U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

Impressie Seaside Matchmaking Cybersecurity 2016


dcypher Symposium 2017 connects cybersecurity knowledgeAre you interested or involved in cybersecurity research, development, innovation, business and/or (higher) education? Come and join us at the first edition of the dcypher Symposium on the 4th of October. There will be a lot to learn, to discuss and share in cybersecurity R&D, innovation and higher education.We believe that networking is essential so there will be many opportunities to meet speakers and participants. Our event is a meeting place for cybersecurity teachers and students, for former, current and possibly future executors of cybersecurity R&D projects, for public and private research partners, for enterprises in need of cybersecurity professionals, for potential profit and non-profit users of research results and policy makers.Register now, seats are limited! Except for networking, the plenary opening and closing sessions, we have sixteen parallel sessions, a demo expo, theme tables and the dcypher Lecture Series. Our event is free of charge. After the summerbreak the Symposium programme will be published. We are proud to announce we currently have the following keynote speakers for our plenary sessions:Presentations (morning)Prof.mr. Lokke Moerel, MOFO, TILTMr. Jack Koons, Unisys The 0-day debate (afternoon)Hans Folmer, CG Defence Cyber Command Prof.dr. Nico van Eijk, IViR Chair of the dayChris van ‘t Hof, Tektok Within our sixteen sessions the following professors, professionals and experts kindly confirmed their cooperation:Prof.dr. Bart Jacobs, RUNRachel Marbus, Privacy Officer KPNProf.dr. Herbert Bos, VUEdwin van Andel, CEO ZerocopterVictor Gevers, Innovation Manager Dutch governmentMaarten Wegdam, InnovalorEelco Vriezenkolk, Agentschap TelecomProf.dr. Wouter Stol, OU, Politie Academy and NLH Dr. Jaap Henk Hoepman, PI-lab and RUN Prof.dr. Pieter Hartel, UT and TUD Dr. Erik Poll, RUN  Prof.dr. Lejla Batina, RUN  Prof.dr. Michel van Eeten, TUD   Petra van Schayik, CEO CompumaticaMary-Jo de Leeuw, Associate Partner RevnextOscar Koeroo, CISO KPNMarleen Weulen-Kranenbarg MSc., NSCR or Mr.dr. Jean Louis van Gelder, NSCRDr. Bibi van den Berg, ULDr. Zeki Erkin, TUDDr. Andreas Peter, UTDr. Nicola Zannone, TU/eRoeland Kegel MSc., UT Prof.dr. Roel Wieringa, UTKarine e Silva, TILT Ellen Mok, TUDJoost Visser, SIG The Lecture SeriesPart of the Symposium is the dcypher Lecture Series. Renowned teachers will give lectures covering different aspects of cybersecurity in the Auditorium of Media Plaza. The Lecture Series is open to all Symposium visitors but students with a strong interested in cybersecurity are specifically invited!11.00 Crime and Law Enforcement in Digital SocietyProf.dr. Wouter Stol11:35 Privacy by DesignDr. Jaap Henk Hoepman12:10 Dark WebProf. dr. Pieter Hartel12:45 lunch break13:30 Cyber bank robberyDr. Erik Poll14:05  Side channel attacks on embedded devicesProf.dr. Lejla Batina14:40 Hacks, sticks and carrots: Improving the incentives for cybersecurityProf.dr. Michel van Eeten  Showcase cybersecurity R&D results, solutions reached in partnership. You will get an impression of the output resulting from earlier tenders for medium term (SBIR) and long term cybersecurity research, both nationally and internationally. Solutions for bridging gaps between cybersecurity higher education curricula and demands from the labor market will be addressed. Sharing ideas will be encouraged, e.g. by discussing challenges of translating research output into innovative solutions, how to make cybersecurity a strength of our infrastructures, how to improve the flow between higher and academic education in cybersecurity. We offer a podium for cybersecurity R&D and education projects, either recently completed or in progress. Also an exposition of new cybersecurity solutions is foreseen.The symposium is organised by dcypher in close cooperation with the Netherlands Organisation for Scientific Research (NWO), the Netherlands Enterprise Agency (RvO), the National Cyber Security Centre (NCSC) and Applied Science Organisation (SIA) in in conjunction with the European Cybersecurity Month and AlertOnline
After a successful first year, the National Cyber Security Summer School is back again in 2017!The NCS3 is a summer school intended to introduce Bachelor’s and Master’s to the topic of Cyber Security. Initiated by the Dutch Cyber Security Council and organised by dcypher (the Dutch Cyber Security Platform for Higher Education and Research), the NCS3 counts with the support of a wide variety of organizations across the public and private sectors, and Universities in the Netherlands. This year, the NCS3 will take its participants to The Hague, Amsterdam, Rotterdam, Utrecht and Eindhoven for a program filled with lectures, active learning sessions, and networking activities that will introduce participants to many different topics of this field.Interested in learning about cyber security? Apply now!For more information please visit www.ncs3.nl
