• LSEC, the European ICT Security Cluster

    LSEC, the European ICT Security Cluster

    LSEC is the European ICT Security Cluster. Started in 2012 in Belgium, the cluster is now active in different countries in Europe supporting its members Read More
  • Mobile Security Solutions

    Mobile Security Solutions

    Mobile Security Solutions cover a wide range of topics related to the challenges posed by the use of mobile devices in an enterprise or government Read More
  • Cloud Security & SaaSification

    Cloud Security & SaaSification

    Securing the Cloud for effective Enterprise Cloud Computing Read More
  • Cyber Security – Active Defense

    Cyber Security – Active Defense

    Cyber Security has been a main theme for LSEC for almost a decade. The LSEC expertise varies from policies, system integration, tools and technologies, incident Read More
  • Internet of Things

    Internet of Things

    LSEC is supporting IoT technology development, Enterprise IoT and Industrial Internet  The Internet of Things is the internet of connected smart sensors and objects with Read More
  • 1
  • 2
  • 3
  • 4
  • 5

LSEC - Leaders In Security

Welcome to LSEC, an internationally renowned Information security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. Founded by the University of Leuven (K.U. Leuven), supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security industry experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.

Visions on Electronic identities

In Identityspace blogs Marcus Lacanse about his experiences and thoughts about electrkonic identities. À great collection of experiences and ideas, practical views and vision of the future. Marcus has been more than 20 years involved in the domain.
We can count him under our list of great experts.
Visit his blog at http://identityspace.wordpress.com/#entries

Ulrich Seldeslachts 06-May-2011

Are you a leader in Security ? Do you want to share your expertise and join the Leaders in Security as a Core Expert Member ?
Contact us via email! Or call + for a direct contact and more information.
An information set and your Membership Welcome Pack awaits you.

Social Media being used for critical communications

Major societal events such as the recent Arabic spring, international marches against the current economical crisis and the recent disasters in Norway or at the Pukkelpop festival in Belgium, are proving the need and the importance of critical infrastructures, resilience of networks, and the use of social media such as Facebook and Twitter.

When communication channels such as GSM break down, family and friends can continue to be connected. Either Wifi, or when the communication picks up again, all tweets are being forwarded.
Pictures on site are being taken and broadcasted, shared in the world even before press and traditional media can participate.

This is a great evolution, which we fully support and also companies and critical infrastructures should take this into consideration when discussing the impact of social media on their corporate networks.

2013 the year of the major data breaches and the data protection regulation

January 2013, a new year, a new challenge. The year started with the BANG of data losses by private and public companies, by numerous companies reporting to us about data breaches and their networks and systems being compromised over the last couple of weeks.
The LSEC Community, over 3000 connected individuals from various organizations, more than 125 specialized Members and the international networks of The European Security Innovation Network and FIRE, together more than 1600 companies in security and defense technologies wishes you a safe, secure, prosperous and happy 2013.
During 2013 we plan to further grow the community and organize supporting activities for a more comprehensive view on security related topics, projects that bring together the expertise of industrial end consumers, the it security industry and researchers and we continue to build our independent informatio security networking platform for the industry at large.
We look forward meeting you during our live meetings and in our online communities. Join the discussions and become part of the solution, even (especially) if you have had your series of security incidents already ... More is yet to come ...
The LSEC Team

LSEC plays leading role in Europe’s cybersecurity strategy as partner in anti-botnet pilots LSEC plays leading role in Europe’s


Leuven, Belgium, Feb 13th, 2013

LSEC plays leading role in Europe's cybersecurity strategy as partner in anti-botnet pilots

Europe bands together to fight against botnets

LSEC leads pilot developments in Advanced Cyber Defence Center with EU support

Cologne - Leuven, 13.02.2013 – LSEC - Association of information security companies in Europe and eco – Association the German Industry together with 28 partners from 14 European countries are launching a project against one of the biggest Internet security threats: Every fifth computer is currently estimated to be part of a botnet used by cyber criminals to infect end user computers with malware and gain remote access to them. Kicking off today in Frankfurt, the association begins its work as the coordinator of the Advanced Cyber Defence Center (ACDC) which is supported by the European Union.

The project will offer a full range of services for increased cyber security ranging from malware recognition to prevention. The campaign partners are large public network providers, software producers, scientific institutions, law enforcement and administrative bodies, banks, as well as certification authorities.
"Working together to combat botnets is fundamentally important: From providers to the police and all the way to the end users. We have seen how effective that can be at the national level with the Anti-Botnet-Advisory Center. We look forward to taking this effective approach to defy botnets in Europe together with our strong partners. With the Advanced Cyber Defence Center we are aiming to develop a series of activities to better cope with cyber threats, more in particulat botnets," says LSEC ceo Ulrich Seldeslachts
The Advanced Cyber Defence Center is an important building block for the cyber security strategy of the EU. At the launch press conference on February 7th, EU-Commissioner Neelie Kroes said: "We need to protect our networks and systems and improve their resilience. To this end we should ensure that all actors play their part in fighting botnets and malware. Cyber threats are not contained to national borders: nor should cyber security be." The Head of Unit DG Connect of the European Commission, Giuseppe Abbamonte, adds: "ACDC is the first initiative launched in the context of the EU Cyber Security Strategy. This project will improve protection of our networks and systems against botnets and malware."

