Cyber Security @ DTU. Lars Ramkilde Knudsen



Similar documents
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Bellevue University Cybersecurity Programs & Courses

2. Cyber security research in the Netherlands

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Cyber Innovation and Research Consortium

Security and Privacy in Big Data, Blessing or Curse?

Computer Security Courses/Programs

CESG Certification of Cyber Security Training Courses

A Systems Engineering Approach to Developing Cyber Security Professionals

Security & privacy in the cloud; an easy road?

Cyber Security and Digital Forensics Training Platform

Dept. of Financial Information Security

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

CYBER SECURITY TRAINING SAFE AND SECURE

The USNA Cyber Program

Master of Science in Cyber Security and Management

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

IT Networking and Security

Center of Academic Excellence Cyber Operations Program 2013 Application

POSTGRADUATE OPEN DAY

Computer Security (EDA263 / DIT 641)

Introduction to Cyber Security / Information Security

Protecting your information

Table of Contents. Introduction. Audience. At Course Completion

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

e-code Academy Information Security Diploma Training Discerption

Human Factors in Information Security

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Introduction to Cybersecurity Overview. October 2014

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Briefing note: GCHQ Internships

Working with the FBI

Committees Date: Subject: Public Report of: For Information Summary

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Michelle Govan & Anand Philip Network & Security Engineering

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

TELE 301 Network Management. Lecture 18: Network Security

UNM Information Assurance Scholarship for Service (SFS) Program

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

Digital Forensics: Current and Future Needs

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

developing your potential Cyber Security Training

WRITTEN TESTIMONY OF

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Principles of Information Assurance Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

The FBI and the Internet

Bachelor of Information Technology (Network Security)

EIT ICT Labs MASTER SCHOOL. Specialisations

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Curriculum Vitae. Personal information. Work experience. First name / Surname Thanassis Giannetsos

External Supplier Control Requirements

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Foundations of Computer Security

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

FBI AND CYBER SECURITY

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Northrop Grumman Cybersecurity Research Consortium

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

National Initiative for Cyber Security Education

IT Networking and Security

The Protection Mission a constant endeavor

An enterprise grade information security & forensic technical team

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Small businesses: What you need to know about cyber security

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Cyber Exercises, Small and Large

Professional Services Overview

Transcription:

Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen

About me 1994 PhD in cryptography, Aarhus University 1999 Professor, University of Bergen, Norway 2001 Professor, DTU, Denmark Specialist in symmetric cryptography Design Serpent, Grøstl, Present Cryptanalysis CBCM, RMAC 2012 Co-founder of Dencrypt ApS Co-founder of ISEC, Center for Information Security, DTU 2 DTU Compute, Technical University of Denmark

What is Cyber Security? Security in cyber space What is cyber space? Cyberspace is an interactive domain made up of digital networks that is used to store, modify and communicate information. It includes the internet, but also the other information systems that support our businesses, infrastructure and services. UK Cyber Security Strategy, 2011 Crime in cyber space is cyber crime 3 DTU Compute, Technical University of Denmark

How serious is Cyber Crime? IC3 (FBI) 300K complaints with claimed loss of 781M US$ (2013) Espionage. German economy losing 53 billion yearly Denmark Cyber crime is only growing crime. CfCS, Center for Cyber Security, Defense, 2013 NC3, National Cyber Crime Center, Police, 4 DTU Compute, Technical University of Denmark

How to get Cyber Security? GCHQ 2012, 10 steps 1. Home and mobile working 2. User education & awareness 3. Incident management 4. Information risk management regime 5. Managing user privileges 6. Removable media controls 7. Monitoring 8. Secure configuration 9. Malware protection 10.Network security 5 DTU Compute, Technical University of Denmark

Cyber security education - trends Increasing relevance Great impact, affects all of us Increasing attention Students, industry and government More targets to attack, more targets to protect Pervasive computing implies pervasive security More real-world security into academic programs Ex. Real-world cryptography conference 6 DTU Compute, Technical University of Denmark

Challenges of the universities Finding qualified staff Competing resources and topics Dynamic curriculum Lack of equipment Lack of experience (e.g. forensics) Research? Innovation? 7 DTU Compute, Technical University of Denmark

Cyber Security at DTU Compute 3 sections with focus on security Language Based Technology Program and protocol analysis, model checking, access control Embedded Systems Engineering Pervasive security, wireless sensor networks, cloud computing Cryptology Design and analysis of cryptosystems. Trusted systems. Lightweight. MSc program in Cyber Security 2013 8 DTU Compute, Technical University of Denmark

Cyber Security @ DTU Prevent Detect React Reestablish Data Security Cryptology Language based security Biometrical Network security Cryptology Practical Network Security Emergency Response Security Forensics 9 DTU Compute, Technical University of Denmark

ISEC, Center for Information Security www.isec.dtu.dk Established (March 27) Collaboration between four departments at DTU Mission: Teach, research, public sector consultancy in CS Vision: Leading academic CS entity in Copenhagen 10 DTU Compute, Technical University of Denmark

Innovation - Dencrypt Spin-out from DTU Established Dec 23, 2013 with Borean Innovation Products for Cyber Protection 1 st product, Oct : voice encryption for mobile devices Patent on dynamic encryption, filed 2011 Currently 6 employees, offices in Copenhagen and Ålborg 11 DTU Compute, Technical University of Denmark

Outtro: Cyber Security in DK More education, more awareness Academic programs must be further developed Academic programs must be collaborative between industry, society, government, global academics Denmark is late compared to US, UK, Israel, UAE,.. More research, more innovation Funding to build up CS environments 12 DTU Compute, Technical University of Denmark

Thank you 13 DTU Compute, Technical University of Denmark