• honeypotproject and Google Summer of Code, interested to participate

    The Honeynet Project was selected for this year's Google Summer of Code. If you are a student and interested in participating in the program, please take a look at There you will find all information about the projects related to the Honeynet Project. Google will begin accepting applications from students beginning today, thus you need to be quick.

  • presentation about cyberterrorism

    On 25th and 26 of March 2009, IBM will be participating to InfoSecurity/Storage Expo, one of the most comprehensive trade fairs for information security and storage professionals.

    On this occasion, IBM would be honoured to invite you to the presentation that John Pirc – an IBM Internet Security Systems specialist –will give on cyberterrorism:

    “Cyberterrorism: Fear, Disruption and Chaos"

    on Wednesday 25 March at 11.45-13.30

    Management Room – Room 1

    presentation by John Pirc, IBM ISS Product Line & Services Executive

    “Why a terrorist’s job is made easier by using the Internet” will be the starting point of the presentation of this former staff member of the U.S Intelligence Community. John Pirc will analyse how terrorists are using historical warfare principals to commit their actions. All this will be illustrated by recent user cases. Moreover, after his presentation John Pirc will be available at the IBM booth to discuss with you the latest trends in virtual security.

    Johan Beckers – IBM ISS Technology and services leader – will join him on the booth to answer all your questions regarding the latest security trends and technologies.

  • the first belgian security/hackers conference in september 09

    We support the initiative as another example that the IT debate in Belgium is finally opening and that the great wall between research and implementation is falling down bit by bit. We haven't breaken down this wall yet, but stone by stone we hope that one day critical debate and research will be a normal part of IT implementation and revision in Belgium, as will ITsecurity norms and certification.

    we hope also that Belgian researchers and activists will participate and bring or show the latest of their research or that international researcher will do the things some Belgians are afraid to do.

    we would like to remind them in case they are looking for Belgian stuff for their presentations that

    * we have freely downloadable open source middleware for EID

    * we have freely downloadable source code for EVOTING

    * we have RFID chips in our passports that some say is safe now

    * we have RFID chips in mobility cards in Brussels

    * we have one of the highest penetrations of TV by ADSL and broadband ADSL (wireless) in Europe in percentage

    We would also like to remind those reseachers that the Belgian law on cybercriminality is very vague and hard and that if necessary we can help them with responsable disclosure and all of that

    We hope that the numerous students and researchers will bring all of their creativity and intelligence to this conference so that the next security flaws can be shown as well the work arounds and patches that would be necessary.

  • hackerspace Brussels OpenWRT event 24/25 Brussels

    HackerSpace Brussels invites you to an open-to-all workshop:

    OpenWRT Weekend Camp / 24-25th of January 2009

    Florian and Nico, two OpenWRT developers from Paris, come over
    for a two days non-stop OpenWRT workshop.

    The weekend is open to all. Beginners and experts are welcome!

    The still evolving schedule:

    - install/configure/debug OpenWRT yourself
    - a chance to meetup with Belgium techies/geeks/hackers/girls/…
    - learn new ways to brick your router
    - have fun!

    Feel interested? Please signup!
    Send an email to
    on Doodle:  or leave your name on the wiki.

    We provide:

    - ASUS WL-HMD boxes (5 of those)
    - some bricked Linksys boxes, some non-bricked ones.
    - you can bring your own hardware to play with it
    - some place to lay down at night (though, take your sleepingbag etc)

    Food & drinks are available! The revenue helps us pay for the
    transport costs of the speakers…

    Location:  HackerSpace Brussels

    Feel free to drop by and have a beer!

  • Free Entry to LSEC New Years Event for our readers

    If that ain't a present.

    You can register for free as a reader of the Belsec blog for this event. It is an extra ordinary opportunity and a gift of 150 EURO's

    and don't forget to vote for the Belsec blog every day .... You can vote every day for 5 blogs (seriously not a scam although it is a system open to all kinds of scams....) 

    for more details see below

    and a happy new year to all of us, you will probably meet some of us, undercover or not.... :)  Just to warn you, so you don't say things on/off the record to be published or rumoured around here (joking or not ?)


  • 22th January LSEC new years event about storage and security

    Security Forum : Storage and Security A  LSEC New Year Event

    On January 22nd 2009, LSEC organizes its 4th Information Security Forum a conference that brings together some international experts from around the world to exchange ideas on the evolution and future of Information Security. This year the focus theme will be on Storage Security. Not only from a technical perspective, but also from a business and a management perspective we try to understand the evolutions of both worlds and where they meet up on a strategic level.

