Researching Graduate Apprenticeships
Jun 6, 2019
Location Merchiston Campus Description SICS-sponsored workshop to:
1. Establish the current state of play for research into Graduate Apprenticeships in Scotland and share initial findings.
2. Discuss what research is needed and what data is available.
3. Organise collaborations and joint dissemination.People Ella Taylor-Smith
Sally Smith
Khristin Fabian
Debbie MehargOrg Units School of Computing
School of Computing Engineering and the Built EnvironmentURL https://www.eventbrite.com/e/researching-graduate-apprenticeships-tickets-61223147081#
Events (62)
5th International Conference Big Data in Cyber Security
Jun 4, 2019
Location Edinburgh Napier University - Craiglockhart Campus Description The 5th International Conference in Big Data in Cyber Security runs over 4th and 5th June, 2019. It includes a wide range of businesses, universities, non-profit and Scottish Government organisations. People Basil Manoussos
Nick PitropakisOrg Units School of Computing
School of Computing Engineering and the Built EnvironmentURL https://thecyberacademy.org/5th-international-conference-big-data-in-cyber-security
Post Graduate Cyber Security (PGCS) Symposium (2018)
May 30, 2018
Location Edinburgh Napier University, Craiglockhart Campus Description The Symposium was organised as an academic event, parallel to the Big Data in Cyber Security conference People Basil Manoussos Org Units School of Computing
School of Computing Engineering and the Built Environment
Cyber Security Master Class
Apr 11, 2016
Location Monday 11 April 12.00 - 15.00pm Description The Cyber Academy and ENUSEC> are hosting a the second Cyber Security Master Class on the latest vulnerabilities and methods on Monday 11 April 2016 in the Glass Room at Merchiston, Edinburgh Napier University from 12pm until 3pm. It is free to attend and will demonstrate some of the latest vulnerabilities. The main presentators include:
Keysight/ENU. Bare metal forensics/side channel attacks.Bill Buchanan. DROWN.Andrew Yates. RSA/EMC. Lastest Threat Analytics using RSA SA (Security Analytics).People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Head of Europol’s European Cybercrime Centre (EC3) to provide Keynote Talk at Big Data in Cyber Security Conference
Feb 17, 2016
Description Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s European Cybercrime Centre (EC3), which supports activities around cybercrime investigations in EU Member States. EC3 thus provides a pooling cyber intelligence in order to fight cybercrime networks at EU level and to coordination with law enforcement authorities outside the EU.
The increasing usage of data within cyber investigations is thus a key focus for EC3 and Stevie aims to outline how intelligence gathering and the sharing and analysis of data will be used across the EU, in order to combat a range of threats.
The conference is one of a number of conference events hosted by The Cyber Academy.
OutlineThe world is moving towards Big Data, and Cyber Security is one of leading applications of this, where events are tracked across a network infrastructure. Along with this the threats to organisations increase by the day, and many organisations have moved towards the integration of SIEM (Secure Incident and Event Management) to detect malicious activity.
This event is hosted by The Cyber Academy, in collaboration with HP and ISACA, and aims to investigate best practice within industry and look to future infrastructures of Big Data for the benefit of organisations in not only monitoring security events, but also in the automated generation of auditing information and business analytics.
The application of SIEM is now being applied in many areas including with security monitoring, incident response and Cyber Crime investigation, and the event aims to showcase best practice in industry and in investigations.
More details here:
http://thecyberacademy.org/events/bigdata/
Bio
Mr Wilson completed 30 years of service with Police Scotland, previously having also served with Strathclyde Police, Scottish Crime and Drug Enforcement Agency and Her Majesty’s Inspectorate of Constabulary. He has worked in a wide range of Senior Detective roles including major investigations, counter terrorism, covert policing, management of sex offenders, fugitives and witness protection. He had responsibility for all aspects of cyber and cyber enabled crime in Scotland and sat on government, industry and academic groups. He also represented Scotland on UK national and European cyber groups.People Bill Buchanan
Rich Macfarlane
Gordon Russell
Jamie BroganOrg Units School of Computing
School of Computing Engineering and the Built Environment
The Cyber Academy Hosts Cyber Security Insight Camp in March 2016
Dec 6, 2015
Description In association with the Cyber Security Challenge UK, Edinburgh Napier University are holding a Cyber Security Insight Camp from 5-7 March 2016. It is open to all who have an interesting in the Cyber Security industry, and aims to showcase the amazing opportunities there are in terms of getting involved in Cyber Security.
