dcypher.nl

You are here

dcypher unites researchers, teachers, manufacturers, users and policy makers to increase knowledge and expertise in the Netherlands in the area of cybersecurity

Impression Seaside Matchmaking Cybersecurity 2016

 

Current

dcypher Symposium 2017 connects cybersecurity knowledgeAre you interested or involved in cybersecurity research, development, innovation, business and/or (higher) education? Come and join us at the first edition of the dcypher Symposium on the 4th of October. There will be a lot to learn, to discuss and share in cybersecurity R&D, innovation and higher education.We believe that networking is essential so there will be many opportunities to meet speakers and participants. Our event is a meeting place for cybersecurity teachers and students, for former, current and possibly future executors of cybersecurity R&D projects, for public and private research partners, for enterprises in need of cybersecurity professionals, for potential profit and non-profit users of research results and policy makers.Register now, seats are limited! Except for networking, the plenary opening and closing sessions, we have sixteen parallel sessions, a demo expo, theme tables and the dcypher Lecture Series. Our event is free of charge. After the summerbreak the Symposium programme will be published. We are proud to announce we currently have the following keynote speakers for our plenary sessions:Presentations (morning)Prof.mr. Lokke Moerel, MOFO, TILTMr. Jack Koons, Unisys The 0-day debate (afternoon)Hans Folmer, CG Defence Cyber Command Prof.dr. Nico van Eijk, IViR Chair of the dayChris van ‘t Hof, Tektok Within our sixteen sessions the following professors, professionals and experts kindly confirmed their cooperation:Prof.dr. Bart Jacobs, RUNRachel Marbus, Privacy Officer KPNProf.dr. Herbert Bos, VUEdwin van Andel, CEO ZerocopterVictor Gevers, Innovation Manager Dutch governmentMaarten Wegdam, InnovalorEelco Vriezenkolk, Agentschap TelecomProf.dr. Wouter Stol, OU, Politie Academy and NLH Dr. Jaap Henk Hoepman, PI-lab and RUN Prof.dr. Pieter Hartel, UT and TUD Dr. Erik Poll, RUN  Prof.dr. Lejla Batina, RUN  Prof.dr. Michel van Eeten, TUD   Petra van Schayik, CEO CompumaticaMary-Jo de Leeuw, Associate Partner RevnextOscar Koeroo, CISO KPNMarleen Weulen-Kranenbarg MSc., NSCR or Mr.dr. Jean Louis van Gelder, NSCRDr. Bibi van den Berg, ULDr. Zeki Erkin, TUDDr. Andreas Peter, UTDr. Nicola Zannone, TU/eRoeland Kegel MSc., UT Prof.dr. Roel Wieringa, UTKarine e Silva, TILT Ellen Mok, TUDJoost Visser, SIG The Lecture SeriesPart of the Symposium is the dcypher Lecture Series. Renowned teachers will give lectures covering different aspects of cybersecurity in the Auditorium of Media Plaza. The Lecture Series is open to all Symposium visitors but students with a strong interested in cybersecurity are specifically invited!11.00 Crime and Law Enforcement in Digital SocietyProf.dr. Wouter Stol11:35 Privacy by DesignDr. Jaap Henk Hoepman12:10 Dark WebProf. dr. Pieter Hartel12:45 lunch break13:30 Cyber bank robberyDr. Erik Poll14:05  Side channel attacks on embedded devicesProf.dr. Lejla Batina14:40 Hacks, sticks and carrots: Improving the incentives for cybersecurityProf.dr. Michel van Eeten  Showcase cybersecurity R&D results, solutions reached in partnership. You will get an impression of the output resulting from earlier tenders for medium term (SBIR) and long term cybersecurity research, both nationally and internationally. Solutions for bridging gaps between cybersecurity higher education curricula and demands from the labor market will be addressed. Sharing ideas will be encouraged, e.g. by discussing challenges of translating research output into innovative solutions, how to make cybersecurity a strength of our infrastructures, how to improve the flow between higher and academic education in cybersecurity. We offer a podium for cybersecurity R&D and education projects, either recently completed or in progress. Also an exposition of new cybersecurity solutions is foreseen.The symposium is organised by dcypher in close cooperation with the Netherlands Organisation for Scientific Research (NWO), the Netherlands Enterprise Agency (RvO), the National Cyber Security Centre (NCSC) and Applied Science Organisation (SIA) in in conjunction with the European Cybersecurity Month and AlertOnline
After a successful first year, the National Cyber Security Summer School is back again in 2017!The NCS3 is a summer school intended to introduce Bachelor’s and Master’s to the topic of Cyber Security. Initiated by the Dutch Cyber Security Council and organised by dcypher (the Dutch Cyber Security Platform for Higher Education and Research), the NCS3 counts with the support of a wide variety of organizations across the public and private sectors, and Universities in the Netherlands. This year, the NCS3 will take its participants to The Hague, Amsterdam, Rotterdam, Utrecht and Eindhoven for a program filled with lectures, active learning sessions, and networking activities that will introduce participants to many different topics of this field.Interested in learning about cyber security? Apply now!For more information please visit www.ncs3.nl
