SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
www.syssec-project.eu


SysSec: A European Network of Excellence
in Managing Threats and Vulnerabilities in
           the Future Internet


                         Evangelos Markatos
                         markatos@ics.forth.gr




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   1
Outline of the talk

Security Challenges: What is the
problem?
  Hackers are getting more sophisticated
  The impact of cyberattacks is getting
  larger
What are we doing about this?
  SysSec: 4-year NoE to consolidate
  Research in managing threats for the
  Future Internet



   markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   2
Outline of the talk

Security Challenges: What is the
problem?
  Hackers are getting more sophisticated
  The impact of cyberattacks is getting
  larger
What will we do?
  SysSec: 4-year NoE to consolidate
  Research in managing threats for the
  Future Internet



   markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   3
Government: UK Parliament’s PCs infected




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   4
Transportation: Cars out of control




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   5
Energy: No electricity




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   6
Defense: fighter planes grounded




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   7
Last but not least: Stuxnet!

Tailored specifically against
 SCADA systems, is the most
 recent demonstration that not
 only attacks are
 sophisticated, complex and
 well-coordinated

It also demonstrates that the
   bad guys:
   - are very well-equipped
   - have ambitious goals
   (cyber-physical systems)


     markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   8
Rent-a-botnet!




              There is even a free 3-minute trial!
markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   9
Outline of the talk

Security Challenges: What is the
problem?
  Hackers are getting more sophisticated
  The impact of cyberattacks is getting
  larger
What will we do?
  SysSec: 4-year NoE to consolidate
  Research in managing threats for the
  Future Internet



   markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   10
Predicting “what’s next”
SysSec: managing threats
and vulnerabilities for the
future Internet
    a NoE, 2010-2014
    General approach
          Proactive solutions
          Collaborate
             – At a European level
             – With our international
               colleagues




                                                                          (see website for updated list)

 markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011         11
SysSec proposes a game-changing approach to
cybersecurity:
  Currently Researchers are mostly reactive:
      they usually track cyberattackers after an attack has been launched
      thus, researchers are always one step behind attackers
  SysSec aims to break this vicious cycle
  Researchers should become more proactive:
      Anticipate attacks and vulnerabilities
      Predict and prepare for future threats
      Work on defenses before attacks materialize.




   markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   12
SysSec Aim and Objectives (I)
1.   Create an active, vibrant, and collaborating community
     of Researchers with
        the expertise, capacity, and determination to anticipate and
        mitigate the emerging threats and vulnerabilities on the Future
        Internet.
        SysSec aims
              to create a sense of “community” among researchers,
              to mobilize this community,
              to consolidate its efforts,
              to expand their collaboration internationally, and
              become the single point of reference for system security research in
              Europe.




     markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   13
SysSec Aim and Objectives (II)
2.   Advance European Security Research well beyond the
     state of the art
        research efforts are fragmented
        SysSec aims to provide a research agenda and
        align their research activities with the agenda
        make SysSec a leading player in the international arena.




     markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   14
SysSec Aim and Objectives (III)
3.   Create a virtual distributed Center of Excellence in
     the area of emerging threats and vulnerabilities.
        By forming a critical mass of European Researchers and by
        aligning their activities,
        A leading role internationally, empowered to undertake large-
        scale, ambitious and high-impact research efforts.
4.   Create a Center of Academic Excellence in the area
        create an education and training program targeting young
        researchers and the industry.
        lay the foundations for a common graduate degree in the area
        with emphasis on Systems Security.




     markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   15
SysSec Aim and Objectives (IV)
5.   Maximize the impact of the project by proactive
     dissemination to the appropriate stakeholders.
        disseminate its results to international stakeholders so as to form
        the needed strategic partnerships (with similar projects and
        organizations overseas) to play a major role in the area.
        dissemination within the Member States will
              reinforce SysSec's role as a center of excellence and
              make SysSec a beacon for a new generation of European Researchers.
         1st SysSec Workshop, July 6th 2011, Amsterdam, VU
6.   Create Partnerships and transfer technology to the
     European Security Industry.
        create a close partnership with Security Industry
        facilitate technology transfer wherever possible to further
        strengthen the European Market.

     markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   16
1st SysSec Workshop

By the numbers:
   23 position papers
         i.e. where is the security research going?
   6 (longer) Student/Research papers
   95 authors
   36 organizations
   One session on INCO strategy
         In trustworthy ICT
         Organized by the BIC project


markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   17
1st SysSec Workshop – Who?




