{"id":264,"date":"2021-03-31T08:25:26","date_gmt":"2021-03-31T08:25:26","guid":{"rendered":"https:\/\/csnet-conference.org\/2021\/?page_id=264"},"modified":"2021-09-18T09:48:31","modified_gmt":"2021-09-18T09:48:31","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/","title":{"rendered":"Keynotes"},"content":{"rendered":"\n<h3 id=\"keynote1\"><strong>Keynote #1<\/strong><\/h3>\n\n\n\n<h4><strong>Title: Conciling privacy rights with security needs<\/strong><\/h4>\n\n\n\n<p><strong>Abstract: <\/strong>Privacy is regularly violated by states to keep control and power, by platforms to make money, and develop their business\u2026 On the other end, security is&nbsp;needed, e.g. for tracking down criminals, harassers, for thwarting terrorism attacks. Moreover, the original purpose for which a technological solution is&nbsp;developed is often diverted to serve other&nbsp;purposes&nbsp;and interests, which are generally not in favor of privacy, e.g. face recognition to detect the non-wearing of mask, or worse to identify&nbsp;individuals as part of an ethnic group.&nbsp;<\/p>\n\n\n\n<p>This keynote addresses the positioning of privacy vs security, in terms of rights and needs and scientific properties. Discussions are then conducted&nbsp;about the technologies able to concile privacy rights with security needs, and the idea to lock the originally intended uses of a solution by the&nbsp;technologies to ensure that no diversion is possible. An introduction to the multidisciplinary Institut Mines-Telecom chair Values and policies of personal&nbsp;information is also presented with several covered research topics and results.<\/p>\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img src=\"https:\/\/csnet-conference.org\/2021\/wp-content\/uploads\/2021\/03\/Photo-Maryline-Laurent-481x500.jpeg\" class=\"img-rounded imageCommitee\" alt=\"Maryline Laurent - CSNet 2021\"><p><b>Maryline Laurent<\/b><br>(T\u00e9l\u00e9com SudParis, France)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio<\/strong>: <strong>Maryline Laurent<\/strong>&nbsp;is Full Professor with T\u00e9l\u00e9com SudParis,&nbsp;Institut Polytechnique de Paris.&nbsp;After taking the lead of the research team R3S&nbsp;(Network,&nbsp;Systems,&nbsp;Services,&nbsp;Security) of the&nbsp;CNRS SAMOVAR&nbsp;lab in 2013 for 7 years, she currently heads the RST department&nbsp;(Telecommunication Networks and services) of T\u00e9l\u00e9com SudParis. <\/p>\n\n\n\n<p>She is&nbsp;co-founder of the&nbsp;multidisciplinary research chair of Institut Mines-T\u00e9l\u00e9com&nbsp;\u201cValues and Policies of Personal&nbsp;Information\u201d. She is also associate editor of&nbsp;Annals&nbsp;of Telecommunication journal and&nbsp;Security&nbsp;and Communication Networks. She&nbsp;is editor of&nbsp;several books&nbsp;including \u201cDigital&nbsp;Identity&nbsp;Management\u201d&nbsp;and guest editor of several special issues&nbsp;in the privacy area. <\/p>\n\n\n\n<p>She has supervised&nbsp;20&nbsp;Ph.D. theses and she&nbsp;has published more than a hundred papers in highly ranked international&nbsp;journals and conferences. Her research topics are related to network security&nbsp;and privacy&nbsp;mechanisms, including protocols and functions, applied to clouds,&nbsp;the Internet of Things, and&nbsp;identity management. She is expert for European Commission&nbsp;(H2020), and French ANR research&nbsp;agency.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h3 id=\"keynote2\"><strong>Keynote #2<\/strong><\/h3>\n\n\n\n<h4><strong>Title: End-2-End Security and Resilience in Cyber-Physical and Autonomous Systems<\/strong><\/h4>\n\n\n\n<p><strong>Abstract:<\/strong> Cyber-Physical and Autonomous Systems have become the only solution to manage the increasingly prevalent Internet of Things (IoT) ecosystems, in areas such as smart cities, transportation, and surveillance, where devices can number in the hundreds of thousands.<\/p>\n\n\n\n<p>The scale and control of these systems are beyond human ability, where unsupervised connectivity potentially exposes an alarming number of security vulnerabilities with potential catastrophic impacts on citizens, cities, or even national infrastructures if compromised.<\/p>\n\n\n\n<p>At TII\u2019s SSRC, we have created a fully autonomous system that manages a swarm of drones to carry out dedicated missions. This system has built into it end-to-end security and resilience &#8211; designed from basic building blocks \u2013 and this is pervasive throughout the whole system. The talk will describe the research and development that we are undertaking with our academic and industry partners to achieve this vision. <\/p>\n\n\n\n<p>Many different technologies are used including machine learning, trusted execution environments, hypervisors, hardware root of trust, functional encryption to protect privacy, secure (including mesh) communications, and hardened software stacks (including secure development methodologies). All our building blocks are built on open-source hardware and software with total transparency and modularity to ensure that security is pervasive. <\/p>\n\n\n\n<p>Our goal is to enable new usage models in Cyber-Physical and Autonomous Systems that enhance the lives of people with confidence in safety.<\/p>\n\n\n\n<p>This keynote will describe the challenges and opportunities in enabling security and resilience in such systems.<br><\/p>\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img src=\"https:\/\/csnet-conference.org\/2021\/wp-content\/uploads\/2021\/04\/42ac0013672156b9730c496398745033.png\" class=\"img-rounded imageCommitee\" alt=\"Shreekant (Ticky) Thakkar - CSNet 2021\"><p><b>Shreekant (Ticky) Thakkar<\/b><br>(Chief Researcher at Technology Innovation Institute, UAE)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio<\/strong>: <strong>Dr. Shreekant (Ticky) Thakkar<\/strong> is Chief Researcher at the Secure Systems Research Centre at the Technology Innovation Institute (TII), a cutting-edge UAE-based scientific research centre. He is responsible for carrying out advanced research that makes the planet safer and more secure, with a focus on providing end-to-end security and resilience in cyber-physical and autonomous systems.