    We aim to present to a number of business leaders and Information Security professionals the changes and potential impacts for their business of these technologies that support the business operations on a day to day life, gaining increased importance.

    Leading technology companies such as EMC, IBM and Symantec have been making major acquisitions and have been spending quite an enormous amount of development on either security or storage technologies. From a business perspective, after a couple of years of operations, the business would like to get a better understanding of the evolutions of those developments and how the joined technologies can improve their business and operations. 

    10.30 : Registration & Welcome

    11.00 : Introduction of the day by Ulrich Seldeslachts, CEO LSEC

    11.15 : Opening address : outlining the issues on Storage and Security
    By Jim Hughes, SUN Microsystems Fellow and Vice President.

    Being the chair of the IEEE Forum on Storage Security, and within his role within SUN Microsystems, Jim has the key to enlighten us on the frameworks of both worlds, where they meet and how technology is evolving to support key business processes such as real-time massive storage access.

    During this opening address, Jim will set the scene and outline some of the issues, returning in the later part of the afternoon and evening on how to handle some of these concerns.

    From a technology perspective some of the following themes will be addressed : Cryptographic Algorithms for Storage, Key Management for Sector and File based Storage Systems, Balancing Usability, Performance and Security concerns, Unintended Data Recovery, Attacks on Storage Area Networks and Storage, Insider Attack Countermeasures, Security for Mobile Storage, Defining and Defending Trust Boundaries in Storage, Long-term storage, …)

    12.00 :  Sandwich Lunch

    12.30 : Storage Security Best Practices,
    by Gordon K. Arnold Product Manager, STSM
    (Technical Strategy Security and Storage Software)

    With optimization of storage resources based upon pooling of networked storage comes a number of vulnerabilities to your data. However, there are best practices for protecting your data in a cost-effective manner. This session surveys the techniques used to mitigate threats to your data and meet the requirements for auditing of storage operations. Innovative self-encrypting storage media and key management will be highlighted, including new full disk encrypting product announcements.

    Three keys elements that you will walk away with:
    1. What are the biggest threats to my data with networked storage?
    2. What are the best practices for securing my data?
    3. What are the practical lessons learned to make storage security cost-effective?

    About : Gordon Arnold is the strategy lead for encryption key management for IBM.  Gordon defines strategy and roadmaps for storage security, encryption and key management.   Gordon joined IBM through acquisition in 1994.  Prior to joining IBM he worked in a variety of technical and development management positions for e-mail and directory integration company Soft-Switch.  His focus in IBM has been on large scale Internet deployments, security, and for the last 6 years storage.  He was part of the core team which brought to market our storage virtualization offerings. Gordon has a BA in Liberal Arts and Sciences from the University of Illinois, over 25 years experience in IT products development, and holds the Senior Technical Staff Member grade in IBM.  He is currently chair of the Storage Security Industry Forum of SNIA.

    13.30 : Service as a Security Feature

    By Stephan Haux, Senior Product Manager EMEA, Iron Mountain Digital

    Every week we read about a data breach throughout Europe. It seems like a contradiction having the rapidly developing security technologies on the one hand and the more frequent and more severe data losses on the other hand. Looking closer into the incidents, you find that humans, processes and coincidence are causing them rather than technologies. “as a Service” does  provide a more comprehensive approach into protecting information against theft, loss or breach.

    ·         Exceptional case studies presenting data loss caused by employees, bad processes and pure coincidence.

    ·         The varying needs for protection throughout the life of information

    ·         360 degree promise of service – not only technology, but processes executed by professionals.

    ·         Examples of how only a service can secure information fully.

    About : Stephan Haux is a Senior Product Manager for EMEA at Iron Mountain Digital. Haux oversees EMEA activities for determining market requirements for going to market across Iron Mountain Digital’s product and service portfolio. Haux frequently speaks at events, briefs journalists and engages with the analyst community in all parts of the world. Before Haux joined Iron Mountain, he held various international positions with SAS, including Team Leader and Product Manager. With more than 20 years experience in IT and Marketing, covering areas from ERP, CRM, Business Intelligence and Performance Management, Haux is embarked for the ultimate challenge: Protecting the world’s information by Storage as a Service.

