CASE STUDIES ON CYBER SECURITY
|
|
- Violet Tate
- 8 years ago
- Views:
Transcription
1 CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING
2 Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision is to establish a global innovation hub for cyber security, to accelerate new value creation, drive new venture creation and build capacity for the cyber security industry, whilst not compromising on research excellence
3
4 CSIT within the Innovation landscape SMART SBRI, KTP, Innovation Voucher CSIT - IKC TRLs EPSRC Innovate UK VCs, Angels etc. Technology Deployed, Spinouts EPSRC Responsive Mode Research CASE, PhDs Horizon 2020 Contract Development Collaborative R&D Every stage requires User/Customer insight, hence CSIT Membership, along with deep links to other Partners (Industry, SMEs, entrepreneurs, Standard Bodies, Trade Org s etc.).
5 Open Innovation Model
6 CSIT Structure CSIT PI Prof John McCanny Research Director Secure Ubiquitous Networks Research Director Device Authentication CSIT Director Research Director Autonomous Sensor Security Research Director Security Analytics Commercial Director Director of Engineering
7 Engineering Team Director of Engineering Programme Office (Admin) Principal Eng. Major Projects Principal Eng. Systems Architect Principal Eng. Cyber Security Data analytics Data analytics SDN Security Crypto H/W Decision support Network Acceleration Crypto S/W Data analytics and decision support Critical Infrastructure Decision Support Data Analytics Student Interns
8 This is what we can do Research Excellence Routes to market & Commercialisation Innovation & Engineering Lead consortia & coordinate projects
9 Case Study - LIOPA Commercialising 8 years lip biometric research at CSIT Users are moving to mobile, theft and fraud IS following $1.6 trillion worth of mobile wallet transactions by 2018 SBRI funding through recent TSB Preventing Fraud in mcommerce call Shortlisted for 25k Awards Top 10
10 Example Spin out Titan IC Systems World leading hardware for: High speed DPI Next Generation Firewall Real time traffic analytics FY ending June 15 profitable with 20 employees A number of US customers design services and licensing Titan IC traffic analysis (DPI with RXP) hardware card R&D plans with Invest NI. Total project costs approx 1M Developing high speed low cost board for DPI and big data analytics Growing to 24 staff
11 Case Study Cyberlytic Formed in 2014 with MOD call to create a tool for network situational awareness CSIT supporting product feasibility consultancy and capacity support CSIT has played a critical role in the evolution of the Cyberlytic product offering. The collaborative engagement with CSIT has enabled our product strategy to evolve at a pace that simply would not have been possible otherwise Stuart Laidlaw, CEO
12 H2020 SESAMI Security EnhancementS for Advanced Metering Infrastructure Secure Societies, DRS : Critical Infrastructure Protection topic 1: Critical Infrastructure smart grid protection and resilience resilience under smart meters threats Submitted: 27 August 2015 Co-Ordinator: QUB / CSIT Budget: 4.75M
13 Potential Future Projects ICT Work Programme 1. ICT : Smart Cyber-Physical Systems 2. ICT : Net Innovation Initiative 3. ICT : Privacy Preserving Big Data Technologies 4. EUK : 5G Next Generation Communications Networks Networks 5. EUK : IoT Joint Research Secure Societies Work Programme 1. CIP /17: Critical Infrastructure Protection 2. DS : Cyber Security for SMEs, local public administration... administration DS : Cryptography 4. DS : Advanced Cyber Security Threats & Threat Actors Cross Cutting Activities Work Programme 1. IoT : R&I on IoT integration and platform
14 e: Ln: w: Q&A
Professor John McCanny CBE FRS FREng
Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion
More informationSICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities
SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive What is SICSA? Collaboration of Scottish
More informationDigitalization of energy market and energy business. Kimmo Alkio CEO, Tieto @kalkio
Digitalization of energy market and energy business Kimmo Alkio CEO, Tieto @kalkio Tieto in the energy market an overview #1 in CRM and Billing for utilities in the Nordics with 5,3 million points of delivery
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationGlobalPlatform: Standardizing the Internet Protocol Landscape
GlobalPlatform: Standardizing the Internet Protocol Landscape Kevin Gillick Executive Director CARTES Asia: Asia-World Expo 28 March 2013 Hong Kong GP 2013 @GlobalPlatform_ www.linkedin.com/company/globalplatform
More informationCyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
More informationSoftware Defined Security Mechanisms for Critical Infrastructure Management
Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu
More informationIoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationInnovation in Electricity Networks
OPPORTUNITIES IN ENERGY SG2 Innovation in Electricity Networks physical & digital network security Contents Introduction... 1 Innovation in electricity networks... 1 The smart grid opportunity... 2 Physical
More informationJyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationR&D and Innovation funding available in Northern Ireland (summary)
Research and Information Service Briefing Paper Paper 26/12 30 January 2012 NIAR 921-11 Fergal Campbell and Aidan Stennett R&D and Innovation funding available in Northern Ireland (summary) 1 Introduction
More informationNational Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
More informationExpert Interview Series
Expert Interview Series Konk ana Khaund Principal Consultant - Energy & Environment FROST & SULLIVAN Konkana Khaund is the Principal Consultant with Frost & Sullivan s Energy & Environment Practice, North
More informationMS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
More informationINTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
More informationCyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
More informationIncluding Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
More informationHorizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationThe Challenges of Securing the Internet of Things (IoT) at Scale
The Challenges of Securing the Internet of Things (IoT) at Scale Ulf Lindqvist, Ph.D. Program Director, SRI International Chair, IEEE Computer Society s Technical Committee on Security and Privacy Vice
More informationAddressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
More informationRIBATASS Real-time Intelligent, Behavioral And Threat Analysis Security Systems
RIBATASS Real-time Intelligent, Behavioral And Threat Analysis Security Systems Introduction ICT operation which started within parent company in 1984 was spinned off to an independent company in 1992.