<\/p>\n\n\n\n<p>Dr. Thakkar\u2019s career is punctuated by industry firsts and successes that have strengthened revenue, profit, and competitive advantage for Fortune 500 firms, as well as start-ups and entrepreneurial divisions.<\/p>\n\n\n\n<p>Dr. Thakkar is a hands-on leader with an invaluable blend of strategy development and tactical execution; an implementer and dedicated &#8220;doer&#8221; who delivers corporate vision by building, leading, mentoring and supporting highly effective, diverse, and collaborative advanced development, engineering\/software engineering teams across different geographies.<\/p>\n\n\n\n<p>Before taking on his current role, Dr. Thakkar was Chief Scientist and Executive Vice President of Engineering and Technology at DarkMatter, a cyber-security leader based in the UAE. In this capacity, he was instrumental in developing an engineering organization of 500 people from a startup team in four geographical locations, delivering two generations of innovative secure smartphones and applications, and a secure VPN appliance that contributed significantly to the company&#8217;s annual revenue.<\/p>\n\n\n\n<p>In prior roles in the United States, he served as Chief Solutions Architect at Qualcomm Data Technologies, and as the Chief Technology Officer in the Personal Computing Group, and as Vice President and Fellow at HP\u2019s Emerging Computing Lab.<\/p>\n\n\n\n<p>Earlier in his career, he completed 21 years at Intel Corporation in roles including Intel Fellow and Chief Systems Architect &#8211; Mobile Systems Technologies.<\/p>\n\n\n\n<p>Dr. Thakkar holds a PhD and an MSc, both in Computer Science, from the University of Manchester (UK). He also earned a BSc in Computer Science and Statistics from University College London. He holds more than 83 patents and has published 31 technical papers and over 4,700 citations in Google Scholar.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h3 id=\"keynote3\"><strong>Keynote #<\/strong>3<\/h3>\n\n\n\n<h4><strong>Title: Why doesn&#8217;t cybersecurity work?<\/strong><\/h4>\n\n\n\n<p><strong>Abstract: <\/strong>The news regularly reports incidents and problems related to poor cybersecurity. It is clear that the measures put in place are not sufficiently effective to counter risks and cyberattacks. <\/p>\n\n\n\n<p>Looking at the reasons for cybersecurity failures in a holistic way allows us to better understand the situations faced by individuals, organizations, and States and to propose perspectives and levers of action to contribute to making cybersecurity efficient and effective for all.<\/p>\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img src=\"https:\/\/csnet-conference.org\/2021\/wp-content\/uploads\/2021\/09\/Ghernaouti.png\" class=\"img-rounded imageCommitee\" alt=\"Solange Ghernaouti - CSNet 2021\"><p><b>Solange Ghernaouti<\/b><br>(Swiss Cybersecurity Advisory & research Group, University of Lausanne)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Solange&nbsp;Ghernaouti<\/strong>, director Swiss Cybersecurity Advisory and Research Group, professor of the University of Lausanne is an active independent cybersecurity advisor, an influential analyst and a regular media commentator. She offers strategic and practical advice, targeted research, and education in Cybersecurity, Cybercrime, Cyberdefence, Cyberpower and Artificial Intelligence related issues.<\/p>\n\n\n\n<p>Solange&nbsp;holds a PhD in Computer Science &amp; Telecommunication (Paris VI University), is a former auditor of the Institute of Advanced Studies in National Defence.&nbsp; She has authored more than 300 publications and thirty books including \u201cCyberpower: Crime, Conflict and Security in Cyberspace\u201d (translated in China). Professor Ghernaouti is Chevalier de la&nbsp;<em>L\u00e9gion d\u2019Honneur<\/em>, a member of the Swiss Commission for UNESCO, a member of the Swiss Academy of Sciences and has been recognised by the Swiss press as one of the outstanding women in professional and academic circles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keynote #1 Title: Conciling privacy rights &hellip; <a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/elika_speaker\/solange-ghernaouti\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keynotes - CSNet 2021<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keynotes - CSNet 2021\" \/>\n<meta property=\"og:description\" content=\"Keynote #1 Title: Conciling privacy rights &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2021\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-18T09:48:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2021\/\",\"name\":\"CSNet 2021\",\"description\":\"5th Cyber Security in Networking Conference\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/csnet-conference.org\/2021\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/#webpage\",\"url\":\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/\",\"name\":\"Keynotes - CSNet 2021\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\"},\"datePublished\":\"2021-03-31T08:25:26+00:00\",\"dateModified\":\"2021-09-18T09:48:31+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2021\/index.php\/keynotes\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/264"}],"collection":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":13,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/264\/revisions"}],"predecessor-version":[{"id":579,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/264\/revisions\/579"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/media?parent=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}