Posts By / lrossiter

The importance of Information Security

cyber eyeInformation security has recently been making headline news with a growing rate of daily reports on cyber-attacks on individuals, businesses and government establishments. This has resulted in an increase in the need for infosec professionals with the proven skills to alleviate the growing cyber risks and attacks; so much so that the demand for experienced and qualified professionals has outstripped supply.

Kevin Henry is recognised as one of the Leaders in the field of Information Security worldwide and recently he visited Bournemouth University to give ‘An Overview of Information Security Today and into the Future’. He highlighted importance of the right Infosec practitioners by describing:

  • How important it is for businesses not only to have the right technologies in place but also the skilled operators to use them to their full extent.
  • Often there are several systems working side by side in a business, but not together, leaving gaps which can be easily exploited. It takes a skilled professional to see those gaps and close them.
  • The need for security to be reasonable, simple and without burden to the user was also stressed. It should not slow a process down but should always be one step ahead of the curve. However, there will always be a balance to be found between system security and availability.

Kevin emphasised the need for:

  • Building a strong security culture both in our individual lives and in our professional lives: we all rely on technology in one form or another so each individual needs to take responsibility and not rely on others to tell us what to do, we should all be using the mantra ‘security is my job’.
  • Security awareness is paramount, businesses need to be constantly reminding staff what they should and should not be doing. Importantly, security needs to be regarded as being a positive influence and not as merely catching people out when they do something wrong.
  • Businesses and Infosec professionals need to look ahead and consider where their business will be in two or three years’ time; what are the emerging technologies and how can we prepare and invest now?

Concluding thoughts on how businesses should manage Information Security:Due to the very nature of risk, specifically its unpredictability, it can be difficult to justify expenditure on systems and professionals mitigating it. By the same token, it is difficult to measure the success of implementing Infosec procedures and systems. Ultimately, each business needs to take ownership of the information they hold, whether it is Intellectual Property or the card details of customers and understand the impact of a security breach. A decision can then be made as to how much time and money to invest. Ignorance to the risks can no longer be used as an excuse, a security breach resulting in the loss of credit card details for example would be seen as irresponsible rather than unlucky.
The team at Bournemouth University Cyber Security Unit (BUCSU) have the skills and experience to assist businesses in developing their own personalised Information Security systems and processes. In addition we undertake bespoke security awareness training for all levels of staff. Our enterprise consultants can provide advice and assistance in accessing the various funding available to businesses to improve their Infosec position through consultancy and collaborative research. For more information on any of these points visit the BUCSU website or contact bucsu@bournemouth.ac.uk.

An overview of Information Security today and into the future

Kevin Henry is *the* guru in security certifications and training and we are delighted that he will be presenting at the University tomorrow and on Friday 12th of June.  Kevin is going to deliver a handful of lectures which will take you on an enlightening journey through the world of Information Security!

Kevin will present on the following topics:

Thursday 11th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30 pm

Content of the CISSP

What is Information Security and its Role in Business?

2pm – 4pm

How is the face of Information Security Changing?

Hackers versus APTs

Where should my career go?

Friday 12th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30pm

The Value of the CISSP and other Certifications

International Standards and Practices – An Overview of ISO/IEC 27001 and PCI-DSS

If you would like to attend any of the lectures please contact the BU Cyber Security Unit to reserve your place – 01202 962 557 or email 

Kevin is recognized as one of the Leaders in the field of Information Security worldwide. He has been involved in computers since 1976 when he was an operator on the largest minicomputer system in Canada at the time. He has since worked in many areas of Information Technology including Computer Programming, Systems Analysis and Information Technology Audit. Following 20 years in the telecommunications field, Kevin moved to a Senior Auditor position with the State of Oregon where he was a member of the Governor’s IT Security Subcommittee and performed audits on courts and court-related IT systems. The co-chair of the CBK for the CISSP and several other certifications, as well as an author with published articles in over ten books and magazines, Kevin is the principal of KMHenry Management Inc. and served until recently as the Head of Education for (ISC)2 and Vice President of ITPG, responsible for all educational systems, products and instructors for training programs. Currently Kevin is an Authorized Instructor for (ISC)2, ISACA, and BCI.

Visit the BUCSU website for more information on enterprise consultancy, research and education

An overview of Information Security today and into the future

Kevin Henry is *the* guru in security certifications and training and we are delighted that he will be presenting at the University on the 11th and 12th of June.  Kevin is going to deliver a handful of lectures which will take you on an enlightening journey through the world of Information Security!

