Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Wednesday May 3rd
13.30Welcome and introductionsAlf Moens (GÉANT ) and Rolf Sture Normann (SIKT)
14.00Current Risk and Threat landscape
  • The threat landscape 
  • SUNET security center monitoring of threat landscape 
  • Thoughts and summaries on the CTI subject
  • The GN5-1 WP8 T3 activities on the topic
  • Pre input for a survey on Threat landscape
  • Input & Discussion on what data we can share within the sector
David Heed (SUNET)
15.30

NIS2: state of affairs and how to prepare

The Security Union will keep us busy in the coming years: NIS2, CER, CRA and the uncertainty about the way they will be implemented in every member state and affiliate states.  One thing is certain: There will hardly be any surprises for the security requirements.

Prepare for NIS2 with the GÉANT Security baseline and pick your choice of international security standards.

Shared during the session: 

NIS2 Directive Requirements https://wiki.geant.org/display/GWP8/NIS2+Directive+Requirements

NIS 2 vs GDPR https://wiki.geant.org/display/GWP8/NIS+2+Directive+vs+GDPR

BS vs S7 vs CIS https://wiki.geant.org/display/GWP8/Security+Baseline%2C+S7+Framework+and+CIS

NIS 2 https://eur-lex.europa.eu/eli/dir/2022/2555

Articles https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2022.333.01.0080.01.ENG&toc=OJ%3AL%3A2022%3A333%3AFULL

Šarūnas Gigaliūnas (LITNET) and Vladislav Bidikov (MARnet) (online)
17.00 Summary of the day; evening programmeAlf Moens (GÉANT ) and Rolf Sture Normann (SIKT)




Thursday May 4th
9.00Welcome and Coffee
9.30

Security Intelligence Operations

Roderick will talk with you about "Sharing agreements for Cyber Threat Intelligence" ← click to download the presentation. 

Roderick Mooi (GÉANT), ...
10.30

"Successful Security Operations​"

Security operations should be an essential part of any organization's cyber defense. But making them work efficiently and effectively is a hard challenge. This talk shares operating models and lessons learned from over 20 years running successful security operations ourselves and helping others in their design and set up. It covers the relationships between detection and response, the importance of prevention, different ways to leverage threat intelligence and threat hunting, and how to shape constructive collaboration with IT and management.

Presentation /slides link

online presentation by Christo Butcher

(Fox IT/NCC group)

11.30

AI - Security Observations: CHATgpt
Recommended video during the session: https://www.youtube.com/watch?v=xoVJKj8lcNQ

Asbjørn Thorsen (CISO, SIKT)
12.30Summary, lunch and farewells

...