DHS S&T Cyber Security Division, Netherlands Counterparts Announce Bilateral Funding Call Program will fund joint U.S.-Dutch Research Teams On May 17, the Netherlands Organisation for Scientific Research’s (NWO) Science domain and the Ministry of Security & Justice, together with the Cyber Security Division (CSD) of the U.S. Department of Homeland Security (DHS), announced the opening of their bilateral call for proposals. Approximately €2.4 million is being made available for research projects in the field of Cyber Security as part of this joint U.S. – Netherlands Cyber Security Research Program. The research will be conducted jointly by researchers from the United States and the Netherlands.fltr: Douglas Maughan, Jan Piet Barthel and Raymond Doijen (photo Paul Voorham)The call was opened during the International One conference in The Hague by Douglas Maughan, CSD Director, Raymond Doijen, NCSC Head of Cyber Security Expertise and Advice and Jan Piet Barthel, NWO Program Manager Cyber ​​Security Research. The purpose of this new program is to strengthen cooperation between leading researchers in cyber security based in the two participating countries.Patricia Zorko, Ministry of Security and Justice director Cyber Security: “With this joint call we reaffirm our joint mission to foster stronger research links between The Netherlands and the U.S., and strengthen collaboration between our nations’ best cyber security researchers. We can only address the challenges we face now and in the future by investing in our shared knowledge. The NCSC is very proud to have DHS and NWO as partners in this field.”“Cybersecurity concerns do not stop at national borders. This new international bilateral agreement recognizes this reality by funding joint U.S.-Dutch research teams to develop capabilities that will benefit both countries,” said DHS Under Secretary (Acting) for Science and Technology Dr. Robert Griffin. “This bilateral call is a significant step forward in CSD's partnership program with international cybersecurity organizations,” said Maughan. “We are excited because this first-of-its-kind funding will bring about cooperative partnerships between U.S.-based and Netherlands-based researchers, bringing a truly global perspective to an international concern: the cybersecurity of critical infrastructure and networks.”The program’s research will focus on two areas:Industrial Control Systems / Supervisory Control and Data Acquisition Systems andDistributed Denial of Service attacks and the Domain Name Systems. Jan Piet Barthel: “The global challenges of cyber security, the appreciation of the research community and the pilot results achieved, convinced us to continue and strengthen our valuable partnership with DHS-CSD by creating a new joint call.”Half of the available program budget of €2.4 million will be made available by NWO and the Ministry of Security & Justice, with the other half being made available by DHS S&T CSD. The program is expected to provide funding for five research proposals.Bilateral research teams interested in submitting a proposal can do so at their national point of contact for this call – NWO for Dutch applicants and DHS for U.S. applicants. The submission deadline is August 31, 2017, 14:00 CET (08:00 EDT).More information about the call can be found here.Source: NWOAlso visit https://www.ncsc.nl/english/current-topics/news/dhs-st-cyber-security-division-netherlands-counterparts-announce-bilateral-funding-call.html


** Submission deadline in a few days: June 29, 2017 ** The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017)September 28-29, 2017, Crete, GreeceIMPORTANT DATESPaper Submission due: June 15, 2017Notification to authors: July 31, 2017Camera ready due: August 15, 2017The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks originalsubmissions from academia and industry presenting novel research on all theoretical and practical aspects of securityand privacy, as well as experimental studies of fielded systems, the application of security technology, theimplementation of systems, and lessons learned. We encourage submissions from other communities such as law, business,and policy that present these communities' perspectives on technological issues.In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing togetherresearchers and practitioners in related areas and to encourage interchange and cooperation between the researchcommunity and the industrial/consumer community. From 2015, due to increased participation it has become a Conference.Submissions with regards to the security of future ICT technologies, such as cyber-physical systems, cloud services,data science and the Internet of Things are particularly welcome.Other topics of interest include, but are not limited to:* Security and Privacy in Smart Devices- Biometrics, National ID cards- Embedded Systems Security and TPMs- Interplay of TPMs and Smart Cards- Mobile Codes Security- Mobile Devices Security- Mobile Malware- Mobile OSes Security Analysis- New Applications for Secure RFID Systems- RFID Systems- Smart Card- Smart Devices Applications- Wireless Sensor Node   * Security and Privacy in Networks- Ad Hoc Networks- Delay-Tolerant