Ros Smith, Senior Product Manager, British Broadcasting Corporation (BBC), is a relative newcomer to the world of Identity and Access Management (IAM). She has worked at the BBC for over 19 years. Until 2018 she worked on Production and Editorial side, having been a Radio Producer for Science Radio, Woman’s Hour and The Big Toe Radio Show; Deputy Editor of the award winning BBC News School Report; Project Manager at BBC Media Action and most recently Acting Head of BBC Weather. She is now Senior Product Manager in Identity and Access Management, and has found a new found enthusiasm for the importance of IAM in the world… and has learnt more acronyms than she ever imagined possible. .
The 2019 edition of Cyber Science took place at the University of Oxford, UK from June 3-4, 2019.
2019 Keynotes & Industry
Senior Product Manager, British Broadcasting Corporation (BBC)
Ros SmithSenior Product Manager, British Broadcasting Corporation (BBC)
CTO, UK & Ireland for Aruba, a Hewlett Packard Enterprise Company
Simon WilsonCTO, UK & Ireland for Aruba, a Hewlett Packard Enterprise Company
Simon Wilson, CTO, UK & Ireland for Aruba, a Hewlett Packard Enterprise Company. In this role he works as a brand ambassador articulating the Aruba vision for experience driven infrastructure. Simon also works closely with Aruba customers and partners across all markets to design smart and secure workspaces that maximise business productivity. With over 25 years’ experience in the networking industry, Simon joined HPE in March 2014.
Before this, Simon was with Nortel/Avaya for sixteen years where he worked across product management, marketing and channel operations roles. His experience also spans network design and electronic engineering. Simon led the EMEA product marketing team and worked in Nortel’s Global product marketing organisation in North America. Prior to that, he had worked in the SMB reseller market and in distribution. Simon holds a BTEC in Engineering from Croydon Technical College in the UK.
Managing Director, Europe, ICANN
Jean-Jacques SahelManaging Director, Europe, ICANN
Jean-Jacques Sahel, Managing Director, Europe, ICANN, has been involved in international government and regulatory affairs for over 15 years in both the private and government sectors. He was appointed Managing Director of ICANN’s Brussels office in July 2017 to lead the organisation’s corporate strategy and coordinate its operations across the European region. Since 2014 he has led ICANN’s strategic plan for outreach, support and engagement with governments, private sector and user groups throughout Europe, and worldwide for civil society.
Before joining ICANN, Mr Sahel headed government and regulatory affairs for Skype, then digital policy at Microsoft for the Europe, Middle-East & Africa regions. He had started his career in the City of London, before spending several years in the UK Government, leading in particular its international telecommunications policy.
Ex officio, Mr Sahel has chaired the UK Chapter of the International Institute of Communications (IIC) since 2009 and was a member of OSAB, the Spectrum Advisory Board of UK communications regulator Ofcom for 2 terms until 2016. He has authored articles and research in both mainstream media and academic publications particularly on Internet policy and governance.
Chief Security, Stability & Resiliency Office, ICANN
John CrainChief Security, Stability & Resiliency Office, ICANN
John Crain is Chief Security, Stability & Resiliency Office at The Internet Corporation for Assigned Names and Numbers (ICANN), responsible for establishing strategy, planning and execution for ICANN’s external Security, Stability and Resiliency programs. He works on a cross functional basis with the ICANN executive team, staff and the community to enable and enhance capabilities that improve the overall security, stability and resiliency of the Internet’s Identifier Systems and associated infrastructures and represents ICANN in operational and technical dialogues and forums to ensure the full communities engagement with these programs.
The Internet Corporation for Assigned Names and Numbers (ICANN) is an internationally organized, non-profit corporation that has responsibility for Internet Protocol (IP) address space allocation, protocol identifier assignment, generic (gTLD) and country code (ccTLD) Top-Level Domain name system management, and root server system management functions.
