SUCHE
Inhaltstyp
Kategorien
-
Internationale Forschung gegen die kriminelle Nutzung des Darkweb und virtueller Währungen
lichen Quellen nutzen können, so unter anderem Register für virtuelle Währungen, Onlineforen, Peer-to-Peer Netze auf Untergrund-Märkten sowie beschlagnahmte Geräte.Dr. King betont, dass bei der Entwicklung
-
Von Kryptowährungen über Blockchain zur Cyber Security
Dezentrale Authentifikation Eine besondere Eigenschaft des modernen Internets liegt in der mächtigen Peer-to-Peer-Funktionalität, bei der Daten und Informationen direkt zwischen den Endnutzern ohne zentrale Steuerung
-
SECPID 2018 - Workshop on Security, Privacy, and Identity Management in the Cloud
conference, the 13th International Conference on Availability, Reliability and Security on August 27 to August 30, 2018 in Hamburg, Germany. ARES aims at a full and detailed discussion of the research issues
-
Vienna Cyber Security Week 2018
the location of AIT Austrian Institute of Technology in Tech Gate Vienna (31.01. - 02.02.). Brought to Vienna in 2017 for the first time, this event gathers international players in the field of safety
-
Cyber Range & Policy Table Top Tutorials
During these Tutorials, you will get to know the concept of cyber security policies and cyber ranges, and how they improve cyber security capabilities of corporations, governments, and institutions. [...] the Table Top Tutorials, policy based scenarios will lead the participants through a fictional setup to challenge their knowledge and assumptions about industries’ cyber security. For the exact program of [...] center for cyberspace security. Become part of this exceptional opportunity! We are looking forward to welcoming you at the Tutorials. Please register for the Cyber Range & Policy Table Top Tutorials
-
Cyber Technology Exhibition 2018
opportunity. We are looking forward to welcoming you at the Cyber Technology Exhibition 2018! We assist you to find your B2B and B2G talk partners. Simply go to: www.energypact.org [...] representatives of businesses, industry corporations and research institutions the opportunity to get to know their respective portfolios and leading technologies in the terrains of cyber security. [...] Take a ride up to the Sky Stage with stunning views on the Danube and Vienna, have a drink and a snack, and get acquainted with representatives of leading-edge Austrian and international cyber technology
-
Global State of Information Security Survey 2018 von PwC
& Compliance (GRC) • Kryptographie • Authentifizierung – End to End Security • SIEM • EU-Datenschutzgrundverordnung •
-
Visit AIT at Milipol 2017
our IT systems demands new mechanisms to protect them from advanced cyber attacks, to detect operational anomalies caused by complex system behaviour, and even to identify failures in operational processes [...] established a "cyber range" training centre to share AIT´s extensive knowledge and to train and raise all stakeholders from industry, science and the public sector to a common level of knowledge. A cyber range [...] combined with 3D stereo data to create access control solutions ranging from low to high security applications. The experts implement contactless biometric solutions in mobile devices to ease the work of Law
-
International Business High Level Panel: DIGITAL SECURITY
digital age - identifying critical skills to make informed decisions in a digital age AIT is scientific partner and co-organizer of the conference. Helmut Leopold, Head of Center for Digital Safety & Security [...] transformation – maximizing opportunities and minimizing threats. Conference dialogue and discussion seek to provide national and international perspective and lessons learned on the development of a digital [...] digital security into strategic business valueUnderstanding the impact of changing threat landscape to the business modelProtecting digital innovation in the context of emerging cyberthreatsIdentifying
-
International Multistakeholder Conference: CYBERSPACE, ENERGY & DEVELOPMENT
Leopold, Head of Center for Digital Safety & Security, AIT Austrian Institute of Technology: "Innovation only happens through communication and combination of knowledge and technology. To achieve [...] international cooperation among nations regarding cyberspace especially concerning the risks related to critical infrastructure such as conventional energy systems. The early initiatives in this area have [...] networks, as these are the underlying infrastructure of cyberspace. However, if a cyber-attack were to result in the deterioration in the supply of energy means such as electricity, it could also impair