Ciberseguridad | 🇬🇧 Cybersecurity

https://editorialia.com/wp-content/uploads/2020/05/techdispatch-1_2020_-contact-tracing-with-mobile-applications-2.jpg

TechDispatch #1/2020: Contact Tracing with Mobile Applications

In public health, contact tracing is the process to identify individuals who have been in contact with infected persons. Proximity tracing with smartphone applications and sensors could support contact tracing. It involves processing of sensitive personal data.

https://editorialia.com/wp-content/uploads/2020/05/cumplimiento_normativo_y_seguridad_ti_en_iot-3.jpg

Cumplimiento normativo y seguridad TI en IoT

La conectividad y el tratamiento masivo de datos son dos pilares esenciales para el desarrollo de estos sistemas, los cuales, a su vez, introducen riesgos de seguridad y privacidad que deben ser tratados adecuadamente.

INTERPOL: Impact of COVID-19 on Financial Crimes, webinar

The complexity of acting against cybercriminal internet domains was discussed; also on the techniques used in cybercrime… Information and detailed well-explained was offered by INTERPOL members, on how to detect and act in most cases.

https://editorialia.com/wp-content/uploads/2020/05/csirts_and_criminal_justice_authorities_-council_europe_webinar-2.jpg

CSIRTs and criminal justice authorities

CSIRTs and criminal justice authorities – good practices of collaboration on cybercrime and electronic evidence (webinar, Council Europe)

https://editorialia.com/wp-content/uploads/2020/04/iii_congreso_auditorc38da_y_grc_the_bible_ai.jpg

III CONGRESO AUDITORÍA Y GRC (ISACA Madrid Chapter)

Este congreso, motivado por la creciente sensibilidad de las compañías en materia de Gobierno, Riesgo y Cumplimiento, se enfoca en generar una visión global de los procesos, gestión de riesgos, fraude, control interno y cumplimiento normativo y legislativo, sin dejar de lado la metodología y ejecución de revisiones y auditorías de los mismos

https://editorialia.com/wp-content/uploads/2020/04/e74ee944-e7de-480c-9b60-665e97c78261.png

Encrypted Traffic Analysis

This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of encrypted malware, file/device/website/location fingerprinting and DNS tunnelling detection.

https://editorialia.com/wp-content/uploads/2020/04/when-autonomous-vehicles-are-hacked-who-is-liable.jpg

When Autonomous Vehicles Are Hacked, Who Is Liable?

Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring.

https://editorialia.com/wp-content/uploads/2020/04/logo_cyber_security.png

Free Cybersecurity Training

Provides instruction in the basic of network security in depth. Includes security objectives, security architecture, security models and security layers; risk management, network security policy, and security training. Includes the give security keys, confidentiality integrity, availability, accountability and auditability. Lecture 3 hours per week.

https://editorialia.com/wp-content/uploads/2020/06/standardisation-in-support-of-the-cybersecurity-certification.jpg

Standardisation in support of the Cybersecurity Certification

The document presents the value of the cybersecurity standardisation efforts for certification, the roles and responsibilities of Standards Developing Organisations (SDOs) in this context, and discusses various ways how standardisation can support efficiently the process of certification schemes creation by following a step by step methodology.