On June 12th, 5G World was organized in London in the Excel. Developed as KNECT365, LSEC presented a perspective on developments of IoT vs 5G having in mind various developments.
Afterwards LSEC hosted and moderated the panel discussion with O2 (Telefonica UK), Mavenir and King's College London.
The presentation can be downloaded, upon registration to the LSEC website.
May 25th, a historical day we've celebrated considering GDPR as a piece of cake. LSEC kicked off the official starting date of the GDPR (General Data Protection Regulation) offering its constuency experiences, technology and birthday cake. ForgeRock presented some considerations on using the core identity as the main architecture also for data protection. During the cases by FireEye, Excellium Services and BNP Paribas Fortis various views and perspectives were presented on how the transition has taken place, what the current actions and activities were and what the next steps are beyond the transition.
GDPR is a process that started years ago by many, and where adoption will continue over the years to come. Companies and organizations facing multiple challenges and developments. IBM and Symantec presented their ideas on identity, monitoring and data leakage prevention. Bitsensor presented a perspective on managing GDPR with DevOpps and agile in mind. CSI Tools presented a user management perspective from their experience in governance control for ERP-environments. Debates were held around ethics with Cathrin Sondergraard, future challenges, the state and development of the regulator. Ulrich Seldeslachts pointed to the challenging messages presented by the different DPA and the speed of ttransforming into national laws.
If you missed it, presentation materials are now available for download from GDPR Birthday Event page or look for the 2018-05-25 event on the activities.
In view of the ongoing requirements to cope with General Data Protection, hereby is a list and pointer of technologies and capabilities that support the management and control for GDPR.
- data discovery tools
- end point protection
- network protection
- data leakage prevention & detection
- monitoring and analysis
- Privacy Enhancing Technologies
Personal Privacy Tools :
http://www.eyewnder.com/views/download : is a chrome extension allowing an individual to control the Chrome browser
May 5th, the European Parliament finally publsihed the GDPR (General Data Protection Regulation), which will take effect on May 25th, 2018. With more than 70% of European companies not even aware of this regulation, let alone be ready to comply to the regulation, LSEC and its Members and Partners started with a series of events and activities that will support the strategic definition, implementation of activities and exchanging expert advice that lead to compliance. During these events all different aspects will be investigated in depth. The major differentiator is that we will not only debate the legal implications, but will deep dive into its implementation best practices, building on top of existing processes and procedures (such as ISO 27k, PCI/DSS, Basel II, ....), using existing technologies (implementing the right rules on NGFW, NGIDS, SIEM, Data Leakage in End Protection, Encryption technologies, ....).
These seminars will be supported with various white papers, expert advisory and sessions minutes.
More information on the Data Protection Regulaton with links and documentation can be found on the Data Protection Section of the LSEC website. Registration to the events can be found there as well.
Join us today in getting ready for first major European Security regulation for enterprises.
Brussels, October 22, 2015: IPACSO announces the 2015 Winners of the EU Cyber Security & Privacy Innovation Awards
LSEC, with The IPACSO Consortium today announced the 2015 Champions of the European Cyber Security & Privacy Innovation Awards. The winners where selected out of a group of no less then 30 finalists from 11 countries! These high achievers in the cyber and privacy domains included spin- off companies resulting from acedemic research, new exiting start- ups, existing security & privacy entrepreneurs with new products & services, and ICT - and Telco's with innovative security offerings.
The finalists and winners where congratulated personally by Mr. Jakub Boratynski, the Head of the Trust Unit, DG CONNECT, of the European Commission. The winners, finalists and an impression of the conference are published online on the IPACSO Website
The EU and U.S. have reached an agreement that would protect personal data used for law enforcement purposes, Reuters reports. However, though the text has been finalized, the European Commission has said it will not be signed until the U.S. passes legislation giving EU citizens the right to judicial redress in the U.S. Meanwhile, Europe's Advocate General is expected to issue a long-awaited legal opinion on Facebook's sharing of personal information with the National Security Agency under the agency's PRISM program. The opinion, which is non-binding but influences the 15 judges on the European Court of Justice, will likely affect the EU-U.S. Safe Harbor Agreement. The opinion's expected delivery date is now 23 September.
On Friday July 14th 2015, LSEC and TNO organized the first IPACSO Cyber Security Innovation Bootcamp in the Netherlands; for a selected group of SME security innovators. The Bootcamps are a part of the IPACSO Project, aimed to support European Cyber Security and Privacy Innovations. LSEC is one of the project partners leading this project.
London, 5 August 2015 – Sedicii, headquartered in Waterford, Ireland, whose patented “Zero Knowledge Proof Protocol” technology, developed at the National University of Ireland, Galway, is designed to protect both consumers’ and corporates’ sensitive personal data, has today been recognised as a ‘Technology Pioneer 2015’ by the World Economic Forum (WEF).
The ultimate disguise for the digital era is set to go on sale in Japan. The National Institute of Informatics said it has developed eyeglasses that help users protect their privacy by disabling facial-recognition systems in cameras.
Sedicii's technology authenticates without exchanging, storing or exposing the personal identifiable information required to authenticate. Established in Dec 2013, Sedicii technology is based on 4½ years of Academic Research to identify new and innovative ways to authenticate and verify identity. The underlying Sedicii architecture achieved patent status in 2013 and in 11 months since being formed, Sedicii has won 7 and shortlisted in over 10 international awards for Innovation, Privacy, Data Security and IP in Fintech, Mobile Payments, Banking and Disrupt Technologies.