Kevin will present on the following topics:

Thursday 11th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30 pm

Content of the CISSP

What is Information Security and its Role in Business?

2pm – 4pm

How is the face of Information Security Changing?

Hackers versus APTs

Where should my career go?

Friday 12th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30pm

The Value of the CISSP and other Certifications

International Standards and Practices – An Overview of ISO/IEC 27001 and PCI-DSS

If you would like to attend any of the lectures please contact the BU Cyber Security Unit to reserve your place – 01202 962 557 or email 

 

Kevin is recognized as one of the Leaders in the field of Information Security worldwide. He has been involved in computers since 1976 when he was an operator on the largest minicomputer system in Canada at the time. He has since worked in many areas of Information Technology including Computer Programming, Systems Analysis and Information Technology Audit. Following 20 years in the telecommunications field, Kevin moved to a Senior Auditor position with the State of Oregon where he was a member of the Governor’s IT Security Subcommittee and performed audits on courts and court-related IT systems. The co-chair of the CBK for the CISSP and several other certifications, as well as an author with published articles in over ten books and magazines, Kevin is the principal of KMHenry Management Inc. and served until recently as the Head of Education for (ISC)2 and Vice President of ITPG, responsible for all educational systems, products and instructors for training programs. Currently Kevin is an Authorized Instructor for (ISC)2, ISACA, and BCI.

 

Visit the BUCSU website for more information on enterprise consultancy, research and education

Join us for today’s cyber security seminar…

Staff and students are invited to join us for today’s cyber security seminar on:

‘Persuasive Technology for Information Security’

Tuesday, 27th January at 4pm. 

Room: P335 LT

In the seminar, participants will hear about design principles for persuasive technology for promoting information security and also about methods to evaluate persuasive technology. Concrete examples and “best practices” will be given from a recent research project, in which it is used in organizations to make employees comply with information security policies.

Our speaker will be Marc Busch.  Marc is a scientist at the AIT – Austrian Institute of Technology and is active at the intersection of persuasive technology and usable privacy and security. Furthermore, he is specialized in advanced quantitative and qualitative usability and user experience methodology, research methods and statistics in Human-computer interaction. Marc is involved in several international and national research and industrial projects, such as MUSES – Multiplatform Usable Endpoint Security Before joining AIT, Marc was at CURE – Center for Usability Research & Engineering, where he focused on user experience and usability.

Secure and cross border digital identity: issues and perspectives

Staff and students are invited to join us for the next cyber security seminar on:

‘Secure and cross border digital identity: issues and perspectives’

Tuesday 25th November, 4pm – 5pm

Room: P335

 

The talk will discuss requirements, issues and perspectives for an interoperability solution that allows citizens and organizations to establish new e-relations across borders, just by presenting their national eID.

Our speaker will be Dr Andrea Atzeni, from the “Dipartimento di Automatica e Informatica, Politecnico di Torino” who is based in the TORSEC Security group.

Dr Atzeni’s work addresses the definition of security requirements and mobile security, plus, investigation and modelisation of user expectation on security and privacy; risk analysis and threat modeling for complex cross-domain systems; specification of functional and security architectures; development of cross-domain usable security; development and integration of cross-border authentication mechanisms (including legal and technical issues).

Join us for today’s cyber security seminar…

 

‘Pattern- and Security-Requirements-Engineering-based Establishment of Security Standards’

Tuesday, 19th August

Coyne Lecture Theatre, Talbot Campus

4pm -5pm.

Security standards such as Common Criteria or ISO 27001 are ambiguous on purpose, because these standards shall be usable for a large set of different scenarios. The establishment of a security standard requires removing all ambiguities, eliciting concrete security requirements and selecting appropriate security measures.

Dr Kristian Beckers is a security requirements engineering researcher at the University of Duisburg-Essen. He investigates how security requirements engineering methods can be used to support the development and documentation of security standards. In this seminar Dr Beckers will introduce you to the methods and systems which have been created to fit a specific security scenario. In particular, you will find out about the Information Security Management System (ISMS) which was built in compliance with the ISO 27001 standard.

If you would like to join us for this seminar, please book your place via EventBrite.

We will look forward to seeing you!

How security requirements engineering methods can be used to support the development and documentation of security standards…

 

You are invited to join us for the next Cyber Security seminar:

‘Pattern- and Security-Requirements-Engineering-based Establishment of Security Standards’

Tuesday, 19th August

Coyne Lecture Theatre, Talbot Campus

4pm -5pm.


