The fourth World Cyber Security Technology Research Summit – Belfast 2014 – saw the event come full circle once again as we sought to horizon scan the cyber security landscape and define research challenges which will form the basis of new programmes here at The Centre for Secure Technologies (CSIT) and other world leading institutions in the coming years.

This year’s Summit was the biggest ever both in terms of numbers of attendees and also in terms of the activity programme which saw two new parallel streams added in addition to the core “Cyber 100” stream familiar to many. The new streams – PRECYSE and Techstars – added new dimensions in terms supporting new cyber security start-ups gain access to experienced industry veterans and funders as well as acting as an outlet for the PRECYSE consortium to disseminate findings from their project and seek input from a broad spectrum of end-users.

Summit Report

The Belfast 2014 Summit Report is now available.

Keynote speakers

Briefing Document

Breakout Sessions

+ Securing Digital Assets

Facilitators: Professor Sakir Sezer, CSIT and Brian Honan, BH Consulting

The distributed and networked nature of computing and storing digital assets in the Cloud requires context-specific security technologies. CSIT is channelling research and innovation into protecting assets, content and infrastructure from malicious attack or unintentional exposure. With pervasive computing, personal information will be used to optimise Smart Utilities and Smart Cities. We are therefore researching policies on privacy and ethics, technologies to prevent misuse of collected data and the opportunity for, and viability of, data shredding in the Cloud and the right to be forgotten.

+ Securing Digital Devices

Facilitators: Professor Andrew Martin, University of Oxford and Mathieu Gorge, VigiTrust

In the hyper-connected world of the Internet of Things (IoT) there is significant security risk from loss of sensitive information on sensors and devices. Furthermore, with increasing communication channels there is an increased attack surface, so we are researching security protocol vulnerabilities and side channel attack and countermeasures. Research and innovation is also directed into Device Authentication, novel biometrics for access control, multi-factor authentication, hardware Trojan detection/prevention, novel approaches to mobile malware, secure virtualisation environments for Bring Your Own Device (BYOD) and robust Physical Unclonable Function (PUF) designs.

+ Securing Digital Citizens

Facilitators: Professor Tony Day, International Energy Research Centre (IERC) and Mark Crosbie, Facebook

With a pervasive computing landscape, people will be empowered within an active space that is aware of their presence, ubiquitous, sensitive, adaptive and responsive to their capabilities, needs, habits and emotions. CSIT is driving research and innovation into this area to provide secure active spaces that will encompass; social sensing and analytics, context aware data analytics and participatory sensing. This will use 'smart' data to provide a ‘next best action’ suggestion allowing the citizen to securely go where they want and engage with who they want, in the digital tomorrow.

+ Blue Skies Breakout Session

Facilitators: Dr Ulf Lindqvist, SRI International and Raj Samani, McAfee

What if?

From Wikipedia:

"Blue skies research (also called blue sky science) is scientific research in domains where "real-world" applications are not immediately apparent. It has been defined as "research without a clear goal" and "curiosity-driven science." It is sometimes used interchangeably with the term "basic research." Proponents of this mode of science argue that unanticipated scientific breakthroughs are sometimes more valuable than the outcomes of agenda-driven research, heralding advances in genetics and stem cell biology as examples of unforeseen benefits of research that was originally seen as purely theoretical in scope."

Belfast 2014 Summit Report
Belfast 2014 Briefing Document