DHS S&T Cyber Security Division, Netherlands Counterparts Announce Bilateral Funding Call Program will fund joint U.S.-Dutch Research Teams On May 17, the Netherlands Organisation for Scientific Research’s (NWO) Science domain and the Ministry of Security & Justice, together with the Cyber Security Division (CSD) of the U.S. Department of Homeland Security (DHS), announced the opening of their bilateral call for proposals. Approximately €2.4 million is being made available for research projects in the field of Cyber Security as part of this joint U.S. – Netherlands Cyber Security Research Program. The research will be conducted jointly by researchers from the United States and the Netherlands.fltr: Douglas Maughan, Jan Piet Barthel and Raymond Doijen (photo Paul Voorham)The call was opened during the International One conference in The Hague by Douglas Maughan, CSD Director, Raymond Doijen, NCSC Head of Cyber Security Expertise and Advice and Jan Piet Barthel, NWO Program Manager Cyber ​​Security Research. The purpose of this new program is to strengthen cooperation between leading researchers in cyber security based in the two participating countries.Patricia Zorko, Ministry of Security and Justice director Cyber Security: “With this joint call we reaffirm our joint mission to foster stronger research links between The Netherlands and the U.S., and strengthen collaboration between our nations’ best cyber security researchers. We can only address the challenges we face now and in the future by investing in our shared knowledge. The NCSC is very proud to have DHS and NWO as partners in this field.”“Cybersecurity concerns do not stop at national borders. This new international bilateral agreement recognizes this reality by funding joint U.S.-Dutch research teams to develop capabilities that will benefit both countries,” said DHS Under Secretary (Acting) for Science and Technology Dr. Robert Griffin. “This bilateral call is a significant step forward in CSD's partnership program with international cybersecurity organizations,” said Maughan. “We are excited because this first-of-its-kind funding will bring about cooperative partnerships between U.S.-based and Netherlands-based researchers, bringing a truly global perspective to an international concern: the cybersecurity of critical infrastructure and networks.”The program’s research will focus on two areas:Industrial Control Systems / Supervisory Control and Data Acquisition Systems andDistributed Denial of Service attacks and the Domain Name Systems. Jan Piet Barthel: “The global challenges of cyber security, the appreciation of the research community and the pilot results achieved, convinced us to continue and strengthen our valuable partnership with DHS-CSD by creating a new joint call.”Half of the available program budget of €2.4 million will be made available by NWO and the Ministry of Security & Justice, with the other half being made available by DHS S&T CSD. The program is expected to provide funding for five research proposals.Bilateral research teams interested in submitting a proposal can do so at their national point of contact for this call – NWO for Dutch applicants and DHS for U.S. applicants. The submission deadline is August 31, 2017, 14:00 CET (08:00 EDT).More information about the call can be found here.Source: NWOAlso visit https://www.ncsc.nl/english/current-topics/news/dhs-st-cyber-security-division-netherlands-counterparts-announce-bilateral-funding-call.html

News

** Submission deadline in a few days: June 29, 2017 ** The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017)September 28-29, 2017, Crete, GreeceIMPORTANT DATESPaper Submission due: June 15, 2017Notification to authors: July 31, 2017Camera ready due: August 15, 2017The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks originalsubmissions from academia and industry presenting novel research on all theoretical and practical aspects of securityand privacy, as well as experimental studies of fielded systems, the application of security technology, theimplementation of systems, and lessons learned. We encourage submissions from other communities such as law, business,and policy that present these communities' perspectives on technological issues.In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing togetherresearchers and practitioners in related areas and to encourage interchange and cooperation between the researchcommunity and the industrial/consumer community. From 2015, due to increased participation it has become a Conference.Submissions with regards to the security of future ICT technologies, such as cyber-physical systems, cloud services,data science and the Internet of Things are particularly welcome.Other topics of interest include, but are not limited to:* Security and Privacy in Smart Devices- Biometrics, National ID cards- Embedded Systems Security and TPMs- Interplay of TPMs and Smart Cards- Mobile Codes Security- Mobile Devices Security- Mobile Malware- Mobile OSes Security Analysis- New Applications for Secure RFID Systems- RFID Systems- Smart Card- Smart Devices Applications- Wireless