dcypher.nl

U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

Impressie Seaside Matchmaking Cybersecurity 2016

Actueel

Minister Bert Koenders (BuZa) heeft een internationale cyberstrategie naar de Tweede Kamer gestuurd. Deze richt zich op het beschermen van de Nederlandse vitale infrastructuur (o.a. overheid, energiesector, banken) tegen cyberaanvallen. Een belangrijk onderdeel van de strategie is het smeden van een verbond met andere landen, internationale organisaties, de it-gemeenschap, academici en maatschappelijke organisaties. (Zie ook: ‘Cyberveiligheid in het centrum van de belangstelling’ onder Nieuws en achtergronden uit de rest van de wereld).Nieuwsbericht RijksoverheidInternationale Cyberstrategie (pdf)Aanbiedingsbrief bij Internationale Cyberstrategie (pdf) 
A dedicated cybersecurity research session is again part of the ICT.OPEN 2017 conference program, scheduled in the afternoon of March 21st 2017. The objective of this session is to demonstrate the progress and achievements in the execution of recent cybersecurity research.Morning of the 21st of MarchNew at ICT.OPEN this year is that there are semi-plenary sessions scheduled in the morning. We are proud to announce that one of the main speakers in one of this sessions is Prof.dr. Bart Jacobs. Professor Jacobs research concentrates on theoretical and practical aspects of security. On the theoretical side, his focus is on quantum logic and computation, supported by an ERC Advanced Grant. On the practical side, he is interested in identity and privacy management.At ICT.OPEN Bart Jacobs will address "ICT and Politics".More information about the morning program at www.ictopen.nl.  Afternoon Program: Peaks in Dutch Cyber Security Research14.30 – 14.35    Opening Session, Zeki Erkin, chair14.35 – 14.55    Cybersecurity Poster presentations of 2 ICT.OPEN posters cybersecurity introduced by Joep van Wijk14.55 – 15.20    DCSRP Award 2017 presentations of 3 nominated papers introduced by Jan Piet Barthel15.20 – 15.40    BCMT Award 2017 presentations of 2 nominated master theses introduced by Nicola Zannone15.40 – 15.45    Round-up, Zeki Erkin, chair– – break– –16.45 – 16.50    Introduction Keynote, Zeki Erkin, chair16.50 – 17.15    Keynote Speaker Maria Dubovitskaya (IBM Research-Zurich)17.15 – 17.25    Announcement Cybersecurity nominee  Poster Award ICT.OPEN 201717.25 – 17.40    Hand-over DCSRP Award 2017 + IBM Bonus Cheque  201717.40 – 17.50    Hand-over BCMT Award 201717.50 – 17.55    Closing remarks, Zeki Erkin, chair Register HERE for participation via the ICT.OPEN 2017 form !! Cybersecurity sessions concentrated on the first day of event, the 21st of March 2017 ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl
Call for Presentations The international One Conference in The Hague, Netherlands, 16-17 May 2017The Dutch Government organizes the international One Conference 2017. This conference is invite-only and aims to facilitate the exchange of knowledge and ideas within the international cyber security community. To this aim 850 people from the (inter)national CERT community, academia, security professionals from public and private sector as well as our key partners from law enforcement and intelligence will participate in this event. The conference program offers topics of interest for a wide variety of participants, from (technical) specialists to decision-makers and researchers, from both the private and the public sector.Sessions The Dutch Government invites researchers, companies and professionals to submit proposals for presentations. All sessions are 40 minutes in length including Q&A. Previously published and/or presented material is welcome if the information and message are still new and relevant to this audience. Presentations will ultimately be chosen based on relevance to the topics below, maturity of results and relevance to the audience.TopicsTopics include but are not limited to:Technical: ICS/SCADA, botnets and malware, APTs, network detection, red teaming, internet routing and technologies, privacy, cryptography, medical devices, automotive, mobile devices, I-o-T, DDoS, (big) data analytics, machine learning, metricsIncident response: information sharing (detection), threat intelligence (sharing), CSIRT maturity, incident handling, cooperation (tactical and operational), incident analysis, coordinated vulnerability disclosure, case studies, lessons learnedGovernance: law enforcement, legal aspects, cross-border collaboration, risk management, public-private partnerships, organizational structures, coordinated vulnerability disclosure, data breaches, supply chain: responsibility & liabilityStrategic issues: cyber security & economic growth, implementing