U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

Impressie Seaside Matchmaking Cybersecurity 2016


Minister Bert Koenders (BuZa) heeft een internationale cyberstrategie naar de Tweede Kamer gestuurd. Deze richt zich op het beschermen van de Nederlandse vitale infrastructuur (o.a. overheid, energiesector, banken) tegen cyberaanvallen. Een belangrijk onderdeel van de strategie is het smeden van een verbond met andere landen, internationale organisaties, de it-gemeenschap, academici en maatschappelijke organisaties. (Zie ook: ‘Cyberveiligheid in het centrum van de belangstelling’ onder Nieuws en achtergronden uit de rest van de wereld).Nieuwsbericht RijksoverheidInternationale Cyberstrategie (pdf)Aanbiedingsbrief bij Internationale Cyberstrategie (pdf) 
A dedicated cybersecurity research session is again part of the ICT.OPEN 2017 conference program, scheduled in the afternoon of March 21st 2017. The objective of this session is to demonstrate the progress and achievements in the execution of recent cybersecurity research.Morning of the 21st of MarchNew at ICT.OPEN this year is that there are semi-plenary sessions scheduled in the morning. We are proud to announce that one of the main speakers in one of this sessions is Prof.dr. Bart Jacobs. Professor Jacobs research concentrates on theoretical and practical aspects of security. On the theoretical side, his focus is on quantum logic and computation, supported by an ERC Advanced Grant. On the practical side, he is interested in identity and privacy management.At ICT.OPEN Bart Jacobs will address "ICT and Politics".More information about the morning program at www.ictopen.nl.  Afternoon Program: Peaks in Dutch Cyber Security Research14.30 – 14.35    Opening Session, Zeki Erkin, chair14.35 – 14.55    Cybersecurity Poster presentations of 2 ICT.OPEN posters cybersecurity introduced by Joep van Wijk14.55 – 15.20    DCSRP Award 2017 presentations of 3 nominated papers introduced by Jan Piet Barthel15.20 – 15.40    BCMT Award 2017 presentations of 2 nominated master theses introduced by Nicola Zannone15.40 – 15.45    Round-up, Zeki Erkin, chair– – break– –16.45 – 16.50    Introduction Keynote, Zeki Erkin, chair16.50 – 17.15    Keynote Speaker Maria Dubovitskaya (IBM Research-Zurich)17.15 – 17.25    Announcement Cybersecurity nominee  Poster Award ICT.OPEN 201717.25 – 17.40    Hand-over DCSRP Award 2017 + IBM Bonus Cheque  201717.40 – 17.50    Hand-over BCMT Award 201717.50 – 18.00    Closing remarks, Zeki Erkin, chair Register HERE for participation via the ICT.OPEN 2017 form !! Cybersecurity sessions concentrated on the first day of event, the 21st of March 2017 ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl
Call for Presentations The international One Conference in The Hague, Netherlands, 16-17 May 2017The Dutch Government organizes the international One Conference 2017. This conference is invite-only and aims to facilitate the exchange of knowledge and ideas within the international cyber security community. To this aim 850 people from the (inter)national CERT community, academia, security professionals from public and private sector as well as our key partners from law enforcement and intelligence will participate in this event. The conference program offers topics of interest for a wide variety of participants, from (technical) specialists to decision-makers and researchers, from both the private and the public sector.Sessions The Dutch Government invites researchers, companies and professionals to submit proposals for presentations. All sessions are 40 minutes in length including Q&A. Previously published and/or presented material is welcome if the information and message are still new and relevant to this audience. Presentations will ultimately be chosen based on relevance to the topics below, maturity of results and relevance to the audience.TopicsTopics include but are not limited to:Technical: ICS/SCADA, botnets and malware, APTs, network detection, red