15

19

June 2020

Cyber Security 2020

In response to the ongoing COVID-19 situation, Cyber Science 2020 will now take place virtually from June 15th-19th.

Advancing a multidisciplinary approach to Cyber Security.

Registered attendees will have access to all virtual events & workshops over the course of the conference.

Starting in:

00 d
00 h
00 m
00 s

Details

Cyber Security 2020,  in conjunction with the International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE 2020), will take place virtually alongside Cyber Situational Awareness 2020Social Media 2020 and Cyber Incident 2020 as part of Cyber Science 2020.

Workshop

Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE 2020) will be presented at the conference.

Posters & Presentations

Posters & Presentations will be presented virtually at the conference.

Industry

Industry track is available for discussing and publishing pilot and proof of concepts.

Work in Progress

Work in Progress track is available for preliminary work.

Research Ideas

Research Ideas track is available for ideas in early stages assessment.

PhD Seminar

PhD Seminar track is available for discussing and publishing early PhD thesis research.

Topics of Interest

  • Information Security
  • Computer Network Security
  • Application Security
  • Web Services Security
  • Mobile Security
  • Protective Security
  • Software Security
  • Wireless & Sensor Network Security
  • Software Coding Security
  • Barcode Scanner Security
  • Security in Middleware, Interface and Interaction
  • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
  • Security Management
  • Security Operations
  • Digital Trust and Reputation
  • Geographical Location (IP Geolocation) and Cyber Travel
  • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
  • Policy, Legal, Legislation & Compliance
  • Security Standardisation
  • Law, Legal and Ethics
  • Web Services
  • Internet Banking
  • E-Booking
  • Cloud Computing
  • E-Government
  • Electronic Commerce
  • Citizens Public Online Services
  • Mobile Commerce
  • E-Postal Services
  • E-Health
  • Online & Virtual Education
  • E-Learning
  • Web Chats
  • Secure Protocols, Coding and Development
  • Security Principles, Theory and Analysis
  • Security Policy, Standards and Procedures
  • Security in Business Processes
  • Security Enforcing Function (SEF) Gateways
  • Intrusion Detection Systems
  • Intrusion Prevention Systems
  • Firewalls
  • Anti-Virus and Anti-Malware Gateways
  • Data Loss Prevention
  • Encryption Services
  • Protection of Business Information Systems
  • Protection of Online Services
  • Public Online Services
  • Internet Banking
  • Security, Trust, Privacy
  • Security in Online Gaming Systems
  • Security in e-Government and Electoral Systems
  • Content Security
  • Protection of Public Online Content Distribution Systems
  • Secure practices, processes and procedures in Public Online Services
  • Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
  • Digital Forensics and Investigations
  • HoneyPots and Honey Nets
  • Critical National Infrastructures (CNIs)
  • Critical Network Systems (CNS)
  • Cyber Security Operations Centre (CSOC)
  • Joint Security Operations Centre (JSOC)
  • Strategic Security Operations Centre (SSOC)
  • Virtual Security Operations Centre (vSOC)
  • Military Security Operations Centres (MSOC)
  • SOC 2.0
  • Cyber Science
  • Cyber SOC Designs
  • SOC Design Architecture Patterns