international cyber security strategy, (conflicts of) interest of values in cyber security, future scenarios, the government role regarding cyber security for I-o-T, cyber espionage & future economic impactHuman factor: offenders, victims, social engineering, insider threat, education and training, I-o-T and acting capacity of end users, privacyResearch & innovation: completed and ongoing cyber security research (fundamental and applied) and innovation Proposal requirementsProposals (maximum one page) should consist of:Title and abstractType of presentation (e.g. lecture, panel, demo and interactive aspects such as Q&A’s or real time polling)Aim of the presentation. What’s in it for the audience (public and private sector)?Target audience (e.g. technical specialists, analysts, policy makers)Short bio of the speaker All presentations are in English, commercial presentations are excluded. Proposals can be submitted to conference@ncsc.nl Important datesDeadline for submission: 31 January 2017Presenter notification: 15 March 2017Date conference: 16-17 May 2017 The One Conference 2017 is organized by the Ministry of Security and Justice and the Ministry of Economic Affairs

Nieuws

The Fourth International Workshop on Graphical Models for Security Santa Barbara, CA, USA - August 21, 2017 Co-located with CSF 2017. SCOPEGraphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Cyber security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including vulnerability assessment, risk analysis, defense analysis, automated defensing, secure services composition, policy validation and verification. The objective of the GraMSec workshop is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.http://gramsec.uni.luTOPICSThe workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:Graphical models for threat modeling and analysisGraphical models for risk analysis and managementGraphical models for requirements analysis and managementTextual and graphical representation for system, organizational, and business securityVisual security modeling and analysis of socio-technical and cyber-physical systemsGraphical security modeling for cyber situational awarenessGraphical models supporting the security by design paradigmMethods for quantitative and qualitative analysis of graphical security modelsFormal semantics and verification of graphical security modelsMethods for (semi-)automatic generation of graphical security modelsEnhancement and/or optimization of existing graphical security modelsScalable evaluation of graphical security modelsEvaluation algorithms for graphical security modelsDynamic update of graphical security modelsGame theoretical approaches to graphical security modelingAttack trees, attack graphs and their variantsStochastic Petri nets, Markov chains, and Bayesian networks for securityUML-based models and other graphical modeling approaches for securitySoftware tools for graphical security modeling and analysisCase studies and experience reports on the use of graphical security modeling paradigm INVITED SPEAKERTo be decided. PAPER SUBMISSIONWe solicit two types of submissions:Regular papers (up to 15 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work within the scope of the workshop.Short papers (up to 7 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work in progress.The reviewers are not required to read the appendices, so the papers should be intelligible without them. All submissions must be prepared using the LNCS style: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0Each paper will undergo a thorough review process. All accepted (regular and short) papers will be included in the workshop's post-proceedings. As the previous two years, the GraMSec 2017 post-proceedings are planned to be published in the Lecture Notes in Computer Science (LNCS) series of Springer (confirmation pending). Submissions should be made using the GraMSec 2017 EasyChair web site: https://www.easychair.org/conferences/?conf=gramsec17IMPORTANT DATESSubmission deadline: Sunday, May 21, 2017Acceptance notification: Friday, July 7, 2017Workshop: Monday, August 21, 2017