The event is free to attend and open to everyone interested. There is a number of places for accommodation available for those who are not local.
More details here:
http://thecyberacademy.org/cybercamp/People Bill Buchanan
Jamie Brogan
Rich Macfarlane
Gordon RussellOrg Units School of Computing
School of Computing Engineering and the Built Environment
The Cyber Academy Hosts a Master Class on the Lastest Computer Vulnerabilities - Stagefright, Logjam, ...
Oct 25, 2015
Description Charley Celice in association with The Cyber Academy and ENUSEC is hosting a Master Class on the latest vulnerabilities on Tuesday 10 November 2015 in the Glass Room at Merchiston, Edinburgh Napier University from 1pm until 4pm.
It is free to attend and will demonstrate some of the latest vulnerabilities including WebView, ShellShock, Heartbleed, StageFright, FREAK, Logjam, Cryptolocker, and others.
Stage Fright is one of the most recent vulnerabilities and allow a malicious agent access to a device by sending a video or audio file to the target. At present, too, WebView affects over one billion Android devices around the World, and can allow remote access to a mobile device. Your Apple Mac is also not immune from vulnerabilities, and the event will showcase ShellShock which affects Linux-based systems.
It is organised by Charley Celice, the UK Cipher Cracking winner, and focuses on practical demonstrations, and aims to showcase how a range of devices are vulnerable and how they can be protected.
More details here.People Bill Buchanan
Rich MacfarlaneOrg Units School of Computing
School of Computing Engineering and the Built Environment
IET Christmas Lectures to feature The Internet of Everything
Jul 4, 2015
Description IntroductionThis year’s IET Christmas lectures are focusing on the Internet of Everything and will run in Glasgow, Edinburgh, Dundee and Inverness. The dates are:
Inverness. 1 Dec 2015.
Dundee. 4 Dec 2015 (Gardyne Theatre).
Glasgow. 8 Dec 2015 (iMax Theatre, Glasgow Science Centre).
Edinburgh. 11 Dec 2015 (Craiglockhart Campus).
The lectures are open to everyone, and teachers can book tickets in blocks for their classes.
Outline
This presentation will showcase the vast range of systems and devices which can connect to the Internet. It aims to totally immerse the audience in the possibility of the Cyber World and how it is changing our lives. Along with this it will outline a range of emerging technologies which will bring benefits to many areas of our lives including health care and education. With these great benefits, though, there are also threats, and some of these will be presented through a range of practical demonstrations.
Overall the key aim of the presentation is to present this new age in a fun and informative way, and engage the audience into understanding the opportunities of the Cyber Age [poster].
More details here.
The IET Christmas Lectures
The Christmas Lectures are designed to excite the public around an aspect of STEM and inspire people about the possibilities of a career in engineering, technology and computing. They also offer universities an opportunity for outreach work and public engagement.
Profile
Prof Bill Buchanan is a Fellow of the IET, and leads The Cyber Academy. He regularly appears on TV and radio, and has published 27 academic books and over 250 research papers. Along with this he has received many awards for innovation and has helped support two spin-out companies.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
The Cyber Academy Hosts Symposium on Software Defined Architectures and Networks
May 26, 2015
Description
This Symposium, on 27 August 2015, focuses on the next generation of network infrastructures, where devices, networks and data elements are defined as software entities. It is presented as partnership between The Cyber Academy and Hutchinson Networks.
