuroCloud Congress Barcelona, October 7 9
It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015 6 th EuroCloud Congress Barcelona, October 7 9 EuroCloud Europe is the European umbrella organization of more than 20 national EuroCloud
INFORMATION SECURITY AWARENESS & TRAINING PROGRAM
INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated
A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack
A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,
Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees
Speaking Notes Meeting of Chairpersons of EU Communications, Education and Transport Committees Thank you for the invitation to join you here today, on this important week in Ireland and Europe s digital
Data Protection Compliance in the EU
Advanced Training Course Data Protection Compliance in the EU Maastricht (NL), 7-9 December 2015 European Institute of Public Administration Institut européen d administration publique Introduction Target
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Cyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
Draft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on
Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
Cyber Security Review
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL
Cyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Online/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
RUSI Cyber Security Conference 2011 Cyber Challenges for National Security
RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,
CYBER SECURITY FOUNDATION - OUTLINE
CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)
CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION
CBI 2010 CONFERENCE CORPORATE BANKING AND ELECTRONIC INVOICING: THE VALUE-ADDED SERVICES FOR BUSINESS AND PUBLIC ADMINISTRATION THURSDAY, 2 DECEMBER MORNING PROVISIONAL AGENDA 8.30 a.m. Participant registration
How To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK
DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) AGENDA DAY ONE TUESDAY 27 OCTOBER 8.00 Event Registration 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
REGISTER AT IIF.COM/TRAINING
IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE
Implementation: Single European Market for eidentity
Implementation: Single European Market for eidentity January 16th 2014 Berlin Dr. Kim Nguyen, Chief Scientist Security (Bundesdruckerei GmbH) & Managing Director D-TRUST GmbH Intern/Vertraulich 1 eidentity
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness
ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction:
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
DS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015
3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015 In cooperation with Program Hotel Vier Jahreszeiten Kempinski Maximilianstraße 17 80539 Munich, Germany www.gaif.de Organised by Afrika-Verein
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Asia Pacific the Future of Cloud Computing
Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations
ISSE/SECURE 2007 Securing Electronic Business Processes
Norbert Pohlmann Helmut Reimer Wolfgang Schneider ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference With 140 illustrations
8 th European Quality Conference. Draft Programme. 1 st & 2 nd October 2015 Esch-Belval, Luxembourg
8 th European Quality Conference Strengthening the capacity of public in tackling current and future challenges - Public as part of the solution 1 st & 2 nd October 2015 Esch-Belval, Luxembourg Draft Programme
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically
Cyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Students: undergraduate and graduate students who are currently enrolled in universities
DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
An enabling volunteering infrastructure in Europe: Situation Trends Outlook
General Assembly Conference: An enabling volunteering infrastructure in Europe: Situation Trends Outlook 14-16 October 2009 Malmö, Sweden What do we mean when talking about an enabling volunteering infrastructure
MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014
MARGARET HADDOCK PRESIDENT EUROPEAN UNION FOR SUPPORTED EMPLOYMENT (EUSE) DEPUTY CHIEF EXECUTIVE THE ORCHARDVILLE SOCIETY. Brussels June 2014 CONTENT Background of European Union of Supported Employment
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
TRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
SYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY?
Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY? A symposium for lawyers, forensic scientists, medical professionals and others 24 25 August 2013
Cooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
GSR 13. 4th Generation regulation: driving digital communications ahead
GSR 13 4th Generation regulation: driving digital communications ahead 3-5 July 2013 Hilton Warsaw Hotel Warsaw, Poland Organized by the International Telecommunication Union (ITU), in collaboration with
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group
1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is
Regulatory Issues - Review of the Cullen International Economic System
MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective
ENSREG Conference Programme 2015
ENSREG Conference Programme 2015 Day 1 29 June 2015 Time Session Session Title number 8:45 9:30 Registration Suggested Moderator Topics Proposed speakers 9:30 10:30 Opening The EU approach to Nuclear Safety
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
Day 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
European Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
Data Protection Compliance for the Public and Private Sector in the EU
Seminar Data Protection Compliance for the Public and Private Sector in the EU Maastricht (NL), 8-9 December 2014 European Institute of Public Administration Institut européen d administration publique
CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