teaming, internet routing and technologies, privacy, cryptography, medical devices, automotive, mobile devices, I-o-T, DDoS, (big) data analytics, machine learning, metricsIncident response: information sharing (detection), threat intelligence (sharing), CSIRT maturity, incident handling, cooperation (tactical and operational), incident analysis, coordinated vulnerability disclosure, case studies, lessons learnedGovernance: law enforcement, legal aspects, cross-border collaboration, risk management, public-private partnerships, organizational structures, coordinated vulnerability disclosure, data breaches, supply chain: responsibility & liabilityStrategic issues: cyber security & economic growth, implementing international cyber security strategy, (conflicts of) interest of values in cyber security, future scenarios, the government role regarding cyber security for I-o-T, cyber espionage & future economic impactHuman factor: offenders, victims, social engineering, insider threat, education and training, I-o-T and acting capacity of end users, privacyResearch & innovation: completed and ongoing cyber security research (fundamental and applied) and innovation Proposal requirementsProposals (maximum one page) should consist of:Title and abstractType of presentation (e.g. lecture, panel, demo and interactive aspects such as Q&A’s or real time polling)Aim of the presentation. What’s in it for the audience (public and private sector)?Target audience (e.g. technical specialists, analysts, policy makers)Short bio of the speaker All presentations are in English, commercial presentations are excluded. Proposals can be submitted to conference@ncsc.nl Important datesDeadline for submission: 31 January 2017Presenter notification: 15 March 2017Date conference: 16-17 May 2017 The One Conference 2017 is organized by the Ministry of Security and Justice and the Ministry of Economic Affairs


CFP: Twenty-second European Symposium on Research in Computer Security (ESORICS 2017) ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development.Important Dates* Paper submission deadline: April 19, 2017* Notification to authors: June 16, 2016* Camera ready due: July 26, 2016 Topics of InterestTopics of interest include, but are not limited to:* access control* accountability* ad hoc networks* anonymity* applied cryptography* authentication* biometrics* data and computation integrity* database security* data protection* digital content protection* digital forensics* distributed systems security* embedded systems security* inference control* information hiding* identity management* information flow control* information security governance and management* intrusion detection* formal security methods* language-based security* network security* phishing and spam prevention* privacy* privacy preserving data mining* risk analysis and management* secure electronic voting* security architectures* security economics* security metrics* security models* security and privacy for big data* security and privacy in cloud scenarios* security and privacy in complex systems* security and privacy in content centric networking* security and privacy in crowdsourcing* security and privacy in the IoT* security and privacy in location services* security and privacy for mobile code* security and privacy in pervasive / ubiquitous computing* security and privacy policies* security and privacy in social networks* security and privacy in web services* security and privacy in cyber-physical systems* security, privacy and resilience in critical infrastructures* security verification* software security* systems security* trust models and management* trustworthy user devices* usable security and privacy* web security* wireless security Paper Submission GuidelinesSubmissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics2017Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the Submission web site. Only pdf files will be accepted.Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their papers will be presented at the conference.Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation CommitteeGeneral Chairs:* Einar Snekkenes, Norwegian University of Science and Technology (NTNU), Norway. Organization Chair: * Laura Georg, Norwegian University of Science and Technology (NTNU), Norway. Workshop Chair: * Sokratis Katsikas, Norwegian University of Science and Technology (NTNU), Norway. Program Committee Chairs: * Dieter Gollman, Technische Universität Hamburg-Harburg, Germany* Simon Foley, IMT Atlantique, France Program Committee:Gail-Joon Ahn, Arizona State University, USAAlessandro Armando, University of Genoa, ItalyMichael Backes, Saarland University, GermanyGiampaolo Bella, Università degli studi di Catania, ItalyElisa Bertino, Purdue University, USACarlo Blundo, Università degli studi di Salerno, ItalyRainer Böhme, University of Innsbruck, AustriaColin Boyd, Norwegian University of Science and Technology, NorwayStefan Brunthaler, SBA Research, AustriaTom Chothia, University of Birmingham, UKSherman S. M. Chow, Chinese University of Hong Kong, Hong KongMauro Conti, University of Padua, ItalyCas Cremers, University of Oxford, UKFrederic Cuppens, IMT Atlantique, FranceNora Cuppens-Boulahia, IMT Atlantique, FranceMads Dam, KTH, SwedenSabrina De Capitani di Vimercati, Università degli studi di Milano, ItalyHerve Debar, Telecom SudParis, FranceRoberto Di Pietro, Nokia Bell Labs, FranceJosep Domingo-Ferrer, Universitat Rovira i Virgili, SpainWenliang Du, Syracuse University, USAPavlos Efraimidis, Democritus University of Thrace, GreeceHannes Federrath, University of Hamburg, GermanySimone Fischer-Hübner, Karlstad University, SwedenRiccardo Focardi, Università Ca’ Foscari di Venezia, ItalySimon Foley, IMT Atlantique, FranceSara Foresti, Università degli studi di Milano, ItalyKatrin Franke, Norwegian University of Science and Technology, NorwayFelix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg,GermanyJoaquin Garcia-Alfaro, Telecom ParisSud, FranceDieter Gollmann, Hamburg University of Technology, GermanyDimitris Gritzalis, Athens University of Economics and Business, GreeceStefanos Gritzalis, University of the Aegean, GreeceJoshua Guttman, Worcester Polytechnic Institute, USAGerhard Hancke, City University of Hong Kong, ChinaMarit Hansen, Unabhängiges Landeszentrum für DatenschutzSchleswig-Holstein, GermanyFeng Hao, Newcastle University, UKCormac Herley, Microsoft Research , USAXinyi Huang, Fujian Normal University, ChinaMichael Huth, Imperial College, UKAaron D. Jaggard, U.S. Naval Research Laboratory, USASushil Jajodia, George Mason University, USALimin Jia, Carnegie Mellon University, USAWouter Joosen, KU Leuven, BelgiumVasilis Katos, Bournemouth University, UKSokratis Katsikas, Norwegian University of Science and Technology, NorwayFlorian Kerschbaum, University of Waterloo, CanadaDogan Kesdogan, Universität Regensburg, GermanyKwangjo Kim, Korea Advanced Institute of Science and Technology, KoreaSteve Kremer, INRIA Nancy-Grand Est, FranceMarina Krotofil, Honeywell, USARalf Küsters, University of Trier, GermanyJunzuo Lai, Singapore Management University, SingaporeKwok-yan Lam, Nanyang Technological University, SingaporeCostas Lambrinoudakis, University of Piraeus, GreecePeeter Laud, Cybernetica AS, EstoniaAdam J. Lee, University of Pittsburgh, USAGabriele Lenzini, University of Luxembourg, LuxembourgYingjiu Li, Singapore Management University, SingaporeAntonio Lioy, Politecnico di Torino, ItalyPeng Liu, The Pennsylvania State University, USAJavier Lopez, University of Malaga, SpainAntonio Maña, University of Malaga, SpainPratyusa K. Manadhata, Hewlett Packard Labs, USALuigi V. Mancini, "Universita di Roma ""La Sapienza""", ItalyHeiko Mantel, TU Darmstadt, GermanyOlivier Markowitch, Université Libre de Bruxelles, BelgiumFabio Martinelli, IIT-CNR, ItalySjouke Mauw, University of Luxembourg, LuxembourgCatherine Meadows, Naval Research Laboratory, USAJohn Mitchell, Stanford