Traditionally, itrust consulting continued its sponsorship for ‘HACK.LU 2018’ (16.-18/10), where our IT Security expert Rémi Chipaux presented in the session ‘Unpacking for Dummies’ malware packing mechanisms and counter strategies.
Additionally, for a consecutive year, we sponsored ‘BSides Luxembourg 2018’ (19/10), result of our excellent professional relationship.
itrust consulting successfully passed its ISO/IEC 27001 surveillance audit performed by Certi-Trust
Europe, confirming that information security is managed according to the state-of-the art industry
The challenge during the recent year was to become GDPR-ready, while giving priority to our
customer needs versus our internal compliance process.
Please use the link below to read the full press release text.
A new cybersecurity for interdependent Critical Infrastructures
Under the patronage of the Minister of the Economy and Foreign Trade Étienne Schneider
Targeted at managers willing to use innovative cybersecurity techniques to protect their critical assets, mainly critical infrastructure such as electricity, gas, water distribution system or transport systems, but also other critical ICT systems.
When: Thursday – October 18, 2018, 9:00-17:30
Organized by: the University of Luxembourg in partnership with itrust consulting sàrl
Location: Maison des Arts et des Étudiants (MAE), 6, avenue de la Fonte, L-4364 Esch-zur-Alzette
09:00 – 09:30 Welcome and Registration
09:30 – 11:00 Security of the Grid and the ATENA Approach
11:15 – 13:00 ATENA innovations: the theoretical approach
14:00 – 15:10 ATENA innovations: the practical approach
15:10 – 15:30 Other research projects on Critical Infrastructure Protection
15:30 – 16:30 Panel Discussion
17:00 – 21:30 Cybersecurity week
itrust consulting s.à r.l. has updated its Privacy Statement.
On 26 June Steve Muller of itrust consulting defended his PhD thesis in Computer Science on Risk Monitoring and Intrusion Detection for Industrial Control System (ICS) at the University of Luxembourg.
itrust consulting s.à r.l. is proud to announce that it has recently signed a contract with SES to participate as one of the many project partners in the recently publicized QUARTZ consortium (https://www.ses.com/press-release/esa-and-ses-led-consortium-develop-satellite-based-cybersecurity), primarily funded by the European Space Agency (ESA) via its ARTES/ScyLight programme.
Please select the Links below to read the full press release and to access further project details as published by SES and ESA.
Modern network intrusion detection systems rely on machine learning techniques to detect traffic anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous traffic.
The recently published article presents an intrusion detection system (IDS) that is able to detect common network attacks including but not limited to, denial-of-service, bot nets, intrusions, and network scans.
With the help of the proposed example IDS, it is shown to what extent the training attack, and more sophisticated variants of it, have an impact on machine-learning based detection schemes. The analysis is then used to design an intrusion detection system that is resilient to such kind of attacks.
Dr. Carlo Harpes, Managing Director and founder of itrust consulting, was invited by ‘radio 100,7’ to a round table discussing the questions: How secure are the databases and - more generally - the informal systems at the state? Or in the private sector? How about data protection, especially in view of the new data protection regulation (GDPR)?
The General Data Protection Regulation (GDPR) affects all organisations that process personal data (PII) of citizens of the European Union and will apply from May 27, 2018. It imposes on every organisation, big or small, as well as on both PII controllers who collect data and those who process the data, called PII processors, the setting up of adequate protection and compliance with the regulation and to prove, in the case of a complaint or violation, conformity with the requirements and the stated principles of protection. This can be achieved with a well-defined management system and proper documentation. Depending on the risks associated with the processing, it also imposes the appointment of a Data Protection Officer (DPO), a Data Protection Impact Assessment (DPIA) and the formal justification that sufficient measures have been taken to reduce the risk of disclosure, manipulation, or loss of data. These requirements are accompanied by the announcement of extremely severe, proportional but dissuasive, administrative penalties. This presentation explains the requirements on SMEs and gives guidance on how to address them.
Presented by Dr. Carlo Harpes for Jonk Handwierk at LaLux Auditorium in Leudelange.