The AI4Business Summit challenged us to present an overview on the state of play of the use of Artifial Intelligence in the Cybersecurity Industry. By positioning Cybersecurity in the context of Risk Management and Security, AI is being utilized already in many defense and security applications such as law enforcement and military robots and increasingly in our home office and business environments. The Cybersecurity sector itself has been applying AI and Machine Learning techniques already for nearly two decades now. With today's 240+ billion Security events happening on a daily basis, there is no longer any human capacity capable of handling these challenges. Next to automation, big data and data analysis, patterns are being recognised and alerted. These tools became the basis for the current Cybersecurity Industry major players such as McAfee, Black Carbon, Crowdstrike, IBM, ... Capturing data from different sensors is the basic premise, utilizing ML, AI in various mechanisms applying mathematical models to investigate security incidents and detect new forms of malwares, detecting the impact on major and smaller European enterprises and supporting the malware analysts in their daily operations. But equally intelligent were the malversaries by utilising AI techniques to detect the weakest links, assess when the time is right to strike into specific platforms or support local R&D teams finding the next vulnerabilities on the basis of automated detection. We've also indicated how AI is being used to evade detection and prevention techniques, or how criminals today use data to actually master the lack of capabilities from law enforcement in a certain region. We've also positioned developments such as Deep Fake to indicate its potential impact on both the use of NLP, and its use in phising campaigns, convincing target about their welwilligness to support. Our journey ends where we started: indicating the potential for robots, but by indicating their lacking cybersecurity postures and indicating potential impact from AI, it will be a long and windy road.
Understand how AI can be supported in your concept case, and become inspired by the key learnings on algorithms, collecting data,
For more information visit the
LSEC offers Cybersecurity companies targeting to start and grow their business in Europe a soft landing platform. LSEC is a European cybersecurity cluster, based in Flanders – Belgium, a central European hub to easily reach all major cities in Europe. The cluster brings together expertise from supply and buy side, from research and policy. Active since 2002, LSEC has matured over 200 companies in the region over the last decades. As a spinoff of the KU Leuven university, it is closely linked to world class research in application security, crypto, embedded and industrial security and legal practice.
LSEC has supported companies like Guardsquare, Palo Alto Networks, Intrinsic-ID, Silensec, ... and over 300 other companies over the last decade getting spotted, supported and migrating from their inception sExpertisees through the valley of death, becoming unicorns and cybersecurity leaders. LSEC connects people, searches for solutions amongst technologies and supports entrepeneurs and companies in realizing their vision.
For more information visit the Global EPIC Soft Landing program and get in touch for your first steps in Europe.
The annual Cyber Threat Intelligence (CTI) event is organzed by LSEC for a selected group of Cyber Security officers and intelligence experts. This year again it took place at the IBM Executive Briefing Center in Brussels with experts from the Royal Military Academy, ENISA, CERT.BE, EclecticIQ, SPLUNK, IBM, FIREEYE and the AI Lab of the Free Brussels University (VUB). There is a continuous growth in incidents and cyberattacks taking place, for which organizations will increasingly have to ensure to strenghten their cyber intelligence and resilience in order to cope with incidents. The management of incidents requires advanced skills and a strong network of peers and partners. Presentations have been made available for download from the program page, on the LSEC website.
On June 12th, 5G World was organized in London in the Excel. Developed as KNECT365, LSEC presented a perspective on developments of IoT vs 5G having in mind various developments.
Afterwards LSEC hosted and moderated the panel discussion with O2 (Telefonica UK), Mavenir and King's College London.
The presentation can be downloaded, upon registration to the LSEC website.
May 25th, a historical day we've celebrated considering GDPR as a piece of cake. LSEC kicked off the official starting date of the GDPR (General Data Protection Regulation) offering its constuency experiences, technology and birthday cake. ForgeRock presented some considerations on using the core identity as the main architecture also for data protection. During the cases by FireEye, Excellium Services and BNP Paribas Fortis various views and perspectives were presented on how the transition has taken place, what the current actions and activities were and what the next steps are beyond the transition.
GDPR is a process that started years ago by many, and where adoption will continue over the years to come. Companies and organizations facing multiple challenges and developments. IBM and Symantec presented their ideas on identity, monitoring and data leakage prevention. Bitsensor presented a perspective on managing GDPR with DevOpps and agile in mind. CSI Tools presented a user management perspective from their experience in governance control for ERP-environments. Debates were held around ethics with Cathrin Sondergraard, future challenges, the state and development of the regulator. Ulrich Seldeslachts pointed to the challenging messages presented by the different DPA and the speed of ttransforming into national laws.
If you missed it, presentation materials are now available for download from GDPR Birthday Event page or look for the 2018-05-25 event on the activities.
April 26th, LSEC - and the Belgian Cyber Security Coalition (CSC) organised the an Experience Sharing day at the VBO / FEB in Brussels. Main topic was NIS and its developments. Especially for Belgian companies, the development of the NIS Directive which was published in June 2016, being transposed into Belgian law required an update. Thanks to the CCB (Center for Cybersecurity in Belgium), an update was presented on its current "under development" status, as this is the authority of the Belgian regulator. Many ingredients are taken from the Critical Infrastructure Protection (CIP)-legislation. The Operators of Essential Services (OES) have not yet been defined, but the list will be in line with the other Member States. Some indications were in any case presented during the day, some experiences from previous legislations shared amongst the attendees. FireEye opened the day with an overview of the relevance of NIS and Critical Infrastructure Protection from an adversary perspective, still (and increasingly) today. Forgerock presented some of its experiences and best practices from a GDPR perspective. Other talks were focused on the developments of GDPR (Jan Leonard of Orange Belgium and Willem De Beuckelaere of the developing Belgian DPA). Some a somewhat more practical challenging and concerns perspective, the other a somewhat more at ease point of view.
If you missed it, presentation materials are now available for download from NIS, GDPR and PSD2 in Practice, LSEC & the Cyber Security Coalition page or look for the 2018-04-26 event on the activities.