Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

HTML
<iframe width="560" height="315" src="https://www.youtube.com/embed/h4T03Twyz8E" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>


Face to face (and also possible online) Spring Meeting for SIG-ISM members and others interested in Information Security Management. Please register at: https://events.geant.org/e/SIG-ISM-Trondheim


  • Venue Location: 

Abels gate 25, 7030 Trondheim, Norway

30 minutes ride from the airport → (Bus stop: Hestehagen) → Bus every ten minutes, just outside the arrivals, at the airport.

Bus Company: https://www.vaernesekspressen.no/rutetider/Face to face spring meeting for SIG-ISM members and others interested in Information Security Management. Please register at: https://events.geant.org/e/SIG-ISM-Trondheim


The main topics in this meeting are:

  • International projects and collaborations (Alf Moens)
  • Risk and Threat landscape (Nicole Harris, Rolf Sture Normann)
  • Preparing for NIS2 (Alf Moens)
  • Sharing agreements for Cyber Threat Intelligence (Roderick Mooi)

...

Preliminary Agenda (all times in CEST, coffee breaks when needed))

4rd

Wednesday May 3rd
13.30Welcome and introductionsAlf Moens (GÉANT ) and Rolf Sture Normann (SIKT)
14.00Current Risk and Treat landscapeand Threat landscape
  • The threat landscape 
  • SUNET security center monitoring of threat landscape 
  • Thoughts and summaries on the CTI subject
  • The GN5-1 WP8 T3 activities on the topic
  • Pre input for a survey on Threat landscape
  • Input & Discussion on what data we can share within the sector
David Heed (SUNET)
15.30

NIS2: state of affairs and how to prepare

The Security Union will keep us busy in the coming years: NIS2, CER, CRA and the uncertainty about the way they will be implemented in every member state and affiliate states.  One thing is certain: There will hardly be any surprises for the security requirements.

Prepare for NIS2 with the GÉANT Security baseline and pick your choice of international security standards.

Shared during the session: 

NIS2 Directive Requirements https://wiki.geant.org/display/GWP8/NIS2+Directive+Requirements

NIS 2 vs GDPR https://wiki.geant.org/display/GWP8/NIS+2+Directive+vs+GDPR

BS vs S7 vs CIS https://wiki.geant.org/display/GWP8/Security+Baseline%2C+S7+Framework+and+CIS

NIS 2 https://eur-lex.europa.eu/eli/dir/2022/2555

Articles https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2022.333.01.0080.01.ENG&toc=OJ%3AL%3A2022%3A333%3AFULL

Šarūnas Gigaliūnas (LITNET) and Vladislav Bidikov (MARnet) (online)
17.00 Summary of the day; evening programmeAlf Moens (GÉANT ) and Rolf Sture Normann (SIKT)




Thursday May 4th
9.00Welcome and Coffee
9.30

Security Intelligence Operations

Roderick will talk with you about "Sharing agreements for Cyber Threat Intelligence" 

Roderick Mooi (GÉANT, online), ...
10.30

"Successful Security Operations​"

Security operations should be an essential part of any organization's cyber defense. But making them work efficiently and effectively is a hard challenge. This talk shares operating models and lessons learned from over 20 years running successful security operations ourselves and helping others in their design and set up. It covers the relationships between detection and response, the importance of prevention, different ways to leverage threat intelligence and threat hunting, and how to shape constructive collaboration with IT and management.

Presentation /slides link

online presentation by Christo Butcher

(Fox IT/NCC group)

11.30

AI - Security Observations: CHATgpt
Recommended video during the session: https://www.youtube.com/watch?v=xoVJKj8lcNQ

Asbjørn Thorsen (CISO, SIKT)
12.30Summary, lunch and farewells

...