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   18
1st SysSec Workshop – International?




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   19
markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   20
Research Roadmap




markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011
                                                                                              21
How to collaborate with SysSec?
Join our constituency (mailing list):
    http://www.syssec-project.eu
Contribute to the research roadmap
    Provide feedback on emerging threats
    Share your ideas on future security issues
Contribute to our systems security University curriculum
    Contribute homeworks/exams, lab exercises
    Teach some of the courses at your University
    Share some of your course material
Send your students to the partners
    with SysSec Scolarships
Send your graduates to the SysSec partners
    With SysSec Marie Curie Fellowships
Become an Associated Partner
 markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   22
Summary
Hackers are getting more sophisticated
The impact of cyberattacks is getting higher
We need to collaborate to manage emerging
threats on the future Internet
  SysSec started on Sept 1st.
  Help us define future security threats
  Help us teach our students system security
  Join us to break the vicious cycle of cyberattacks.




 markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   23
SysSec: A European Network of Excellence
in Managing Threats and Vulnerabilities in
           the Future Internet


http://www.syssec-project.eu
http://twitter.com/syssecproject

                           Evangelos Markatos
                               FORTH-ICS

markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011   24

Weitere ähnliche Inhalte

Was ist angesagt?

Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Mapping and building an education body of knowledge
Mapping and building an education body of knowledgeMapping and building an education body of knowledge
Mapping and building an education body of knowledgeGeorges Ataya
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016Elsa Prieto
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trungNur Shiqim Chok
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...IEEEFINALSEMSTUDENTPROJECTS
 
Rin armenia icin 2020
Rin armenia  icin 2020Rin armenia  icin 2020
Rin armenia icin 2020Eduard Grasa
 
MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detectionWeverify
 
Enabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the CloudEnabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the CloudEUBrasilCloudFORUM .
 

Was ist angesagt? (20)

Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mapping and building an education body of knowledge
Mapping and building an education body of knowledgeMapping and building an education body of knowledge
Mapping and building an education body of knowledge
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016
 
Press release 3rd pilot
Press release 3rd pilotPress release 3rd pilot
Press release 3rd pilot
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung
[Cisco Connect 2018 - Vietnam] Bio nguyen duc trung
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Rin armenia icin 2020
Rin armenia  icin 2020Rin armenia  icin 2020
Rin armenia icin 2020
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
 
Enabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the CloudEnabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the Cloud
 

Andere mochten auch

Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meetingfcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meetingfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectivesfcleary
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides amsfcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meetingfcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisifcleary
 

Andere mochten auch (17)

Tdl
TdlTdl
Tdl
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
Nessos
NessosNessos
Nessos
 

Ähnlich wie Syssec

ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseKevin Duffey
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
SECO-Assist 2019 research seminar
SECO-Assist 2019 research seminarSECO-Assist 2019 research seminar
SECO-Assist 2019 research seminarTom Mens
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708Sandro D'Elia
 
A Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching CybersecurityA Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching Cybersecuritysaman zaker
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Scaling Community Information Systems
Scaling Community Information SystemsScaling Community Information Systems
Scaling Community Information SystemsRalf Klamma
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
WP8 Dissemination and Exploitation
WP8 Dissemination and ExploitationWP8 Dissemination and Exploitation
WP8 Dissemination and ExploitationINSEMTIVES project
 
Insights on Open Source and Inner Source
Insights on Open Source and Inner SourceInsights on Open Source and Inner Source
Insights on Open Source and Inner SourceMatthias Stürmer
 
