CYBER SECURITY & PRIVACY FORUM 2014

(CSP FORUM) ATHENS: 21-22 May 2014

Day 2 - Thursday 22nd May 2014

Day 2 - Thursday 22nd May 2014

Download Programme PDF

Detailed Programme:

download here.

8.30 - onwards

REGISTRATION & WELCOME TEA/COFFEE

09.30 - 10.30

Track 4 How to Transform Principles into Enginering Requirements? (PRIPARE)

Room: CONFERENCE 1

 

Chair:  Antonio Kung (Trialog)

 

Presenters:
Ethical and privacy impact assessment  : David Wright (Trilateral)
From principles to engineering requirements :  Claudia Diaz (KU Leuven) or Carmela Troncoso (Gradiant):
The OASIS Privacy Management Reference Model and Methodology ( PMRM) and PbD : Dr. Dawn Jutla (co-chair, OASIS PbD-SE TC , Member OASIS PMRM TC):

Track 5 Towards an innovative framework model for Cybersecurity & Privacy innovators (IPaCSO)

Room: CONFERENCE 4

 

Chair: Ulrich Seldeslachts (LSEC) and Jamie Power (WIT-RIKON)

 

Presenters:

Bart Preneel, KU Leuven
Bart Renard, Vasco Data Security
Claire Vishik, Intel - McAfee
Erik Luysterborg, Deloitte
Rosamunde Van Brakel, VUB - CPDP

Track 6 Trustworthy services (ANIKETOS,OPTET, SECURED)

Room: TEMPLAR’S

 

Chairs: Zeta Dooly (TSSG) Ilias Spais (ATC)     
(Zeta Dooly (TSSG) & Dr Ilias Spais (ATC)  & Antonio Lioy  : General introduction

 

Presenters:
Aniketos View on Trust : Hisain Elshaafi (TSSG)
OPTET Trust computational Model - trust estimator - estimate a users trust level in a system across time : Costas Kalogiros (AUEB)
SECURED technical approach - remote attestation of the critical network nodes and the creation of a trusted and secure network flow  : Antonio Lioy (Politecnico do Torino)

10.30 - 11.00

TEA / COFFEE / NETWORKING

11.00 - 13.00

Track 7 Privacy-by-design Issues: Supply Chain, Multiple Jurisdictions, Training (PRIPARE )

Room: CONFERENCE 1

 

Chair:  David Wright (Trilateral)

 

Presenters:
Overview of issues :  Daniel Le Métayer (INRIA).
The dimension of accountability: Fanny Coudert (KU Leuven).
Requirements for training material : Claudia Roda (American University in Paris).
Teaching human rights and digital technology: Susan Perry (American University of Paris)
Training ICT developers : Frank Kargl (University of Ulm)

Track 8 Trustworthy Cloud starts at Client-side (TRESCCA, HINT)

Room: CONFERENCE 4

 

Chair: Gunnar Schomaker (OFFIS)

 

Presenters:
Holistic approaches for integrity of ICT-Systems  : Carsten Rust (Morpho)
Protecting Confidentiality and Integrity in Embedded Systems : Jérémie Brunel (Telecom ParisTech)
System-Level Modeling of a NoC Firewall on Spidergon STNoC : Kyprianos Papadimitriou (TEI of crete)
Strong Isolation in ARM Platforms : Michele Paolino  (VOSYS)
Virtual Machine Migration to Protect Sensitive Information : Bernhard Katzmarski  (OFFIS)

Track 9 Emerging areas of information technology & present a reference model for cybersecurity and privacy (Capital)

Room: TEMPLAR’S

 

Chair:  Mari Kert (EOS)

 

Presenters:   
Mari Kert (EOS)
Impact of emerging cloud security issues on cybersecurity: Aljosa Pasic (ATOS)
Bruno Crispo (University of Trento)
Presentation of road-mapping activities of WG3 of the NIS platform: Fabio Martinelli (IIT CNR)
Situation awareness in cyberspace: Pascal Bisson (Thales)

How Research can help toward Cyber-Security: an industrial example: Henrik Plate (SAP)

13.00 - 14.00

LUNCH / NETWORKING

14.00 - 15.30

Track 10 Methodologies and Best Practices for Privacy-by-Design (PRIPARE)

