Registering is free, but required in order to attend the conference.
You can register until May 30, 2022.
Schedule
Presentation
|
---|
9:00
Opening session |
9:30
Public policies in national cybersecurity |
10:15
Ibero-American Collaboration in cybersecurity
|
10:45
Beyond quantum security with emerging pathways in information physics and complexity Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society - such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics. The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond. In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security. To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers. |
11:15
Coffee break |
11:45
GDPR 4 years later and the challenges of EU Digital Sovereignty |
12:15
Capacity building in Cybersecurity - Challenges and Opportunities Focused on the ongoing activities of the National Centre for Cybersecurity (CNCS), the talk aims to tackle the main challenges identified in the area of Cybersecurity, namely the need to augment citizens awareness, business maturity in information security, cooperation and information sharing among peers and the need to promote research and innovation in cybersecurity applied to digital transformation processes for industry and public administration. |
12:45
Lunch break |
14:00
Blended security analysis for web applications: techniques and tools Nowadays, millions of people use web applications as part of their lives by accessing and managing confidential information, including financial, health, and personal data that must be confidential, reliable, and readily accessible (CIA). Web applications are frequently deployed with security vulnerabilities that, when exploited by hackers, may have a huge negative effect on the business, potentiated by the worldwide press coverage of such incidents. To cope with this situation, the developers should find and fix these vulnerabilities. Although there are many techniques and tools to detect vulnerabilities, there is still, room for improvement as they do not detect all vulnerabilities, and they report many false positives. This presentation describes a new blended approach for web security that provides far better detection and a lower number of false alarms. |
14:30
Using machine learning in intrusion detection systems |
15:00
Management of Cybersecurity and Privacy Cyber Controls at Altice Portugal Altice Portugal’s cybersecurity strategy is centered on a pro Active Doctrine, with 5 integrated and complementary strategic dimensions focused on continuous cyber defense and improvement: GOVERNANCE, PREVENTION, PROTECTION, DETECTION & RESPONSE and RECOVERABILITY. They work together in a continuous 360º approach, supported by comprehensive security metrics integrated into a central security analytics platform (CyberWatch) that supports proper governance attribution and continuous improvement. Without proper GOVERNANCE it is not possible to have a sound cybersecurity strategy and execution. PREVENTION and PROTECTION are INHIBITORs, e.g., they exist to reduce the probability of security incidents materializing or propagating, respectively. DETECTION & COUNTER RESPONSE, guaranteed by our CyberSOC unit, are essential in case PREVENTION and PROTECTION fail for some reason. Finally, RECOVERABILITY is our last defense! Our doctrine is continuously adapted to deal with new threats or new IT or Telco trends. |
15:30
Coffee break |
16:00
ZTNA (Zero Trust Network Access) |
16:30
Security by Design – how to embed security across modern IT |
17:00
Digital Resilience. The importance of managing the security risk of the supply chain The new global context - geopolitical and digital - requires new ways of thinking and operating the businesses. In this new era, value chain management and cybersecurity go hand in hand. Currently, operational resilience involves managing information security risk, both internally and in the supply chain. |
17:30
Closing session |
GPS: N 40.5412512º, W -7.2837867º
Organizing committee of the International Cybersecurity Conference
Polytechnic of Guarda