Welcome to LSEC, an internationally renowned Information security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. Founded by the University of Leuven (K.U. Leuven), supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security industry experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.
On November 30th, LSEC organized its 8th GDPR activity in 2017, this time on Experiences Sharing in GDPR transformation, covering topics such as developments and state of play with guidelines, accountability, PIA's and DPIA's, Consent Management, Data Leakage Prevention technologies, compliance management, company wide data loss protection and overall privace management. Interesting debates with operational data protection coordinators and DPO's, participants from DPO offices managing the current challenges in the ongoing GDPR transformation.
The majority of the participants have already been studying GDPR and its impact, but continue to struggle with the implementation. Guidance from the experts Nicholas Delcroix, Hans Graux, Laurie-Ann Bourdain and experiences from the iWelcome team, on privacy by design by Tommy Vandepittte, using SDLC for GDPR development by Toreon, practical experiences on use of DLP technologies from Symantec and Data Protection form IBM and finally from iGuards made it an informative and practical session for our attendees. For most of them, interpretation of the GDPR regulation continues to be challenge, debate and discussion. Best practices amongst attendees supports some of the ongoing developments on GDPR transformation.
If you missed it, presentation materials are now available for download from the GDPR events page and looking for November 30th event (or any of the other past sessions)..
The fifth edition of the Industrial Automation Security event took place in Antwerp on November 9th. WIth participation and contributions by Airbus, Rhode Schwarz, SecurityMatters, Kaspersky, DutchSec, Secudea, Flowman and many others.
If you missed it, presentation materials are now available for download from the registration page.
A report on the discussions and contributions will be published on 3if.eu.
The Cybersecurity Conference organised by Forum Europe brings together the protagnists of the European policy making landscape. Find out the latest developments of the Cybersecurity Framework and ENISA debates.
Join in for the final results of the CIMA study.
For more information, links to registration and agenda, click on the banner.
Belgian Cyber Security Convention, well attended first edition.
Lightning speech by Cybersecurity Futurologist Bart Preneel.
A private event, organized by a brewery of ideas, supported by the Belgian Cybersecurity Coordination Center, the Cybersecurity Coalition and LSEC.
To download the LSEC Cybersecurity Industry Market Analysis Presentation of October 25th, the materials of the session, go to the download session. Upon login - or after registration, you will be able to access the downloadable file.
Identity & Access Management Conference Belgium 2017, organised by Heliview, supported by LSEC.
Top speakers from Kantara Initiative, Eandis, the European Commission and LSEC.
LSEC will be focusing on its key learnings from the IoT and IIoT developments and initiatives in managing identities for IoT in enterprise environments.
For more information and registration. with relationcode 28GQWKTU
The LSEC Membership has expanded significantly over the last years. Both industry (Core LSEC Members) and end user (Corporate and Individual Members) have grown exponentially. Earlier in 2017 we have released our new Membership and market analysis portal http://marketintelligence.leadersinsecurity.org. This interactive database platform allows to dynamically adapt the changes our community is constantly undertaking. The platform is there to allow for end users and industry to be able to browse through partners and providers more efficiently. While still under development, we welcome all members to take a look, to register and update their profiles and to ensure a good visibility amongst their target audiences. Users are scutinizing their partners and innovative solutions, and will be updated on their interests going forward. Take a glimpse on our Marketintelligence Platform. Once you register, you will be able to reap larger benefits and can start selecting on specific components.
We'll be adding some usage guidance, but if you like to be part of our expert panel, deciding over the user interface, please contact us at marketintel at lsec.eu with your interest.
On June 6th, LSEC, PwC and ECSO (the European Cyber Security Organization) organinzed the first Cybersecurity Industry Market Analysis fact finding workshop. Following its market study on the European Cybersecurity Industry for the European Commission - DG CONNECT, LSEC presented its unique quantitative analysis to a group of Cyber Security industry leaders in Brussels, resulting in a discussion leading to a better understanding of the market situation. Following this a series of country workshops will be organized allowing Cybersecurity services and solution providers to join in and debate the current status of the European market. The analysis presents a unique perspective of the Cybersecurity market in relation to the rest of the world, indicating total value, number of people, its actors and the types of services being offered. The gives a unique insight in interest of the end users, the types of markets and imports and exports. Further detail is being prepared and presented during the specific country workshops, and will be collected and presented during one of the Cybersecurity events in the fall, leading to the new Cybersecurity Strategy of the European Commission.
Workshops will be held in Belgium, The Netherlands, Germany, UK, Poland, Sweden, Italy, Spain, France and Greece. Participation is free of charge, seating is limited per country, registration is required. Visit the CIMA eventpage with all details on the country workshops.
On April 27th, LSEC - cyber security hub - in collaboration with B-Hive - fintech hub - organized a first joint event focused on the ongoing innovative developments in the financial services domain impacting not only financial services, but also its supply chain and operational transactions such as cyber security and information security components.
An insightfull perspective by authentication expert Isabel group introduced us into some of the challenges, including authentication developments and helping understanding some of the complexities which resulted in the current RTS (regulatory technical standard) and SCA (Strong Customer Authentication) for TTP (trusted third parties). The PSD2 directive already exists since January 2016, and is currently being adopted by the European Member States, in particular their NCA (national competent authorities), usually the regulators. Next to the PSD2 directive that amongst other enables other companies to access account information for payment services, new developments such as API's are equally seeing their routes into market. The Glue and Oracle presented insightful views of the current developments towards Open API. The NBB (National Bank of Belgium), one of the co-authors of the RTS, keynoted the event with the core fundamental behind these developments and insights in some of the working that had led to its current state. He also indicated some future routes. Identity technology provider TrustBuilder and authentication providers Vasco and SDO presented their views on the role of existing and developing authentication technologies. During some of the panels, the operators such as Ingenico and Twiki reasoned on their current challenges and how they got there; Finally other security challenges were brought by BAE Systems, indicating that there is much more than authentication in securing these new developments.
For more information and documentation background, visit the event page.