CASE STUDIES ON CYBER SECURITY

Size: px
Start display at page:

Download "CASE STUDIES ON CYBER SECURITY"

Transcription

1 CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING

2 Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision is to establish a global innovation hub for cyber security, to accelerate new value creation, drive new venture creation and build capacity for the cyber security industry, whilst not compromising on research excellence

3

4 CSIT within the Innovation landscape SMART SBRI, KTP, Innovation Voucher CSIT - IKC TRLs EPSRC Innovate UK VCs, Angels etc. Technology Deployed, Spinouts EPSRC Responsive Mode Research CASE, PhDs Horizon 2020 Contract Development Collaborative R&D Every stage requires User/Customer insight, hence CSIT Membership, along with deep links to other Partners (Industry, SMEs, entrepreneurs, Standard Bodies, Trade Org s etc.).

5 Open Innovation Model

6 CSIT Structure CSIT PI Prof John McCanny Research Director Secure Ubiquitous Networks Research Director Device Authentication CSIT Director Research Director Autonomous Sensor Security Research Director Security Analytics Commercial Director Director of Engineering

7 Engineering Team Director of Engineering Programme Office (Admin) Principal Eng. Major Projects Principal Eng. Systems Architect Principal Eng. Cyber Security Data analytics Data analytics SDN Security Crypto H/W Decision support Network Acceleration Crypto S/W Data analytics and decision support Critical Infrastructure Decision Support Data Analytics Student Interns

8 This is what we can do Research Excellence Routes to market & Commercialisation Innovation & Engineering Lead consortia & coordinate projects

9 Case Study - LIOPA Commercialising 8 years lip biometric research at CSIT Users are moving to mobile, theft and fraud IS following $1.6 trillion worth of mobile wallet transactions by 2018 SBRI funding through recent TSB Preventing Fraud in mcommerce call Shortlisted for 25k Awards Top 10

10 Example Spin out Titan IC Systems World leading hardware for: High speed DPI Next Generation Firewall Real time traffic analytics FY ending June 15 profitable with 20 employees A number of US customers design services and licensing Titan IC traffic analysis (DPI with RXP) hardware card R&D plans with Invest NI. Total project costs approx 1M Developing high speed low cost board for DPI and big data analytics Growing to 24 staff

11 Case Study Cyberlytic Formed in 2014 with MOD call to create a tool for network situational awareness CSIT supporting product feasibility consultancy and capacity support CSIT has played a critical role in the evolution of the Cyberlytic product offering. The collaborative engagement with CSIT has enabled our product strategy to evolve at a pace that simply would not have been possible otherwise Stuart Laidlaw, CEO

12 H2020 SESAMI Security EnhancementS for Advanced Metering Infrastructure Secure Societies, DRS : Critical Infrastructure Protection topic 1: Critical Infrastructure smart grid protection and resilience resilience under smart meters threats Submitted: 27 August 2015 Co-Ordinator: QUB / CSIT Budget: 4.75M

13 Potential Future Projects ICT Work Programme 1. ICT : Smart Cyber-Physical Systems 2. ICT : Net Innovation Initiative 3. ICT : Privacy Preserving Big Data Technologies 4. EUK : 5G Next Generation Communications Networks Networks 5. EUK : IoT Joint Research Secure Societies Work Programme 1. CIP /17: Critical Infrastructure Protection 2. DS : Cyber Security for SMEs, local public administration... administration DS : Cryptography 4. DS : Advanced Cyber Security Threats & Threat Actors Cross Cutting Activities Work Programme 1. IoT : R&I on IoT integration and platform

14 e: Ln: w: Q&A

Professor John McCanny CBE FRS FREng

Professor John McCanny CBE FRS FREng Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion

More information

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive What is SICSA? Collaboration of Scottish

More information

Digitalization of energy market and energy business. Kimmo Alkio CEO, Tieto @kalkio