Security standards such as Common Criteria or ISO 27001 are ambiguous on purpose, because these standards shall be usable for a large set of different scenarios. The establishment of a security standard requires removing all ambiguities, eliciting concrete security requirements and selecting appropriate security measures.

Dr Kristian Beckers is a security requirements engineering researcher at the University of Duisburg-Essen. He investigates how security requirements engineering methods can be used to support the development and documentation of security standards. In this seminar, Dr Beckers will introduce you to the methods and systems which have been created to fit a specific security scenario. In particular, you will find out about the Information Security Management System (ISMS) which was built in compliance with the ISO 27001 standard.

If you would like to join us for this seminar, please book your place via EventBrite.

We will look forward to seeing you!

 

National Security: Advancing Capabilities to Meet Current and Future Threats

 

On Thursday 3rd July, the BU Cyber Security Unit (BUCSU) will be exhibiting at the National Security: Advancing Capabilities to Meet Current and Future Threats conference in London.

The conference will offer delegates an opportunity to investigate the key threats and risks to the UK’s national security. They will also learn of the latest developments in developing the UK’s cyber security and the role technology can play in protecting infrastructure and ensuring business and service continuity.

Facing the issue of developing the UK’s cyber security, there are two important areas which need to be tackled – the shortage of security practitioners and the increasing skills gap between existing knowledge and new cyber threats.

In response to these issues, BUCSU will be launching at the conference its ‘job retention through education plan’.  The unit is already working closely with the Police and there is traction to work with other government agencies too; this conference will provide an excellent opportunity to engage with these agencies and UK businesses.


Goal Modelling for Investigating Fraud

Staff and students are invited to join us for the next Cyber Security Seminar…

‘Goal Modelling for Investigating Fraud’

Tuesday 17th June 2014

Lawrence Lecture Theatre, Talbot Campus

4pm – 5pm

 

Join us for this informative seminar presented by Clive Blackwell, who is currently a Research Engineer at Airbus Innovation Works.

This seminar will present a systematic process for analysing fraud using the KAOS tool, which is widely used in requirements engineering. Interestingly, Clive will analyse the case of Paul Ceglia vs Mark Zuckerberg and Facebook, where Ceglia claims 50% of Facebook supported by an alleged contract signed by Zuckerberg. Clive believes this technique could be extended to help provide a general model for fraud and also aid better analysis of the cyber security of complex systems in general.

 If you would like to join us for this presentation, please book your place via Eventbrite. We will look forward to seeing you!

Speaker Bio: Clive Blackwell is currently a Research Engineer at Airbus Innovation Works where his main research is in threat detection and modelling. Clive was formerly a Research Fellow at Oxford Brookes University between 2010 and 2013, where his main area of research was in cyber security and digital forensics with a particular interest in the development of a scientific basis for digital forensics. He has over 50 publications including two books to his name.

Ferndown & Uddens Business Improvement District collaborates with a multi-disciplinary team from BU

The Business Improvement District (BID) yesterday hosted their first breakfast meeting on business continuity and information assurance.

Staff from the Business School, The Disaster Management Centre and the Cyber Security Unit presented a knowledgeable insight to identify collective responsibilities of businesses within the district, giving examples where one business problem may affect other enterprises across the estate. The Dorset Fire & Rescue Service and Dorset Police further supported BU’s representations concerning crisis management; business resilience; disaster recovery and cybercrime. In addition, A&T Insurance Group provided a comprehensive study on insuring business resilience.

BUCSU introduced the availability of TSB Innovation Vouchers to meet the recently published ‘Cyber Essentials’ issued by the Information Commissioners Office.

What happens next: can the future of tech-enabled crime ever be predicted?

Dr Christopher Richardson from the BUCSU delivered a thought provoking presentation at the CIFAS Fraud Conference, which was held at Dexter House London on the 3 June 2014. It was attended by the UK’s financial and insurance communities.

The conference was alerted to the fact that UK fraud is currently running at 25 incidents per hour; with an annual cost estimated above £52 billion.

Dr Richardson’s oversight expanded that through the continuance of pervasive technologies; increased crime wave and progressive skills shortage within the security industry, has all resulted in a perfect storm.

In forecasting the cyber threat landscape Dr Richardson projected the increase of insider threat, malicious software and human error, which if not corrected will bring the cost of fraud above £100 billion. The real question is, at what point will society, enterprise and individuals demand government action, and in particular a more determined approach to the investigation and prosecution of fraudulent activities? A characteristic of cybercrime is that it’s global, whereas policing is local.  In order to rescue our beleaguered and often under skilled law enforcement agencies, we need to tackle the issues from an international perspective, with global partnerships engaging business communities and overcoming their reluctance to breach reporting.

