Schedule 16-17th June - 2016 EUROPEAN SECURITY

Transcrição

Schedule 16-17th June - 2016 EUROPEAN SECURITY
European Security Conference 2016
June 16
Time
9:00-9:30
9:30-10:00
10:00-10:30
10:30-11:00
11:00-11:30
Speaker
Mário Caldeira (ISEG,U.Lisboa)
Gurpreet Dhillon (ISEG,U.Lisboa)
Paulo Veríssimo (U. Lux)
Pedro Veiga (CNCS)
Title
Registration & Opening Session
Big Data Needs Big Security
Grand Challenges for Cybersecurity of Critical Information and Infrastructures
Cybersecurity: Challenges Ahead
Coffee Break
11:30-12:00
12:00-12:30
12:30-13:00
13:00-13:30
13:30-14:00
14:00-14:30
14:30-15:00
15:00-15:30
15:30-16:00
16:00-16:30
16:30-17:00
17:00-17:30
Round Table Discussion
Miguel Correia (IST,U.Lisboa)
Henrique Santos (U.Minho)
Luís Antunes (FC,U.Porto)
Bruno Horta Soares (IDC)
Nathalie RÉBÉ
Alamgir Hossain
The future of Cybersecurity
Lunch
Big Data Analytics for Host Misbehavior Detection
Building a Cybersecurity Curricula: challenges and pitfalls
Cyber-sovereignty: sovereignty in a world without borders.
Coffee Break
IDC FUTURESCAPE SECURITY 2016
Forecasting the cloud: the Jurisdictional storm to come
Intelligent Real-time Phishing Detection and Protection Scheme for Online Transaction
June 17
Time
9:00-9:30
9:30-10:00
10:00-10:30
10:30-10:55
10:55-11:20
11:20-11:45
11:45-12:10
Speaker
Sérgio Nunes (ISEG,U.Lisboa)
João Paulo Magalhães (IPP)
Parallel Sessions
Ben Herzberg
Pratap Chandra and Pardhiv Reddy
João Senos
Swaroop Yermalkar
Title
Registration & Opening Session
Dealing with Malicious Domains Names
Coffee Break
Room: Aud. 2
Is funding a DDoS worth it? A look at the economics driving the DDoS world
Attacking and crashing IOT devices via Bluetooth Protocol
Cyber Defense Behind the Firewall
Patients at Risk! Ransomwares Infecting Healthcare
Application of the Dual V-Model Methodology for Highly Reliable and Guaranteed Quality Information
Security Management Systems
Room: Aud. 3
12:10-12:35
Jude Okoro,Pavol Zavarsky
Parallel Sessions
10:30-10:55
Griselda Sinanaj and Frederick Beyer Do data breaches affect our beliefs? Investigating reputation risk in social media
10:55-11:20
11:20-11:45
11:45-12:10
12:10-12:35
12:35-13:00
13:00-13:30
13:30-14:00
14:00-14:30
14:30-15:00
15:00-15:30
15:30-16:00
16:00-16:30
16:30-17:00
Kishor Krishnan Nair, Albert Helberg
and Johannes van der Merwe
Khin Lwin, Mohammad Sobur and
Alamgir Hossain
Nattakant Utakrit
Georg Thomas, Patrick Duessel and
Michael Meier.
Paulo Empadinhas (ENISA)
André Zúquete (U.Aveiro)
Nuno Neves (FC,U.Lisboa)
Jorge Pinto (AP2SI)
Gonçalo Cadete (ISACA Lisbon)
Towards a Robust Fingerprint Authentication System Protocol
New Social Engineering Challenges in Phishing - A Case Study of Ransomware Attack
Online Distance Education Scandals: Where the Trends Go in Today’s World
Ethical Issues of User Behavioral Analysis Through Machine Learning
Lunch
Cybersecurity impact in in the Digital Single Market and European
perspective of economic grow.
Data Security Mechanisms for IoT Platforms
Improving the resilience of SCADA in Critical Infrastructures
Coffee Break
Cybersecurity aspects in the augmented human
ISACA Global survey and Implications for 2016

Documentos relacionados