    14.30 : Coffee Break

    15.00 : Storage Security Best Practices
    By ir. Erik R. van Zuuren MBA is Senior Manager at Deloitte Enterprise Risk Services

    Organizations have become dependent on (the storage of) their electronic data and on (the processing of) their electronic transactions. This dependence and the need for protection of this data and the transactions is getting every day higher on the agenda, hence this seminar.

    However, data centers represent the central hubs for this data storage, information exchange and transaction processing. Therefore they are not to be forgotten in the context of an organization’s data & information storage- & security-strategy.

    Data center security is not solely focused on preventing data breaches. The security of a data center must protect the confidentiality, integrity, and availability of process and functions that depend on the data center. The security of the data center must address each type of threat, including those posed from humans, electronic data, and nature (i.e., the environment).  This expose will give an overview of the risk management & security-aspects which are required to sustain normal business operations and protect the business from harm.

    About : ir. Erik R. van Zuuren MBA is Senior Manager at Deloitte Enterprise Risk Services and has an extensive experience in Information Security Governance and Risk Management related disciplines, both at strategic and tactical level and has an extensive experience at C-level in the private sector and management- / cabinet-level in the public sector. ir. Erik R. van Zuuren MBA is active as consultant since over 10 years and since participated in and led a broad range of strategic and tactical projects mostly in Belgium and The Netherlands.

    15.45 Keynote - Virtual IT: A Strategy For Thriving In The Information Economy
    A holistic view on the future of storage and security by EMC.
    by Hans Timmerman, Technology Officer EMC Netherlands

    In this keynote by EMC, the leading Storage company it will become clear why they have acquired RSA with the specific goal in mind of Security and Storage. Include VM Ware to the table and a whole new paradigm presents itself what the future of Information Technology could look like. Learn about the view on the future by EMC/RSA.

    ·         The Need For Information Governance

    ·         New Focus on Information Risk Management

    ·         The Rise of Social Computing

    ·         The New Knowledge Worker

    ·         The Demand For Personal Information Control

    ·         The Deconstruction and Reconstruction of IT

    About : Prior to joining EMC The Netherlands beginning 2002, Hans was active in the Dutch Aerospace industry. He lead many years the manufacturing development at Fokker Aircraft  after which he held several management and director roles. During his career he has been a guest professor at several universities and was involved in various international IT and standardization projects. At EMC after having been responsible for the Professional Services and Pre-Sales, Hans today is Country Technology Officer and responsible for the ONE EMC view - for development and empowerment of both EMC’s local business development as for the existing Strategic Alliances and partnerships.

    17.10 : Welcome note to the evening sessions participants, Ulrich Seldeslachts, CEO LSEC

    17.15 : Keynote : Cross Border Data & Information Storage & Security
    by Erik Luysterbosch, Partner Deloite ERS

    When you are storing, hosting,  processing etc. (personal) data  you need to consider how to appropriately to manage the requirements and risks of applicable data protection and privacy laws, regulations and internal policy/contractual requirements. All of this needs to be done while ensuring that from a technical and procedural point of view the necessary tools are in place to protect and share such data efficiently. What are the key parameters in order to achieve such a balance ? How is it that implementation/usage of technology tools is often not sufficient to obtain data privacy ? What impact do data protection laws and regulations/contracts have on issues such as data leakage, data retention, data access etc .? What is this so-called security/privacy paradox and why is it relevant to storing/processing (personal) data in a (international) data centre ?  During this presentation we will shed some light on the above issues and how to manage them in a pragmatic manner. We will share with you some experiences and thoughts and suggest a “real life” checklist for dealing with a number of the major implications of these data protection issues and requirements.

    About : Erik Luysterborg  is a partner of Deloitte Enterprise Risk Services, operating out of the Brussels office. In his cross-functional client role, he heads up Deloitte’s data protection and privacy  services  both in Belgium and for the EMEA region. He also acts as the global Chief Privacy Officer for Deloitte Touche Thomatsu worldwide. He is a lawyer by training but runs an integrated  team of both lawyers and security & privacy experts who are specialized in ICT and data protection  related ICT and regulatory compliance services.  Erik is an active member of several global data privacy steering committees and has extensive experience in assisting clients regarding the cross border aspects of data protection including the outsourcing aspects thereof. He has a specific focus on both designing and implementing a pragmatic data protection strategy as well as providing hands on privacy solutions and advice on setting up manageable and auditable compliance structures within international organizations.

