dcypher.nl

You are here

dcypher unites researchers, teachers, manufacturers, users and policy makers to increase knowledge and expertise in the Netherlands in the area of cybersecurity

Impression Nationale Cyber Security Summer School 2016

Current

dcypher Symposium 2017 connects cybersecurity knowledge Are you interested or involved in cybersecurity research, development, innovation, business and/or (higher) education? Come and join us at the first edition of the dcypher Symposium on the 4th of October. There will be a lot to learn, to discuss and share in cybersecurity R&D, innovation and higher education.We believe that networking is essential so there will be many opportunities to meet speakers and participants. Our event is a meeting place for cybersecurity teachers and students, for former, current and possibly future executors of cybersecurity R&D projects, for public and private research partners, for enterprises in need of cybersecurity professionals, for potential profit and non-profit users of research results and policy makers.Register now, seats are limited! Except for networking, the plenary opening and closing sessions, we have sixteen parallel sessions, a demo expo, theme tables and the dcypher Lecture Series. Our event is free of charge. After the summerbreak the Symposium programme will be published. We are proud to announce we currently have the following keynote speakers for our plenary sessions:Presentations (morning)Prof.mr. Lokke Moerel, MOFO, TILTMr. Jack Koons, Unisys The 0-day debate (afternoon)Hans Folmer, CG Defence Cyber Command Ronald Prins, Founder and CTO of Fox IT Kees Verhoeven, Member of the Second ChamberNico van Eijk, Institute for Information Law (IViR, University of Amsterdam)  ​​​​​​​Chair of the dayChris van ‘t Hof, Tektok Within our sixteen sessions the following professors, professionals and experts kindly confirmed their cooperation:Prof.dr. Bart Jacobs, RUNProf.dr. Herbert Bos, VUEdwin van Andel, CEO ZerocopterVictor Gevers, Innovation Manager Dutch governmentMaarten Wegdam, InnovalorEelco Vriezenkolk, Agentschap TelecomProf.dr. Wouter Stol, OU, Politie Academy and NLH Dr. Jaap Henk Hoepman, PI-lab and RUN Prof.dr. Pieter Hartel, UT and TUD Dr. Erik Poll, RUN  Prof.dr. Lejla Batina, RUN  Prof.dr. Michel van Eeten, TUD   Petra van Schayik, CEO CompumaticaMary-Jo de Leeuw, Associate Partner RevnextOscar Koeroo, CISO KPNMarleen Weulen-Kranenbarg MSc., NSCR or Mr.dr. Jean Louis van Gelder, NSCRDr. Bibi van den Berg, ULDr. Zeki Erkin, TUDDr. Andreas Peter, UTDr. Nicola Zannone, TU/eRoeland Kegel MSc., UT Prof.dr. Roel Wieringa, UTKarine e Silva, TILT Ellen Mok, TUDJoost Visser, SIG The Lecture SeriesPart of the Symposium is the dcypher Lecture Series. Renowned teachers will give lectures covering different aspects of cybersecurity in the Auditorium of Media Plaza. The Lecture Series is open to all Symposium visitors but students with a strong interested in cybersecurity are specifically invited!11.00 Crime and Law Enforcement in Digital SocietyProf.dr. Wouter Stol11:35 Privacy by DesignDr. Jaap Henk Hoepman12:10 Dark WebProf. dr. Pieter Hartel12:45 lunch break13:30 Cyber bank robberyDr. Erik Poll14:05  Side channel attacks on embedded devicesProf.dr. Lejla Batina14:40 Hacks, sticks and carrots: Improving the incentives for cybersecurityProf.dr. Michel van Eeten  Showcase cybersecurity R&D results, solutions reached in partnership. You will get an impression of the output resulting from earlier tenders for medium term (SBIR) and long term cybersecurity research, both nationally and internationally. Solutions for bridging gaps between cybersecurity higher education curricula and demands from the labor market will be addressed. Sharing ideas will be encouraged, e.g. by discussing challenges of translating research output into innovative solutions, how to make cybersecurity a strength of our infrastructures, how to improve the flow between higher and academic education in cybersecurity. We offer a podium for cybersecurity R&D and education projects, either recently completed or in progress. Also an exposition of new cybersecurity solutions is foreseen.The symposium is organised by dcypher in close cooperation with the Netherlands Organisation for Scientific Research (NWO), the Netherlands Enterprise Agency (RvO), the National Cyber Security Centre (NCSC) and Applied Science Organisation (SIA) in in conjunction with the European Cybersecurity Month and AlertOnline
