This talk by Kirsten Ullbæk Selvig from the Ministry of Transport discusses the international perspectives of airspace and outer space, interfaces and dynamic borderlines. It touches upon the consequences of the digital transformation for the cybersecurity of space activities, including the Norwegian perspective, and our increasing dependence on airspace, aviation and satellite infrastructure in the form of GNSS/GPS. Could this infrastructure break down, and to what extent are we prepared if it happens ? All interested are welcome.
This talk by Mia Landsem is about where photos end up when they are unlawfully shared online, and what could be the consequences for victims and offenders. The talk is in Norwegian. All interested are welcome.
This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets. Speaker: Sujeet Shenoi (University of Tulsa).
This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices. Speaker: Sujeet Shenoi (University of Tulsa).
5G networks promise to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In this talk, we visit 5G security architecture & outline potential security challenges in deployed networks. We use previously known and severe telecom security attacks examples to demonstrate potential risks of 5G.
This talk by Mauno Pihelgas is about building an availability scoring system for NATO CCDCOE's annual international cyber defence exercise Locked Shields. All interested are welcome.
Norsk Informasjonssikkerhetsforum (ISF) arrangerer Sikkerhetsfestivalen 2019 i dagene 26. - 28. august på Lillehammer.
Privacy Threat of Keystroke Profiling on the Web
In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is a biometric modality which can be used by any Web service to profile users. The collection of keystroke dynamics does not require any additional sensors and can be done without the users' knowledge. Keystroke Dynamics can be used to authenticate users, but also to profile otherwise anonymous web users, and thereby represents a privacy threat. This talk first discusses the performance of Keystroke Dynamics and how it poses a serious threat to users privacy. The talk then discusses several potential real-time methods for anonymization of Keystroke Dynamics, and gives some recommendations for building and implementing Keystroke Dynamics Anonymization Systems.
Security Trends: 1) Factorization, 2) AI/ML in Cyber Security
AFSikkerhet seminar om CyberSmart og GenCyber
EOS-utvalgets kontroll av de hemmelige tjenesters IT-systemer.
The 23rd Nordic Conference on Secure IT Systems
The 17th European Conference on Cyber Warfare and Security
Norsk Informasjonssikkerhetskonferanse 2017