    18.15 : Closing Keynote : the future of storage and security explained

    By Jim Hughes, SUN Microsystems Fellow and Vice President.

    A glimpse in the future of storage and security and the world of information technology and systems. Jim will bring some of the key learning of the day and expands that into a view of technological developments in close contact with tomorrow’s business requirements. A view from the leading companies in technology of the world …

    19.15 : Closing Notes & LSEC activities in 2009 by Ulrich Seldeslachts, CEO of LSEC

    19.30 : Reception, Walking Dinner, Networking and Fun Activities

    22.00 : Close of Event

    Practical Details

    LSEC Security Forum – Storage & Security, LSEC New Years Event

    Brussels, Claridge, Leuvensesteenweg 24 in Brussels, Thursday January 22nd
    from 11h – 22.00h.

    Free to LSEC Members, KTN Cybersecurity Members, Teletrust Members, Pôle TEC and Agoria Members and by invitation
    Others Conference : 150 €, evening new year’s reception cordially invited

    Registration by sending a email with contact details to or online via :

    (after subscribing on the website first, next returning to the online page and pushing the subscribe button).


  • hack lu as if you were there yourself

    From our reporters-other security bloggers that were present 

    And another one

  • Brussels 27 november world e-parliament congress

    The World e-Parliament Conference 2008 will take place at the European Parliament in Brussels on 25 and 26 November 2008. The Conference is co-organized by the European Parliament and the Global Centre for ICT in Parliament, a joint initiative of the United Nations Department of Economic and Social Affairs (UNDESA) and the Inter-Parliamentary Union (IPU) and a core group of partners, established in 2006 to promote the role of parliaments in advancing the Information Society goals as well as the effective use of ICT for the modernization of parliamentary processes.

    The World e-Parliament Conference 2008 represents a unique opportunity for leaders and members of parliaments, parliamentary officials and experts to exchange views at a global level on new technologies and innovation as tools to strengthen the representative, legislative and oversight functions of regional and national assemblies.

    The Conference builds on the results of the World e-Parliament Conference 2007, held in Geneva in October 2007, and on the outcome of the World e-Parliament Report 2008, the first publication on this topic issued by the United Nations, the Inter-Parliamentary Union and the Global Centre for ICT in Parliament on 28 February 2008.

    The World e-Parliament Conference is aimed at parliamentarians, Secretaries General, parliamentary staff and officials of national and regional parliaments, experts from international organizations and academicians who work and deal with information and communication technologies as instruments to improve and modernize parliamentary business and citizens’ participation in public decision-making processes.

  • Identity Management : L-Sec Event 20th november

    LSEC Identity, Access and Information Management Conference 2008 part II

    Satisfied with the way you access your systems and information ?

    Earlier this year our IDM / IAM conference was directed toward Solutions based upon eID and Identity Management from a best practices and use case approach on a management perspective. During this seminar the objective is to focus more on the technical and implementation approaches, integration issues, products and solutions that allow for a successful result. User provisioning, user federation, directory services with a centralized command and control, what are limitations and expectations. How easily does the current technology allow to integrate with distributed systems and diversified user population.

    Thursday November 20th, Leuven : LSEC IDM & IAM Conference 2008 part II

    Register now at :

    Contributions from companies that have been invited such as : IS4U, Everett, eID Company, Vasco, Evidian, IBM, SUN Microsystems, KPMG, Deloitte, RSA - EMC, 4allNetworks, ACA-IT, Novell, Oracle, Vasco, …

    Preliminary Program

    8.30 : Registration & Welcome Coffee

    9.00 : Opening Notes

    by Ulrich Seldeslachts, CEO of LSEC
    Introducing the Identity Management Conference 2008 part II
    Introducing the LSEC eID white paper

    9.10 : Keynote : How Identity Management is evolving from actual business requirements

    “ A Unique approach to IAM projects”
    by Jordi Cuesta, Evidian Director Presales Support and Training

    About : , 46 years old is graduated from the University of Physics of Barcelona. He started his carrier in Bull Spain in the technical department. He moved to the Headquarters in France in 1993 to developed international business with vertical solutions dedicated to the Retail sector first and then in the Manufacturing sector with SAP and Baan. Joined Evidian in 2000 in his current function.

