Welcome to LSEC, an internationally renowned Information security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. Founded by the University of Leuven (K.U. Leuven), supported by European Commission FP7 and leading a unique PAN European Private partnership that interacts with Public Institutions, LSEC connects security industry experts, research institutes and universities, government agencies, end users, funding bodies and technical experts who are driving national and European research agendas. LSEC activities aim to raise cyber security awareness, support innovation and competitiveness of the European IT- Security market and promote the visibility of its members.
In view of the ongoing requirements to cope with General Data Protection, hereby is a list and pointer of technologies and capabilities that support the management and control for GDPR.
- data discovery tools
- end point protection
- network protection
- data leakage prevention & detection
- monitoring and analysis
- Privacy Enhancing Technologies
Personal Privacy Tools :
http://www.eyewnder.com/views/download : is a chrome extension allowing an individual to control the Chrome browser
Based on studies and years of professional experience, we know that cyber criminals are constantly monitoring and successfully attacking companies. We know that this is due to the fact that those companies lack visibility and control on how they are perceived from the outside. By not having this dynamic view at hand, security & risk stakeholders are struggling to answer simple questions like:
Not knowing an answer to those questions leaves an organization in the dark and at high risk. Without awareness, your company can be attacked by cyber criminals, potentially undermining your critical business information infrastructure, resulting in financial losses and damage to your reputation. The cyber security solution called “Sweepatic” is able to address those important questions for you. At the same time, it helps your company to comply with the General Data Protection Regulation (GDPR), the EU legislation that stipulates companies are, among other things, liable for protecting used data, and assessing their security risks.
To apprehend the Sweepatic solution, it's important to understand the “Cyber Kill Chain” concept. It’s a phased model used in the military world that describes the different phases of a targeted cyber attack. The reconnaissance phase is the first and initial phase, prior to the attack. This phase is used by cyber attackers to research, to perform identifications and to select their targets. They obtain this view by using different advanced reconnaissance techniques.
The Sweepatic solution mimics the way the different threat actors are conducting these reconnaissance activities. We operate just like the criminals do in their preparation phase. By doing so, Sweepatic develops a view of the potential possibilities to breach your company.
Due to the way companies interact with each other via web services, how employees and consumers communicate with and about the organization, one can see a great amount of digital artifacts about the company, that are publicly available. As these are picked up by cyber adversaries, in order to prepare their attack (e.g. spear phishing threat), Sweepatic customers can really benefit from the Sweepatic solution to become informed. It allows your company to take action in a proactive way.
The Sweepatic solution contains different layers: Sweep, Analyze, Evaluate, Report, Clean and Collaborate. The solution runs around the clock (24x7) by using real-time data exploration and highly technological reconnaissance techniques.
Our personal data crawler “sweeps” the publicly available information of internet domains and is collecting all kinds of different files and pictures on the internet to extract personal data. It's by extracting and analyzing those artifacts that Sweepatic is able to create insights about your information leakage. Sweepatic is also able to clean these data leaks, preventing your company of further unwanted information exposure. As the results are centralized, Sweepatic always keeps a pair of eyes on your digital footprint and alerts you when appropriate.
We also conduct targeted hunting engagements using amongst others Open Source intelligence (OSINT), can generate benchmarks and research studies for your company to compare your digital footprint with business competitors, a particular industry, country or other combinations.
May 5th, the European Parliament finally publsihed the GDPR (General Data Protection Regulation), which will take effect on May 25th, 2018. With more than 70% of European companies not even aware of this regulation, let alone be ready to comply to the regulation, LSEC and its Members and Partners started with a series of events and activities that will support the strategic definition, implementation of activities and exchanging expert advice that lead to compliance. During these events all different aspects will be investigated in depth. The major differentiator is that we will not only debate the legal implications, but will deep dive into its implementation best practices, building on top of existing processes and procedures (such as ISO 27k, PCI/DSS, Basel II, ....), using existing technologies (implementing the right rules on NGFW, NGIDS, SIEM, Data Leakage in End Protection, Encryption technologies, ....).
These seminars will be supported with various white papers, expert advisory and sessions minutes.
More information on the Data Protection Regulaton with links and documentation can be found on the Data Protection Section of the LSEC website. Registration to the events can be found there as well.
Join us today in getting ready for first major European Security regulation for enterprises.
The Infradata Security Summit 2016 was a fun gathering of security experts and Infradata partners and customers. LSEC's Ulrich Seldeslachts provided attendees a perspective on the Data Protection regulation, some of the challenges for enterprise market.
Attendees, about 2/3 indicated their concerns in privacy, but zero attendees had either investigated the GDPR, or its impact for their organization. Ulrich Seldeslachts from LSEC tried to give an insight in the regulatory changes, following the current challenges and putting them into a business perspective indicating to security professionals what impact they might cause.
Other interesting contributions from NSS-labs, participating and joing directly from the US, providing insights on their market analysis methodologies for enterprise security products such as next generation firewalls and next generation ids.
More information on the event can be found on the Infradata website. Presentations can be found there as well.
The EU and U.S. have reached an agreement that would protect personal data used for law enforcement purposes, Reuters reports. However, though the text has been finalized, the European Commission has said it will not be signed until the U.S. passes legislation giving EU citizens the right to judicial redress in the U.S. Meanwhile, Europe's Advocate General is expected to issue a long-awaited legal opinion on Facebook's sharing of personal information with the National Security Agency under the agency's PRISM program. The opinion, which is non-binding but influences the 15 judges on the European Court of Justice, will likely affect the EU-U.S. Safe Harbor Agreement. The opinion's expected delivery date is now 23 September.