Digitalization of energy market and energy business. Kimmo Alkio CEO, Tieto @kalkio Digitalization of energy market and energy business Kimmo Alkio CEO, Tieto @kalkio Tieto in the energy market an overview #1 in CRM and Billing for utilities in the Nordics with 5,3 million points of delivery

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

GlobalPlatform: Standardizing the Internet Protocol Landscape

GlobalPlatform: Standardizing the Internet Protocol Landscape GlobalPlatform: Standardizing the Internet Protocol Landscape Kevin Gillick Executive Director CARTES Asia: Asia-World Expo 28 March 2013 Hong Kong GP 2013 @GlobalPlatform_ www.linkedin.com/company/globalplatform

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

Software Defined Security Mechanisms for Critical Infrastructure Management

Software Defined Security Mechanisms for Critical Infrastructure Management Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Innovation in Electricity Networks

Innovation in Electricity Networks OPPORTUNITIES IN ENERGY SG2 Innovation in Electricity Networks physical & digital network security Contents Introduction... 1 Innovation in electricity networks... 1 The smart grid opportunity... 2 Physical

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

R&D and Innovation funding available in Northern Ireland (summary)

R&D and Innovation funding available in Northern Ireland (summary) Research and Information Service Briefing Paper Paper 26/12 30 January 2012 NIAR 921-11 Fergal Campbell and Aidan Stennett R&D and Innovation funding available in Northern Ireland (summary) 1 Introduction

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Expert Interview Series

Expert Interview Series Expert Interview Series Konk ana Khaund Principal Consultant - Energy & Environment FROST & SULLIVAN Konkana Khaund is the Principal Consultant with Frost & Sullivan s Energy & Environment Practice, North

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

INTRODUCTION. IoT AND IP STRATEGIES

INTRODUCTION. IoT AND IP STRATEGIES INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic

More information

Cyber Security and Privacy

Cyber Security and Privacy Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of

More information

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation

More information

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of

More information

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

The Challenges of Securing the Internet of Things (IoT) at Scale

The Challenges of Securing the Internet of Things (IoT) at Scale The Challenges of Securing the Internet of Things (IoT) at Scale Ulf Lindqvist, Ph.D. Program Director, SRI International Chair, IEEE Computer Society s Technical Committee on Security and Privacy Vice

More information

Addressing Cyber Security in Oracle Utilities Applications

Addressing Cyber Security in Oracle Utilities Applications Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to

More information

RIBATASS Real-time Intelligent, Behavioral And Threat Analysis Security Systems

RIBATASS Real-time Intelligent, Behavioral And Threat Analysis Security Systems RIBATASS Real-time Intelligent, Behavioral And Threat Analysis Security Systems Introduction ICT operation which started within parent company in 1984 was spinned off to an independent company in 1992.

More information

Intel: a Thought Leader Helping IoT Scale Out

Intel: a Thought Leader Helping IoT Scale Out Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri (rkarri@poly.edu) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber

More information

UK Government Information Economy Strategy

UK Government Information Economy Strategy Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...

More information

8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities

8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities 8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities Stefano Besseghini CEO & President Luciano Martini T&D Dept.

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

EUK-02-2016: South Korea: IoT joint research

EUK-02-2016: South Korea: IoT joint research HORIZON 2020 WP 2016-17 EUK-02-2016: South Korea: IoT joint research DG CONNECT/DG AGRI/DG MOVE/DG RTD European Commission RIA EUK-02-2016: South Korea: IoT joint research Challenge: IoT has moved from

More information

Cyber Security: Confronting the Threat

Cyber Security: Confronting the Threat 09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Aerospace & the Innovation Landscape

Aerospace & the Innovation Landscape Aerospace & the Innovation Landscape Simon Masters, Lead Technologist Aerospace, Innovate UK Glasgow University Aerospace Symposium 2015, 3 rd November 2015 We are an innovation nation The UK is built

More information

Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS

Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS UK Energy system need for flexibility Main elements of UK energy

