Welcome to LSEC, an internationally renowned Information security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. Founded by the University of Leuven (K.U. Leuven), supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security industry experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.
LSEC's main mission is to create awareness about IT security, provide a networking platform for the experts on IT Security as an international centre of expertise, and to ensure that its members stay at the forefront of technology by supporting innovation and by stimulating and supporting knowledge exchange and collaboration.
LSEC provides a single point of entry to a geographic concentration of world-class e-security expertise and e-security professionals in Europe. This website is merely a flavor of a tool that is being completed and extended , with information, interacitivity and actions. LSEC members have been carefully selected for being experts in their respectives domains of Information Security expertise. This portal can be your starting point to find information related to specific Information Security matters, and relates back to the experts and information. LSEC is constantly organizing events and sessions on a variety of Themes, made up of expertises. So do take a look at What's Happening, to find out more on all of our activities.
Formed in January 2002, LSEC is an independent not-for-profit network organisation uniting a variety of experts of IT security : users (Security Officers, IT Managers and other security professionals), hardware and software vendors, service and knowledge providers, advisors, research institutions and governmental organisations.
Together with partners from Spain, Estonia, Germany, UK and Czech Republic, LSEC started project FIRE that aims to facilitate access to it security research, capabilities and it security needs in order to reduce the gap between research and academia. A lot of research activities are unfortunately known only to few in the industry, whilst a lot of research interest is undocumented and gets lost. Also in an effort to reduce industry fragementation throughout Europe and make Europe a stronger Union with a more coordinated IT Security Industry. LSEC and its partners AMETIC, NSMC, Cybernetica, ifis - TeleTrusT and ADS Group - SITC will be actively identifying researchers, research, it security offerings and demand and als documenting this during seminars and online publications over the course of the next couple of years. For more information, please download our executive summary of FIRE, or contact your FIRE coordinator in proximity. .
Europe bands together to fight against botnets, LSEC leads pilot developments in Advanced Cyber Defence Center with EU support
LSEC - Association of information security companies in Europe and eco – Association the German Industry together with 28 partners from 14 European countries are launching a project against one of the biggest Internet security threats: Every fifth computer is currently estimated to be part of a botnet used by cyber criminals to infect end user computers with malware and gain remote access to them. Kicking off today in Frankfurt, the association begins its work as the coordinator of the Advanced Cyber Defence Center (ACDC) which is supported by the European Union.
The Advanced Cyber Defence Center is an important building block for the cyber security strategy of the EU. At the launch press conference on February 7th, EU-Commissioner Neelie Kroes said: "We need to protect our networks and systems and improve their resilience.
More information can be found on : in the news section
In Identityspace blogs Marcus Lacanse about his experiences and thoughts about electrkonic identities. À great collection of experiences and ideas, practical views and vision of the future. Marcus has been more than 20 years involved in the domain.
We can count him under our list of great experts.
Visit his blog at http://identityspace.wordpress.com/#entries
Ulrich Seldeslachts 06-May-2011
Are you a leader in Security ? Do you want to share your expertise and join the Leaders in Security as a Core Expert Member ?
Contact us via email! Or call +188.8.131.52.41 for a direct contact and more information.
An information set and your Membership Welcome Pack awaits you.
Major societal events such as the recent Arabic spring, international marches against the current economical crisis and the recent disasters in Norway or at the Pukkelpop festival in Belgium, are proving the need and the importance of critical infrastructures, resilience of networks, and the use of social media such as Facebook and Twitter.
When communication channels such as GSM break down, family and friends can continue to be connected. Either Wifi, or when the communication picks up again, all tweets are being forwarded.
Pictures on site are being taken and broadcasted, shared in the world even before press and traditional media can participate.
This is a great evolution, which we fully support and also companies and critical infrastructures should take this into consideration when discussing the impact of social media on their corporate networks.
January 2013, a new year, a new challenge. The year started with the BANG of data losses by private and public companies, by numerous companies reporting to us about data breaches and their networks and systems being compromised over the last couple of weeks.
The LSEC Community, over 3000 connected individuals from various organizations, more than 125 specialized Members and the international networks of The European Security Innovation Network and FIRE, together more than 1600 companies in security and defense technologies wishes you a safe, secure, prosperous and happy 2013.
During 2013 we plan to further grow the community and organize supporting activities for a more comprehensive view on security related topics, projects that bring together the expertise of industrial end consumers, the it security industry and researchers and we continue to build our independent informatio security networking platform for the industry at large.
We look forward meeting you during our live meetings and in our online communities. Join the discussions and become part of the solution, even (especially) if you have had your series of security incidents already ... More is yet to come ...
The LSEC Team
Leuven, Belgium, Feb 13th, 2013
LSEC plays leading role in Europe's cybersecurity strategy as partner in anti-botnet pilots
Europe bands together to fight against botnets
LSEC leads pilot developments in Advanced Cyber Defence Center with EU support
Cologne - Leuven, 13.02.2013 – LSEC - Association of information security companies in Europe and eco – Association the German Industry together with 28 partners from 14 European countries are launching a project against one of the biggest Internet security threats: Every fifth computer is currently estimated to be part of a botnet used by cyber criminals to infect end user computers with malware and gain remote access to them. Kicking off today in Frankfurt, the association begins its work as the coordinator of the Advanced Cyber Defence Center (ACDC) which is supported by the European Union.
The project will offer a full range of services for increased cyber security ranging from malware recognition to prevention. The campaign partners are large public network providers, software producers, scientific institutions, law enforcement and administrative bodies, banks, as well as certification authorities.
