New International Plan To Tackle Cybercrime LaunchedNew International Plan To Tackle Cybercrime Launched
New research road map developed by leading international cybersecurity researchers
July 11, 2012
A new international plan to tackle cyber crime has been launched at Queen’s University in Belfast.
The new research roadmap has been developed by leading international cyber security researchers along with industry and government experts who gathered for the Second World Cyber Security Summit at the Centre for Secure Information Technologies (CSIT) at Queen’s in March.
More than 80 invited participants from around the world attended the event. They included Chief Scientific Advisor from the UK Home Office - Professor Bernard Silverman, Cyber Security Division Director of US Homeland Security - Dr Douglas Maughan, Chairman and CEO of Kaspersky Labs - Eugene Kaspersky, Director of Innovation, Connected Energy Networks Cisco - Barbara Fraser, and Raj Samani, CTO, EMEA, McAfee.
Now available online, the summit report contains strategic recommendations under four main research themes critical to the on-going creation of cyber security defences.
The collective strategy includes the following elements:
Adaptive Cyber Security Technologies - using ‘big data’ in adaptive techniques and harnessing nature-inspired mechanisms to provide faster response and provide hi-fidelity detection
The Protection of Smart Utility Grids – Smart Meter as a Platform (SMaaP), standardisation of smart meters, their platforms, authentication protocols and sensing technologies; the mitigation of realistic threat scenarios
Security of Mobile platforms and applications - investigating common policies and technologies that can be applied to all components in the mobile architecture and focusing on trust models, authentication and application certification
Multi-faceted approach to cyber security research – studying social norms and user behaviour to exploit opportunities for cross cutting research based around ownership, identity, privacy and measuring trust.
CSIT Principal Investigator, Professor John McCanny, said: “The success of the inaugural 2011 World Cyber Security Technology Research Summit is reflected in the fact that even more of the biggest names in global cyber security attended this year’s event.
“The annual summit is unique in that it brings together cyber security experts, researchers and government policy makers from around the world for two days to identify, map out and ultimately combat the biggest threats to online security.
“Ultimately our objective is to help make the Internet of Tomorrow a safe and secure platform which is vital for global economic growth and societal development.”
Media inquiries to Claire O’Callaghan, Queen’s University Communications Office, Tel: +44 28 9097 5391 or email [email protected]
Notes to editors
Copies of the Second World Cyber Security Technology Research Summit Report are available online at http://www.csit.qub.ac.uk/Belfast2012
The Centre for Secure Information Technologies (CSIT), the UK’s lead university centre for cyber security research, is a new innovation and knowledge centre (IKC) based at Queen's University of Belfast's, Institute of Electronics, Communications and Information Technology (ECIT) in the Northern Ireland Science Park. Bringing together research specialists in complementary fields such as data encryption, network security systems, wireless enabled security systems, video analytics and intelligent surveillance technology, CSIT creates the security infrastructure needed to safeguard the trustworthiness of information stored electronically, both at home and in the workplace.
CSIT has been awarded ‘Academic Centre of Excellence in Cyber Security Research’ status by the UK’s GCHQ in partnership with the Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS).
Member companies and organisations include Altera, BAE Systems, Cisco, IBM, McAfee, Q1 Labs and Thales.
For further information, please contact:
David Crozier – CSIT Technical Marketing Manager [email protected]
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023