After a successful first year, the National Cyber Security Summer School is back again in 2017!The NCS3 is a summer school intended to introduce Bachelor’s and Master’s to the topic of Cyber Security. Initiated by the Dutch Cyber Security Council and organised by dcypher (the Dutch Cyber Security Platform for Higher Education and Research), the NCS3 counts with the support of a wide variety of organizations across the public and private sectors, and Universities in the Netherlands. This year, the NCS3 will take its participants to The Hague, Amsterdam, Rotterdam, Utrecht and Eindhoven for a program filled with lectures, active learning sessions, and networking activities that will introduce participants to many different topics of this field.Interested in learning about cyber security? Apply now!For more information please visit www.ncs3.nl
DHS S&T Cyber Security Division, Netherlands Counterparts Announce Bilateral Funding Call Program will fund joint U.S.-Dutch Research Teams On May 17, the Netherlands Organisation for Scientific Research’s (NWO) Science domain and the Ministry of Security & Justice, together with the Cyber Security Division (CSD) of the U.S. Department of Homeland Security (DHS), announced the opening of their bilateral call for proposals. Approximately €2.4 million is being made available for research projects in the field of Cyber Security as part of this joint U.S. – Netherlands Cyber Security Research Program. The research will be conducted jointly by researchers from the United States and the Netherlands.fltr: Douglas Maughan, Jan Piet Barthel and Raymond Doijen (photo Paul Voorham)The call was opened during the International One conference in The Hague by Douglas Maughan, CSD Director, Raymond Doijen, NCSC Head of Cyber Security Expertise and Advice and Jan Piet Barthel, NWO Program Manager Cyber ​​Security Research. The purpose of this new program is to strengthen cooperation between leading researchers in cyber security based in the two participating countries.Patricia Zorko, Ministry of Security and Justice director Cyber Security: “With this joint call we reaffirm our joint mission to foster stronger research links between The Netherlands and the U.S., and strengthen collaboration between our nations’ best cyber security researchers. We can only address the challenges we face now and in the future by investing in our shared knowledge. The NCSC is very proud to have DHS and NWO as partners in this field.”“Cybersecurity concerns do not stop at national borders. This new international bilateral agreement recognizes this reality by funding joint U.S.-Dutch research teams to develop capabilities that will benefit both countries,” said DHS Under Secretary (Acting) for Science and Technology Dr. Robert Griffin. “This bilateral call is a significant step forward in CSD's partnership program with international cybersecurity organizations,” said Maughan. “We are excited because this first-of-its-kind funding will bring about cooperative partnerships between U.S.-based and Netherlands-based researchers, bringing a truly global perspective to an international concern: the cybersecurity of critical infrastructure and networks.”The program’s research will focus on two areas:Industrial Control Systems / Supervisory Control and Data Acquisition Systems andDistributed Denial of Service attacks and the Domain Name Systems. Jan Piet Barthel: “The global challenges of cyber security, the appreciation of the research community and the pilot results achieved, convinced us to continue and strengthen our valuable partnership with DHS-CSD by creating a new joint call.”Half of the available program budget of €2.4 million will be made available by NWO and the Ministry of Security & Justice, with the other half being made available by DHS S&T CSD. The program is expected to provide funding for five research proposals.Bilateral research teams interested in submitting a proposal can do so at their national point of contact for this call – NWO for Dutch applicants and DHS for U.S. applicants. The submission deadline is August 31, 2017, 14:00 CET (08:00 EDT).More information about the call can be found here.Source: NWOAlso visit https://www.ncsc.nl/english/current-topics/news/dhs-st-cyber-security-division-netherlands-counterparts-announce-bilateral-funding-call.html