More informationIntel: a Thought Leader Helping IoT Scale Out
Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal
More informationCybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
More informationWilliam Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly
William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri (rkarri@poly.edu) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
More informationUK Government Information Economy Strategy
Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...
More information8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities
8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities Stefano Besseghini CEO & President Luciano Martini T&D Dept.
More informationSecurity in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
More informationEUK-02-2016: South Korea: IoT joint research
HORIZON 2020 WP 2016-17 EUK-02-2016: South Korea: IoT joint research DG CONNECT/DG AGRI/DG MOVE/DG RTD European Commission RIA EUK-02-2016: South Korea: IoT joint research Challenge: IoT has moved from
More informationCyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
More informationSome Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
More informationAerospace & the Innovation Landscape
Aerospace & the Innovation Landscape Simon Masters, Lead Technologist Aerospace, Innovate UK Glasgow University Aerospace Symposium 2015, 3 rd November 2015 We are an innovation nation The UK is built
More informationDr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS
Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS UK Energy system need for flexibility Main elements of UK energy
More informationInformation Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills
Information Economy Strategy amee s Consultation Response to the Department for Business, Innovation & Skills March 2013 amee 4th Floor, 70/74 City Road London EC1Y 2BJ 1 amee amee s mission is to provide
More informationSME support under COSME and the Enterprise Europe Netzwerk
SME support under COSME and the Enterprise Europe Netzwerk Gunnar Matthiesen European Commission - Executive Agency for Small and Medium-sized Enterprises ERRIN FINNOWATER & SME Financing Day COSME & the
More informationEntrepreneurship & Innovation in Business
Michael Farrell Director PKF-FPM ACCOUNTANTS LTD. Entrepreneurship & Innovation in Business Raising Finance for Innovative Products Format of Workshop Overview and Importance of Innovation. Cause of funding
More informationEnergy efficiency in communication networks in Horizon 2020 perspective
Energy efficiency in communication networks in Horizon 2020 perspective Pertti Jauhiainen Network Technologies European Commission DG CONNECT September 25, 2013 EU action to tackle climate change 20-20-20
More informationSecurity as Architecture A fine grained multi-tiered containment strategy
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG aszakal@us.ibm.com 2 Objectives Cybersecurity
More informationData Opportunity Action Plan October 2014
October 2014 An Action Plan within the Framework for Action for the Technology and Engineering Sector in Scotland TECHNOLOGY ADVISORY GROUP 1 INTRODUCTION The phenomenal growth in Data is a consequence
More informationWinning in the Telco Data Center
Winning in the Telco Data Center Roz Roseboro, Senior Analyst, Heavy Reading Agenda Heavy Reading intro What s happening in telco? Why is open source relevant to telco? What do telcos think about open
More informationBusiness models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru
Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply
More informationEditorial. Dear Readers. Ideal-ist consortium welcomes you to read the October 2015 edition of the project newsletter.
Your Worldwide ICT Support Network OCTOBER 2015 IN THIS ISSUE: 1 Introducing the next Idealist project Idealist2018 2 H2020-ICT-2016 3 ICT 2015 Innovate, Connect, Transform- Lisbon, 20 22 October 2015
More informationD 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive
Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationAdvancing cyber security. Cyber Security Academy
Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.