The European Cloud Computing Strategy
The European Cloud Computing StrategyThe European Cloud Computing Strategy
The European Cloud Computing StrategyCarl-Christian Buhr
 
inLab FIB & Industry 4.0
inLab FIB & Industry 4.0inLab FIB & Industry 4.0
inLab FIB & Industry 4.0inLabFIB
 
European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEOSC-hub project
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
Prototyping Apps for Informal Learning: A Semantic Video Annotation Scenario
Prototyping Apps for Informal Learning: A Semantic Video Annotation ScenarioPrototyping Apps for Informal Learning: A Semantic Video Annotation Scenario
Prototyping Apps for Informal Learning: A Semantic Video Annotation ScenarioNicolaescu Petru
 
FoCAS Newsletter Issue Five
FoCAS Newsletter Issue FiveFoCAS Newsletter Issue Five
FoCAS Newsletter Issue FiveFoCAS Initiative
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14WMG, University of Warwick
 

Ähnlich wie Syssec (20)

ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
SECO-Assist 2019 research seminar
SECO-Assist 2019 research seminarSECO-Assist 2019 research seminar
SECO-Assist 2019 research seminar
 
The red book
The red book  The red book
The red book
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708
 
A Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching CybersecurityA Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching Cybersecurity
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Scaling Community Information Systems
Scaling Community Information SystemsScaling Community Information Systems
Scaling Community Information Systems
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
WP8 Dissemination and Exploitation
WP8 Dissemination and ExploitationWP8 Dissemination and Exploitation
WP8 Dissemination and Exploitation
 
Insights on Open Source and Inner Source
Insights on Open Source and Inner SourceInsights on Open Source and Inner Source
Insights on Open Source and Inner Source
 
The European Cloud Computing Strategy
The European Cloud Computing StrategyThe European Cloud Computing Strategy
The European Cloud Computing Strategy
 
inLab FIB & Industry 4.0
inLab FIB & Industry 4.0inLab FIB & Industry 4.0
inLab FIB & Industry 4.0
 
European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunities
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Prototyping Apps for Informal Learning: A Semantic Video Annotation Scenario
Prototyping Apps for Informal Learning: A Semantic Video Annotation ScenarioPrototyping Apps for Informal Learning: A Semantic Video Annotation Scenario
Prototyping Apps for Informal Learning: A Semantic Video Annotation Scenario
 
FoCAS Newsletter Issue Five
FoCAS Newsletter Issue FiveFoCAS Newsletter Issue Five
FoCAS Newsletter Issue Five
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
 

Mehr von fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meetingfcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus wsfcleary
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingfcleary
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meetingfcleary
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fclearyfcleary
 

Mehr von fcleary (7)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fcleary
 

Kürzlich hochgeladen

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 

Kürzlich hochgeladen (20)

