nis wg3 3rd meeting april 29th n.
Skip this Video
Loading SlideShow in 5 Seconds..
NIS WG3 3rd meeting, April 29th PowerPoint Presentation
Download Presentation
NIS WG3 3rd meeting, April 29th

Loading in 2 Seconds...

play fullscreen
1 / 13

NIS WG3 3rd meeting, April 29th - PowerPoint PPT Presentation

  • Uploaded on

NIS WG3 3rd meeting, April 29th. WG3 Secure ICT Research & Innovation. NIS WG3 Meeting Secure ICT Landscape Deliverable Mari Kert , Javier Lopez Evangelos Markatos , Bart Preneel. 8 April 2014. Secure ICT Landscape Deliverable. What is it?. Describe State of the Art

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

NIS WG3 3rd meeting, April 29th

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. NIS WG3 3rd meeting, April 29th WG3 Secure ICT Research & Innovation

    2. NIS WG3 Meeting Secure ICT Landscape Deliverable Mari Kert, Javier Lopez EvangelosMarkatos, Bart Preneel 8 April 2014

    3. Secure ICT Landscape Deliverable

    4. What is it? Describe State of the Art In Cyber Security What are the Treats? What are the Existing Defenses for each threat? What are the Research Challenges? What are the Existing Tools?

    5. How did we do it? Created 4 Groups: @steering @contributors @wg3 @stakeholders

    6. How did we do it? @steering created a Table of Contents Asked for feedback from @wg3 and @stakeholders In parallel, those who gave feedback (and wanted) became part of @contributors

    7. Contributors Magnus Almgren, Chlamers University of Technology Elias Athanasopoulos, FORTH HenkBirkholz, Fraunhofer SIT Hugh Boyes, University of Warwick Hervé Debar, TélécomSudParis Sotiris Ioannidis, FORTH Roy Isbell, University of Warwick Nicola Jentzsch, DIW WouterLeibbrandt, NXP Semiconductors Joachim Posegga, University of Passau MichalisPolychronakis, Columbia University VassilisPrevelakis, Technical University, Braunschweig Ali Rezaki,Tubitak Rodrigo Roman, University of Malaga Carsten Rudolph, Fraunhofer SIT BjornarSolhaug, SINTEF Christophe Sprenger, ETH Zurich Theo Tryfonas, University of Bristol Paulo Verissimo, University of Lisbon Tim Watson, University of Warwick

    8. The procedure @steering created an “example” section to be used by the rest of the contributors assigned the sections to authors and reviewers as well Text has been steadily flowing Some is still trickling

    9. Structure Introduction Basic Technologies Internet of Things - Cloud Application Domains Conclusions

    10. Structure Basic Structure of Each section: Introduction What is it? Current Status What has been done? Research Challenges What needs to be done? Existing Tools (if applicable)

    11. Next Steps Quality assurance Receive Feedback Complete Reviews Address some of the Research challenges 

    12. Example Section: Intrusion Detection Systems Introduction Rule-based, Anomaly-based Current Status Research Challenges The Changing Security Paradigm No more perimeter security Speed Whole System Image Not only network image New models for attack patterns String matching and automataare not enough

    13. Summary Secure ICT Landscape Deliverable Have mobilized the community At several different levels @contributors, @wg3, @stakeholders Text flows in Quality assurance runs in parallel