Welcome to LSEC, an internationally renowned Information security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. Founded by the University of Leuven (K.U. Leuven), supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security industry experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.
LSEC together with its partners 3IF.be and iot-convention.be organized the 5th 3IF.eu conference and closed the 3IF.be project, but continues with the 3IF.be activities such as the Condition Based Maintenance Fieldlab, the Industrial Dataspace, the Connected Factories activities and the Trinity Cybersecurity for Robotics activities. LSEC and 3IF.eu aim to continue to provide their expertise to companies looking for Industry4.0 related expertise and assistance, either in selecting, discovering, deploying or operating their Industry 4.0 activities.
LSEC organized the 3IF.eu activities and had many different talks at the 3IF.be conference 2019. For some more pictures, access to presentations and video contents, please visit the program page.
We welcome you again at the next 3IF.eu conference organized together with iot-convention in 2020, on Wednesday June 10th.
Flemish Minister for Innovation Philipp Muyters together with LSEC - 3IF.eu Ulrich Seldeslachts and Guy Verrue, together with Bernard Schrevens, Kulapro; Johan Dekeyzer, Dekeyzer-Ossaer.
3IF Annual Conference 2019 agenda and links.
A day of CSA (Cloud Security Alliance) Belux and LSEC Cloud Security. From vulnerability assessements best practices (Toreon) in the cloud to secdeveops and agile (Bitsensor). From containers and kubernetes developments and their security management challenges (Trend Micro) to key management and hardware keys (ATOS), from Cloud Act to GDPR Code of Conduct (CSA) and Cloud Services Providers certification (TimeLex & LSEC). From cloud application governance (KBC) to layer seven solutions encapsulating all security risks (Symantec). The cloud is omnipresent and not caring is being plain ignorant on some of the most exciting current security developments and related opportunities. Take a look at the perspectives presented on May 14th in Brussels at the Vandervalk Hotel in Diegem.
For an overview of the day and presentation, including a way to contact the presentors and participants, take a look on the day page.
In 2019 customers and partners should be presented one single interface to all of the backend systems of their services providers. They should be able to choose between the different multifactor applications they have, whenever they want and whereever they are. Back and identity and access systems should be agnostic about this and should be ready to be distributed, decentralized, utilising OTP (one time password) and MFA (multifactor authentication) or step up authentication. Not only customers, but systems should be able to provision the complexity of devices, systems, applications and other services. Technologies, expertise and experiences exist to support this in order to reduce digital identity theft, malicious access attempts and still reducing the burden of the customer access control. Identity and Access in the 21st centurt support the digital transformation of organizations, systems and technologies in a seamless way. Financial institutions organize themselves to reduce the administrative burden for their business customers (Isabel) by facilitating KYC (know your customer) amongst themselves, and the respective mandates for financial services. Technologies (Forgerock) support the ease of the single customer accessing multiple legacy back-end services seamlessly. Decentralized and distributed authentication, identification are being made possible (Trustbuilder and KEYP) going towards Zero Knowledge Proof and reducing the burden for personal dataprotection, and providing seamless multifator possibilities. Proving compliance and controlling access throughout multiple systems and cloud environments (Brainwave) for management, audit and DPO can be made easy. Multifactor authentication and OTP increase the security levels, but technologies have lowered the barriers for customers to use them (InWebo). With developments in industry (IDSA) this won't be limited to data interactions within an organization. Walls are being teared down to access company confidential data. A short impression of a day at the races of the LSEC Digital Identities Forum 2019 held on April 25th in Brussels at the Vandervalk Hotel in Diegem.
For an overview of the day and presentation, including a way to contact the presentors and participants, take a look a the agenda at a glance.
Almost 1 year after the full activation of the GDPR, we take a look back on the past year with experiences and best practices. But more importantly we look forward together with the new Belgian DPA and their respective new members, as well as with the Vlaamse Toezichtshouder. We consider the impact both on private industry and public authorities and their related organizations. We look into things such as data subject requests, too much consent and the clickawaycookie mentality. Joined by a number of professional support organizations and dedicated technology providers, the GDPR Salon offers not only key insights and learning, but access to expertise and partners in supporting the transformation process. Join us in celebrating Willem De Beuckelaere and Minister Philippe Debacker for their respective leaderships and handovers to their successors.
Join GDPR Salon on Friday May 24th. Following the link to https://gdprsalon.be supported by LSEC, Privacysalon, VUB, VVSG and Koaach, supported by the Belgian DPA and under the pattronage of the Belgian State Secretary for Privacy.
LSEC and 3IF.be are Digital Innovation Hubs and Centres of Excellence in Cybersecurity and Digital Transformation for Manufacturing in Europe and have started expanding their expertise into the highly impactfull domain of robotics. Robots are widely used in industrial production environments and increasingly in logistics, healthcare and home appliances. Most of the traditional robot systems are being operated by a PLC and / or a specific robot controller. But even while being isolated in industrial networks, these machines are not free from harm. Both human safety and product quality are at stake. But more increasingly flexible, autonomous and versatile robots have entered in to the industrial domain. Collaborative robots are being released from their cages and put in close cooperation with humans. That positive trend also sees a significant decline in cost for robotics. Partially thanks to the availability of standard technologies and the interconnectivity of the robotic systems. But most of the robotic systems lack a fundamentel cybersecurity posture. LSEC and 3IF.be have joined TRINITY as part of the Digital Transformation program of the European Commission, bringing together Cybersecurity experts and robotics experts and improving the overall cybersecurity gesture of robotic implementations. For more information please visit the 3IF.be website. Part of this program is an open call that will open 2nd half of 2019 for innovative robotic projects to take place. The activity will be widely discussed at the upcoming European Robotics Forum (ERF) 2019 in Bucharest. More information and presentations can be found on the Cybersecurity for Robotics page.
The AI4Business Summit challenged us to present an overview on the state of play of the use of Artifial Intelligence in the Cybersecurity Industry. By positioning Cybersecurity in the context of Risk Management and Security, AI is being utilized already in many defense and security applications such as law enforcement and military robots and increasingly in our home office and business environments. The Cybersecurity sector itself has been applying AI and Machine Learning techniques already for nearly two decades now. With today's 240+ billion Security events happening on a daily basis, there is no longer any human capacity capable of handling these challenges. Next to automation, big data and data analysis, patterns are being recognised and alerted. These tools became the basis for the current Cybersecurity Industry major players such as McAfee, Black Carbon, Crowdstrike, IBM, ... Capturing data from different sensors is the basic premise, utilizing ML, AI in various mechanisms applying mathematical models to investigate security incidents and detect new forms of malwares, detecting the impact on major and smaller European enterprises and supporting the malware analysts in their daily operations. But equally intelligent were the malversaries by utilising AI techniques to detect the weakest links, assess when the time is right to strike into specific platforms or support local R&D teams finding the next vulnerabilities on the basis of automated detection. We've also indicated how AI is being used to evade detection and prevention techniques, or how criminals today use data to actually master the lack of capabilities from law enforcement in a certain region. We've also positioned developments such as Deep Fake to indicate its potential impact on both the use of NLP, and its use in phising campaigns, convincing target about their welwilligness to support. Our journey ends where we started: indicating the potential for robots, but by indicating their lacking cybersecurity postures and indicating potential impact from AI, it will be a long and windy road.
Understand how AI can be supported in your concept case, and become inspired by the key learnings on algorithms, collecting data,
For more information visit the