"Working together to combat botnets is fundamentally important: From providers to the police and all the way to the end users. We have seen how effective that can be at the national level with the Anti-Botnet-Advisory Center. We look forward to taking this effective approach to defy botnets in Europe together with our strong partners. With the Advanced Cyber Defence Center we are aiming to develop a series of activities to better cope with cyber threats, more in particulat botnets," says LSEC ceo Ulrich Seldeslachts
The Advanced Cyber Defence Center is an important building block for the cyber security strategy of the EU. At the launch press conference on February 7th, EU-Commissioner Neelie Kroes said: "We need to protect our networks and systems and improve their resilience. To this end we should ensure that all actors play their part in fighting botnets and malware. Cyber threats are not contained to national borders: nor should cyber security be." The Head of Unit DG Connect of the European Commission, Giuseppe Abbamonte, adds: "ACDC is the first initiative launched in the context of the EU Cyber Security Strategy. This project will improve protection of our networks and systems against botnets and malware."
On of the intended applications in the EU pilot project is the Clearing House which receives reports from the project partners on security issues like spam campaigns in their networks, stolen data, or DDoS attacks. Affected parties such as end users, mobile phone providers, and banks, providers of security solutions or hosting providers are then informed of the incidents and receive support via the central website http://www.botfree.eu (http://www.botvrij.be and http://www.sansbot.be) from national support centers to remove the malware. The support centers are supposed to offer the necessary downloadable tools. What's more, small and mid-sized companies receive support if their websites are infected with malware.
In addition, the Advanced Cyber Defence Center is committed to identifying infected websites and committed to removing malware programs. Participating providers will also detect anomalies in their networks, botnets in the cloud, and within mobile networks and report them to the Clearing House.
The pilot project has a total budget of 16 million Euros and is supposed to initially run for 30 months.
A fact sheet about the project is available at http://ec.europa.eu/information_society/apps/projects/factsheet/index.cfm?project_ref=325188.
The speech given by EU-Commissioner Neelie Kroes at the launch of the EU Cyber Security Strategy is available at http://europa.eu/rapid/press-release_SPEECH-13-104_en.htm.
LSEC (http://www.lsec.be) - Leaders in Security is an industry association of information security companies. Founded in 2002, LSEC organizes with and for the industry various information security events related to enterprise, government and end users, LSEC brings together the expertise in the industry in industrial research projects such as ACDC, FIRE, MOBES and the Eurtopean Security Innovation Network. LSEC's members include some of the largest expert companies and top security experts on a global level such as RSA, Vasco, Symantec, McAfee, Sophos, G-Data, Qualys, and many others.
LSEC – Leaders in Security
Kasteelpark 10 – 3001 Heverlee
Ulrich Seldeslachts, phone +32 16 32 8541, acdc at lsec.be
eco - Association the German Internet Industry
Lichtstr. 43h, 50825 Cologne, Germany
San Francisco, CA, US, February 26th, 2013
Congratulations to LSEC Member UCL, where Prof. Em. Jean-Jacques Quisquater receives 2013 RSA Award Excellence in field of Mathematics!
The award, presented during the annual RSA Conference in San Francisco, February 26th is yet another milestone of the Belgian expertise in information security on a global level.
The annual award has been given in the previous years to Eli Biham, Professor; Technion-Israel Institute of Technology, Computer Science; Dr. Mitsuru Matsui, Senior Researcher, Mitsubishi Electric Corporation; Charles W. Rackoff, University of Toronto, ...
Quisquater has been awarded for his works in the domain of cryptography and the development of smartcards and the use of cryptography for eID cards in Europe and around the world.
Congratulations from the industry!
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition
From NIST Tech Beat: October 2, 2012
Contact: Chad Boutin
The National Institute of Standards and Technology (NIST) today announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security.
The winning algorithm, Keccak (pronounced "catch-ack"), was created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors. The team's entry beat out 63 other submissions that NIST received after its open call for candidate algorithms in 2007, when it was thought that SHA-2, the standard secure hash algorithm, might be threatened. Keccak will now become NIST's SHA-3 hash algorithm.
Hash algorithms are used widely for cryptographic applications that ensure the authenticity of digital documents, such as digital signatures and message authentication codes. These algorithms take an electronic file and generate a short "digest," a sort of digital fingerprint of the content. A good hash algorithm has a few vital characteristics. Any change in the original message, however small, must cause a change in the digest, and for any given file and digest, it must be infeasible for a forger to create a different file with the same digest.
The NIST team praised the Keccak algorithm for its many admirable qualities, including its elegant design and its ability to run well on many different computing devices. The clarity of Keccak's construction lends itself to easy analysis (during the competition all submitted algorithms were made available for public examination and criticism), and Keccak has higher performance in hardware implementations than SHA-2 or any of the other finalists.
"Keccak has the added advantage of not being vulnerable in the same ways SHA-2 might be," says NIST computer security expert Tim Polk. "An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently."
Polk says that the two algorithms will offer security designers more flexibility. Despite the attacks that broke other somewhat similar but simpler hash algorithms in 2005 and 2006, SHA-2 has held up well and NIST considers SHA-2 to be secure and suitable for general use.
What then will SHA-3 be good for? While Polk says it may take years to identify all the possibilities for Keccak, it immediately provides an essential insurance policy in case SHA-2 is ever broken. He also speculates that the relatively compact nature of Keccak may make it useful for so-called "embedded" or smart devices that connect to electronic networks but are not themselves full-fledged computers. Examples include sensors in a building-wide security system and home appliances that can be controlled remotely.
"The Internet as we know it is expanding to link devices that many people do not ordinarily think of as being part of a network," Polk says. "SHA-3 provides a new security tool for system and protocol designers, and that may create opportunities for security in networks that did not exist before."
For more on the SHA3 competition, see http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.