  • Threat Intelligence
  • Fusion Centre & Cyber Centre
  • Operations Monitoring Centre
  • Security Monitoring
  • Transaction Monitoring
  • Web Fraud Detection (WFD)
  • Incident Management
  • Cyber Incident Response
  • Anomaly Detection
  • Heuristic Learning
  • Intrusion Detection
  • Computer Misuse and Abuse
  • Design Requirements
  • Principles and Operations
  • SOC Security Operating Procedures (SOC SyOPs)
  • Architectures and Design Considerations
  • Implementation of SOC Centres
  • Monitoring and Security Analysis
  • Security Information and Event Management (SIEM)
  • Log Analysis & Analytics
  • IDS/IPS & Firewall Administration
  • Alerting and Event Prioritisation
  • Log Management
  • Analysis Tools and Techniques
  • Incident Triage
  • Incident Analysis, Management, Reporting and Escalation
  • Management Reports and Management Information (MI) Reports
  • Coordination and Containment
  • Collaboration and Incident Investigation
  • National CERT Liaison
  • Model of Operations
  • Intelligence Interfaces and Threat Intelligence Feeds
  • Asset Management, Prioritisation and Categorisation
  • Investigation & Forensic Readiness
  • Functions of NOCs
  • Design Principles
  • Design Architectures and Design Requirements
  • Monitoring and Analysis
  • Coordination
  • Incident Response & Handling
  • Incident Management
  • Operations Management
  • Models of Operations
  • System Interfaces and Automation
  • Asset Management
  • Data Leak Prevention (DLP)
  • Denial and Distributed Denial of Service (DDoS)
  • Vulnerability Scanning, Ranking and Prioritisation
  • IT Health Checks (ITHC)
  • Vulnerability Analysis
  • Vulnerability Management
  • Asset Management & Configuration Management Database
  • Business Information Systems Management
  • Asset Classification, Categorisation & Prioritisation
  • Remedial Action Plans
  • Risk Management
  • Business Process Optimisation
  • Security Management
  • Policy and Standards Compliance
  • Vulnerability Management
  • Accreditation & Assurance
  • Security Assurance and Certification
  • Process, Procedure and Standardisation
  • Global IT Outsourcing
  • Supplier Management
  • Autonomous & Self-driving
  • Self-Healing
  • Domestic Assistance
  • Autonomous Healthcare and Assistance
  • Industrial Manufacturing Robotics
  • Search and Rescue Operations
  • Cryptocurrency
  • Bitcoin & Bit-everything
  • Blockchain in Manufacturing
  • Blockchain in Banking & Financial Systems
  • Blockchain in Aviation
  • Blockchain in Pharmaceuticals
  • Blockchain in IoT
  • Blockchain in Defence
  • Blockchain in Cybersecurity Operations
  • Blockchain in Publications
  • Blockchain in Smart Contracts
  • Blockchain in the Energy Sector & Utilities
  • Cyber Security in childhood education
  • Code – Teaching Coding for Kids, Teens and Colleges
  • Secure by Code
  • Secure by Design
  • Secure by Default
  • ACP
  • Container Technologies
  • Security Concerns Associated with Container Technologies
  • Apps
  • Cultural and Technical Processes for Managing Containers & Apps
  • Microservices
  • Kubernetes
  • Docker
  • Cloud Computing
  • Virtualisation (Network, OS, Container & Apps)
  • DevOps
  • API
  • HostOS
  • Container Technology Architecture
  • Approaches to Management, Maintenance and Processing of Containers, Apps and HostOS
  • CI/CD
  • Risks & Issues
  • OWASP
  • Open Web Application Security

