Multi-faceted Cyber Security Research Group edited strategy.

Slides:



Advertisements
Similar presentations
Shared vision development for the Kiraly street Business case.
Advertisements

E.g Act as a positive role model for innovation Question the status quo Keep the focus of contribution on delivering and improving.
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
Water cooperation is key to poverty reduction, social equity and gender equality One challenge: “business as usual” is counter-productive to reducing poverty.
L2 Business Unit 2: Business Organisations
Creating a Winning E-Business Second Edition
1. Guiding Principles 3. Critical Success Factors 2. Delivery Processes 4. Benefits Realisation Strategy Business Management Technology Management Roadmap.
CoastNET The role of coastal fora in sustainable management of the coast Alex Midlen CoastNET and Colchester Borough Council.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
What is Capacity, Capacity Assessment, and Capacity Development Capacity is defined as “the ability of individuals, organizations, and societies to perform.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Österreich 2006 Austria 2006 Autriche 2006 Präsidentschaft der Europäischen Union Presidency of the European Union Présidence de L’Union européenne ★★★★★★
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
European Grid Initiative Technical Forum 21 September 2011, Lyon The Digital Agenda for Europe What about the Cloud? Carl-Christian Buhr European Commission.
The Coalition for Action on ICT enabled change in Europe.
Summary of the U.S. Task Force on United Way’s Economic Model & Growth.
Inspire Personal Skills Interpersonal & Organisational Awareness Developing People Deliver Creative Thinking & Problem Solving Decision Making, Prioritising,
Class 8 The State of Cybercrime Today- Threads & Solutions.
Cyber Security & Fraud – The impact on small businesses.
Enabling Shared Context Anne Thomas Manes Director Market Innovation W3C Web Services Workshop.
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
A Framework for Developing and Understanding Digital Competence in Europe Barbara Brecko Yves Punie EC JRC IPTS.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
1 Policy Frameworks for the Knowledge-based Economy ICTs, Innovation and Human Resources Brasilia September 2002 Session 2.2. ICTs and e-business.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
What is the role of Intl. Organisations in addressing data management requirements? The Colour of Ocean Data - The Palais des Congrès, Brussels, Belgium,
UN/CEFACT UNECEUNECE 3 rd Executive Forum on Trade Facilitation Paperless Trade in International Supply Chains: Enhancing Efficiency and Security Geneva,
Describe the potential of IT to improve internal and external communications By Jim Green.
Recycling data: common metrics for research, policy, and evaluation Samantha Becker, MLIS, MPA Principal Research Scientist University of Washington Information.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 1: Security Governance Through Principles and Policies
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
 sohamRe is a web browser based Reinsurance management system for Reinsurance Companies.  sohamRe provide all of the business functions necessary for.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
The Evolving IG Lead Role Phil Walker IGA. The IG Lead Role I am constantly surprised by the breadth and variety of work undertaken by IG Leads, but there.
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
Strategy to solve complex problems Use number 1, 2, 3, 4, 5, 6, 7, 8, 9 only once so that sum of three numbers are Identical as shown below: __ + __ +
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Cloud Security for eHealth – Study Validation
Information Security, Theory and Practice.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Observatory, Service catalogue, Marketplace and SME end-user club
Bringing EU Cybersecurity & privacy research results closer to the market Cybersecurity.
Opportunities of external data within companies in promoting new business and sustainability on the real estate and construction sector Antti Säynäjoki.
Scotland’s Environment Web Environmental Data Portal Joanna Muse Scottish Environment Protection Agency.
Digital Disruption An ISP take on trends and possibilities
Towards modern public administration:
Top 6 Strategies of Digital Marketing.
Cyber Security Consultant. If you are tired of spend money to third party to solve your problems of cyber security then you at right place, Steppa can.
Collective impact Emma Cooper, M&E Unit
About Trust for London We are an independent charitable trust funding work which tackles poverty and inequality in the capital. We are interested in work.
Blockchain & Social Impact
Presentation for information days Units involved:
Cyber security Policy development and implementation
Bruce Riordan Joint Policy Committee Bay Area Climate Adaptation Overview.
The Ecosystem Forum - OPSI September 2018
Database Administration
digitalLIFE4CE Interreg Central Europe , Trieste
Final Conference 18 Set 2018.
Digital Preservation is…
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Presentation transcript:

Multi-faceted Cyber Security Research Group edited strategy

Top opportunities 1.Ownership and responsibility for security - taking account of different social norms, differences between cyber space and physical space 2.Identity and privacy - publically acceptable identity mechanisms 3.Measurement of trust - metrics 4.Valuation of digital interactions - support asset separation, personal info currency 5.Policy development 6.Useable and useful security solutions

Future technologies required Machine learning for: deterrent recovery helping users to isolate themselves from attacks building trust in others modeling attacks

Practical steps required by research organisations Social norms - studies with users to identify how to deliver cyber security info Define cyber security problems in ways that they can be solved Develop framework for policy makers to understand impact of their policies Bring together public sector having security needs and commercial players that have developed security solutions