More informationConference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
More informationIndustry involvement in education and research - TCIPG
1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015 Outline History and facts TCIPG Overview and Vision
More informationCustomer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
More informationEmerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP
Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP July 25, 2014 Topics Improved 4G Communications Mobile Devices Cyber Security Threats Cyber Security Guidance
More informationNetwork Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015
Network Softwarisation An Open Development Ecosystem Telefónica I+D @ Global CTO 26-03-2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes
More informationCreating business outcomes for Building Operators with the Internet of Things
Creating business outcomes for Building Operators with the Internet of Things Vertical case studies from Dubai Siemens Building Technologies IoT World Forum 2015, Dubai siemens.com Siemens Digitalization
More informationREPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
More informationARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation
More informationEncryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE
Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A Threat Landscape
More informationNetwork Security Innovation Platform
Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationHorizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Annalisa Bogliolo DG CONNECT European Commission Warning The content of this presentation remains indicative until the
More informationGood morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationReal-Time Big Data Analytics + Internet of Things (IoT) = Value Creation
Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation January 2015 Market Insights Report Executive Summary According to a recent customer survey by Vitria, executives across the consumer,
More informationICT 6: Cloud computing
computing Jorge GASÓS Software and Services, Cloud Unit DG Connect Jorge.Gasos@ec.europa.eu Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,
More informationHead of Unit Network Technologies DG CONNECT European Commission
Building a commoneu vision for Internet of Things(IoT) Thibaut Kleiner* Head of Unit Network Technologies DG CONNECT European Commission The Internet of Things is the next digital revolution Everything
More informationTEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with
TEASER INVESTOR DECK 500k SEIS+EIS ROUND In partnership with Cyberlytic created Cyber Threat Profiler, a software solution that complements existing network security components to provide real-time risk
More informationRE: Comments on Vietnam s Draft Law on Information Security, version 2.22
July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology
More informationBYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationCritical Infrastructure in a CyberPhysicalHuman World
Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,
More informationGOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
More informationChallenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
More informationImpact of Internet of Things (IoT) on Industry and Supply Chain
Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally
More informationSome Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
More informationConnected Cities Research Program
Connected Cities Research Program Intelligent Transportation Systems Joint Program Office (ITS JPO) NSF Workshop on Smart Cities Arlington, VA, November 10, 2015 Marcia Pincus Program Manager, Environment
More informationThe Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationPragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group
Pragati Maidan, New Delhi 20-22 May, 2015 er Solutions for a Better Tomorrow Organiser www.smartcitiesindia.com Exhibitions India Group SMART Cities INDIA er Solutions for a Better Tomorrow As India s
More informationHOSTING. Managed Security Solutions. Managed Security. ECSC Solutions
Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More information5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
More informationADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationCybersecurity & Public Utility Commissions
Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer
More informationSoftware defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
More informationPOSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
More informationTechnology and the Future of Business
Technology Strategy Board Driving Innovation Digital October 2010 02 Technology Strategy Board Digital Digital Working with business to tackle digital challenges Digital technologies are now an essential
More informationO p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
More informationSimplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationSmart Cyber-Physical Systems - an essential technology for Digitising European Industry
Smart Cyber-Physical Systems - an essential technology for Digitising European Industry CPS clustering event, Vienna, 14 April 2016 Werner Steinhögl DG CONNECT A3 European Commission 1 Outline The portfolio
More informationCybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu
More informationThe Technology Impact on Economic Development
The Technology Impact on Economic Development How technology trends, innovation and globalization will affect traditional economic development agency business models The BIG technology trends Ubiquitous
More information23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
More informationFuture Cities Bristol is Open
Future Cities Bristol is Open Prof. Dimitra Simeonidou Faculty of Engineering Research showcase 2015 1 Bristol is Open The first Joint Venture between the Council & the University Why are we doing this?
More informationCyber security. Ideal logo position here
Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and
More informationDeveloping e-leadership
Developing e-leadership Delivering Skills for an Innovative and Competitive Europe IE Business School, 4 June 2014 Gabriella Cattaneo, IDC Prepared for the European Commission DG Enterprise and Industry
More informationBuilding trust in the cloud. Alastair McAulay PA Consulting Group
Building trust in the cloud overcoming the inhibitors Alastair McAulay PA Consulting Group PA Knowledge Limited 2011. 2 Introduction Introduction to Alastair McAulay 25 year s experience in the IT Services
More informationCyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
More informationICT in the FoF Contractual PPP
ICT in the FoF Contractual PPP Khalil Rouhana, Yves Paindaveine DG CONNECT, European Commission Content ICT in FoF and the EU "digitisation of industry strategy" Role of Contractual PPPs ICT in FoF: Objectives
More information