Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 12: Line 12:
  
 
* '''The Usual Insecurity of Things''',&nbsp; ''Keith Martin'',&nbsp; Royal Holloway College, University of London <br/> While the Internet of Things is used to describe a host of new lightweight technologies, when it comes to security it pays to focus less on the novelty of IoT, and more on what IoT applications have in common with previous technologies that have learned about security the hard way (by first getting it wrong). It's time to go back to basics, and reflect on what security means in cyberspace. Only once this is understood, can we hope to secure any type of application that resides there.
 
* '''The Usual Insecurity of Things''',&nbsp; ''Keith Martin'',&nbsp; Royal Holloway College, University of London <br/> While the Internet of Things is used to describe a host of new lightweight technologies, when it comes to security it pays to focus less on the novelty of IoT, and more on what IoT applications have in common with previous technologies that have learned about security the hard way (by first getting it wrong). It's time to go back to basics, and reflect on what security means in cyberspace. Only once this is understood, can we hope to secure any type of application that resides there.
* Title T.B.A.,&nbsp; ''Mathias Eckstedt'',&nbsp; Royal Institute of Technology (KTH), Stockholm
+
* '''System-wide Probabilistic Vulnerability Assessment Using Attack Graphs''',&nbsp; ''Mathias Eckstedt'',&nbsp; Royal Institute of Technology (KTH), Stockholm<br />T-systems are today highly complex and interconnected into large systems-of-systems. With the ongoing digitalization systems are becoming even more all encompassing and integrated. Ensuring a high-level of security in such system environments is a challenge that thus requires a holistic approach addressing multiple and a diverse set of attack surfaces and potential attack vectors. This presentation describes previous and ongoing work with combining probabilistic attack graphs and system architecture modelling as a means to produce design and maintenance support for security engineering of system architectures.
 
* '''Cybersecurity in the Norwegian Energy Sector''',&nbsp; ''Janne Hagen'',&nbsp; The Norwegian Water Resources and Energy Directorate (NVE)
 
* '''Cybersecurity in the Norwegian Energy Sector''',&nbsp; ''Janne Hagen'',&nbsp; The Norwegian Water Resources and Energy Directorate (NVE)
 
* Title T.B.A.,&nbsp; ''Tord Persokrud'',&nbsp; Conax
 
* Title T.B.A.,&nbsp; ''Tord Persokrud'',&nbsp; Conax

Revision as of 16:18, 22 November 2017

Cybersecurity Challenges

DATE:  Monday 4 December 2017

LOCATION:  Seminar room Python (room 2269), Ole Johan Dahl's House.

AGENDA:

14:00h Welcome at IFI

14:15h Invited Talks:

  • The Usual Insecurity of ThingsKeith Martin,  Royal Holloway College, University of London
    While the Internet of Things is used to describe a host of new lightweight technologies, when it comes to security it pays to focus less on the novelty of IoT, and more on what IoT applications have in common with previous technologies that have learned about security the hard way (by first getting it wrong). It's time to go back to basics, and reflect on what security means in cyberspace. Only once this is understood, can we hope to secure any type of application that resides there.
  • System-wide Probabilistic Vulnerability Assessment Using Attack GraphsMathias Eckstedt,  Royal Institute of Technology (KTH), Stockholm
    T-systems are today highly complex and interconnected into large systems-of-systems. With the ongoing digitalization systems are becoming even more all encompassing and integrated. Ensuring a high-level of security in such system environments is a challenge that thus requires a holistic approach addressing multiple and a diverse set of attack surfaces and potential attack vectors. This presentation describes previous and ongoing work with combining probabilistic attack graphs and system architecture modelling as a means to produce design and maintenance support for security engineering of system architectures.
  • Cybersecurity in the Norwegian Energy SectorJanne Hagen,  The Norwegian Water Resources and Energy Directorate (NVE)
  • Title T.B.A.,  Tord Persokrud,  Conax
  • Defending Critical Infrastructure from Espionage and SabotageFrode Hommedal,  Telenor SOC and CERT

16:00h Panel and Discussion


SPEAKER BIOS: T.B.A.

AFSecurity is organised by the University of Oslo SecurityLab Logo-UiO-SecurityLab-colour.jpg