CASE STUDIES ON CYBER SECURITY
|
|
|
- Violet Tate
- 10 years ago
- Views:
Transcription
1 CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING
2 Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision is to establish a global innovation hub for cyber security, to accelerate new value creation, drive new venture creation and build capacity for the cyber security industry, whilst not compromising on research excellence
3
4 CSIT within the Innovation landscape SMART SBRI, KTP, Innovation Voucher CSIT - IKC TRLs EPSRC Innovate UK VCs, Angels etc. Technology Deployed, Spinouts EPSRC Responsive Mode Research CASE, PhDs Horizon 2020 Contract Development Collaborative R&D Every stage requires User/Customer insight, hence CSIT Membership, along with deep links to other Partners (Industry, SMEs, entrepreneurs, Standard Bodies, Trade Org s etc.).
5 Open Innovation Model
6 CSIT Structure CSIT PI Prof John McCanny Research Director Secure Ubiquitous Networks Research Director Device Authentication CSIT Director Research Director Autonomous Sensor Security Research Director Security Analytics Commercial Director Director of Engineering
7 Engineering Team Director of Engineering Programme Office (Admin) Principal Eng. Major Projects Principal Eng. Systems Architect Principal Eng. Cyber Security Data analytics Data analytics SDN Security Crypto H/W Decision support Network Acceleration Crypto S/W Data analytics and decision support Critical Infrastructure Decision Support Data Analytics Student Interns
8 This is what we can do Research Excellence Routes to market & Commercialisation Innovation & Engineering Lead consortia & coordinate projects
9 Case Study - LIOPA Commercialising 8 years lip biometric research at CSIT Users are moving to mobile, theft and fraud IS following $1.6 trillion worth of mobile wallet transactions by 2018 SBRI funding through recent TSB Preventing Fraud in mcommerce call Shortlisted for 25k Awards Top 10
10 Example Spin out Titan IC Systems World leading hardware for: High speed DPI Next Generation Firewall Real time traffic analytics FY ending June 15 profitable with 20 employees A number of US customers design services and licensing Titan IC traffic analysis (DPI with RXP) hardware card R&D plans with Invest NI. Total project costs approx 1M Developing high speed low cost board for DPI and big data analytics Growing to 24 staff
11 Case Study Cyberlytic Formed in 2014 with MOD call to create a tool for network situational awareness CSIT supporting product feasibility consultancy and capacity support CSIT has played a critical role in the evolution of the Cyberlytic product offering. The collaborative engagement with CSIT has enabled our product strategy to evolve at a pace that simply would not have been possible otherwise Stuart Laidlaw, CEO
12 H2020 SESAMI Security EnhancementS for Advanced Metering Infrastructure Secure Societies, DRS : Critical Infrastructure Protection topic 1: Critical Infrastructure smart grid protection and resilience resilience under smart meters threats Submitted: 27 August 2015 Co-Ordinator: QUB / CSIT Budget: 4.75M
13 Potential Future Projects ICT Work Programme 1. ICT : Smart Cyber-Physical Systems 2. ICT : Net Innovation Initiative 3. ICT : Privacy Preserving Big Data Technologies 4. EUK : 5G Next Generation Communications Networks Networks 5. EUK : IoT Joint Research Secure Societies Work Programme 1. CIP /17: Critical Infrastructure Protection 2. DS : Cyber Security for SMEs, local public administration... administration DS : Cryptography 4. DS : Advanced Cyber Security Threats & Threat Actors Cross Cutting Activities Work Programme 1. IoT : R&I on IoT integration and platform
14 e: Ln: w: Q&A
SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities
SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive What is SICSA? Collaboration of Scottish
Digitalization of energy market and energy business. Kimmo Alkio CEO, Tieto @kalkio
Digitalization of energy market and energy business Kimmo Alkio CEO, Tieto @kalkio Tieto in the energy market an overview #1 in CRM and Billing for utilities in the Nordics with 5,3 million points of delivery
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Cyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
Software Defined Security Mechanisms for Critical Infrastructure Management
Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: [email protected]
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Innovation in Electricity Networks
OPPORTUNITIES IN ENERGY SG2 Innovation in Electricity Networks physical & digital network security Contents Introduction... 1 Innovation in electricity networks... 1 The smart grid opportunity... 2 Physical
Jyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman [email protected]
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman [email protected] Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
INTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
Cyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
Addressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
Intel: a Thought Leader Helping IoT Scale Out
Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal
Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri ([email protected]) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
UK Government Information Economy Strategy
Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...