Prior to his time at ICANN, John worked as part of the executive management team at the RIPE NCC in Amsterdam. The RIPE NCC is the Regional Internet Registry (RIR) that provides Internet resource allocations for Europe and surrounding areas. John has been directly involved in the administration of Internet Identifiers since his start at the RIPE NCC in 1995 and has worked in all areas of IP address administration. John also has extensive experience in the area of DNS administration and managing Internet infrastructure services. Currently he is responsible for the management of the L-Root server, one of the Internet’s 13 “Root Servers”. Before becoming involved in Internet Administration John worked as a Design Engineer in composite materials research and development. In that role John was also responsible for local area networking of Computer Aided Design Systems and for writing and developing custom software applications.
Professor Awais Rashid
Professor of Cyber Security at University of Bristol, UK
Professor Awais RashidProfessor of Cyber Security at University of Bristol, UK
Awais Rashid is Professor of Cyber Security at University of Bristol, UK. His research focuses on security of large-scale connected infrastructures, software security and human behaviours (adversarial and non-adversarial) in these contexts. He leads projects as part of the UK Research Institute on Trustworthy, Interconnected Cyber-Physical Systems (RITICS) and UK Research Institute on Science of Cyber Security (RISCS), co-leads the Security and Safety theme within the UK Hub on Cyber Security of Internet of Things (PETRAS) and is a member of the UK Centre for Research and Evidence on Security Threats (CREST). He also leads the Cyber Security Body of Knowledge (CyBOK) project which aims to provide much needed foundations for education and training programmes in this area.
Professor Sadie Creese
Professor of Cyber Security in the Department of Computer Science at the University of Oxford
Professor Sadie CreeseProfessor of Cyber Security in the Department of Computer Science at the University of Oxford
Sadie Creese is a Professor of Cyber Security in the Department of Computer Science at the University of Oxford. She teaches threat detection, risk assessment and operational aspects of security. Her current research portfolio includes threat modelling and detection, visual analytics for cybersecurity, risk propagation logics and communication, resilience strategies, privacy, vulnerability of distributed ledgers, and understanding cyber-harm. She is Principal Investigator on the AXIS Insurance Company sponsored project “Analysing Cyber Value-at-Risk” focused on developing a method for predicting potential harms arising from cyber-attacks. She is a co-Investigator on the PETRAS EPSRC sponsored Internet of Things Research Hub project “Cyber Risk Assessment for Coupled Systems” which is developing a new risk assessment method aimed at helping organisations prepare for the threats and vulnerabilities we will face as the Internet of Things evolves. She was the founding Director of the Global Cyber Security Capacity Centre (GCSCC) at the Oxford Martin School where she continues to serve as a Director conducting research into what constitutes national cybersecurity capacity, working with countries and international organisations around the world. She was the founding Director of Oxford’s Cybersecurity network launched in 2008 and now called CyberSecurity@Oxford, and is a member of the World Economic Forum’s Global Council on Cyber Security. Sadie is a Fellow of Worcester College, Oxford.
Professor Mike Hinchey
Chair of IEEE UK & Ireland Section for 2018-2019
Professor Mike HincheyChair of IEEE UK & Ireland Section for 2018-2019
Professor Mike Hinchey is Chair of IEEE UK & Ireland Section for 2018-2019. He is President of IFIP, the International Federation for Information Processing (www.ifip.org) and is Emeritus Director of Lero-the Irish Software Research Centre and Professor of Software Engineering at University of Limerick, Ireland. Prior to joining Lero, Professor Hinchey was the Director of the NASA Software Engineering Laboratory. In 2009, he was awarded NASA’s Kerley Award as Innovator of the Year and is recognized in the NASA Inventors Hall of Fame. Professor Hinchey holds a B.Sc. in Computer Systems from University of Limerick, an M.Sc. in Computation from University of Oxford and a PhD in Computer Science from University of Cambridge. Professor Hinchey is a Chartered Engineer, Chartered Engineering Professional, Chartered Mathematician and Charted Information Technology Professional, as well as a Fellow of the IET, British Computer Society and Irish Computer Society. He is Editor-in-Chief of Innovations in Systems and Software Engineering: a NASA Journal and Journal of the Brazilian Computer Society. In January 2018, he became an Honorary Fellow of the Computer Society of India.