University, USAAikaterini Mitrokotsa, Chalmers University of Technology, SwedenRefik Molva, EURECOM, FranceCharles Morisset, Newcastle University, UKRolf Oppliger, eSECURITY Technologies, SwitzerlandStefano Paraboschi, Università di Bergamo, ItalyDusko Pavlovic, University of Hawaii, USAGünther Pernul, Universität Regensburg, GermanyDavid Pichardie, ENS-IRISA, RennesFrank Piessens , Katholieke Universiteit Leuven, BelgiumWolter Pieters, Delft University of Technology, The NetherlandsMichalis Polychronakis, Stonybrook University, USAChristina Pöpper, NYU Abu Dhabi, UAEJoachim Posegga, University of Passau, GermanyChristian Probst, Technical University of Denmark, DenmarkKai Rannenberg, Goeth University, GermanyAwais Rashid, Lancaster University, UKIndrajiti Ray, Colorado State University, USAKui Ren, State University of New York at Buffalo, USAMark Ryan, University of Birmingham, UKPeter Y.A. Ryan, University of Luxembourg, LuxembourgRene Rydhof Hansen, Aarhus University, DenmarkAndrei Sabelfeld, Chalmers University of Technology, SwedenRei Safavi-Naini, University of Calgary, CanadaPierangela Samarati, Universitá degli studi di Milano, ItalyRavi Sandhu, University of Texas at San Antonio, USARalf Sasse, ETH Zürich, SwitzerlandNitesh Saxena, University of Alabama at Birmingham, USAAndreas Schaad, Huawei European Research Center, GermanySteve Schneider, University of Surrey, UKBasit Shafiq, Lahore University of Management Sciences, PakistanEinar Snekkenes, Norwegian University of Science and Technology, NorwayWilly Susilo, University of Wollongong, AustraliaKrzysztof Szczypiorski, Warsaw University of Technology, PolandBjörn Tackmann, IBM Research, SwitzerlandQiang Tang, New Jersey Institute of Technology, USANils Ole Tippenhauer, Singapore University of Technology and Design,Singaporejaideep Tsochou, Ionion University, GreeceVijay Varadharajan, Macquarie University, AustraliaLuca Viganò, King's College London, UKMichael Waidner, Fraunhofer SIT & TU Darmstadt, GermanyCong Wang, City University of Hong Kong, ChinaBen Smyth, Huawei, FranceEdgar Weippl, SBA Research, AustriaStephen Wolthusen, Royal Holloway university, UKChristos Xenakis, University of Piraeus, GreeceJeff Yan, Lancaster University, UKMeng Yu, University of Texas at San Antonio, USABen Zhao, University of California at Santa Barbara, USAJianying Zhou, Institute for Infocomm Research, SingaporeJörg Schwenk, Ruhr-Universität, Bochum Publicity Chair * Cristina Alcaraz, University of Malaga, Spain
Foreign minister Bert Koenders outlined his conviction that the Netherlands needs to be resilient in the digital age. In a letter to parliament, he submitted his plans for an International Cyber Strategy.‘The Netherlands wants a safe, free and open internet. This takes work. We have to protect our vital infrastructure (government agencies, the energy sector and banks) from cyberattacks. To this end we need to form partnerships with other countries, international organisations, the IT sector, academics and civil society organisations,’ Mr Koenders said.In this new strategy the government is focusing on six areas: economic growth and development of the internet; effective internet governance; further enhancement of cybersecurity; cybercrime; international peace, security and stability, and rights and internet freedom.On Monday Mr Koenders will attend the presentation of the Tallinn Manual 2.0 in The Hague. This handbook, written by an international group of prominent jurists, explains how international law can be applied to cyber operations. The foreword was written by the minister.‘The threat posed by cyberattacks and disinformation has only grown in the past few years. The Tallinn Manual 2.0 is an indispensable guide to a largely unexplored new field. Many rules date back to the pre-digital age, but malicious hackers and the wide dissemination of fake news are now a daily reality. We desperately need clarity about the rules so that action can be taken,’ Mr Koenders said.