News

18th Privacy Enhancing Technologies Symposium (PETS 2018) July 24--27 2018, Barcelona, Spain General information: https://petsymposium.org/ Submission server: https://submit.petsymposium.org/2018.2/The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 18th PETS event will be organized by Eticas and held in Barcelona, Spain (dates tbd). Papers undergo a journal-style reviewing process and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).PoPETs, a scholarly, open access journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs is published by De Gruyter Open, the world's second largest publisher of open access academic content, and part of the De Gruyter group, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges.Papers submitted to PETS/PoPETs should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below.PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. To be suitable for publication, SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions. SoK papers will follow the same review process as other submissions, and will be published in PoPETs and presented at the PETS 2018 event.Authors can submit papers to PoPETs four times a year, every three months on a predictable schedule. The four submission deadlines for the 2018 volume of PoPETs are in May 2017, Aug 2017, Nov 2017, and Feb 2018. Papers accepted for an issue in the 2018 volume will be presented at PETS 2018. Note that accepted papers must be presented at PETS.Authors are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised versions.Submit papers for PoPETs 2018, Issue 2 at https://submit.petsymposium.org/2018.2/. Please see the submission guidelines at https://petsymposium.org/authors.php#submission-guidelines and view our FAQ at https://petsymposium.org/faq.php for more information about the process. Important Dates for PETS 2018 Issue 2All deadlines are 23:59:59 American Samoa time (UTC-11) Paper submission deadline: August 31, 2017 (firm) Rebuttal period: October 9 -- 11, 2017 Author notification: October 31, 2017 Camera-ready deadline for accepted papers and minor revisions (if accepted by the shepherd): December 15, 2017Authors invited to resubmit with major revisions can submit the revised (full) paper two weeks after the stated deadline. Such papers must, however, be registered with an abstract by the usual deadline. All other papers than these major revision resubmissions must be submitted by the stated deadline, including papers submitted to and rejected from previous issues. To benefit from the two-week deadline extension, major revisions must be submitted to one of the two issues following the decision. Major revisions submitted to later issues are treated as new submissions, due by the regular deadline and possibly assigned to new reviewers. Suggested topics include but are not restricted to:Behavioural targeting Building and deploying privacy-enhancing systems Crowdsourcing for privacy Cryptographic tools for privacy Data protection technologies Differential privacy Economics of privacy and game-theoretical approaches to privacy Empirical studies of privacy in real-world systems Forensics and privacy Human factors, usability and user-centered design for PETs Information leakage, data correlation and generic attacks to privacy Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology, human rights Location and mobility privacy Machine learning and privacy Measuring and quantifying privacy Mobile devices and privacy Obfuscation-based privacy Policy languages and tools for privacy Privacy in cloud and big-data applications Privacy in social networks and microblogging systems Privacy-enhanced access control, authentication, and identity management Profiling and data mining Reliability, robustness, and abuse prevention in privacy systems Surveillance Systems for anonymous communications and censorship resistance Traffic analysis Transparency enhancing tools Web privacy General Chair (gc18@petsymposium.org)Gemma Galdón Clavell, Eticas Program Chairs/Co-Editors-in-Chief (pets18-chairs@petsymposium.org) Rachel Greenstadt, Drexel UniversityDamon McCoy, New York UniversityCarmela Troncoso, IMDEA Software Institute Program Committee/Editorial Board:Gunes