e-IRG publishes Roadmap 2016 as a next step towards the e-Infrastructure CommonsThe e-Infrastructure Reflection Group (e-IRG) has published a new version of its Roadmap document. The e-IRG Roadmap 2016 is taking up the e-Infrastructure Commons concept. The document intends to define a clear route on how to evolve the European e-Infrastructure system further. The new Roadmap edition aims to turn the vision of the e-Infrastructure Commons into reality by 2020, and has recommendations to all stakeholders to progress on the way towards the e-Infrastructure Commons.The key recommendations in the Roadmap document encourage the research infrastructures and research communities to elaborate on and drive their e-infrastructure needs. The goal is that they participate in the innovation of e-Infrastructure services, contribute to standards, and take care of their data. e-Infrastructure providers should further increase their efforts to work closely together to fulfil the often complex user needs in a seamless way. National governments and funding agencies should try to embrace e-Infrastructure coordination at the national level and construct strong national e-Infrastructure building blocks. This has to enable coherent and efficient participation in European efforts.Together, they have to analyse and evaluate their national e-Infrastructure funding and governance mechanisms. Further aims are to identify best practices, and provide input to the development of the European e-Infrastructure landscape. The European Commission should provide strong incentives for cross-platform innovations. Other roles for the European Commission would be to continuously support the coordination and consolidation of e-Infrastructure service development and take care of provisioning on the national and the European level.The Roadmap starts with a brief elaboration on the e-IRG vision and an assessment of the extent to which the current national and international e-Infrastructures already realise this. The document then presents a landscape analysis of the current European e-Infrastructure system and identifies the key challenges that hinder e-Infrastructure harmonisation and integration.From the analysis, it is clear that an extended effort on "emphatic co-operation and coordination" among all main stakeholders is required. This involves the providers - the e-Infrastructure developers and operators, and the users - research infrastructure including the ESFRI projects, large scientific communities, and users belonging to the "long tail of science". It also involves the policy makers and funders - the national governments and their agents and the EU. Good coordination can be established through a formal coordination platform among all stakeholders with strong national involvement, in line with the vision of the e-Infrastructure Commons. Also in line with the vision, such a platform can be implemented using a potentially distributed, multi-stakeholder model of governance.e-IRG is organising two open workshops each year. Interaction between all stakeholders is high on the agenda during these workshops. The break-out sessions stimulate the discussion and invite the participants to present their views on the Roadmap recommendations from different angles. The e-IRG workshops function as a creative laboratory of thoughts and opinions as to how to establish the e-Infrastructure Commons as a practical model for the European research community.A concrete way towards the e-Infrastructure Commons, loosely integrating the different types of e-Infrastructures, is to use a marketplace with a proper governance including a representation of the users as a single point of access to all e-Infrastructure services and tools. The marketplace will act as a one stop-shop for EU researchers, i.e. a place where all e-Infrastructure services are accessible all together, either directly or redirected elsewhere. The marketplace can make use of several technologies and services, such as cloud technologies, a searchable service catalogue and a common authentication/authorisation scheme. In this way, standardised and single point of access to services will be achieved, without promoting monopolies, nor a single integrated provider. This has proven to be very difficult across different e-Infrastructure components. On the contrary, it will be open to new actors, encouraging cooperation, competition and innovation.Erik Fledderus, editor of the e-IRG 2016 Roadmap, stated: "We should think about what might be the role of e-IRG in being part of the recommendations, now that they have been published. How will we be acting as e-IRG to make that these recommendations are also being realised? We should be part of the solution and being part of the recommendations is also involved in our role. We should follow up on the European Commission to see how they develop the new working plans, the tail of Horizon2020, but also the new Framework. This is something we should definitely be involved in. After delivering this Roadmap, the story continues and really starts actually."Sverker Holmgren, former e-IRG Chair who has been following up on the process of editing the Roadmap 2016 document, stated: "The e-Infrastructure Commons has to be accomplished by the European e-Infrastructure initiatives but needs