Een artikel van het World Economic Forum (WEF) recapituleert wat vorige maand op het congres in Davos is gezegd over cyberveiligheid: hackers bedreigen politieke systemen, bedrijven, organisaties en de privacy van burgers. Het artikel vertelt ook hoe overheden en bedrijven zich hiertegen moeten wapenen. Een artikel van Computer Weekly beschrijft wat de belangrijkste zwakke punten in computersystemen van overheden en bedrijven zijn. Een artikel van GovTech vertelt dat veel overheden en bedrijven momenteel kijken naar blockchain als oplossing voor de grootste cyberveiligheidsproblemen. Rapporten van IBM en Deloitte gaan dieper in op de mogelijkheden van blockchain voor overheden respectievelijk bedrijven.Artikel WEFArtikel Computer WeeklyArtikel GovTechRapport IBM (pdf)Rapport Deloitte
Samenvatting en beleidsaanbevelingen uit het rapport 'Opwaarderen.'Het rapport ‘Opwaarderen’ van het Rathenau Instituut laat zien dat overheid, bedrijfsleven en maatschappelijke spelers onvoldoende toegerust zijn om onze fundamentele rechten te beschermen. We hebben onze app’s, onze software en onze technologie wel regelmatig opgewaardeerd, maar we zijn vergeten om de maatschappij te updaten.Het Rathenau Instituut stelt vijf acties voor waarmee politici, beleidsmakers, bedrijven en  maatschappelijke organisaties de digitale samenleving verantwoord kunnen opwaarderen:Visie: stel een overkoepelende kabinetsvisie op over de betekenis van digitalisering en het borgen van grondrechten en mensenrechten.Toezicht: versterk de rol en de positie van toezichthouders.Akkoord: richt een ‘digitaliseringsakkoord’ op waarin bedrijven, overheid en maatschappelijke organisaties hun commitment en verantwoordelijkheden vastleggen voor het beschermen van publieke waarden.Dialoog: organiseer een nationale dialoog over digitalisering en publieke waarden.Check up: zorg voor een periodieke discussie/ check up in de Eerste en Tweede Kamer over de governance van digitaliseringsvraagstukken. Zie ook https://www.rathenau.nl/nl/publicatie/opwaarderen-borgen-van-publieke-waarden-de-digitale-samenleving
Telecombedrijf KPN, onderzoeksinstelling TNO en de gemeente Den Haag willen een Nationaal Cyber Testcentrum realiseren. Het centrum, ook wel Cybersecuritytestbed genoemd, moet antwoord bieden op cyberdreiging bij toenemende digitalisering, zogenaamde slimme steden en het internet of things.‘De veiligheid van digitaal verkeer moeten we zeker stellen. Voor burgers, bedrijven en overheden zijn er grote belangen mee gemoeid. We zien mogelijkheden om een Nationaal Cyber Testcentrum te ontwikkelen als bedrijven, overheden en kennisinstellingen samenwerken. De eerste stap in die samenwerking is nu gezet’, aldus wethouder Ingrid van Engelshoven van de gemeente Den Haag.KPN, TNO en de gemeente Den Haag hopen dat andere partijen zich bij het plan aansluiten. Ze hebben toegezegd dat samen wordt gekeken naar concrete toepassingen en projecten op de korte termijn.KPNTelecomaanbieder KPN ziet in het Nationaal Cyber Testcentrum een meerwaarde voor het verhogen van de digitale veiligheid van internet of things. Joost Farwerck, lid van de Raad van bestuur van KPN: ‘Gezien de impact op de samenleving en in het bijzonder smart cities en smart homes, ondersteunt KPN het Nationaal Cybertestbed om onder andere slimme internet of things (IoT)-apparaten te testen. Zo zullen wij ons landelijk dekkende LoRA IoT-netwerk koppelen aan het Nationaal Cyber Testcentrum om daarmee slimme oplossingen te testen en te ontsluiten voor gebruikers.’RapportHet initiatief vloeit voort uit een verkenningsrapport dat wethouder Ingrid van Engelshoven van de gemeente Den Haag, mede namens de Metropoolregio Rotterdam Den Haag, in ontvangst mocht nemen. In het rapport wordt het nut en de noodzaak van een Nationaal Cybertestbed onder de loep genomen.  https://www.computable.nl/artikel/nieuws/overheid/5956209/1277202/kpn-tno-en-den-haag-willen-cybersecuritycentrum.html
Bekijk het volledige nieuwsoverzicht >