8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities
8 October 2015 The evolution of renewable energy integration and the smart grid in Europe: The current situation, challenges and opportunities Stefano Besseghini CEO & President Luciano Martini T&D Dept.
Security in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
EUK-02-2016: South Korea: IoT joint research
HORIZON 2020 WP 2016-17 EUK-02-2016: South Korea: IoT joint research DG CONNECT/DG AGRI/DG MOVE/DG RTD European Commission RIA EUK-02-2016: South Korea: IoT joint research Challenge: IoT has moved from
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS
Dr Jonathan Radcliffe, Senior Research Fellow, and CLCF Programme Director FAPESP, 12 May, 2014 DELIVERING FLEXIBILITY IN ENERGY SYSTEMS UK Energy system need for flexibility Main elements of UK energy
SME support under COSME and the Enterprise Europe Netzwerk
SME support under COSME and the Enterprise Europe Netzwerk Gunnar Matthiesen European Commission - Executive Agency for Small and Medium-sized Enterprises ERRIN FINNOWATER & SME Financing Day COSME & the
Energy efficiency in communication networks in Horizon 2020 perspective
Energy efficiency in communication networks in Horizon 2020 perspective Pertti Jauhiainen Network Technologies European Commission DG CONNECT September 25, 2013 EU action to tackle climate change 20-20-20
Security as Architecture A fine grained multi-tiered containment strategy
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG [email protected] 2 Objectives Cybersecurity
Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru
Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply
D 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive
Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
Advancing cyber security. Cyber Security Academy
Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.
Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
Customer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
Network Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015
Network Softwarisation An Open Development Ecosystem Telefónica I+D @ Global CTO 26-03-2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes
Creating business outcomes for Building Operators with the Internet of Things
Creating business outcomes for Building Operators with the Internet of Things Vertical case studies from Dubai Siemens Building Technologies IoT World Forum 2015, Dubai siemens.com Siemens Digitalization
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group [email protected] Session Overview ARC Presentation
Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE
Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A Threat Landscape
Network Security Innovation Platform
Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Annalisa Bogliolo DG CONNECT European Commission Warning The content of this presentation remains indicative until the
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation
Real-Time Big Data Analytics + Internet of Things (IoT) = Value Creation January 2015 Market Insights Report Executive Summary According to a recent customer survey by Vitria, executives across the consumer,
ICT 6: Cloud computing
computing Jorge GASÓS Software and Services, Cloud Unit DG Connect [email protected] Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,
Head of Unit Network Technologies DG CONNECT European Commission
Building a commoneu vision for Internet of Things(IoT) Thibaut Kleiner* Head of Unit Network Technologies DG CONNECT European Commission The Internet of Things is the next digital revolution Everything
TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with
TEASER INVESTOR DECK 500k SEIS+EIS ROUND In partnership with Cyberlytic created Cyber Threat Profiler, a software solution that complements existing network security components to provide real-time risk
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
Impact of Internet of Things (IoT) on Industry and Supply Chain
Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
The Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Pragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group
Pragati Maidan, New Delhi 20-22 May, 2015 er Solutions for a Better Tomorrow Organiser www.smartcitiesindia.com Exhibitions India Group SMART Cities INDIA er Solutions for a Better Tomorrow As India s
Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC [email protected]
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC [email protected] So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Cybersecurity & Public Utility Commissions
Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
POSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
Simplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
The Technology Impact on Economic Development
The Technology Impact on Economic Development How technology trends, innovation and globalization will affect traditional economic development agency business models The BIG technology trends Ubiquitous
23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
Future Cities Bristol is Open
Future Cities Bristol is Open Prof. Dimitra Simeonidou Faculty of Engineering Research showcase 2015 1 Bristol is Open The first Joint Venture between the Council & the University Why are we doing this?
Cyber security. Ideal logo position here
Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and
Developing e-leadership
Developing e-leadership Delivering Skills for an Innovative and Competitive Europe IE Business School, 4 June 2014 Gabriella Cattaneo, IDC Prepared for the European Commission DG Enterprise and Industry
Building trust in the cloud. Alastair McAulay PA Consulting Group
Building trust in the cloud overcoming the inhibitors Alastair McAulay PA Consulting Group PA Knowledge Limited 2011. 2 Introduction Introduction to Alastair McAulay 25 year s experience in the IT Services
Cyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
ICT in the FoF Contractual PPP
ICT in the FoF Contractual PPP Khalil Rouhana, Yves Paindaveine DG CONNECT, European Commission Content ICT in FoF and the EU "digitisation of industry strategy" Role of Contractual PPPs ICT in FoF: Objectives
