About CSAwareAdm

This author has not yet filled in any details.
So far CSAwareAdm has created 155 blog entries.

Cybersecurity: the human factor

We are Wise & Munro, and we are specialised in human collaboration, facilitated by technology. Our role is to be a partner in projects in which collaborative technology is being developed, to guide and conduct social research by which we investigate the needs of users, involving users in the design of the technology, to the [...]

By |2017-12-23T19:01:38+00:00December 21st, 2017|Blog|0 Comments

The CriM17 workshop in Oulu and CS-AWARE

It has been about a month since the CriM17 workshop in Oulu which gave me some time to process all the information received during the lectures and workshop sessions, and to think about how the different angles in which security was looked at fit together and how they relate to CS-AWARE. The CriM workshop is [...]

By |2017-12-21T11:17:16+00:00December 21st, 2017|Blog|0 Comments

Soft Systems Workshop Roma Capitale

Just beginning to assimilate, organise and process the outputs from last week’s “Soft Systems” workshop in Roma Capitale (RC). It was an excellent week with extremely good and detailed input from the team at RC, all of whom worked very hard to ensure that we completed this part of the work package. We now have [...]

By |2017-12-21T11:09:33+00:00December 21st, 2017|Blog|0 Comments

Big-data data collection for CS-AWARE

Within the CS-AWARE project, 3rdPlace is committed in implementing a data collection framework capable of storing in a real time fashion a large stream of logs coming from systems, applications, databases and network devices. After an initial analysis phase carried out in those first months alternative solutions have been identified. This post briefly describe one [...]

By |2017-12-18T15:37:35+00:00December 12th, 2017|Blog|0 Comments

Lasting impact and skills transfer to local public administrations

Our CS-AWARE project is an Innovation Action. So not a Research Action. This means that we build on existing technologies that will be integrated to offer an innovative solution deployed in a real world setting. That said, this does not mean at all that the challenges of such a project are smaller or fewer than [...]

By |2017-12-01T09:46:27+00:00December 1st, 2017|Blog|0 Comments

Cybersecurity in an interconnected world: Trust and Privacy

Straight after the JTC 1/SC 27 IT security techniques meeting in Jaipur (following night after the Parish event) ETSI’s Cyber group seriously proposed that we have to abandon the whole privacy issue. I do not see the future as black. Based on this serious theme we have arranged a series of update acute isssues [...]

By |2017-11-29T09:24:51+00:00November 29th, 2017|Blog|0 Comments

Cybersecurity and government

Where are we at with cyber-security in government? An article by Rene Millman in The Guardian[1] stresses that both central and local governments are increasingly at risk of cyber attacks. They should, he notes, be trying to constantly improve their systems and, perhaps most importantly, fostering an increased staff awareness about how to protect data. [...]

By |2017-11-20T11:51:22+00:00November 10th, 2017|Blog|0 Comments

Understanding the Cyber Threat: A Policy Guide for Legislators.

Ajoint policy declaration of AT&T and the National Cyber Security Alliance published a guide to encourage the development of long-term strategies aimed at increasing cybersecurity awareness among elected officials.They commissioned the Governing Institute (dedicated to helping public sector leaders govern more effectively through research, decision support and executive education) to survey 103 US state legislators [...]

By |2017-11-20T11:41:29+00:00November 10th, 2017|Blog|0 Comments

Challenges in Cyberthreat Detection

During the past few years, cybercrime had a strong presence world-wide judging by the impact of the recorded incidents. The financial damage caused by cybercrime globally is estimated to be about $450 billion and this number is predicted to reach $6 trillion by 2021. In response to these worrying figures, the security industry has developed [...]

By |2017-11-20T11:32:53+00:00October 27th, 2017|Blog|0 Comments

Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach

SECURWARE 2017 : The Eleventh International Conference on Emerging Security Information, Systems and Technologies In a world in which large-scale cyber attacks are the norm rather than the exception, the need for cybersecurity gains in importance every day. Current cybersecurity solutions are often not taking the holistic approach that would be required to provide [...]

By |2017-11-06T15:55:23+00:00October 25th, 2017|Papers|0 Comments