Network- Domestic Network- GSM/GPRS/UMTS Systems- Peer-to-Peer Networks- Security Issues in Mobile and Ubiquitous Networks- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks- Vehicular Network- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others   * Security and Privacy in Architectures, Protocols, Policies, Systems and Applications- BYOD Contexts- Cloud-enhanced Mobile Security- Critical Infrastructure (e.g. for Medical or Military Applications)- Cyber-Physical Systems- Digital Rights Management (DRM)- Distributed Systems and Grid Computing- Information Assurance and Trust Management- Intrusion Detection and Information Filtering- Lightweight cryptography- Localization Systems (Tracking of People and Goods)- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine toHuman)- Mobile Commerce- Multimedia Applications- Public Administration and Governmental Services- Pervasive Systems- Privacy Enhancing Technologies- Secure self-organization and self-configuration- Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection- Security Policies (Human-Computer Interaction and Human Behavior Impact)- Security Measurements- Smart Cities- Systems Controlling Industrial Processes  SUBMISSION INSTRUCTIONS--------------------------Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to ajournal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer LNCSformat.For detailed instructions please see the website - www.wistp.org 
De broncode van Windows 10, de code die door derden is te gebruiken om naar potentiële kwetsbaarheden in het besturingssysteem te zoeken, heeft enige tijd online gestaan. De Britse krant The Register zegt dat het om 32 terabyte aan code gaat. Website BetaArchive.com spreekt dit tegen en meldt dat het om 1,2 gigabyte zou gaan. Microsoft bevestigt het lek en de echtheid van de getoonde documenten.Volgens de softwaregigant lijkt het er op dat de code uit het Shared Source Initiative komt, een programma waarmee Microsoft zijn bronmateriaal deelt met computerfabrikanten en andere partners.Het grootste gedeelte van de code die gelekt is, wordt gebruikt om Windows 10 te laten werken met pc's. Zo bevat een deel van deze broncodes informatie voor het gebruik van ingebouwde usb-poorten en wifi-netwerken. De codes sturen het hart van het besturingssysteem aan en zijn cruciaal voor het functioneren van Windows 10. Ze zijn bestemd voor Microsoft zelf, hardwarefabrikanten en een selecte groep consumenten.ArrestatieHet lijkt er op dat de data vanaf maart gestolen is. De documenten werden in eerste instantie op BeteArchive.com geplaatst, maar zijn inmiddels offline gehaald. Of Microsoft gehackt is of dat cybercriminelen op een andere manier aan de data zijn gekomen, is onbekend. De BBC meldde afgelopen donderdag dat twee Britten zijn gearresteerd voor hun betrokkenheid bij pogingen tussen januari en maart 2017 om het netwerk van Microsoft te hacken. De twee zouden deel uitmaken van een grotere groep die de software wilde hacken om zo aan consumentendata te komen. Volgens Microsoft is dit niet gelukt, maar is nog onbekend welke informatie mogelijk wel in het bezit van de criminelen is gekomen. Volgens BetaArchive.com staat deze arrestatie los van de gelekte Windows 10-code.Microsoft Nederland heeft Computable te kennen gegeven geen verdere uitspraken te doen en wil niet ingaan op de arrestatie van de Britten.https://www.computable.nl/artikel/nieuws/security/6049750/250449/hackers-publiceren-deel-broncode-windows-10.htm
Blockchain wordt algemeen gezien als een systeem dat digitaal vertrouwen kan scheppen op het internet. Een artikel van NewEurope doet verslag van het evenement ‘From Research to Innovation – The Blockchain Era’ waarop alle aspecten van blokchain aan de orde kwamen die relevant zijn voor de verdere ontwikkeling van de technologie. Uit de discussies kwam onder meer het grote belang naar voren van standaardisatie en internationale regelgeving.Artikel NewEurope 
Vijfentwintig onderzoeksprojecten van hogescholen krijgen een RAAK-subsidie. In totaal waren er 64 voorstellen ingediend voor de ronde 2016. Daarmee is het honoreringspercentage bijna 40%. Het beschikbare budget voor deze call was 9,8 miljoen euro. De voorstellen waren echter zo goed dat Regieorgaan SIA, onderdeel van NWO, het budget heeft verhoogd tot 17,5 miljoen euro.Nieuwsbericht SIA 
Bent u als ondernemer bezig met innovaties die gebruik maken van blockchaintoepassingen die een decentraal energienetwerk dichterbij brengen? De SBIR-oproep 'Blockchain Energie Rotterdam' daagt ondernemers uit om voorstellen in te dienen.Belangrijk is dat de innovaties in de praktijk toepasbaar zijn. De scope van deze oproep is breed: warmte, elektriciteit, waterstof of combinaties hiervan, voor of tussen industrie, bedrijven, huishoudens en elektrische voertuigen. De oproep aan ondernemers luidt: stel een deeloplossing of niche voor waarin eerste innovaties en toepassingen haalbaar zijn, gezien stand der techniek, markt en beschikbare budgetten.Lees meer over de oproep (pdf).Zie ook: http://www.rvo.nl/subsidies-regelingen/sbir/oproep-blockchain-energie-rotterdam
Bekijk het volledige nieuwsoverzicht >