This conference follows on from the BUCSU’s strategic cyber policing conference in February, where cyber enabled and cyber dependent crimes were discussed. Please visit previous blog post for further info on the South West Police Cybercrime Conference.

   

 

Join us for a seminar on ‘Understanding Crowdsourcing and CCTV surveillance’

Staff and students are invited to join us for today’s Cyber Security Seminar…

‘Understanding Crowdsourcing and CCTV surveillance’

Tuesday, 27th May

Coyne Lecture Theatre 

4pm – 5pm

 

Closed Circuit Television (CCTV) has many different uses but is often considered an archetypal surveillance technology. These infrastructures generate large amounts of data; so much so that the technique of crowdsourcing has recently been applied to the problem of searching for abnormalities in live surveillance video; the premise being that many inexpert watchers are cheaper but as efficient as a small number of experienced security experts. However, the merits of crowdsourcing watchers of surveillance video are largely unknown.

In this talk Dr. Paul Dunphy will describe exemplar infrastructures of this type, and two user studies that assess the performance of the watchers of CCTV video online. The results prompt a discussion regarding the effectiveness of using crowdsourcing in such contexts, and the role such infrastructures can play in society.

Speaker Bio: Paul is a postdoctoral researcher in the Culture Lab at Newcastle University. He is interested in multi-disciplinary approaches to understand and design security and privacy technologies.

 If you would like to join us for this presentation, please book your place via Eventbrite.

IT as a Utility Community conference

As part of the community, BUCSU is supporting Southampton University with this UK network.

IT as aUtility: Network+ community conference

                                             Thursday 19th – Friday 20th June 2014

This will be a two-day presentation and reflection on the achievements so far and the future plans of the RCUK-funded IT as a Utility Network+. The event will be an opportunity to further examine the role of IT utilities in the digital economy both now and in the future.

If you are interested in booking onto this event, please book your place via Eventbrite.

In addition to this, BU will be hosting a ‘Data as a utility and analytics as a service’ workshop at the Executive Business Centre on Monday 9th June from 12pm – 6pm.

Understanding Crowdsourcing and CCTV surveillance

 

Staff, students and members of the public are invited to join us for the next Cyber Security Seminar…

‘Understanding Crowdsourcing and CCTV surveillance’

Tuesday, 27th May

Coyne Lecture Theatre 

4pm – 5pm

 

Closed Circuit Television (CCTV) has many different uses but is often considered an archetypal surveillance technology. These infrastructures generate large amounts of data; so much so that the technique of crowdsourcing has recently been applied to the problem of searching for abnormalities in live surveillance video; the premise being that many inexpert watchers are cheaper but as efficient as a small number of experienced security experts. However, the merits of crowdsourcing watchers of surveillance video are largely unknown.

In this talk Dr. Paul Dunphy will describe exemplar infrastructures of this type, and two user studies that assess the performance of the watchers of CCTV video online. The results prompt a discussion regarding the effectiveness of using crowdsourcing in such contexts, and the role such infrastructures can play in society.

Speaker Bio: Paul is a postdoctoral researcher in the Culture Lab at Newcastle University. He is interested in multi-disciplinary approaches to understand and design security and privacy technologies.

 If you would like to join us for this presentation, please book your place via Eventbrite.

Could new framework take pressure off businesses who have to deal with privacy compliance?

 

 

The next Cyber Security seminar will be on:

‘Legal – URN (User Requirements Notation) Framework for Privacy Compliance’

Tuesday, 13th May

Coyne Lecture Theatre, Talbot Campus

4pm -5pm.

 

Bournemouth University is delighted to welcome Dr. Sepideh Ghanavati from CRP Henri Tudor, who will be visiting on the 13thMay to present an overview of the Legal-URN framework, which includes compliance analysis techniques and provides guidelines to manage multiple regulations at the same time.

The number of regulations an organisation needs to comply with has been increasing, and the pressure is building for them to ensure that their business processes are aligned with these regulations. However, because of the complexity and intended vagueness of regulations in general, it is not possible to treat them the same way as other types of requirements.

The cost of being non-compliant can also be fairly high; non-compliance can cause crucial harm to organisations, who may incur financial penalties or loss of reputation. Therefore, it is very important for organisations to take a systematic approach to ensuring that their compliance with related laws, regulations and standards is established and maintained. To achieve this goal, a model-based privacy compliance analysis framework called Legal-URN has been proposed.

If you would like to join us for this presentation, please book your place via Eventbrite.

We will look forward to seeing you!