Yuval Elovici, Prof. Director of Telekom Innovation Laboratories Head of BGU Cyber Security Labs June, 2014 The Role of the Academia in Promoting Cyber.

Slides:



Advertisements
Similar presentations
The Role of Universities in a Knowledge-Based Economy Stephen F. Mayer, PhD., P.E. The Capital Corridor June 14, 2010.
Advertisements

1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
Promoting Engineering Education and Partnership between the University, Public, and Private Sectors to Stimulate Development in Latin America and the Caribbean.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
FGDC Steering Committee June 7, 2011 Federal Geographic Data Committee Overview Ivan DeLoatch, Executive Director FGDC Secretariat, USGS.
2nd Workshop Prague 29/11/2007 WP4: Pilot action plan Region of Central Macedonia Isidoros Passas, URENIO Research Unit.
Cyber Principles November 2010 Bob Gourley. The 12 Principles of Cyber Conflict 1. Know the enemy: Bad actors in the world are bad actors in cyberspace.
Dr Neil Bradshaw Director of Enterprise The role of IPR as seen by the academic community LES Annual Conference, Bristol, June 24, 2004.
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
Innovation, Colleges and Applied Research ACCC College and Institute Applied Research Symposium (February 12-13, 2004)
12/6/2010CS Andrew Bates - UCCS1 Intrusion Detection and Advanced Persistent Threats CS 591 Andrew Bates University of Colorado at Colorado Springs.
(Geneva, Switzerland, September 2014)
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Information Security Investment's in Organizations – How it's actually been done? Daniel Dor & Prof. Yuval Elovici Ben-Gurion University of the Negev According.
Anomaly Detection and Mitigation. Outline DoS and DDoS Anomaly Detection and Mitigation Systems Cisco DDoS Anomaly Detection and Mitigation Solutions.
Entrepreneurial Professors and Secrecy in Science: Variations and Impact Karen Seashore Louis University of Minnesota Eric G Campbell Harvard University.
Science Park Universidad Carlos III de Madrid. Located inside the Leganés Technology Park: total Surface m2 Phase 1 (20% of the total): – 73.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Presented by Vladimir Yossifov Consultant, IP Services “IP Universities” Istanbul, May 16 to 18, 2012 Albert Long Hall, BOGAZICI UNIVERSITY.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Economics, Cyber Security and Innovation Massimo Felici Hewlett-Packard Laboratories Risk Assessment and Cyber Insurance Workshop Brussels, Belgium 27.
Logic Model and Methodology for Knowledge Innovation Program(KIP) Evaluation in Chinese Academy of Sciences Tao Dai Nov. 4, 2011 Evaluation 2011: Values.
John Collier Science with High Power Lasers. Godfrey Stafford Celebration The Central Laser Facility Prof John Collier Director.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Vice Rector for Graduate Studies and Scientific Research.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
The Basque Fab Lab. DenokInn DenokInn is the Basque Centre for Innovation, Entrepreneurship and New Business Development. DenokInn promotes a comprehensive.
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya Department of Computer Science and.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
Azam Supervisor : Prof. Raj Jain
Management System For Graduate Students Projects Day Presentation – June 2011.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Dubai, UAE, 20 November 2012 The Role of ITU Standardization for Advancing Research Innovation and Academic Education Prof Dr Ramjee Prasad, IEEE Fellow,
University of Ljubljana Responsible Research and Innovation.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
UNCLASSIFIED Defense Threat Reduction Agency Small Business Innovation Research (SBIR) Small Business Technology Transfer (STTR) Mark Flohr Program Manager.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Athena Innovation. Knowledge. Experience Peretz Gurel FCT : Urban security topic 2 Contribution as a partner.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
1 Promotion in Management and Research Tracks in Industry Magdalena Alonso-Galicia, PhD Cardiovascular Diseases Department Merck Research Laboratories.
Advanced Cyber Defence Center RIPE 67 Athens, Thursday 17 October 2013 Thorsten Kraft (eco e.V. | project lead) 1.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Towards a European Innovation Partnership on „Agricultural Productivity and Sustainability Martin Scheele Directorate General for Agriculture and Rural.
DDoS Protection
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Center of Excellence in Cyber Security
A lustrum of malware network communication: Evolution & insights
CNT 4704 Computer Communication Networking (not “analysis”)
Intelligence Driven Defense, The Next Generation SOC
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Security Monitoring for Network Protocols and Applications
[Person presenting] [Title of event] [Date, Location of the event]
Cyber Security Culture
A.P.T. wehackpeople.com.
Final Conference 18 Set 2018.
Break out Session: Innovation Chair: Tatu Koljonen Summer Camp 2010
Prof. Kiran Kalia, Director NIPER Ahmedabad
Presentation transcript:

Yuval Elovici, Prof. Director of Telekom Innovation Laboratories Head of BGU Cyber Security Labs June, 2014 The Role of the Academia in Promoting Cyber Innovation Ben-Gurion University of the Negev

2 Source of Cyber Security Innovation Mostly Cyber Security innovation is generated by startup- companies based on knowledge the founders acquired in the IDF

3 Ben-Gurion University of the Negev Academic contribution to cyber innovation IDS Anomaly detection Algorithms Honeypots Malware Static analysis based on ML techniques Dynamic analysis Crypto New cryptographic algorithms Analysis of security protocols The increase in cyber security attack sophistication will intensify the demand for academic support.

4 Ben-Gurion University of the Negev Academia is Faster than industry Distributed Denial of Service Attacks Mitigation technologies Botnet Platform for launching cyber attacks Detection is based on detecting C&C Advanced Persistent Threat Launched by advanced attackers Very hard to detect Research conducted by Prof. Lior Rokach and Prof Yuval Elovici

5 Ben-Gurion University of the Negev DDoS First reported (year) First mentioned in a professional article First scientific publication First patent application

6 Ben-Gurion University of the Negev BotNet First reported (year) First mentioned in a professional article First scientific publication First patent application

7 Ben-Gurion University of the Negev APT Threat class First reported (year) First mentioned in a professional article First scientific publication First patent application APT

8 Ben-Gurion University of the Negev Academia’s contribution to cyber innovation Graduates studies focusing on Cyber security Supporting development of innovative products Transfer of innovations to startup companies

9 Ben-Gurion University of the Negev Transfer of Innovation from BGU to Industry

Thank You! Ben-Gurion University of the Negev Yuval Elovici, Prof. Director of Telekom Innovation Laboratories Head of BGU Cyber Security Labs