Room: CONFERENCE 1

 

Chair:  Alberto Crespo (ATOS)

 

Presenters:
“PRIPARE's New Vision on Engineering Privacy and Security by Design” :  Nicolas Notario (ATOS)

Best practice at research level : Hisain Elshaafi (TSSG)

Designing and evaluation an architecture : Antonio Kung;

Re-using privacy patterns : Frank Kargl

Track 11 Business model/Innovation Path etc (SECCORD, IPACSO, CYSPA, SECONOMICS)

Room: CONFERENCE 4

 

Chairs: Massimo Felici (HP Labs, UK),
           Olga Gadyatskaya (University of Trento, IT)

 

Presenters:
Session Introduction: Economics, Business Models and Innovation Paths in Cyber Security and Privacy : Massimo Felici (HP Labs, UK)
Success stories of EU projects: Innovations and societal impacts  : Olga Gadyatskaya (University of Trento, IT), Aljosa Pasic (ATOS, ES)
Technology readiness: An overview of emerging EU clusters : Michele Bezzi (SAP, FR)
Towards an integrated view of innovation management in cybersecurity : Dharm Kapletia (HP Labs, UK)
IPACSO: Towards developing an innovation framework for ICT innovators in the Privacy and Cyber Security Markets : Zeta Dooly (WIT, IR)
Archimedes: Improving innovation through end-user participation and sound innovation management : Claudio Telmon (Mediaservice S.r.l. and Clusit, IT)
EU innovations in cybersecurity: The CYSPA’s perspective : Olga Gadyatskaya (University of Trento, IT), Nina Olesen (EOS, BE)
SECONOMICS-Socio-economics meets security for enhancing Airport protection : Alessandro Pollini (Deep Blue S.r.l., IT)

Track 12 Privacy and Data-protection: “Putting Privacy-ABCs into practice” – Course evaluation, social networks, identity and anonymity use

Room: TEMPLAR’S

 

Chair: Hannah Obersteller (ULD)

 

Presenters:   

The Concepts of Privacy-ABCs  :  Dr. Gregory Neven (IBM)

Privacy-ABC's on Mobile Devices : Jonas Lindstrøm Jensen, Ph.D (Alexandra Institute)

Community Interaction Among Pupils : Souheil Bcheri, M.Sc. (Eurodocs AB)

 

Track 12 will be continued in Track 15 . . .

15.30 - 15.45

COFFEE / TEA / NETWORKING (available if tracks want to break for it - optional)

15.45 - 17.15

Track 13 Accountable Cloud Governance: Interoperability and Policy Requirements) (A4Cloud)

Room: CONFERENCE 1

 

Chair:  Dr Vasilis Tountopoulos (ATC)

 

Presenters
The problem of cloud data governance :  Dr Vasilis Tountopoulos (ATC)
Accountability Model for Cloud Service Provision : Massimo Felici (HP Labs)
An analysis of interoperability requirements for accountable cloud services : Alain Pannetrat (CSA)
Regulatory and contractual challenges in cloud computing : Eleni Kosta (Tilburg University)

Track 14 Privacy and Data Protection issues in information sharing initiatives: business challenges, trusted sharing,… Experiences from ACDC

Room: CONFERENCE 4

 

Karine e Silva (ICRI-KU Leuven and B-CCENTRE)

Ulrich Seldeslachts (LSEC)

Track 15 Privacy and Data-protection: “Putting Privacy-ABCs into practice” – Course evaluation, social networks, identity and anonymity use

Room: TEMPLAR’S

 

Chair: Hannah Obersteller (ULD)

 

Track 12 Continued . . . .

Privacy Preserving Course Evaluations in Educational Institutes : Prof. Yannis Stamatiou (Diophantus)

Enabling Privacy Friendly Integration of Cloud Services into Enterprises :  Ahmad Sabouri (Goethe Universität Frankfurt)
Q&A

17.15 - 17.30

CLOSING SESSION - Plenary Room Closing Session/Wrap Up

Room: KALLIRROE 1

Plenary Room Closing Session/Wrap Up -  Henrik Plate (SAP)