Register

International Cybersecurity Conference.

Registering is free, but required in order to attend the conference.
You can register until May 30, 2022.

Program

Central Services Auditorium

Schedule
Presentation
9:00

Opening session
Joaquim Manuel Fernandes Brigas
Presidente do Politécnico da Guarda

9:30

Public policies in national cybersecurity
Contra-Almirante António Gameiro Marques
Gabinete Nacional de Segurança

10:15

Ibero-American Collaboration in cybersecurity
Jesús Martínez Martínez
Universidad de Murcia, Spain

10:45

Beyond quantum security with emerging pathways in information physics and complexity
Rui Perdigão
Centre for Complex System Science, Austria

Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake.

Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society - such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics.

The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond.

In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security.

To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.

11:15

Coffee break

11:45

GDPR 4 years later and the challenges of EU Digital Sovereignty
João Ferreira Pinto
Supremo Tribunal De Justiça

12:15

Capacity building in Cybersecurity - Challenges and Opportunities
António Rio Costa
Portuguese National Cybersecurity Centre

Focused on the ongoing activities of the National Centre for Cybersecurity (CNCS), the talk aims to tackle the main challenges identified in the area of Cybersecurity, namely the need to augment citizens awareness, business maturity in information security, cooperation and information sharing among peers and the need to promote research and innovation in cybersecurity applied to digital transformation processes for industry and public administration.

12:45

Lunch break

14:00

Blended security analysis for web applications: techniques and tools
Paulo Nunes
Polytechnic of Guarda

Nowadays, millions of people use web applications as part of their lives by accessing and managing confidential information, including financial, health, and personal data that must be confidential, reliable, and readily accessible (CIA). Web applications are frequently deployed with security vulnerabilities that, when exploited by hackers, may have a huge negative effect on the business, potentiated by the worldwide press coverage of such incidents. To cope with this situation, the developers should find and fix these vulnerabilities. Although there are many techniques and tools to detect vulnerabilities, there is still, room for improvement as they do not detect all vulnerabilities, and they report many false positives. This presentation describes a new blended approach for web security that provides far better detection and a lower number of false alarms.

14:30

Using machine learning in intrusion detection systems
Victor Lobo e José Alberto Borges
AFCEA-Portugal, e Instituto Universitário Militar

15:00

Management of Cybersecurity and Privacy Cyber Controls at Altice Portugal
José Alegria
Altice Portugal

Altice Portugal’s cybersecurity strategy is centered on a pro Active Doctrine, with 5 integrated and complementary strategic dimensions focused on continuous cyber defense and improvement: GOVERNANCE, PREVENTION, PROTECTION, DETECTION & RESPONSE and RECOVERABILITY. They work together in a continuous 360º approach, supported by comprehensive security metrics integrated into a central security analytics platform (CyberWatch) that supports proper governance attribution and continuous improvement. Without proper GOVERNANCE it is not possible to have a sound cybersecurity strategy and execution. PREVENTION and PROTECTION are INHIBITORs, e.g., they exist to reduce the probability of security incidents materializing or propagating, respectively. DETECTION & COUNTER RESPONSE, guaranteed by our CyberSOC unit, are essential in case PREVENTION and PROTECTION fail for some reason. Finally, RECOVERABILITY is our last defense! Our doctrine is continuously adapted to deal with new threats or new IT or Telco trends.

15:30

Coffee break

16:00

ZTNA (Zero Trust Network Access)
Daniel Ferreira
Fortinet

16:30

Security by Design – how to embed security across modern IT
Miguel Azevedo
Noesis

17:00

Digital Resilience. The importance of managing the security risk of the supply chain
Ofélia Malheiros
Securnet

The new global context - geopolitical and digital - requires new ways of thinking and operating the businesses. In this new era, value chain management and cybersecurity go hand in hand. Currently, operational resilience involves managing information security risk, both internally and in the supply chain.

17:30

Closing session
Contra-Almirante António Gameiro Marques
Gabinete Nacional de Segurança

Location

How to get to Polytechnic of Guarda

Polytechnic of Guarda
Av. Dr. Francisco Sá Carneiro nº50
6300-559 Guarda

+351 271 220 100

GPS: N 40.5412512º, W -7.2837867º

Contacts

For information regarding registration and participation, please contact:

Organizing committee of the International Cybersecurity Conference
Polytechnic of Guarda

csecurity@ipg.pt

+351 271 220 100

Organization

organizing committee

Fernando Melo

Fernando Melo Rodrigues

Clara Silveira

Maria Clara Silveira

Natália Gomes

Natália Gomes

Noel Lopes

Noel Lopes

Pedro Pinto

Pedro Pinto

Previous editions

International Cybersecurity Conference