Acar, KU Leuven William Aiello, University of British Columbia Abdelrahaman Aly, KU Leuven Alessandro Aquisti, Carnegie Mellon University Mashael Al-Sabah, Qatar University Shehar Bano, University College London Kevin Bauer, MIT Lincoln Laboratory Matt Blaze, University of Pennsylvania Sonja Buchegger, KTH Royal Institute of Technology Kelly Caine, Clemson University Aylin Caliskan, Princeton University Jean Camp, Indiana University Bloomington Sherman S.M. Chow, Chinese University of Hong Kong Christopher Clifton, Purdue University Scott Coull, FireEye Jed Crandall, University of New Mexico Emiliano De Cristofaro, University College London Rinku Dewri, University of Denver Claudia Diaz, KU Leuven Roger Dingledine, The Tor Project Tariq Elahi, KU Leuven Giulia Fanti, University of Illinois at Urbana-Champaign David Fifield, University of California, Berkeley Simone Fischer-Hübner, Karlstad University Arthur Gervais, Imperial College London Ian Goldberg, University of Waterloo Thomas Groß, Newcastle University Jens Grossklags, Technical University Munich Seda Gurses, KU Leuven Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein Ryan Henry, Indiana University Bloomington Jaap-Henk Hoepman, Radboud University Nijmegen Amir Herzberg, Bar Ilan University Mireille Hildebrandt, Radboud University Nijmegen Nick Hopper, University of Minnesota Amir Houmansadr, University of Massachusetts Amherst Yan Huang, Indiana University Bloomington Kévin Huguenin, Université de Lausanne Aaron Johnson, U.S. Naval Research Laboratory Apu Kapadia, Indiana University Bloomington Aniket Kate, Purdue University Stefan Katzenbeisser, TU Darmstadt Florian Kershbaum, University of Waterloo Negar Kiyavash, University of Illinois at Urbana-Champaign Boris Koepf, IMDEA Software Institute Markulf Kohlweiss, Microsoft Research Ponnurangam Kumaraguru, IIIT Delhi Alptekin Kupku, Koç University Peeter Laud, Cybernetica Adam J. Lee, University of Pittsburgh Douglas Leith, Trinity College Dublin Janne Lindqvist, Rutgers University Ashwin Machanavajjhala, Duke University Nick Mathewson, The Tor Project Aleecia McDonald, Stanford University Sarah Meiklejohn, University College London Prateek Mittal, Princeton University Takao Murakami, National Institute of Advanced Industrial Science and Technology (AIST) Steven Murdoch, University College London Arvind Narayanan, Princeton University Muhammad Naveed, University of Southern California Shirin Nilizadeh, UCSB Guevara Noubir, Northeastern University Cristina Onete, INSA/IRISA Rennes Paul Pearce, UC Berkeley Adrian Perrig, ETHZ Bart Preneel, KU Leuven Ananth Raghunathan, Google Kasper Rasmussen, University of Oxford Joel Reardon, UC Berkeley / ICSI Michael Reiter, UNC Chapel Hill Alfredo Rial, University of Luxembourg Franziska Roesner, University of Washington Thomas Roessler, Google Stefanie Roos, University of Waterloo Ahmad-Reza Sadeghi, Technische University Darmstadt Martin Schmiedeckre, SBA Research Peter Schwabe, Radboud Univeristy Nijmegen Claudio Soriente, Telefonica Research Thorsten Strufe, TU Dresden Paul Syverson, U.S. Naval Research Laboratory Abhradeep Thakurta, UC Santa Cruz Michael Tschantz, UC Berkeley Gene Tsudik, UC Irvine Doug Tygar, UC Berkeley Eugene Vasserman, Kansas State University Michael Waidner, Fraunhofer SIT and TU Darmstadt Tao Wang, Hong Kong University of Science and Technology Tara Whalen, Google Philipp Winter, Princeton University Joss Wright, Oxford Internet Institute Matthew Wright, RIT Submission GuidelinesFor full details of submission guidelines please refer to: https://petsymposium.org/authors.php#submission-guidelines. Papers not following these instructions risk being rejected without consideration of their merits! Andreas Pfitzmann Best Student Paper Award The Andreas Pfitzmann PETS 2018 Best Student Paper Award will be selected at PETS 2018. Papers written solely or primarily by a student who is presenting the work at PETS 2018 are eligible for the award. Submission Papers must be submitted via the PETS 2018 submission server. The URL for Issue 2 is: https://submit.petsymposium.org/2018.2/. HotPETsAs with the last several years, part of the symposium will be devoted to HotPETs -- the "hottest," most exciting research ideas still in a formative state. Further information will be published on the PETS 2018 website soon. 