Dr Aunshul Rege
Aunshul Rege, PhD, is an Associate Professor with the Department of Criminal Justice at Temple University, USA
Dr Aunshul RegeAunshul Rege, PhD, is an Associate Professor with the Department of Criminal Justice at Temple University, USA
Aunshul Rege, PhD, is an Associate Professor with the Department of Criminal Justice at Temple University, USA. She holds a PhD and MA in Criminal Justice, an MA and BA in Criminology, and a BS in Computer Science. She has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her National Science Foundation funded research projects examine adversarial and defender behavior, decision-making, adaptations, modus operandi, and group dynamics. Dr. Rege’s work employs qualitative approaches of observing real-time cybersecurity exercises to understand the behavior of adversaries and defenders. She intersects theoretical frameworks and methodologies from criminology with hard science approaches (time series analysis, graph theory, simulations, and machine learning) to foster innovative and multidisciplinary proactive cybersecurity research. Dr. Rege’s has been published in the Journal of Information Warfare, Journal of Homeland Security and Emergency Management, the Security Journal, and the IEEE Intelligent Systems. She is also passionate about educating the next generation workforce across the social and hard sciences about the relevance of the human factor in cybersecurity.
Accepted Papers, Extended Abstracts and Posters
- Jonah Burgess, Domhnall Carlin, Philip O’Kane and Sakir Sezer. MANiC: Multi-step Assessment for Crypto-miners
- Alan Mills, Theodoros Spyridopoulos and Phil Legg. Efficient and Interpretable Real-Time Malware Detection Using Random-Forest
- Peyman Kabiri and Mahdieh Chavoshi. Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
- Bernhardt Engerer and Alexiei Dingli. Big Social Data – Predicting Users’ Interests from their Social Networking Activities
- Chunlei Li, Chunming Rong and Martin Gilje Jaatun. A cost-efficient scheme for Bitcoin-like blockchain
- Kimberly Tam and Kevin Jones. Forensic Readiness within the Maritime Sector
- Kimberly Tam and Kevin Jones. Factors Affecting Cyber Risk in Maritime
- Yogesh Patel, Karim Ouazzane, Vassil Vassilev, Ibrahim Faruqi and George Walker. Keystroke Dynamics using Auto Encoders
- Theo Lynn, Patricia Takako Endo, Pierangelo Rosati, Ivanovitch Silva, Guto Leoni and Debbie Ging. Detecting Hate Speech Online: A
- Comparison of Machine Learning Approaches for Automatic Misogyny Detection in Urban Dictionary
- Aunshul Rege and Scott Vanzant. Examining the Roles of Muhajirahs in the Islamic State via Twitter
- Olivier Jacq, David Brosset, Yvon Kermarrec and Jacques Simonin. Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems
- Cyril Onwubiko and Karim Ouazzane. Cyber Onboarding is ‘Broken’
- Meha Shukla, Shane Johnson and Peter Jones. Does the NIS implementation strategy effectively address cyber security risks in the UK?
