Smart Cybersecurity?

Smart Cybersecurity?

The prefix “cyber” has been used in many terms like cybercrime, cyberterrorism and cyberwarfare, although often with unclear definitions. Differentiation was often based on the origin of a threat (criminal networks, terrorists) or target of an attack (critical infrastructures, money).

The prefix “smart” is likely even more troublesome to define, and it is certainly more misused. According to Encyclopedia Britannica it is “…ability to adapt effectively to the environment...”.


Nevertheless…I will be talking about “smart cybersecurity”.


Over the last years, Atos has been investing heavily in new technologies and methodologies to improve the state-of-the-art in cybersecurity, sometimes through collaborative R&D projects co-financed through H2020 program. On November 23rd I will give a short introduction to “Smart Cybersecurity” during our annual internal event called Digital Show, where several H2020 project results are going to be presented with their demos.


We will see how to deal with the emergence of new and increasingly dangerous potential threat vectors, how to address the increasing openness and vulnerability of high-impact targets such as critical infrastructures, how to improve the speed of incident response, how to preserve or improve data protection and privacy or how to reduce identity fraud.  


Digital Show will run for the whole week, with the other days being dedicated to continuum computing, artificial intelligence and blockchain.


Noaa Barak

4YFN Strategy | Innovation | Investors @GSMA | ?? Tell me why you'd like to connect ??

4 年

Hey Aljosa Pasic, sounds interesting! Is there a link where we can view the full agenda and register?

回复

要查看或添加评论,请登录

Aljosa Pasic的更多文章

  • Security Classification of IoT Devices

    Security Classification of IoT Devices

    When classifying IoT devices and IoT hardware from a security perspective, there are different taxonomies or frameworks…

  • Mutual authentication of Cinderella and a shoe

    Mutual authentication of Cinderella and a shoe

    Once upon a time, in a faraway kingdom, not subject to EC eIDAS regulations, there lived a young girl named Cinderella.…

    3 条评论
  • Cybersecurity Fairy Tale

    Cybersecurity Fairy Tale

    Cybersecurity awareness and education should start with the primary school!!! Some 10 years ago this was the typical…

    2 条评论
  • AI based anomaly detection for decentralised Electrical Power and Energy Systems

    AI based anomaly detection for decentralised Electrical Power and Energy Systems

    On Novemeber 10th 2022, SDN-microSENSE project held Virtual Open Event where the latest results and outcomes of…

  • Lessons from Descartes, part 3: hardware and software dualism

    Lessons from Descartes, part 3: hardware and software dualism

    (You might want to read part 1 and part 2 before this article, although these are not related directly). Unfortunately,…

    1 条评论
  • Lessons from Descartes, part 2: technology and market dichotomy

    Lessons from Descartes, part 2: technology and market dichotomy

    The coordinate system, as we know it today, is called the Cartesian system, after the French mathematician René…

  • Future of Cybersecurity Education in Europe

    Future of Cybersecurity Education in Europe

    Recently I was listening to recording of Sir Ken Robinson, a professor, advisor, author, and speaker on education…

    1 条评论
  • Efficient R&D in collaborative projects

    Efficient R&D in collaborative projects

    When it comes to efficient technology transfer from R&D to company portfolio, change is the only constant. In Atos…

  • NGI Talk: Cybersecurity for teleworking

    NGI Talk: Cybersecurity for teleworking

    Every day we must make decisions about hundreds of different risks. Whether it is crossing the street, washing your…

  • ENSURESEC project

    ENSURESEC project

    We do not hear much about specific e-commerce threats, apart from common site and transaction security, and maybe…

社区洞察

其他会员也浏览了