A key focus of the event is to analyse how a range of organisations can be transformed using SDN (Software Defined Networks), including for improved business integration, performance, security and failover, especially to highlight current practice and the future of information infastructures.
More details here.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
The Cyber Academy Presents ... Brave New World or Big Brother?
May 3, 2015
Location 12/06/2015 7pm Description The public engagement event on Thursday 26 June at 7pm will examine the threats and opportunities within the Cyber Age. At its core is the debate around between the rights of privacy against the rights of society to detect threats, and in the growth of the devices which connect to the Internet.
It will use a wide range of fun and interesting demonstrations to showcase the opportunities and threats within this Age, including parallels of modern day surveillance and the usage of intelligent devices, from visionary writers such as George Orwell, Ray Bradbury, and others, along with movies such as 2001: Space Oddity.
Included in the demonstrations will be an examination of the risks around the embedded systems which connect to the Internet, including for home control systems, IP cameras, health care sensors, intelligent car networks, and even children's toys.
Through-out there will be fun demonstrations and audience interaction, using a range of devices and objects, including live demonstrations around the vulnerabilities within mobile devices and the Internet of Things. These demonstrators will also show the threats there are related to our increasing digital shadow and within flaws within our current implementation of security on the Internet: PKI (Public Key Infrastructure).
In the end, we hope your will either be enthused by the opportunities of this new age, or be ready to get into a time machine that send you back to a time before the creation of the Internet.
Either way, you'll learn something new about this amazing age ... The Cyber Age!
Interested? You can register here ...
https://cyberage.eventbrite.co.uk/People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Consulting on the Shoulders of Giants - Andrew Kember, Cloudreach Limited
Mar 19, 2015
Location 10:00 B2 Description Consulting on the Shoulders of Giants is a guest lecture from Andrew Kember, Cloudreach Limited
Time: 10am
Place: B2, Merchiston
All invitedPeople Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Heartbleed, Sony and Lenovo : Anatomy of a Computer Vulnerability
Mar 4, 2015
Location 1pm, F10 Description Seminar:
Wednesday 4th March 2015, 1pm, F10, Merchiston All invited.
Title:
Heartbleed, Sony and Lenovo : Anatomy of a Computer Vulnerability
Abstract:
This talk will outline the time lines involved in some of the most recent computer hacks, and showcase the issues involved. It will look at the complete timeline of Heartbleed, and outline how bugs and sloppy coding within C++ nearly brought down the Internet. The talk will also provide a live demo of Heartbleed, and analyse some insider share price dealing around the vulnerability.
Along with this the talk will look at the complete timeline of the Sony hack, going back to the issues related to the cracking of the PlayStation Network, and show new evidence on the possible culprits.
Finally it will look at how Lenovo managed to compromise the security of the Internet with the integration of Superfish.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Cyber Security Symposium
Jan 14, 2015
Description The Cyber Security Symposium was held at Edinburgh Napier University on Thursday 8 Jan 2015 investigated a range of interesting topics.
Here's some of the tweets around the event:
https://storify.com/billatnapier/cyber-security-symposium
Other details here.
The event was supported by the EU (DG Connect), and sponsored by ECS, Farrpoint and G2G3.People Bill Buchanan
Jamie Brogan
Rich Macfarlane
Alistair LawsonOrg Units School of Computing
School of Computing Engineering and the Built Environment
Professor to talk to the Law Society of Scotland on Data Loss Prevention: Detecting the Cracks and Plugging a Dam with a Billion Holes
Aug 19, 2014
Description
Prof Bill Buchanan will talk on Data Loss Prevention: Detecting the Cracks and Plugging a Dam with a Billion Holes, at a Law Society of Scotland event on Wednesday 17 September in Edinburgh.
This presentation will outline the many ways that sensitive information can leak from an organization, and the methods which can be used to prevent and detect the loss. This includes methods of detecting data leakage across internally networked systems, and within open source environments.