- Erik Moore, Steven Fulton, Roberta Mancuso, Tristen Amador and Dan Likarish. Collaborative Training and Response Communities – An Alternative to Traditional Cyber Defense Escalation
- Andrew Mason, Yifan Zhao, Hongmei He, Raymon Gompelman, Srikanth Mandava and Guy Adams. Online Anomaly Detection of Time Series at Scale
- Yuanyuan Zhu, Mee Chi So and Paul Harrigan. Domain Identification for Commercial Intention-holding Posts on Twitter
- Leonard Renners, Felix Heine, Carsten Kleiner and Gabi Dreo. Adaptive and Intelligible Prioritization for Network Security Incidents
- Thomas Daniel Wagner. Cyber Threat Intelligence for “Things”
- Eszter Oroszi. Security awareness escape room – a possible new method in improving security awareness of users
- Wenjun Xiong and Robert Lagerström. Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang
- Subhi Alrubei, Jonathan Rigelsford, Callum Willis and Edward Ball. Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation
- Muntaha Saleem. Brexit Impact on Cyber Security of United Kingdom
- Nima Asadi, Aunshul Rege and Zoran Obradovic. Pattern discovery in intrusion chains and adversarial movement
- Yuxiang Hong and Steven Furnell. Organizational formalization and employee information security behavioral intentions based on an extended TPB model
- Christopher McDermott and John Isaacs. Towards a Conversational Agent for Threat Detection in the Internet of Things
- Kamalakanta Sethi, Ankit Pradhan, Punith. R and Padmalochan Bera. A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
- Aunshul Rege, Katorah Williams and Alyssa Mendlein. A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines
- Yunjia Wang and Ishbel Duncan. A Novel Method to Prevent Phishing by using OCR Technology
- Chern Nam Yap, Rui Tao Kee, Jovan Sie and Rhys Wong. Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
- Mahin Talukder, Syed Islam and Paolo Falcarin. Analysis of Obfuscated Code with Program Slicing
- Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy and Richard Enbody. BATSense: Anomalous Security Event Detection using TBATS Machine Learning
- Mary C. (Kay) Michel and Michael C. King. The Future of Cyber Analytics: Identity Classification for Systematic and Predictive Insight
- Zirak Allaf, Mo Adda and Alexandar Gegov. TrapMP: Malicious Process Detection By Utilising Program Phase Detection
- Marios Ioannou, Eliana Stavrou and Maria Bada. Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination
- Florian Skopik and Stefan Filip. Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
- Phil Legg and Tim Blackman. Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks
- Martin Lundgren and Erik Bergström. Security-Related Stress: A Perspective on Information Security Risk Management
- Sikha Bagui, Debarghya Nandi, Subhash Bagui and Robert Jamie White. Classifying Phishing Email Using Machine Learning and Deep Learning
- Fiona Carroll, Phil Legg and Adam Chakof. What makes for effective visualisation in Cyber Situational Awareness for Non-Expert Users?
- Jd Work. In wolf’s clothing: Complications of threat emulation in contemporary cyber intelligence practice
- Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast and Said Sadoudi. Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem
- Renate Schubert and Ioana Marinica. Facebook Data: Sharing, Caring, and Selling
- Wenting Li, Haibo Cheng and Ping Wang. Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things
- Suleiman Yerima and Sarmadullah Khan. Longitudinal performance analysis of machine learning based Android malware detectors
- Cyril Onwubiko and Austine Onwubiko. Cyber KPI for Return on Security Investment
- Aguinaldo Bezerra, Gisliany Alves, Ivanovitch Silva, Pierangelo Rosati, Patricia Takako Endo and Theo Lynn. A Preliminary Exploration of Uber Data as an Indicator of Urban Liveability
- Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera and Prashanta Kumar Patra. A Novel Machine Learning Based Malware Detection and Classification Framework
- Lakshmi Prayaga. Empowering Citizen data Scientists
- Adam Zibak and Andrew Simpson. Towards Better Understanding of Cyber Security Information Sharing
- Abraham Althonayan and Alina Andronache. Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management alignment
- Remy Zgraggen. Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues
- William Claycomb and Daniel Costa. Poster: Leveraging Existing IT Resources for Insider Threat Risk Mitigation
- William Claycomb and Daniel Costa. Poster: Indicator Development for Insider Threat Risk
- Adrian Duncan, Sadie Creese and Michael Goldsmith. A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
- Ferenc Leitold. Practical approach for maesuring the level of user behavior
- Bertrand Venard. The determinants of individual cyber security behaviours