Sensor Node   * Security and Privacy in Networks- Ad Hoc Networks- Delay-Tolerant Network- Domestic Network- GSM/GPRS/UMTS Systems- Peer-to-Peer Networks- Security Issues in Mobile and Ubiquitous Networks- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks- Vehicular Network- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others   * Security and Privacy in Architectures, Protocols, Policies, Systems and Applications- BYOD Contexts- Cloud-enhanced Mobile Security- Critical Infrastructure (e.g. for Medical or Military Applications)- Cyber-Physical Systems- Digital Rights Management (DRM)- Distributed Systems and Grid Computing- Information Assurance and Trust Management- Intrusion Detection and Information Filtering- Lightweight cryptography- Localization Systems (Tracking of People and Goods)- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine toHuman)- Mobile Commerce- Multimedia Applications- Public Administration and Governmental Services- Pervasive Systems- Privacy Enhancing Technologies- Secure self-organization and self-configuration- Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection- Security Policies (Human-Computer Interaction and Human Behavior Impact)- Security Measurements- Smart Cities- Systems Controlling Industrial Processes  SUBMISSION INSTRUCTIONS--------------------------Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to ajournal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer LNCSformat.For detailed instructions please see the website - www.wistp.org 
From 25 to 29 September, The Hague is hosting the second edition of the international Cyber Security Week. During more than 40 events, hundreds of experts in cyber security and cybercrime working for governments, businesses and knowledge institutions will share their knowledge, discuss the latest developments and pitch innovative ideas. Together they will look for innovative solutions for one of the biggest challenges in our modern, digital world: how can we guarantee a secure cyber future? Important events at the Cyber Security Week are the Europol-INTERPOL cybercrime conference and the final of the EC-Council hacking competition Global CyberLympics.The urgency of the issue cannot be exaggerated. The hack of the American elections and the recent attack with the WannaCry ransomware are just two examples of alarming actions that can seriously disrupt our digital world and cause huge economic damage. As international data hub and digital gateway to Europe, the Netherlands plays an important role in fighting these threats and optimally guaranteeing the cyber security of our critical infrastructures.Participants in the Cyber Security Week include Europol, INTERPOL, NATO, representatives of various European security clusters from the UK, Belgium, Germany and France, among others, and many big and small businesses that are specialised in cyber security. Through seminars, lectures, workshops, challenges and show cases, the participants and visitors to the CSW will hear the latest 'ins and outs' with regard to cyber security and be invited to share, enhance and apply their knowledge.The Cyber Security Week is an initiative of The Hague Security Delta (HSD), the leading security cluster in Europe, in which businesses, governments and knowledge institutions work together on cyber security innovations and knowledge development, national and urban security issues, the protection of critical infrastructure and forensics. Many events of the CSW will take place at the HSD campus, but other locations in the Hague - the International City of Peace, Justice and Security - will also host events, including the WTC, the Fokker Terminal and New Babylon.The Cyber Security Week will be opened by the deputy mayor of The Hague, Saskia Bruines. Bruines: “Cyber security is one of the biggest challenges of our modern society. International collaboration and sharing knowledge are crucial in this respect. There are also major business opportunities. This is why The Hague has developed itself into an important international centre for cyber security. The organisation of the Cyber Security Week is a good example of this."More information about the programme can be found at: www.cybersecurityweek.nl
The deadline has been extended to June 23, 2017 (11:59 p.m. American Samoa time) for STM 2017 (Oslo, Norway - September 14-15, co-located with with ESORICS 2017). Submission deadline extended to June 23, 2017 (11:59PM American Samoa time). 