The Cybersecurity Revolution Event

If we are going to realize the benefits of a globally consolidated communications system we, as a global community of researchers, are going to have to start truly working together to find a way that we can make the internet safe for everyone. This means that all of the researchers from different countries and different disciples working on aspects of cybersecurity need to start sharing.  The problem is that the many, many brilliant researchers are spread out across the world and it is very difficult and expensive to bring them together.  When we asked our partners and friends if they are willing to try something new to help over come this problem the answer was positively enthusiastic. Together we are going to make use of the growing power of online media platforms and their ability to broadcast live video and facilitate massive discussions. The goal of this effort is to provide a near zero cost opportunity for international collaboration and to road test a new format. On the 31st of May 2018 there will be a coordinated series of presentations from universities and organizations around the world that will follow the sun for over 24 hours. This round the clock round the world event will bring together researchers from across the globe for one revolution of the planet.

We would like to welcome all of the participants and the wider community to the Cybersecurity Revolution.

The Cybersecurity Revolution is an event conceived to openly encourage sharing and interaction among the wider cybersecurity research community. It is an event focused around research, education, science and learning. For more information and an updated program and links please visit: https://secrev.dfir.science

A great big thanks to all of our members, partners and friends whom have helped us organize this event.

The program outline is below. The program is divided into sessions with multiple speakers in each session.  The start and finish times for each session are indicated on the first line of each session. Please follow along at https://secrev.dfir.science.

Organisation URL Start (UTC) Finish (UTC) Speakers Topic
The CyberAcademy at Napier University http://thecyberacademy.org/ 8:00 16:00 see Workshop Program Cybersecurity and Big Data
Prof Madjid Merabti IoT: Safety and Security of Human Digital Memories
Mark Baker and Adam Brady LogRythm
Harry McClaren Using DevOps Practices to Implement a Full Route-to-Live for SIEM Platforms
Dr Jamie Graves AI and Security: Threats and Opportunities
Mark Menzies AI and Cybersecurity
see Complete Workshop Program at http://thecyberacademy.org/bigdata2018/
Cybersecurity Research Centre, The Hebrew University of Jerusalem http://csrcl.huji.ac.il 9:00 12:00 Dr. Amit Rechavi The Secondary Global Market for Hacked Data
Michael Wolfowicz Cyber-radicalization: Challenges and solutions
Eitan Diamond ‘Big Data’ and the implementation of the law of armed conflict
Dr. David Maimon Environmental Cues and their Impact on Public Wi-Fi Users’ Privacy Behaviors
Cardiff University 11:30 12:30 Michael Levi
Pete Burnap
Canadian Institute for Cybersecurity at the University of New Brunswick http://www.unb.ca/cic/ 14:00 16:00 Arash Habibi Lashkari Cyber Security Data Repository
Marzieh Jalalabadi
VU/NSCR/the Hague www.tno.nl 13:00 15:00 Marco Romagna Hacktivism and Website Defacements
www.nscr.nl Raoul Notté Ma MSc SME’s and cybersecurity
www.nscr.nl Dr. Rutger Leukfeldt Cybercriminal networks
www.vu.nl Dr. Marleen Weulen Kranenbarg Cybercriminals compared to traditional criminals
www.nscr.nl Lukas Norbutas MSc Trust in cryptomarkets for illegal drugs
Université de Montréal umontreal.ca 15:00 18:00
Benoît Dupont Canada Research Chair in Cybersecurity Research Program
Shirley McKey Smart Cybersecurity Networks
David Decary-Hetu Darknet and the Darknet and Anonymity Research Center
Rasmus Munksgaard Insights from qualitative research on darkweb drug sellers
Concordia University concordia.ca Jeremy Clark Bitcoin & Blockchain: Landscape and Future Directions
Mahsa Moosavi Ghazal: toward truly authoritative certificates for secure web browsing using Ethereum
Shayan Eskandari Cryptojacking: unmindful cryptocurrency mining while surfing the Internet
Seneca College, Knowledge Flow Foundation and Datarisk Canada https://cybersafetyfoundation.org 17:00 17:45 Claudiu Popa Cybersecurity Research in the Private Sector: Challenges, Opportunities and Lessons Learned
L’Université du Québec à Montréal uqam.ca 18:00 19:00 Sébastien Gambs Privacy and Ethical Issues in Big Data: Current Trends and Future Challenges
Universidad EAN https://universidadean.edu.co/es 19:00 21:00 Ciberseguridad y los negocios
https://universidadean.edu.co/es/eventos/u-ean-en-el-cybersecurity-revolution Panel Format, Each Speaker will present for 15 minutes on the subject of Cyberscurity and Business before responding to questions and discussing the theme (In Spanish)
MinTIC
National Police Mayor Marlon Toro
Jeimy Cano, PhD CFE
Juan Mario Posada
Alberta Council of Technologies http://www.abctech.ca 21:00 23:00
DKS DATA Consulting Group www.dksdata.com/about-us-video David Dickson Introduction and Closing: Cybersecurity and Privacy – It’s a partnership, not a competition.
University of Calgary/ Redigo Advanced Systems Inc Vassil Dimitrov Loading the bases – the development of the multiple-base number representation with applications in digital signal processing and cryptography
Centre for Crime Policy and Research – Flinders University www.flinders.edu.au 22:30 0:30 Russell Brewer
Deakin www.deakin.edu.au 23:00 2:00 Chad Whelan
Monash monash.edu.au Lennon Chang Strengthening Cyber capacity and raising cyber security awareness in Asia
Australian National University anu.edu.au Roger Bradbury
Session 2 (Upload of Pre-recorded content) 2:30 4:00
Swinburne University https://www.swinburne.edu.au James Martin
Australian National University anu.edu.au Rod Broadhurst
Hallym University global.hallym.ac.kr 4:00 7:00 Joshua James
Yohannes Yemane Recommended Android mobile app security implementation considerations and practices
Jiyoon Ham Censorship of North Korean Content in South Korea
Ajayi Betty Bukola The Local Perspective of Cybercrime in Nigeria
Addisu Afework Birhanu Digital Forensic Investigation of the Cloudflare Argo Tunnel
Subong Jang Malicious Content Blocklists in South Korea
Jaeseung Jang Legal Issues on Artificial Intelligence and Robots in South Korea
Minjin Park Kakao Talk Jail: Technology-supported social outcasts
David Kim A study on the Phases of Cyberwarfare and Countermeasures
Nikolay Akatyev Three years of Cyber Peacekeeping
Jisoo Kang Questions on injectable (implantable) IoT devices
Université de Lausanne www.unil.ch 7:00 9:00 Olivier Ribaux ESC Introduction
Quentin Rossy Online Illicit Markets and Internet Traces
Damien Rumorbarbe Monitoring Psyochactive Substances Forums
Ludovic Staehli Ordering Cocaine on the Internet
Sara Aniello Online Stolen Goods Market
Jonathan Bourquenoud Detecting Relationships between Internet Sites
Tim Bollé Detecting Links among Online Frauds
Stefano Caneppele Internet of Things and Cybercrime
Eoghan Casey Digital forensic
Olivier Delémont Image: the Advent of a Witness Like no Other

 

Leave a Reply

Your email address will not be published. Required fields are marked *