to be facilitated and pushed by the EU Member States, the European Commission, and the European research communities and research infrastructures. e-IRG has the intention to enter in dialogue with these different bodies and entities. Significant progress in the process of implementing the e-Infrastructure Commons has already been made. The Roadmap 2016 document is the next step towards establishing this coherent system, which involves all stakeholders."The Roadmap 2016 document can be downloaded from the e-IRG website at http://e-irg.eu/documents/10920/12353/Roadmap+2016.pdfAbout e-IRGe-IRG is a self-regulated and independent body consisting of delegations from the EU Member States and Associated Countries and the European Commission. The e-IRG vision is to facilitate integration in the area of European e-Infrastructures and connected services, within and between member states, at the European level and globally. In its series of Roadmaps, e-IRG builds on this vision to fulfil its mission to support coherent, innovative and strategic European e-Infrastructure policy making and the development of convergent and sustainable e-Infrastructure services.http://e-irg.euNotes for the editor (not for publication)For more information on the e-IRG:Gabriele von Voigte-IRG Chair as of January 1, 2017vonvoigt[{at}]luis.uni-hannover.deFor more information on this press release:Ad Emmene-IRGSP5 Communication Manageremmen[{at}]genias.nlSkype: ad.emmenPDF of this release:http://e-irg.eu/documents/10920/283008/e-IRGPressReleasev20170111.pdfODT of this release:http://e-irg.eu/documents/10920/283008/e-IRGPressReleasev20170111.odtWeb link of this release:http://e-irg.eu/news-blog/-/blogs/e-irg-to-publish-roadmap-2016-as-a-next-step-towards-the-e-infrastructure-commons
De Topconsortia voor Kennis en Innovatie (TKI)-toeslag heet vanaf 1 februari 2017: PPS-toeslag Onderzoek en Innovatie. De bestaande instrumenten voor de TKI’s veranderen van naam, maar inhoudelijk blijven de instrumenten hetzelfde. Daarnaast komt er een nieuw instrument bij. Vanaf 1 februari kunnen privaat-publieke samenwerkingsverbanden rechtstreeks bij de Rijksdienst voor Ondernemend Nederland (RVO.nl) een aanvraag indienen voor PPS-projecttoeslag.Betere overkoepelende termTot de naamsverandering is besloten omdat het een betere overkoepelende term is nu de doelgroep verbreed is van alleen TKI’s naar TKI’s plus privaat-publieke samenwerkingsverbanden.Nieuw instrumentEr komt een nieuw instrument bij voor privaat-publieke samenwerkingsverbanden. Deze samenwerkingsverbanden kunnen nu ook rechtstreeks bij RVO.nl indienen. De reden hiervoor is tweeledig:Allereerst komen projecten tot stand op initiatief van andere partijen dan de TKI’s. De rol van het TKI is bij dergelijke initiatieven relatief klein.De tweede reden is dat het ministerie van Economische  Zaken cross-sectorale projecten wil bevorderen. SamenwerkingsverbandVoor het aanvragen van een PPS-projecttoeslag voor een samenwerkingsverband moet dit samenwerkingsverband minimaal bestaan uit een onderzoeksinstelling en een ondernemer.Om voor de toeslag in aanmerking te komen, moet de ondernemer een flinke private bijdrage leveren. Daarnaast moet het project uit fundamenteel onderzoek, industrieel onderzoek, experimentele ontwikkeling of een combinatie daarvan bestaan.Een uitgebreide beschrijving van het nieuwe instrument kunt u vinden bij Download.AanvragenDe openstellingsperiodes voor de 3 instrumenten binnen de PPS-toeslag zijn de volgende:TKI- of PPS-programmatoeslag voor het TKI: vanaf 1 januari 2017 tot en met 31 mei 2017, 17.00 uur;TKI- of PPS-projecttoeslag voor het TKI: vanaf 15 november 2016 tot en met 31 juli 2017 17.00 uur;PPS-projecttoeslag voor een samenwerkingsverband: vanaf 1 februari 2017 tot en met 31 juli 2017, 17.00 uur. Meer informatieDe hele wijzigingsregeling vindt u op overheid.nl. Alle voorwaarden voor het instrument 'PPS-projecttoeslag voor een samenwerkingsverband' vindt u in het document 'Voorwaarden voor PPS-projecttoeslag voor een samenwerkingsverband', bij Download. http://www.rvo.nl/actueel/nieuws/tki-toeslag-wordt-pps-toeslag-onderzoek-en-innovatie
CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017) ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development.Important Dates* Paper submission deadline: April 19, 2017* Notification to authors: June 16, 2016* Camera ready due: July 26, 2016 Topics of InterestTopics of interest include, but are not limited to:* access control* accountability* ad hoc networks* anonymity* applied cryptography* authentication* biometrics* data and computation integrity* database security* data protection* digital content protection* digital forensics* distributed systems security* embedded systems security* inference control* information hiding* identity management* information flow control* information security governance and management* intrusion detection* formal security methods* language-based security* network security* phishing and spam prevention* privacy* privacy preserving data mining* risk analysis and management* secure electronic voting* security architectures* security economics* security metrics* security models* security and privacy for big data* security and privacy in cloud scenarios* security and privacy in complex systems* security and privacy in content centric networking* security and privacy in crowdsourcing* security and privacy in the IoT* security and privacy in location services* security and privacy for mobile code* security and privacy in pervasive / ubiquitous computing* security and privacy policies* security and privacy in social networks* security and privacy in web services* security and privacy in cyber-physical systems* security, privacy and resilience in critical infrastructures* security verification* software security* systems security* trust models and management* trustworthy user devices* usable security and privacy* web security* wireless security Paper Submission GuidelinesSubmissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics2017Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the Submission web site. Only pdf files will be accepted.Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their papers will be presented at the conference.Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation CommitteeGeneral Chairs:* Einar Snekkenes, Norwegian University of Science and Technology (NTNU), Norway. Organization Chair: * Laura Georg, Norwegian University of Science and Technology (NTNU), Norway. Workshop Chair: * Sokratis Katsikas, Norwegian University of Science and Technology (NTNU), Norway. Program Committee Chairs: * Dieter Gollman, Technische Universität Hamburg-Harburg, Germany* Simon Foley, IMT Atlantique, France Program Committee:Gail-Joon Ahn, Arizona State University, USAAlessandro Armando, University of Genoa, ItalyMichael Backes, Saarland University, GermanyGiampaolo Bella, Università degli studi di Catania, ItalyElisa Bertino, Purdue University, USACarlo Blundo, Università degli studi di Salerno, ItalyRainer Böhme, University of Innsbruck, AustriaColin Boyd, Norwegian University of Science and Technology, NorwayStefan Brunthaler, SBA Research, AustriaTom Chothia, University of Birmingham, UKSherman S. M. Chow, Chinese University of Hong Kong, Hong KongMauro Conti, University of Padua, ItalyCas Cremers, University of Oxford, UKFrederic Cuppens, IMT Atlantique, FranceNora Cuppens-Boulahia, IMT Atlantique, FranceMads Dam, KTH, SwedenSabrina De Capitani di Vimercati, Università degli studi di Milano, ItalyHerve Debar, Telecom SudParis, FranceRoberto Di Pietro, Nokia Bell Labs, FranceJosep Domingo-Ferrer, Universitat Rovira i Virgili, SpainWenliang Du, Syracuse University, USAPavlos Efraimidis, Democritus University of Thrace, GreeceHannes Federrath, University of Hamburg, GermanySimone Fischer-Hübner, Karlstad University, SwedenRiccardo Focardi, Università Ca’ Foscari di Venezia, ItalySimon Foley, IMT Atlantique, FranceSara Foresti, Università degli studi di Milano, ItalyKatrin Franke, Norwegian University of Science and Technology, NorwayFelix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg,GermanyJoaquin Garcia-Alfaro, Telecom ParisSud, FranceDieter Gollmann, Hamburg University of Technology, GermanyDimitris Gritzalis, Athens University of Economics and Business, GreeceStefanos Gritzalis, University of the Aegean, GreeceJoshua Guttman, Worcester Polytechnic Institute, USAGerhard Hancke, City University of Hong Kong, ChinaMarit Hansen, Unabhängiges Landeszentrum für DatenschutzSchleswig-Holstein, GermanyFeng Hao, Newcastle University, UKCormac Herley, Microsoft Research , USAXinyi Huang, Fujian Normal University, ChinaMichael Huth, Imperial College, UKAaron D. Jaggard, U.S. Naval Research Laboratory, USASushil Jajodia, George Mason University, USALimin Jia, Carnegie Mellon University, USAWouter Joosen, KU Leuven, BelgiumVasilis Katos, Bournemouth University, UKSokratis Katsikas, Norwegian University of Science and Technology, NorwayFlorian Kerschbaum, University of Waterloo, CanadaDogan Kesdogan, Universität Regensburg, GermanyKwangjo Kim, Korea Advanced Institute of Science and Technology, KoreaSteve Kremer, INRIA Nancy-Grand Est, FranceMarina Krotofil, Honeywell, USARalf Küsters, University of Trier, GermanyJunzuo Lai, Singapore Management University, SingaporeKwok-yan Lam, Nanyang Technological University, SingaporeCostas Lambrinoudakis, University