More information

Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills

Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills March 2013 amee 4th Floor, 70/74 City Road London EC1Y 2BJ 1 amee amee s mission is to provide

More information

SME support under COSME and the Enterprise Europe Netzwerk

SME support under COSME and the Enterprise Europe Netzwerk SME support under COSME and the Enterprise Europe Netzwerk Gunnar Matthiesen European Commission - Executive Agency for Small and Medium-sized Enterprises ERRIN FINNOWATER & SME Financing Day COSME & the

More information

Entrepreneurship & Innovation in Business

Entrepreneurship & Innovation in Business Michael Farrell Director PKF-FPM ACCOUNTANTS LTD. Entrepreneurship & Innovation in Business Raising Finance for Innovative Products Format of Workshop Overview and Importance of Innovation. Cause of funding

More information

Energy efficiency in communication networks in Horizon 2020 perspective

Energy efficiency in communication networks in Horizon 2020 perspective Energy efficiency in communication networks in Horizon 2020 perspective Pertti Jauhiainen Network Technologies European Commission DG CONNECT September 25, 2013 EU action to tackle climate change 20-20-20

More information

Security as Architecture A fine grained multi-tiered containment strategy

Security as Architecture A fine grained multi-tiered containment strategy 1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG aszakal@us.ibm.com 2 Objectives Cybersecurity

More information

Data Opportunity Action Plan October 2014

Data Opportunity Action Plan October 2014 October 2014 An Action Plan within the Framework for Action for the Technology and Engineering Sector in Scotland TECHNOLOGY ADVISORY GROUP 1 INTRODUCTION The phenomenal growth in Data is a consequence

More information

Winning in the Telco Data Center

Winning in the Telco Data Center Winning in the Telco Data Center Roz Roseboro, Senior Analyst, Heavy Reading Agenda Heavy Reading intro What s happening in telco? Why is open source relevant to telco? What do telcos think about open

More information

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply

More information

Editorial. Dear Readers. Ideal-ist consortium welcomes you to read the October 2015 edition of the project newsletter.

Editorial. Dear Readers. Ideal-ist consortium welcomes you to read the October 2015 edition of the project newsletter. Your Worldwide ICT Support Network OCTOBER 2015 IN THIS ISSUE: 1 Introducing the next Idealist project Idealist2018 2 H2020-ICT-2016 3 ICT 2015 Innovate, Connect, Transform- Lisbon, 20 22 October 2015

More information

D 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive

D 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Advancing cyber security. Cyber Security Academy

Advancing cyber security. Cyber Security Academy Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

Industry involvement in education and research - TCIPG

Industry involvement in education and research - TCIPG 1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015 Outline History and facts TCIPG Overview and Vision

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP July 25, 2014 Topics Improved 4G Communications Mobile Devices Cyber Security Threats Cyber Security Guidance

More information

Network Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015

Network Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015 Network Softwarisation An Open Development Ecosystem Telefónica I+D @ Global CTO 26-03-2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes

More information

Creating business outcomes for Building Operators with the Internet of Things

Creating business outcomes for Building Operators with the Internet of Things Creating business outcomes for Building Operators with the Internet of Things Vertical case studies from Dubai Siemens Building Technologies IoT World Forum 2015, Dubai siemens.com Siemens Digitalization

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation

More information

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A Threat Landscape

More information

Network Security Innovation Platform

Network Security Innovation Platform Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Annalisa Bogliolo DG CONNECT European Commission Warning The content of this presentation remains indicative until the

More information

Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.

Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation

Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation January 2015 Market Insights Report Executive Summary According to a recent customer survey by Vitria, executives across the consumer,

More information

ICT 6: Cloud computing

ICT 6: Cloud computing computing Jorge GASÓS Software and Services, Cloud Unit DG Connect Jorge.Gasos@ec.europa.eu Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,

More information

Head of Unit Network Technologies DG CONNECT European Commission

Head of Unit Network Technologies DG CONNECT European Commission Building a commoneu vision for Internet of Things(IoT) Thibaut Kleiner* Head of Unit Network Technologies DG CONNECT European Commission The Internet of Things is the next digital revolution Everything

More information

TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with

TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with TEASER INVESTOR DECK 500k SEIS+EIS ROUND In partnership with Cyberlytic created Cyber Threat Profiler, a software solution that complements existing network security components to provide real-time risk

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Critical Infrastructure in a CyberPhysicalHuman World

Critical Infrastructure in a CyberPhysicalHuman World Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,

More information

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big

More information

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single

More information

Impact of Internet of Things (IoT) on Industry and Supply Chain

Impact of Internet of Things (IoT) on Industry and Supply Chain Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

Connected Cities Research Program

Connected Cities Research Program Connected Cities Research Program Intelligent Transportation Systems Joint Program Office (ITS JPO) NSF Workshop on Smart Cities Arlington, VA, November 10, 2015 Marcia Pincus Program Manager, Environment

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Pragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group

Pragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group Pragati Maidan, New Delhi 20-22 May, 2015 er Solutions for a Better Tomorrow Organiser www.smartcitiesindia.com Exhibitions India Group SMART Cities INDIA er Solutions for a Better Tomorrow As India s

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

5G Network Infrastructure for the Future Internet

5G Network Infrastructure for the Future Internet 5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Cybersecurity & Public Utility Commissions

Cybersecurity & Public Utility Commissions Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer

More information

Software defined networking. Your path to an agile hybrid cloud network

Software defined networking. Your path to an agile hybrid cloud network Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

Technology and the Future of Business

Technology and the Future of Business Technology Strategy Board Driving Innovation Digital October 2010 02 Technology Strategy Board Digital Digital Working with business to tackle digital challenges Digital technologies are now an essential

More information

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION

More information

Simplifying IT with SDN & Virtual Application Networks

Simplifying IT with SDN & Virtual Application Networks Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation

More information

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number

More information

Smart Cyber-Physical Systems - an essential technology for Digitising European Industry

Smart Cyber-Physical Systems - an essential technology for Digitising European Industry Smart Cyber-Physical Systems - an essential technology for Digitising European Industry CPS clustering event, Vienna, 14 April 2016 Werner Steinhögl DG CONNECT A3 European Commission 1 Outline The portfolio

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

The Technology Impact on Economic Development

The Technology Impact on Economic Development The Technology Impact on Economic Development How technology trends, innovation and globalization will affect traditional economic development agency business models The BIG technology trends Ubiquitous

More information

23.9.2015. Kangas Cybersecurity strategy

23.9.2015. Kangas Cybersecurity strategy Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures

More information

Future Cities Bristol is Open

Future Cities Bristol is Open Future Cities Bristol is Open Prof. Dimitra Simeonidou Faculty of Engineering Research showcase 2015 1 Bristol is Open The first Joint Venture between the Council & the University Why are we doing this?

More information

Cyber security. Ideal logo position here

Cyber security. Ideal logo position here Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and

More information

Developing e-leadership

Developing e-leadership Developing e-leadership Delivering Skills for an Innovative and Competitive Europe IE Business School, 4 June 2014 Gabriella Cattaneo, IDC Prepared for the European Commission DG Enterprise and Industry

More information

Building trust in the cloud. Alastair McAulay PA Consulting Group

Building trust in the cloud. Alastair McAulay PA Consulting Group Building trust in the cloud overcoming the inhibitors Alastair McAulay PA Consulting Group PA Knowledge Limited 2011. 2 Introduction Introduction to Alastair McAulay 25 year s experience in the IT Services

More information

Cyber Security VTT and the Finnish Approach

Cyber Security VTT and the Finnish Approach Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies

More information

ICT in the FoF Contractual PPP

ICT in the FoF Contractual PPP ICT in the FoF Contractual PPP Khalil Rouhana, Yves Paindaveine DG CONNECT, European Commission Content ICT in FoF and the EU "digitisation of industry strategy" Role of Contractual PPPs ICT in FoF: Objectives

More information