Programme Committee

  • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
  • Frank Wang – Computer Society, IEEE, United Kingdom and Ireland
  • Nick Savage – University of Portsmouth, UK
  • Martin Gilje Jaatun – University of Stavanger, Norway
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Pierangelo Rosati – Dublin City University, Dublin, Ireland
  • Grace Fox – Dublin City University, Dublin, Ireland
  • Patricia Endo – Dublin City University, Dublin, Ireland
  • Xavier Bellekens – University of Strathclyde, Scotland, UK
  • Per Hakon Meland – SINTEF, Norway
  • Pierangelo Rosati – Dublin City University, Dublin, Ireland
  • Joe Burton – Political Science and Public Policy Programme, The University of Waikato, New Zealand
  • Phil Legg – University of the West of England, UK
  • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
  • Carolina Nogueira – DISCO | Distributed Computer Systems Lab, Computer Science Department, TU Kaiserslautern, Germany
  • Arnau Erola – Department of Computer Science, University of Oxford, UK
  • Hanan Yousry Hindy – School of Design and Informatics, Abertay University, Dundee, Scotland
  • Ngoc Tran – Dublin City University, Dublin, Ireland
  • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
  • Xavier Bellekens – University of Strathclyde, Scotland, UK
  • Tim D Williams – University of Reading, Reading, UK
  • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
  • Thomas Pasquier – Department of Computer Science, University of Bristol, UK
  • Francisco J Aparicio Navarro, Cyber Technology Institute, De Montfort University, UK
  • Ensar Seker – NATO, CCD COE, Estonia
  • Michal Chorasm – Telecommunications and Computer Science, University of Science and Technology (UTP), Bydgoszcz, Poland
  • Kostas Kyriakopoulos – Digital Communications, Loughborough University, Leicestershire, UK
  • Joe Burton – Political Science and Public Policy Programme, The University of Waikato, New Zealand
  • He (Mary) Hongmei – AI and Cyber Security for Manufacturing, Cranfield University, UK
  • Aunshul Rege – Temple University, Pennsylvania, USA
  • Jason Nurse – University of Kent, UK
  • David Brosset –  Naval Academy Research Institute, France
  • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
  • Jens Myrup Pedersen – University of Aalborg, Denmark
  • Marios Anagnostopoulos – University of the Aegean, Greece
  • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
  • Ciza Thomas – College of Engineering, India
  • Stefanos Gritzalis – University of the Aegean, Greece
  • Varun Dutt – Indian Institute of Technology Mandi, India
  • Georgios Kambourakis – University of the Aegean, Greece
  • Elisavet Konstantinou – University of the Aegean, Greece
  • Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
  • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
  • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
  • Tim D Williams – University of Reading, Reading, UK
  • Amin Hosseinian-Far – Business Systems and Operations , University of Northampton, UK
  • Zisis Tsiatsikas  – University of the Aegean, Karlovassi, Greece
  • Michalis Diamantaris  – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
  • Jorge Varela Barreras – Oxford Research Staff Society Engineering Science, University of Oxford, UK
  • Avishek Nag – University College Dublin, Ireland
  • Elochukwu Ukwandu – University of Strathclyde, Scotland, UK
  • Egon Kidmose – Aalborg University, Denmark
  • Bertrand Venard – Audencia, OII, University of Oxford, UK
  • Carlos A. Perez Delgado – School of Computing, University of Kent, UK
  • Philipp Reinecke – Cardiff University, Wales, UK
  • Thomas T Y Win – School of Business & Technology, University of Gloucestershire, UK
  • Suleiman Yerima – Cyber Security, De Montfort University, UK
  • Lynsay Shepherd – Abertay University, Dundee, Scotland, UK
  • Florian Skopik – Cyber Security Research, AIT Austrian Institute of Technology, Austria
  • Palvi Aggarwal – Carnegie Mellon University (CMU), USA
  • Sean Mckeown – Edinburgh Napier University, Scotland, UK
  • Arghir-Nicolae Moldovan – National College of Ireland (NCIRL), Ireland
  • Domhnall Carlin – Queen’s University (QUB), Belfast, Northern Ireland, UK
  • Karen Renaud – Abertay University, Scotland, UK
  • Maria Bada – University of Cambridge, UK
  • Kim Tam – Plymouth University, UK
  • Felix Heine – Hannover University of Applied Sciences, Germany
  • Ruth Ikwu – Cardiff University, Wales, UK
  • Kumar Bandeli – Data Science, Walmart Inc., USA
  • Charles Clarke – Kingston University, London, UK
  • Varun Dutt – Indian Institute of Technology (IIT) Mandi, India
  • Filippo Sanfilippo – University of Agder, UIA, Norway
  • Nicholas Savage – Portsmouth University, UK
  • Egon Kidmose – Aalborg University, Denmark
  • Ivan Silva – Instituto Metrópole Digital (IMD), Federal University of Rio Grande do Norte (UFRN), Brazil
  • Frank Wang – Kent University, UK
  • Vanderson de Souza Sampaio – Fundação de Medicina Tropical Dr. Heitor Vieira Dourado, Brazil
  • Ryan Heartfield – Cyber Security, University of Greenwich, London, UK
  • Lakshmi Prayaga – Department of Applied Science, Technology and Administration, University of West Florida, USA
  • Harin Sellahewa – School of Computing, The University of Buckingham, UK
  • Thaddeus Eze – Computer Science Department, University of Chester, UK
  • Dimitris Kavallieros – Center for Security Studies (KEMEA), Greece
  • Susan Rea – Nimbus Centre at Cork Institute of Technology, Ireland
  • Samir Puuska – JAMK University of Applied Sciences, Finland
  • Vasil Vassilev – School of Computing, London Metropolitan University, UK
  • Martin Gilje Jaatun – University of Stavanger, Norway
  • Ulrik Franke – RISE Research Institutes of Sweden, Sweden
  • Shamal Faily – Cyber Security Research group (BUCSR), Bornemouth University, UK
  • Jingyue Li – Department of Computer Science, Faculty of Information Technology and Electrical Engineering, NTNU, Norway
  • Hasan Yasar – Division of the Software Engineering Institute, Carnegie Mellon University, USA

Previous Conferences

Cyber Security 2019
Location: Oxford, UK

Cyber Security 2018
Location: Glasgow, UK

Cyber Security 2017
Location: London, UK

Cyber Security 2016
Location: London, UK

Cyber Security 2015
Location: London, UK