Nine long term projects Prof. Inald Lagendijk, member of Physical Sciences Board, NWO-EW Cyber Security Remains a Challenge Curiosity Revenge Monetary gains Espionage National Security Top-Level Policies Address Challenges • Top Sectors & Roadmap ICT National Cyber Security Strategy • • Alert Online (Knowledge is 2014 theme) • Research • Talent • Collaboration • Prevention • Detection • Response • • • Sentinels 2004-2014 Veni/Vidi/Vici 2012-2013 Prevention Resp onse Detection Prevention ICT One Can Rely On Secure & Vital ICT. Privacy & Identity. ICT Systems for Monitoring and Control. ICT for a Connected World. Data, Data, Data (Big Data). Detection Cyber Security 2013- … Detection Prevention Response Research Talent Collaboration Response • • • Research Talent Collaboration Talent Is Needed: Today in Research Lejla Batina, RUN, Vidi Herbert Bos, VU, Vici Martijn de Jong, EUR, Vidi Peter Schwabe, RUN, Veni Sicco Verwer, TUD, Veni • • • Research Talent Collaboration Talent Is Needed: Tomorrow Through Education • Radboud University Nijmegen. • BSc. Security (from 2013) • 3TU and Radboud University Nijmegen. • MSc. Cyber Security being established (extension of Kerkhoffs Masters Program). • Cyber Security Academy The Hague. • Postgraduate education towards professional MSc. • Hogescholen (university of applied sciences). • Vocational degrees in cybersecurity, a.o. Haagse Hogeschool, Hanze Hogeschool, Fontys, Saxion. • • • Research Talent Collaboration NWO-EW Efforts in Cyber Security Cooperation • Multidisplinary scientific approach. • • With Ministries operating in the cyber field. • • • • in collaboration with Technical Sciences and Humanities. united in cyber consultation led by NCTV. With the IIP-VV (Veilig Verbonden) community. With The Hague Security Delta (HSD). Internationally with iMinds (Flanders), NSF, DHS (USA). • • • Research Talent Collaboration Policy & Talent Research Projects • Early start yielding strong Dutch track record in security research • NWO en STW: Sentinels programme 2004-2014. • NWO-EW Cyber Security call 1 (2013-2017). • Both short term R&D SBIR and long term research projects. NWO-EW Cyber Security call with DHS for joint US-NL research projects. • • NWO-EW Cyber Security call 2 (2014-2018). • Both short term R&D SBIR and long term research projects. Cyber Security call 1 (2013-2017). Cyber Security call with DHS. Kickoff 9 Granted Research Projects 1. 2. 3. Wieringa: Personal Information Security Assistant (PISA). 4. Etalle: Visualization and deep protocol analysis to detect cyber espionage and targeted malware. 5. 6. 7. 8. 9. Van der Aalst: Privacy Compliance and Enforcement (PriCE). Van Eeten: Reputation Metrics Design to Improve Intermediary Incentives for Security. Jacobs: OpenSesame: opening backdoors on embedded devices Bos: Re-Cover, the Power of Obfuscation. Batina: Profiling for Optical Fault Induction using Locationdependent leakage. Van Gelder: Cyber Crime Offender Profiling: The Human Factor Examined. Vaandrager: Learning Extended State Machines for Malware Analysis (LEMMA).