Schedule 16-17th June - 2016 EUROPEAN SECURITY
Transcrição
Schedule 16-17th June - 2016 EUROPEAN SECURITY
European Security Conference 2016 June 16 Time 9:00-9:30 9:30-10:00 10:00-10:30 10:30-11:00 11:00-11:30 Speaker Mário Caldeira (ISEG,U.Lisboa) Gurpreet Dhillon (ISEG,U.Lisboa) Paulo Veríssimo (U. Lux) Pedro Veiga (CNCS) Title Registration & Opening Session Big Data Needs Big Security Grand Challenges for Cybersecurity of Critical Information and Infrastructures Cybersecurity: Challenges Ahead Coffee Break 11:30-12:00 12:00-12:30 12:30-13:00 13:00-13:30 13:30-14:00 14:00-14:30 14:30-15:00 15:00-15:30 15:30-16:00 16:00-16:30 16:30-17:00 17:00-17:30 Round Table Discussion Miguel Correia (IST,U.Lisboa) Henrique Santos (U.Minho) Luís Antunes (FC,U.Porto) Bruno Horta Soares (IDC) Nathalie RÉBÉ Alamgir Hossain The future of Cybersecurity Lunch Big Data Analytics for Host Misbehavior Detection Building a Cybersecurity Curricula: challenges and pitfalls Cyber-sovereignty: sovereignty in a world without borders. Coffee Break IDC FUTURESCAPE SECURITY 2016 Forecasting the cloud: the Jurisdictional storm to come Intelligent Real-time Phishing Detection and Protection Scheme for Online Transaction June 17 Time 9:00-9:30 9:30-10:00 10:00-10:30 10:30-10:55 10:55-11:20 11:20-11:45 11:45-12:10 Speaker Sérgio Nunes (ISEG,U.Lisboa) João Paulo Magalhães (IPP) Parallel Sessions Ben Herzberg Pratap Chandra and Pardhiv Reddy João Senos Swaroop Yermalkar Title Registration & Opening Session Dealing with Malicious Domains Names Coffee Break Room: Aud. 2 Is funding a DDoS worth it? A look at the economics driving the DDoS world Attacking and crashing IOT devices via Bluetooth Protocol Cyber Defense Behind the Firewall Patients at Risk! Ransomwares Infecting Healthcare Application of the Dual V-Model Methodology for Highly Reliable and Guaranteed Quality Information Security Management Systems Room: Aud. 3 12:10-12:35 Jude Okoro,Pavol Zavarsky Parallel Sessions 10:30-10:55 Griselda Sinanaj and Frederick Beyer Do data breaches affect our beliefs? Investigating reputation risk in social media 10:55-11:20 11:20-11:45 11:45-12:10 12:10-12:35 12:35-13:00 13:00-13:30 13:30-14:00 14:00-14:30 14:30-15:00 15:00-15:30 15:30-16:00 16:00-16:30 16:30-17:00 Kishor Krishnan Nair, Albert Helberg and Johannes van der Merwe Khin Lwin, Mohammad Sobur and Alamgir Hossain Nattakant Utakrit Georg Thomas, Patrick Duessel and Michael Meier. Paulo Empadinhas (ENISA) André Zúquete (U.Aveiro) Nuno Neves (FC,U.Lisboa) Jorge Pinto (AP2SI) Gonçalo Cadete (ISACA Lisbon) Towards a Robust Fingerprint Authentication System Protocol New Social Engineering Challenges in Phishing - A Case Study of Ransomware Attack Online Distance Education Scandals: Where the Trends Go in Today’s World Ethical Issues of User Behavioral Analysis Through Machine Learning Lunch Cybersecurity impact in in the Digital Single Market and European perspective of economic grow. Data Security Mechanisms for IoT Platforms Improving the resilience of SCADA in Critical Infrastructures Coffee Break Cybersecurity aspects in the augmented human ISACA Global survey and Implications for 2016