13th International Workshop on Security and Trust Management (STM 2017) Oslo, Norway - September 14-15, 2017 http://stm2017.di.unimi.it co-located with with ESORICS 2017STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2017 is the thirteenth workshop in this series and will be held in Oslo, Norway, in conjunction with the 22nd European Symposium On Research in Computer Security (ESORICS 2017).The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICT.Topics of interest include, but are not limited to:Access controlAnonymityApplied cryptographyAuthenticationComplex systems securityData and application securityData protectionData/system integrityDigital rights managementEconomics of security and privacyFormal methods for security and trustIdentity managementLegal and ethical issuesMobile securityNetworked systems securityOperating systems securityPrivacySecurity and trust metricsSecurity and trust policiesSecurity and trust management architecturesSecurity and trust for big dataSecurity and trust in cloud environmentsSecurity and trust in content delivery networksSecurity and trust in crowdsourcingSecurity and trust in grid computingSecurity and trust in the Internet of ThingsSecurity and trust in pervasive computingSecurity and trust in servicesSecurity and trust in social networksSocial implications of security and trustTrust assessment and negotiationTrust in mobile codeTrust modelsTrust management policiesTrust and reputation systemsTrusted platformsTrustworthy systems and user devicesSUBMISSION INSTRUCTIONSAll submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations).Submissions should be at most 16 pages in the LNCS format, including the bibliography and well-marked appendices. All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers).The final version of an accepted paper must be in the format required for publication in the LNCS series. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions are to be made to the submission web site athttps://easychair.org/conferences/?conf=stm2017 .Papers must be received by the extended deadline of June 23, 2017(11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop.The proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.A paper submitted to STM 2017 cannot be under review for any other conference or journal during the time it is being considered for STM 2017. Furthermore, after you submit to STM 2017, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before/after submission of the paper to STM 2017, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.IMPORTANT DATESPaper submission due: June 23, 2017 (11:59 p.m. American Samoa time) [extended] Notification to authors: July 27, 2017 Camera ready due: August 05, 2017PROGRAM CHAIRSGiovanni Livraga, Universita' degli Studi di Milano, ItalyChris Mitchell, Royal Holloway, University of London, UKPROGRAM COMMITTEEKen Barker, University of Calgary, Canada Colin Boyd, NTNU, Norway David Chadwick, University of Kent, UK Liqun Chen, University of Surrey, UK Jorge Cuellar, Siemens AG, Germany Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Sara Foresti, Universita' degli Studi di Milano, Italy Joaquin Garcia-Alfaro, Telecom SudParis, France Ehud Gudes, Ben-Gurion University, Israel Michael Huth, Imperial College, UK Costas Lambrinoudakis, University of Piraeus, Greece Javier Lopez, University of Malaga, Spain Fabio Martinelli, CNR, Italy Sjouke Mauw, University of Luxembourg, Luxembourg Catherine Meadows, NRL, USA Stig Mjolsnes, NTNU, Norway Charles Morisset, Newcastle University, UK Siani Pearson, HP, UK Gunther Pernul, University of Regensburg, Germany Marinella Petrocchi, CNR, Italy Benoit Poletti, INCERT GIE, Luxembourg Silvio Ranise, FBK, Italy Ralf Sasse, ETH Zurich, Switzerland Daniele Sgandurra, Royal Holloway, University of London, UK Vicenc Torra, University of Skovde, Sweden Fabian Van Den Broek, Radboud University of Nijmegen, Netherlands Vijay Varadharajan, University of Newcastle, Australia Damien Vergnaud, ENS, France Cong Wang, City University of Hong Kong, Hong Kong If you have any question, please contact the program chairs at stm2017pcchairs@gmail.com 
 It isn’t just about risk reduction anymore. Perimeter-based security isn’t enough. Take a zero-trust approach to data security.VIEW NOWMost Security & Risk Professionals focus on risk reduction, but your data security approach is a chief differentiator for your company. How can you harness its power to drive growth? Read the Forrester Report: The Future of Data Security and Privacy to:Learn 5 ways data security drives competitive advantageUncover 4 inadequacies of perimeter-based modelsDiscover how a zero-trust approach sets you up for successTake your data security and privacy to the next level. VIEW NOW
KTH Royal Institute of Technology, School of Electrical EngineeringKTH Royal Institute of Technology in Stockholm has grown to become one of Europe’s leading technical and engineering universities, as well as a key centre of intellectual talent and innovation. We are Sweden’s largest technical research and learning institution and home to students, researchers and faculty from around the world. Our research and education covers a wide area including natural sciences and all branches of engineering, as well as in architecture, industrial management, urban planning, history and philosophy.Become a part of world-leading research and education! The School of Electrical Engineering is one of ten schools at KTH. We conduct research and education in Electrical Engineering, Systems Engineering, Information Technology, Space, Fusion and Plasma Physics. The field of electrical and electronic engineering at KTH is internationally recognized and places high in international rankings. The school is responsible for bachelor and master programs in Electrical Engineering which are closely linked to our research fields. 