Hundreds of experts in cyber security and cybercrime working for governments, businesses and knowledge institutions will share their knowledge, discuss the latest developments and pitch innovative ideas during Cyber Security Week 2017.This week will take place from 25-29 September 2017 in The Hague, the Netherlands. Participation for most events is open and free of costs, but seats are limited. Participants can select their own personal programme from more than 70 events and join a matchmaking programme to find business partners.Together we share our knowledge and look for innovative solutions for one of the biggest challenges in our modern, digital world: how can we guarantee a secure cyber future?Register here < https://www.cybersecurityweek.nl/ >
7th STAST Workshop (Socio-Technical Aspects in Security and Trust)Title and Abstract: September 20, 2017, 23.59 AoE (= UTC-12)Full Paper: September 25, 2017, 23.59, AoE (= UTC-12)Notification: October 30, 2017Camera Ready: November 20, 2017SUBMISSIONWe accept:Full PapersPosition PapersCase StudiesFor more details, please visit our web page: http://stast.uni.luCONCEPT AND GOALSuccessful attacks on information systems often combine social engineering practices with technical skills. Research in social sciences and usable security has demonstrated that insecure behavior can be justified from cognitive, emotional, and social perspectives and to improve security, technology must adapt to the users.  However, finding the right balance between the technical and the social security measures remains largely unexplored, which motivates the need for this workshop.There is no established holistic research in security, and the respective communities tend to offload on each other parts of problems that they consider to be out of scope, an attitude that results in deficient or unsuitable security solutions.The workshop intends to stimulate an exchange of ideas and experiences on how to design systems that are secure in the real world where they interact with non-expert users. It aims at bringing together experts in various areas of computer security and in social and behavioral sciences.PROCEEDINGSThe final proceedings will be published with the ACM International Conference Proceedings SeriesWORKSHOP TOPICS Requirements for socio-technical systems Feasibility of policies from the socio-technical perspective Threat models that combine technical and human-centred strategies Technical and social factors that influence decision making in security and privacy Balance between technical measures and social strategies in ensuring security and privacy Studies of real-world security incidents from the socio-technical perspective Social factors that influence changes in organizations security policies and processes Lessons learned from holistic design and deployment of security mechanisms and policies Models of user behaviour and user interactions with technology Perceptions of security, risk and trust and their influence on human behaviour Interplay of law, ethics and politics with security and privacy measures Social engineering, persuasion, and other deception techniques Socio-technical analysis of security incidents Strategies, methodology and guidelines for socio-technical and cyber-security intelligence analysis We welcome qualitative and quantitative research approaches from academia and industry INVITED SPEAKERRobert L. Biddle (Carleton University) ORGANIZINGATIONProgramme ChairsZinaida Benenson (University of Erlangen-Nuremberg)Daniela Oliveira (University of Florida) Workshop OrganizersGiampaolo Bella (University of Catania)Gabriele Lenzini (University of Luxembourg) Programme CommitteeAdam Aviv (United States Naval Academy) Matt Bishop (University of California, Davis) Lynne Coventry (University of Northumbria) Sarah Diesburg (University of Northern Iowa) Natalie Ebner (University of Florida) Ben Edwards (IBM) Thomas Groß (University of Newcastle) Markus Jakobsson (Agari) Lydia Kraus (Technische Universität Berlin) Kat Krol (University of Cambridge) Mohammad Mannan (Concordia University) Brandon Matthews (MIT Lincoln Laboratory) Maryam Mehrnezhad (University of Newcastle) Simon Parkin (University College London) Sasa Radomirovic (University of Dundee) Karen Renaud (University of Glasgow) Volker Roth (Freie Universität Berlin) Scott Ruoti (MIT Lincoln Laboratory) Jessica Staddon (Google) Julie Thorpe (University of Ontario Institute of Technology) Melanie Volkamer (Karlstad University) Chenxi Wang (Twistlock) Pamela Wisniewski (University of Central Florida) Rick Wash (Michigan State University) Jeff Yan (University of Lancaster) 
The second edition of the CNIL-Inria Privacy Protection Award has been launched in ay. It will reward a scientific paper on privacy and personal data protection published in 2015-2016. The award is intended to raise awareness and promote research on privacy and data protection.The first award was granted on 25 January 2017, during the 10th edition of the international conference Computer Privacy and Data Protection (CPDP) in Brussels by Isabelle Falque-Pierrotin, President of CNIL , and François Sillion, Deputy Vice President of Science at Inria, to Michael Backes, Manuel Barbosa, Dario Fiore and Raphael M. Reischuk for their paper: “ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data”.Submitted papers should describe a fundamental research result, a technical innovation, a didactic presentation of the state of the art, or an interdisciplinary approach. Possible topics include (without limitation):     Privacy by design     Algorithm transparency     Privacy Enhancing Technologies (PETs)     Anonymisation     Privacy risk analysis     Control on personal data     Accountability All relevant information, including the rules and submission procedure is available at :https://www.inria.fr/en/news/news-from-inria/launch-of-2nd-edition-of-inria-cnil-privacy-award The deadline for submission is 1 September 2017 and the award will be delivered during CPDP in January 2018.Award Jury :     Emiliano De Cristofaro, University College, London     Josep Domingo-Ferrer, Universitat Rovira i Virgili, UNESCO Chair in Data Privacy     Simone Fischer-Hübner, Karlstad University     Sébastien Gambs, Université du Québec à Montréal     Krishna Gummadi, Max Planck Institute     Jaap-Henk Hoepman, Radboud University Nijmegen     Yves-Alexandre de Montjoye, Imperial College, London     Daniel Le Métayer, Inria     Gwendal Le Grand, CNIL     Claude Castelluccia, Inria     Matthieu Grall, CNIL