of Piraeus, GreecePeeter Laud, Cybernetica AS, EstoniaAdam J. Lee, University of Pittsburgh, USAGabriele Lenzini, University of Luxembourg, LuxembourgYingjiu Li, Singapore Management University, SingaporeAntonio Lioy, Politecnico di Torino, ItalyPeng Liu, The Pennsylvania State University, USAJavier Lopez, University of Malaga, SpainAntonio Maña, University of Malaga, SpainPratyusa K. Manadhata, Hewlett Packard Labs, USALuigi V. Mancini, "Universita di Roma ""La Sapienza""", ItalyHeiko Mantel, TU Darmstadt, GermanyOlivier Markowitch, Université Libre de Bruxelles, BelgiumFabio Martinelli, IIT-CNR, ItalySjouke Mauw, University of Luxembourg, LuxembourgCatherine Meadows, Naval Research Laboratory, USAJohn Mitchell, Stanford University, USAAikaterini Mitrokotsa, Chalmers University of Technology, SwedenRefik Molva, EURECOM, FranceCharles Morisset, Newcastle University, UKRolf Oppliger, eSECURITY Technologies, SwitzerlandStefano Paraboschi, Università di Bergamo, ItalyDusko Pavlovic, University of Hawaii, USAGünther Pernul, Universität Regensburg, GermanyDavid Pichardie, ENS-IRISA, RennesFrank Piessens , Katholieke Universiteit Leuven, BelgiumWolter Pieters, Delft University of Technology, The NetherlandsMichalis Polychronakis, Stonybrook University, USAChristina Pöpper, NYU Abu Dhabi, UAEJoachim Posegga, University of Passau, GermanyChristian Probst, Technical University of Denmark, DenmarkKai Rannenberg, Goeth University, GermanyAwais Rashid, Lancaster University, UKIndrajiti Ray, Colorado State University, USAKui Ren, State University of New York at Buffalo, USAMark Ryan, University of Birmingham, UKPeter Y.A. Ryan, University of Luxembourg, LuxembourgRene Rydhof Hansen, Aarhus University, DenmarkAndrei Sabelfeld, Chalmers University of Technology, SwedenRei Safavi-Naini, University of Calgary, CanadaPierangela Samarati, Universitá degli studi di Milano, ItalyRavi Sandhu, University of Texas at San Antonio, USARalf Sasse, ETH Zürich, SwitzerlandNitesh Saxena, University of Alabama at Birmingham, USAAndreas Schaad, Huawei European Research Center, GermanySteve Schneider, University of Surrey, UKBasit Shafiq, Lahore University of Management Sciences, PakistanEinar Snekkenes, Norwegian University of Science and Technology, NorwayWilly Susilo, University of Wollongong, AustraliaKrzysztof Szczypiorski, Warsaw University of Technology, PolandBjörn Tackmann, IBM Research, SwitzerlandQiang Tang, New Jersey Institute of Technology, USANils Ole Tippenhauer, Singapore University of Technology and Design,Singaporejaideep Tsochou, Ionion University, GreeceVijay Varadharajan, Macquarie University, AustraliaLuca Viganò, King's College London, UKMichael Waidner, Fraunhofer SIT & TU Darmstadt, GermanyCong Wang, City University of Hong Kong, ChinaBen Smyth, Huawei, FranceEdgar Weippl, SBA Research, AustriaStephen Wolthusen, Royal Holloway university, UKChristos Xenakis, University of Piraeus, GreeceJeff Yan, Lancaster University, UKMeng Yu, University of Texas at San Antonio, USABen Zhao, University of California at Santa Barbara, USAJianying Zhou, Institute for Infocomm Research, SingaporeJörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain
Foreign minister Bert Koenders outlined his conviction that the Netherlands needs to be resilient in the digital age. In a letter to parliament, he submitted his plans for an International Cyber Strategy.‘The Netherlands wants a safe, free and open internet. This takes work. We have to protect our vital infrastructure (government agencies, the energy sector and banks) from cyberattacks. To this end we need to form partnerships with other countries, international organisations, the IT sector, academics and civil society organisations,’ Mr Koenders said.In this new strategy the government is focusing on six areas: economic growth and development of the internet; effective internet governance; further enhancement of cybersecurity; cybercrime; international peace, security and stability, and rights and internet freedom.On Monday Mr Koenders will attend the presentation of the Tallinn Manual 2.0 in The Hague. This handbook, written by an international group of prominent jurists, explains how international law can be applied to cyber operations. The foreword was written by the minister.‘The threat posed by cyberattacks and disinformation has only grown in the past few years. The Tallinn Manual 2.0 is an indispensable guide to a largely unexplored new field. Many rules date back to the pre-digital age, but malicious hackers and the wide dissemination of fake news are now a daily reality. We desperately need clarity about the rules so that action can be taken,’ Mr Koenders said.
Bekijk het volledige nieuwsoverzicht >