Programme 2017

Information Security Themes

Dates

Theme

Wednesday 28/06

Introduction to Security

Thursday 29/06

Incident Management and Digital Forensics

Friday 30/06

Identity Management and Authentication

Saturday 01/07

Cryptology and Risk Management

Monday 03/07

Applied Information security

Tuesday 04/07 - Wednesday 05/07

Information Privacy Requirements and Protection

Thursday 06/07

Trends in Information Technologies and Information Security

Friday 07/07

Computer Lab Work

 

Schedule of Courses

 

Wednesday 28/06

Thursday 29/06

Friday 30/06

Saturday 01/07

 

09:00-10:30

V. Chrissikopoulos
A. Tsohou
M. Magkos

Welcome by the local host
S. Furnell
Introduction to
Security

 

Dave Croasdell

Business Continuity Management


 

 

G. Pernul
Authorization -
Access Control

 

B. Preneel
Introduction to Cryptology

10:30-11:00

Coffee Break

 

11:00-12:30


S. Furnell

Security Culture


N. Clarke

Digital Forensics
 

 

F. Ludwig
Identity and Access Management

 

B. Preneel
Introduction to Cryptology

12:30-14:00

Lunch Break

 

14:00-15:30


K. Markantonakis

Security of cyber physical systems…lesson learned!


V. Katos
Digital Forensics and Incidence Response

C. Xenakis 

C. Ntantogian

Device-centric authentication, biometric & behavioral authentication, anonymous credentials

 

M. Karyda
Risk analysis
and Management

15:30-16:00

Coffee Break

 

16:00-17:30


K. Markantonakis

Security of cyber physical systems…lesson learned!


V. Katos
Digital Forensics and Incidence Response

C. Xenakis

C. Ntantogian
Device-centric authentication, biometric & behavioral authentication, anonymous credentials

 

S. Kokolakis
Perceptions of Risk

 

 

 

Monday 03/07

Tuesday 04/07

Wednesday 05/07

Thursday 06/07

Friday 07/07

 

09:00-10:30

 

S. Katsikas
Critical Infrastructures Security and Resilience

 

J. Lopez
Fog Security

 

C. Kalloniatis
Privacy Requirements Engineering

 

E. Weippl
Blockchains and Bitcoins

 

L. L. Ribeiro,

F. Loureiro

Computer

Lab Work

 

10:30-11:00

Coffee Break

 

11:00-12:30

 

S. Katsikas
Critical Infrastructures Security and Resilience

 

C. Lambrinoudakis
Information Privacy Breaches and Data Protection

 

H. Mouratidis

Modelling Security & Privacy Requirements

 

 E. Weippl
Blockchains and Bitcoins

 

L. L. Ribeiro,

F. Loureiro

Computer

Lab Work

12:30-14:00

Lunch Break

 

14:00-15:30

 

T. Tryfonas
Security and Privacy in IoT and Smart Cities

 

J. Hoepman
Privacy by Design

 

P. Samarati
Data Protection in the Cloud

 

C. Wills
Marx, Mein Kampf, Big Data and Cyber Warfare: Ideological Hegemony  and the disfunctional consequences of search algorithms in the Post-Truth Age

 

L. L. Ribeiro,

F. Loureiro

Computer

Lab Work

15:30-16:00

Coffee Break

 

16:00-17:30

 

T. Tryfonas
Security and Privacy in IoT and Smart Cities


J. Hoepman

Privacy by Design

 

P. Samarati
Data Protection in the Cloud

 

C. Wills
Marx, Mein Kampf, Big Data and Cyber Warfare: Ideological Hegemony and the disfunctional consequences of search algorithms in the Post-Truth Age

 

IPICS closing session