Cybersecurity is a global sport!” That is the worldview Dr. Douglas Maughan takes when it comes to fighting cyber-threats. Maughan, director of the Department of Homeland Security Science and Technology Directorate’s (S&T) Cyber Security Division (CSD), uses that phrase to spotlight the partnerships S&T has with numerous government and international cybersecurity entities around the world.Because of this need for a global focus, CSD has established active partnerships with cybersecurity organizations in 13 countries—including the United Kingdom, Australia, Canada, Singapore and Israel—and an international body—the European Union.A shining example of a mutually beneficial partnership is the cooperative relationship CSD enjoys with its counterparts in the Netherlands: the Netherlands Organization for Scientific Research (NWO) and the country’s National Cyber Security Center (NCSC), part of the Ministry of Security and Justice.The U.S.-Dutch research-and-development (R&D) partnership spans numerous years and encompasses a range of activities, capped most recently with the announcement of an innovative $2.6 million funding opportunity that promotes the formation of joint U.S.-Dutch research teams.The goal of this newest initiative—announced mid-May—is to strengthen R&D collaboration between top cybersecurity researchers from both nations. The two research focus areas for the bilateral call are Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) and Distributed Denial of Service Defenses. In all, the partners plan to fund up to five unified research proposals that detail a full program of work to be conducted by teams comprised of academia, industry and laboratory (U.S. only) researchers from both countries.Under the program, half of the R&D funding will be provided by CSD through its International Broad Agency Announcement (BAA) HSHQDC-17-R-B001, which was published on FedBizOpps in February. This five-year, $9.5 million BAA will be used to facilitate cooperative cybersecurity R&D activities with CSD’s current and future international partners. Funding from the BAA will be awarded to U.S.-based researchers.Meanwhile, NWO and NCSC will award funding for the other half of the program to researchers based in the Netherlands.Interested U.S.-Netherlands cybersecurity research teams have until August 31, 2017 to submit a combined proposal to their respective country’s participating organization.“This bilateral call is a significant step forward in CSD’s partnership program with international cybersecurity organizations,” said Maughan, when the funding opportunity was announced. “We are excited because this first-of-its-kind funding will bring about cooperative partnerships between U.S.- and Netherlands-based researchers, bringing a truly global perspective to an international concern: the cybersecurity of critical infrastructure and networks.”“With this joint call we reaffirm our joint mission to foster stronger research links between the Netherlands and the U.S. and strengthen collaboration between our nations’ best cybersecurity researchers. We can only address the challenges we face now and in the future by investing in our shared knowledge,” said Patricia Zorko, director of cybersecurity in the Ministry of Security and Justice.This cooperative funding opportunity builds upon research projects previously conducted jointly by the two countries. Since 2013, CSD in cooperation with NCSC and NWO has worked on the following research projects:Malware on Smartphones: Collection, Analysis and Defensive Measures—In this project, the two sides jointly worked to create an online analysis engine that can detect potentially malicious activity or a capability to induce potentially malicious activity in apps.Reducing the Challenges to Making Cybersecurity Investments in the Private Sector—Under this project, the two sides developed models and policies for encouraging private-sector entities, especially those in the critical infrastructure sphere, to invest in cybersecurity protections.Increasing the Impact of Voluntary Action against Cybercrime—Through this project CSD and its Netherlands counterparts sought to identify the factors that make voluntary notifications of cybercrime by Internet Service Providers more effective.Improving Cyber Security Incident Response Teams—This joint undertaking focused on the development of principles, processes and decision aids that inform and enhance government and private-sector organizations to staff, train, support and sustain effective cyber security incident response teams.In addition, the two Netherlands organizations have collaborated with CSD on the Information Marketplace for Policy and Analysis of Cyber-risk and Trust (IMPACT) project, which enables empirical data and information sharing among the global cybersecurity R&D community; a modeling of internet attacks project spearheaded by the Oak Ridge National Laboratory; and a SCADA defense project.“The U.S.-Netherlands partnership provides benefits to both countries and helps strengthen our respective cybersecurity postures,” said Maughan. “In short, we are proud to call our Dutch colleagues ‘partners’!”https://www.newswise.com/articles/netherlands-u-s-cybersecurity-r-d-partnership-is-thriving
View all news items >