A particular challenge relates to the storage of information within The Cloud and on the trails of information that each of us leave on the Internet. With the talk, Bill will outline the growth of SIEM (Security Information and Event Manage) as a tool which can detect and log important events, so that data loss can be detected in real-time, or that the events capture can be used to playback the incident. It seems increasingly that virtually every event is captured and archived on a network, and used to analyse the methods used within data loss.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
The Battle-Line between Cyber Libertarians and Cyber Cops
Jun 8, 2014
Location - event: 19 June 2014 at 11:00 Description
OutlineDr. Barry Cartwright will present on the changing face of Canadian Cyber Laws on Thursday 19 June 2014 at 11am (room to be confirmed).
Register to attend here.
Abstract
This presentation contemplates two recent legislative initiatives by the Canadian federal government—both intended to meet the challenges posed by the rapid expansion of cyberspace and the concomitant increase in cybercrime—and the debate between “cyber libertarians” and “cyber cops” that has been set in motion by these legislative initiatives.
The first piece of legislation, the Copyright Act of 2012, revamped Canadian copyright law in an effort to address copyright issues in cyberspace. The legislation introduced concepts such as digital networks, digital memory, digital copies and digital locks, clarified the liability of ISPs, and broadened the definitions of telecommunication, publication, public performances and performer rights. It enabled courts to award statutory damages ranging from $100 to $5,000 for non-commercial copyright infringement and $500 to $20,000 for commercial copyright infringement, and required ISPs to provide copyright holders with the electronic location of individuals or commercial enterprises who had engaged in copyright infringement.
The second piece of legislation, known as Bill C-13, the Protecting Canadians from Online Crime Act, is presently before parliament. The thrust of Bill C-13 is to update the Canadian Criminal Code and the Canada Evidence Act, creating a number of new criminal code offences, including “sexting;” manufacturing, importing, possessing or selling devices designed to facilitate theft of telecommunications signals; obtaining or intercepting a computer service; gaining unlawful access to a computer system; and recording, storing and disseminating child pornography or hate propaganda.
The proposed legislative changes would create a new series of indictable offences, some carrying potential sentences of between two and ten years of imprisonment. It would also enable judges to issue warrants to seize digital publications, representations or recordings of intimate images, and to order the deletion of intimate images and hate propaganda.
These recent legislative initiatives have been endorsed enthusiastically by politicians, police and other government officials, who argue that greater policing and enforcement powers are necessary to deal properly with new variants of cybercrime, or old variants of crime that have migrated to cyberspace. On the other hand, these initiatives have met with scepticism and dismay on the part of cyber libertarians and the denizens of cyberspace, who view the Internet as an intellectual commons, and advocate for a “hands off” approach.
Brief Biography Dr. Barry Cartwright is a Senior Lecturer in the School of Criminology at Simon Fraser University, and a member of the university’s International CyberCrime Research Centre. His areas of interest include cyber-research, cyberbullying, and digital copyright law. Details here.
The seminar has been organised in collaboration with Dr George R S Weir, Department of Computer & Information Sciences, University of Strathclyde.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Professor invited to present at Education Scotland Event on Computing Science
May 20, 2014
Description Prof Bill Buchanan will present on The Future of Computer Science Education and Observations from On-line Learning on 29 May 2014 at the Hilton Grosvenor Haymarket. This event looks at the future of Computer Science education in schools in Scotland.
The presentation will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career in related areas, including covering the key areas related to computer security (which are included in N5 and N6).
Along with this Bill will outline the results of the work undertaken on the Bright Red Publishing Digital Zone related to Computer Science, along with an analysis of engagement within the on-line environment, and on future developments. A key element of the talk is for the audience to provide ideas on the future of the Digital Zone, and how it might be support teachers and pupils for Computing Science.
Registeration at:
https://blogs.glowscotland.org.uk/glowblogs/eslb/2014/05/20/computing-science-conference/People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
Professor to Outline New Research on Heartbleed at NISC 2014
May 2, 2014
Description Prof Bill Buchanan will outline some new research, which has never been seen anywhere in the World, related to the Heartbleed vulnerability in an invited endnote presentation on the opening day of NISC 2014 in Glasgow [Details] on Wednesday 14 May 2014.