450 people work together in an international environment in eight departments and in the Dean’s office.At the Department of Electric Power and Energy Systems the Software Systems Architecture & Security group does research in cyber security, threat modeling, attack simulations, risk management, software engineering, and architecture modeling. The group staff consists of three professors, one post-doc, and and three PhD students who contribute to a high professional standard of intensive work and quality results, as well as to a friendly and open environment. The staff has a multicultural background and the working language is English. The department is internationally well established, has many research collaborations with excellent partners worldwide, and is involved in several European and national projects.https://www.kth.se/en/om/work-at-kth/lediga-jobb/what:job/jobID:154895/type:job/where:4/apply:1  Project descriptionIncreasing use of computers and networking lead to increasing vulnerability of modern vehicles to cyberattacks. Due to the increasing complexity of systems, it is very difficult to manually map the large number of attack paths available to potential attackers. A clear understanding of the threats and vulnerabilities is a prerequisite for an efficient defense. Software tools for threat modeling and attack simulations can today be used to assess the probability that an attacker will reach the various parts of the vehicle system. These tools thus provide a useful evaluation of the security of a system, as well as the effects of system changes on the overall security. However, in the automotive domain, there are currently no tools available for threat modeling and simulation. The purpose of the project is to create a threat modeling and simulation language specifically tailored to automotive IT.The PhD program in Electrical Engineering provides world class quality education, including a large list of graduate courses ensuring an in-depth development of relevant competences and skills.KTH offers an attractive working environment, generous remuneration, as well as other employment benefits. As a PhD student at KTH you have many opportunities to participate at conferences, projects and other relevant events which will extend your professional network and benefit your future career.QualificationsThe successful applicant is expected to hold or to be about to receive an MSc degree in computer science, information systems, electrical engineering, or similar. A specialization in cyber security is an asset.The successful applicant should have an outstanding academic track record, and well developed analytical and problem solving skills. We are looking for a strongly motivated person, who is able to work independently. Good command of English orally and in writing is required to publish and present results at international conferences and in international journals.Trade union representativesYou will find contact information to trade union representatives at KTH's webpage.ApplicationLog into KTH:s recruitment system in order to apply to this position. You are the main responsible to ensure that your application is complete according to the ad. Your complete application must be received at KTH no later than the last day of the application period.The application must include:CV including your relevant professional experience and knowledge.Copy of the degree certificate(s) and transcripts of records from your previously attended university-level institutions. Translations into English or Swedish if the original documents are not issued in one of these languages.Statement of purpose: Why do you want to pursue a PhD, what are your academic interests, how they relate to your previous studies and future goals; maximum 2 pages long.Representative publications or technical reports: Documents no longer than 10 pages each. For longer documents (e.g. theses), please provide a summary (abstract) and a web link to the full text.Letters of recommendationContact information for two reference persons. We reserve us the right to contact references only for shortlisted candidates.OthersThe employment is time limited following the regulations for Ph.D. employment in the Higher Education Ordinance (~ 5 years when 80% PhD studies and 20% department service including teaching). We firmly decline all contact with staffing and recruitment agencies and job ad salespersons.Disclaimer: In case of discrepancy between the Swedish original and the English translation of the job announcement, the Swedish version takes precedence.Type of employmentTemporary position longer than 6 monthsContract typeFull timeFirst day of employmentAccording to agreement, preferably as soon as possibleSalaryMonthly salary according to KTH´s Ph.D. student salary agreementNumber of positions1Working hours100%CityStockholmCountyStockholms länCountrySwedenReference numberE-2017-0695ContactRobert Lagerström, Associate Professor, robertl@kth.se, +46 8 790 68 66Mikael Visén, HR Administrator, rekrytering@ee.kth.se, +46 8 790 84 89Published15.Jun.2017Last application date15.Aug.2017 11:59 PM CET
View all news items >