On of the intended applications in the EU pilot project is the Clearing House which receives reports from the project partners on security issues like spam campaigns in their networks, stolen data, or DDoS attacks. Affected parties such as end users, mobile phone providers, and banks, providers of security solutions or hosting providers are then informed of the incidents and receive support via the central website http://www.botfree.eu (http://www.botvrij.be and http://www.sansbot.be) from national support centers to remove the malware. The support centers are supposed to offer the necessary downloadable tools. What's more, small and mid-sized companies receive support if their websites are infected with malware.

In addition, the Advanced Cyber Defence Center is committed to identifying infected websites and committed to removing malware programs. Participating providers will also detect anomalies in their networks, botnets in the cloud, and within mobile networks and report them to the Clearing House.
The pilot project has a total budget of 16 million Euros and is supposed to initially run for 30 months.
A fact sheet about the project is available at http://ec.europa.eu/information_society/apps/projects/factsheet/index.cfm?project_ref=325188.
The speech given by EU-Commissioner Neelie Kroes at the launch of the EU Cyber Security Strategy is available at http://europa.eu/rapid/press-release_SPEECH-13-104_en.htm.

LSEC (http://www.lsec.be) - Leaders in Security is an industry association of information security companies. Founded in 2002, LSEC organizes with and for the industry various information security events related to enterprise, government and end users, LSEC brings together the expertise in the industry in industrial research projects such as ACDC, FIRE, MOBES and the Eurtopean Security Innovation Network. LSEC's members include some of the largest expert companies and top security experts on a global level such as RSA, Vasco, Symantec, McAfee, Sophos, G-Data, Qualys, and many others.

Press contact:
LSEC – Leaders in Security
Kasteelpark 10 – 3001 Heverlee

Ulrich Seldeslachts, phone +32 16 32 8541, acdc at lsec.be

eco - Association the German Internet Industry
Lichtstr. 43h, 50825 Cologne, Germany

Katrin Mallener, Phone.: +49 221/70 00 48 260, This email address is being protected from spambots. You need JavaScript enabled to view it.
Petra Greitschus, Phone. +49 221/70 00 48 261, This email address is being protected from spambots. You need JavaScript enabled to view it.

Prof Em Jean-Jacques Quisquater receives 2013 RSA Award Excellence in field of Mathematics


San Francisco, CA, US, February 26th, 2013

Congratulations to LSEC Member UCL, where Prof. Em. Jean-Jacques Quisquater receives 2013 RSA Award Excellence in field of Mathematics!

The award, presented during the annual RSA Conference in San Francisco, February 26th is yet another milestone of the Belgian expertise in information security on a global level.
The annual award has been given in the previous years to Eli Biham, Professor; Technion-Israel Institute of Technology, Computer Science; Dr. Mitsuru Matsui, Senior Researcher, Mitsubishi Electric Corporation; Charles W. Rackoff, University of Toronto, ...

Quisquater has been awarded for his works in the domain of cryptography and the development of smartcards and the use of cryptography for eID cards in Europe and around the world.

Congratulations from the industry!

US NIST selects Belgian Keccak in 5 year

NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

From NIST Tech Beat: October 2, 2012

Contact: Chad Boutin

The National Institute of Standards and Technology (NIST) today announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security.

The winning algorithm, Keccak (pronounced "catch-ack"), was created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors. The team's entry beat out 63 other submissions that NIST received after its open call for candidate algorithms in 2007, when it was thought that SHA-2, the standard secure hash algorithm, might be threatened. Keccak will now become NIST's SHA-3 hash algorithm.

Hash algorithms are used widely for cryptographic applications that ensure the authenticity of digital documents, such as digital signatures and message authentication codes. These algorithms take an electronic file and generate a short "digest," a sort of digital fingerprint of the content. A good hash algorithm has a few vital characteristics. Any change in the original message, however small, must cause a change in the digest, and for any given file and digest, it must be infeasible for a forger to create a different file with the same digest.

The NIST team praised the Keccak algorithm for its many admirable qualities, including its elegant design and its ability to run well on many different computing devices. The clarity of Keccak's construction lends itself to easy analysis (during the competition all submitted algorithms were made available for public examination and criticism), and Keccak has higher performance in hardware implementations than SHA-2 or any of the other finalists.

"Keccak has the added advanExpertisee of not being vulnerable in the same ways SHA-2 might be," says NIST computer security expert Tim Polk. "An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently."

Polk says that the two algorithms will offer security designers more flexibility. Despite the attacks that broke other somewhat similar but simpler hash algorithms in 2005 and 2006, SHA-2 has held up well and NIST considers SHA-2 to be secure and suitable for general use.

What then will SHA-3 be good for? While Polk says it may take years to identify all the possibilities for Keccak, it immediately provides an essential insurance policy in case SHA-2 is ever broken. He also speculates that the relatively compact nature of Keccak may make it useful for so-called "embedded" or smart devices that connect to electronic networks but are not themselves full-fledged computers. Examples include sensors in a building-wide security system and home appliances that can be controlled remotely.

"The Internet as we know it is expanding to link devices that many people do not ordinarily think of as being part of a network," Polk says. "SHA-3 provides a new security tool for system and protocol designers, and that may create opportunities for security in networks that did not exist before."

For more on the SHA3 competition, see http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.

Page 13 of 14

LSEC for Security Professionals


LSEC for Security Companies


LSEC for enterprise & government


LSEC for academia & research institutes


Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here


Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +