On 26 June Steve Muller of itrust consulting defended his PhD thesis in Computer Science on Risk Monitoring and Intrusion Detection for Industrial Control System (ICS) at the University of Luxembourg.
itrust consulting s.à r.l. is proud to announce that it has recently signed a contract with SES to participate as one of the many project partners in the recently publicized QUARTZ consortium (https://www.ses.com/press-release/esa-and-ses-led-consortium-develop-satellite-based-cybersecurity), primarily funded by the European Space Agency (ESA) via its ARTES/ScyLight programme.
Please select the Links below to read the full press release and to access further project details as published by SES and ESA.
Modern network intrusion detection systems rely on machine learning techniques to detect traffic anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous traffic.
The recently published article presents an intrusion detection system (IDS) that is able to detect common network attacks including but not limited to, denial-of-service, bot nets, intrusions, and network scans.
With the help of the proposed example IDS, it is shown to what extent the training attack, and more sophisticated variants of it, have an impact on machine-learning based detection schemes. The analysis is then used to design an intrusion detection system that is resilient to such kind of attacks.
Dr. Carlo Harpes, Managing Director and founder of itrust consulting, was invited by ‘radio 100,7’ to a round table discussing the questions: How secure are the databases and - more generally - the informal systems at the state? Or in the private sector? How about data protection, especially in view of the new data protection regulation (GDPR)?
The General Data Protection Regulation (GDPR) affects all organisations that process personal data (PII) of citizens of the European Union and will apply from May 27, 2018. It imposes on every organisation, big or small, as well as on both PII controllers who collect data and those who process the data, called PII processors, the setting up of adequate protection and compliance with the regulation and to prove, in the case of a complaint or violation, conformity with the requirements and the stated principles of protection. This can be achieved with a well-defined management system and proper documentation. Depending on the risks associated with the processing, it also imposes the appointment of a Data Protection Officer (DPO), a Data Protection Impact Assessment (DPIA) and the formal justification that sufficient measures have been taken to reduce the risk of disclosure, manipulation, or loss of data. These requirements are accompanied by the announcement of extremely severe, proportional but dissuasive, administrative penalties. This presentation explains the requirements on SMEs and gives guidance on how to address them.
Presented by Dr. Carlo Harpes for Jonk Handwierk at LaLux Auditorium in Leudelange.