Register

International Cybersecurity Conference.

Registering is free, but required in order to attend the conference.
You can register until May 26, 2022.

Program

Central Services Auditorium

Schedule
Presentation
9:00

Opening session

9:30

Public policies in national cybersecurity
Contra-Almirante António Gameiro Marques
Gabinete Nacional de Segurança

10:15

Ibero-American Collaboration in cybersecurity
Jesús Martínez Martínez
Universidad de Murcia, Spain

10:45

Beyond quantum security with emerging pathways in information physics and complexity
Rui Perdigão
Centre for Complex System Science, Austria

Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake.

Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society - such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics.

The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond.

In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security.

To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.

11:15

Coffee break

11:45

GDPR 4 years later and the challenges of EU Digital Sovereignty
João Ferreira Pinto
Supremo Tribunal De Justiça

12:15


António Rio Costa
Portuguese National Cybersecurity Centre

12:45

Lunch break

14:00

Blended security analysis for web applications: techniques and tools
Paulo Nunes
Polytechnic of Guarda

Nowadays, millions of people use web applications as part of their lives by accessing and managing confidential information, including financial, health, and personal data that must be confidential, reliable, and readily accessible (CIA). Web applications are frequently deployed with security vulnerabilities that, when exploited by hackers, may have a huge negative effect on the business, potentiated by the worldwide press coverage of such incidents. To cope with this situation, the developers should find and fix these vulnerabilities. Although there are many techniques and tools to detect vulnerabilities, there is still, room for improvement as they do not detect all vulnerabilities, and they report many false positives. This presentation describes a new blended approach for web security that provides far better detection and a lower number of false alarms.

14:30

Using machine learning in intrusion detection systems
Victor Lobo
Escola Universitária Militar / Universidade Nova de Lisboa

15:00



Ordem dos Engenheiros

15:30

Management of Cybersecurity and Privacy Cyber Controls at Altice Portugal
José Alegria
Altice Portugal

Altice Portugal’s cybersecurity strategy is centered on a pro Active Doctrine, with 5 integrated and complementary strategic dimensions focused on continuous cyber defense and improvement: GOVERNANCE, PREVENTION, PROTECTION, DETECTION & RESPONSE and RECOVERABILITY. They work together in a continuous 360º approach, supported by comprehensive security metrics integrated into a central security analytics platform (CyberWatch) that supports proper governance attribution and continuous improvement. Without proper GOVERNANCE it is not possible to have a sound cybersecurity strategy and execution. PREVENTION and PROTECTION are INHIBITORs, e.g., they exist to reduce the probability of security incidents materializing or propagating, respectively. DETECTION & COUNTER RESPONSE, guaranteed by our CyberSOC unit, are essential in case PREVENTION and PROTECTION fail for some reason. Finally, RECOVERABILITY is our last defense! Our doctrine is continuously adapted to deal with new threats or new IT or Telco trends.

16:00

Coffee break

16:30

ZTNA (Zero Trust Network Access)
Daniel Ferreira
Fortinet

17:00
17:30

Closing session

Location

How to get to Polytechnic of Guarda

Polytechnic of Guarda
Av. Dr. Francisco Sá Carneiro nº50
6300-559 Guarda

+351 271 220 164

GPS: N 40.5412512º, W -7.2837867º

Contacts

For information regarding registration and participation, please contact:

Organizing committee of the International Cybersecurity Conference
Polytechnic of Guarda

csecurity@ipg.pt

+351 271 220 165

Organization

organizing committee

Fernando Melo

Fernando Melo Rodrigues

Clara Silveira

Maria Clara Silveira

Natália Gomes

Natália Gomes

Noel Lopes

Noel Lopes

Pedro Pinto

Pedro Pinto

Previous editions

International Cybersecurity Conference