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 

Syssec

  • 1. www.syssec-project.eu SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos markatos@ics.forth.gr markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 1
  • 2. Outline of the talk Security Challenges: What is the problem? Hackers are getting more sophisticated The impact of cyberattacks is getting larger What are we doing about this? SysSec: 4-year NoE to consolidate Research in managing threats for the Future Internet markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 2
  • 3. Outline of the talk Security Challenges: What is the problem? Hackers are getting more sophisticated The impact of cyberattacks is getting larger What will we do? SysSec: 4-year NoE to consolidate Research in managing threats for the Future Internet markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 3
  • 4. Government: UK Parliament’s PCs infected markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 4
  • 5. Transportation: Cars out of control markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 5
  • 6. Energy: No electricity markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 6
  • 7. Defense: fighter planes grounded markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 7
  • 8. Last but not least: Stuxnet! Tailored specifically against SCADA systems, is the most recent demonstration that not only attacks are sophisticated, complex and well-coordinated It also demonstrates that the bad guys: - are very well-equipped - have ambitious goals (cyber-physical systems) markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 8
  • 9. Rent-a-botnet! There is even a free 3-minute trial! markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 9
  • 10. Outline of the talk Security Challenges: What is the problem? Hackers are getting more sophisticated The impact of cyberattacks is getting larger What will we do? SysSec: 4-year NoE to consolidate Research in managing threats for the Future Internet markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 10
  • 11. Predicting “what’s next” SysSec: managing threats and vulnerabilities for the future Internet a NoE, 2010-2014 General approach Proactive solutions Collaborate – At a European level – With our international colleagues (see website for updated list) markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 11
  • 12. SysSec proposes a game-changing approach to cybersecurity: Currently Researchers are mostly reactive: they usually track cyberattackers after an attack has been launched thus, researchers are always one step behind attackers SysSec aims to break this vicious cycle Researchers should become more proactive: Anticipate attacks and vulnerabilities Predict and prepare for future threats Work on defenses before attacks materialize. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 12
  • 13. SysSec Aim and Objectives (I) 1. Create an active, vibrant, and collaborating community of Researchers with the expertise, capacity, and determination to anticipate and mitigate the emerging threats and vulnerabilities on the Future Internet. SysSec aims to create a sense of “community” among researchers, to mobilize this community, to consolidate its efforts, to expand their collaboration internationally, and become the single point of reference for system security research in Europe. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 13
  • 14. SysSec Aim and Objectives (II) 2. Advance European Security Research well beyond the state of the art research efforts are fragmented SysSec aims to provide a research agenda and align their research activities with the agenda make SysSec a leading player in the international arena. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 14
  • 15. SysSec Aim and Objectives (III) 3. Create a virtual distributed Center of Excellence in the area of emerging threats and vulnerabilities. By forming a critical mass of European Researchers and by aligning their activities, A leading role internationally, empowered to undertake large- scale, ambitious and high-impact research efforts. 4. Create a Center of Academic Excellence in the area create an education and training program targeting young researchers and the industry. lay the foundations for a common graduate degree in the area with emphasis on Systems Security. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 15
  • 16. SysSec Aim and Objectives (IV) 5. Maximize the impact of the project by proactive dissemination to the appropriate stakeholders. disseminate its results to international stakeholders so as to form the needed strategic partnerships (with similar projects and organizations overseas) to play a major role in the area. dissemination within the Member States will reinforce SysSec's role as a center of excellence and make SysSec a beacon for a new generation of European Researchers. 1st SysSec Workshop, July 6th 2011, Amsterdam, VU 6. Create Partnerships and transfer technology to the European Security Industry. create a close partnership with Security Industry facilitate technology transfer wherever possible to further strengthen the European Market. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 16
  • 17. 1st SysSec Workshop By the numbers: 23 position papers i.e. where is the security research going? 6 (longer) Student/Research papers 95 authors 36 organizations One session on INCO strategy In trustworthy ICT Organized by the BIC project markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 17
  • 18. 1st SysSec Workshop – Who? markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 18
  • 19. 1st SysSec Workshop – International? markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 19
  • 20. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 20
  • 21. Research Roadmap markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 21
  • 22. How to collaborate with SysSec? Join our constituency (mailing list): http://www.syssec-project.eu Contribute to the research roadmap Provide feedback on emerging threats Share your ideas on future security issues Contribute to our systems security University curriculum Contribute homeworks/exams, lab exercises Teach some of the courses at your University Share some of your course material Send your students to the partners with SysSec Scolarships Send your graduates to the SysSec partners With SysSec Marie Curie Fellowships Become an Associated Partner markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 22
  • 23. Summary Hackers are getting more sophisticated The impact of cyberattacks is getting higher We need to collaborate to manage emerging threats on the future Internet SysSec started on Sept 1st. Help us define future security threats Help us teach our students system security Join us to break the vicious cycle of cyberattacks. markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 23
  • 24. SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet http://www.syssec-project.eu http://twitter.com/syssecproject Evangelos Markatos FORTH-ICS markatos@ics.forth.gr - www.syssec-project.eu – Effectsplus Clustering Event – July 4, 2011 24