He will cover the full technical details of the threat, with a live demo. Along with how Heartbleed is detected on networked device, and some new research of the full time line of the vulnerabilty, including details of insider trading.
Bill previously gave a talk in 2012, and this year's event brings back some of main speakers over the years. The presentation from 2012 is here.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment
University to host the first AWS User Group in Scotland
Apr 26, 2014
Description IntroductionWith the importance of Cloud technology to Scotland, both in the public and private sector, James Lucas (Cirrushq) and Edinburgh Napier University are setting up the first Scottish AWS (Amazon Web Services) User Group, with the initial gathering on Tuesday 27 May 2014 in the Glass Room at the Merchiston Campus, Edinburgh.
As the adoption of Cloud technology gathers pace, with both public and private clouds, it is now seen as a major driving force within the development of IT infastructures, providing a base for a range of industries. A key part of this development is the sharing of ideas and experience, especially how Cloud-based systems are designed, created and tested, within a wide range of application area.
The event will include two main speakers:
- Ian Massingham, an AWS Evangelist (https://twitter.com/IanMmmm).
- Bill Buchanan, Professor of Computing (https://twitter.com/billatnapier).
Overall the event aims to be a meeting place for people from a range of backgrounds to come and share ideas on how their organisations can improve their systems, and will thus aim to encorage innovation, provide a forum for knowledge exchange, development improvements within areas such as health and social, and generally enable the sharing of ideas.
If you have any questions, please contact: James Lucus (james@cirrushq.com), Bill Buchanan (w.buchanan@napier.ac.uk), Jamie Brogran (j.brogan@napier.ac.uk) or Adrian Smales (a.smales@napier.ac.uk).
Refreshments and food will be provided free-of-charge, and the event is all inclusive. Register here.People Bill Buchanan
Jamie BroganOrg Units School of Computing
School of Computing Engineering and the Built Environment
Rafe Pilling from Dell Secureworks to talk on Disrupting Malware Assisted Online Fraud
Dec 2, 2013
Location 03/12/2013 H5 Description Rafe will give a presentation on Disrupting Malware Assisted Online Fraud in H.5 (Merchiston) at 9am on Tuesday 3 December 2013. All are invited.
Rafe is a security researcher working for the Dell SecureWorks Counter Threat Unit (CTU). Rafe has significant experience in a broad range of security disciplines including malware analysis, penetration testing, incident response and digital forensics from his years leading the delivery of pragmatic security solutions within the Dell SecureWorks Security and Risk Consulting group.
His current role in the CTU focuses on developing intelligence based countermeasures to protect client networks, delivering threat intelligence to EMEA customers and investigating complex incidents.
People Bill Buchanan
Rich MacfarlaneOrg Units School of Computing
School of Computing Engineering and the Built Environment
Professor to provide visionary presentation on mobile working at KPMG seminar
Nov 28, 2013
Description Professor Bill Buchanan has been invited to give a visionary presentation on mobile working within a KPMG seminar in Edinburgh on 30 January 2014. The title is:
The Risks and Opportunities of Mobile Working within Cloud Environments
The talk will outline the changing architecture of business systems, and with the increasing use of Cloud-based systems. It will outline some of the key risks around using mobile devices for business and social uses, and define some of the best practice methods which can overcome these. Along with this the talk will outline the key pointers within mobile systems which identify and authenticate both users and systems, which typically use multi-factor authentication. These will be discussed with use cases which shows when things can go wrong, and the ramifications for both the individuals involved and the organisation.
Overall the talk involve some interaction with the audience, and will gather information about some key factors around security within mobile and cloud-based systems. Along with Bill will attempt to show how easy it is to break most of the security on a mobile device, using a practical and live demonstration, of a mobile device which has been independently setup.
More details to follow.People Bill Buchanan Org Units School of Computing
School of Computing Engineering and the Built Environment