    10.10 : Practical considerations from major integration cases

    “The Identity Management Rollercoaster”
    by Jan Vanhaecht, IAM Architect, Deloitte Enterprise Risk Services

    Lots of Identity and Access Management (IAM) projects are being suspended or even halted.  Is IAM another bubble in the IT space that exploded?  Is IAM still relevant for your organization?  Do you still need “Single Sign On”?  At the same time, a renewed demand for IAM-functionality emerges.  The business requires IAM-functions to support their business. The risks of unauthorized access become ever clearer.  Demonstration of compliance to multiple regulations is needed. Etc.  Is the IAM hype finally over and is the real added value of IAM becoming clear?  During this presentation we will share with you some experience and thoughts and present to you the critical succesfactors to build your organisation’s working IAM-environment.

    About : Jan Vanhaecht is a leading IAM-architect at Deloitte Enterprise Risk Services and has an extensive practical experience in Identity, Access and Privilege management projects. During the past years, he had a leading role with an integrator in Identity, Access and Privilege management, where he build a team of experienced Identity, Access and Privilege Management engineers delivering multiple successful IAM Projects. Before joining Deloitte, Jan Vanhaecht regularly worked as consultant with most major IDM deployments, and is widely recognized for his knowledge and experience. In this role he was and still is in close contact with the product development teams.

    11.00 : Coffee Break & Networking

    11.30 : Technical and implementation approaches

    Single Sign On (SSO) project with an large Broadband, Telco and Cable TV Service Operator : challenges, opportunities and key learnings

    by Serge Craeys, ACA-IT

    12.20 : Keynote : Overview of results of European Identity & Access Management Survey

    “Insights and trends from over 200 European companies in different countries and sectors”
    by Benny Bogaerts, KPMG Advisory Services

    What is the status and maturity of identity and access management projects in European organizations.
    Find out the recent findings and benchmark some of the results with your own company’s objectives. From this survey it
    is clear that Identity Management is here to stay : there are (seperate) budgets, all participants started one or more IAM projects
    over the last three years, with main driver being process improvement.

    13.10 : Lunch Break

    14.00 : Limitations to provisioning and implemenations


    14.45 : Integrated Solutions based upon eID

    eID Company
    Vasco Data Security

    15.30 : Coffee Break

    16.00 : Best practices : use case

    Methodologies for Identity & Access Management Projects Best Practices
    by Sven Pauwels, Partner IS4U

    16.45 : Keynote : Implications to the future of identity management

    Implications of dealing with multiple electronic identities (or a single one)
    by Peter Valkenburg, CTO Everett - Author of the book
    “Identity Management, omgaan met electronische identiteiten” (Identity Management, dealing with electronic identities)

    17.30 : Panel discussion
    18.00 : Reception & Networking
    19.30 : Close of Seminar

    Practical Details

    LSEC & EEMA Identity, Access and Information Management Conference 2008 part II

    - Thursday November 20th, Leuven
    - Ubicenter, Leuven
    - Free to LSEC expert, enterprise and individual members (how to apply ?), LSEC vouchers, and LSEC partner members such as EEMA, Teletrust and KTN Cybersecurity Members
    - Subscribe before November 1st and receive a reduced entrance fee of 150 €
    - After November 1st, entrance fee will be 350 €

    For more information about this event or registration, please email to idm2008 @ or visit

    * SUBSCRIPTION PROCESS: In order to subcribe today to the events, you will be asked to enter your credentials to sign up as Member to the LSEC website if you hadn't already done so.  Once done you will allowed access to specific additional parts of the website in the future, and also be having an easier registration process for any of our future events.

    ** You have been receiving this email because you have participated in the past to one of our events, or have specifically signed-up to one of our communications. If you choose not to receive any email from us regarding our events in the future, please click here to have your email address to be removed from our records.

    For further information, please don't hesitate to contact the conference organizers.

    LSEC - Leaders In Security
    Kasteelpark Arenberg 10
    3001 Leuven ( Belgium)
    Tel:   32 16 32 85 41
    Fax:  +32 16 32 1969
    email :

  • 27 november London INternational workshop Privacy Enhancing Technologies

    You are invited to attend Europe's foremost independent seminar on privacy technologies in London on the 27th of November to discuss the growing success of privacy enhancing technologies (PETs) in modern society.

    The aim of this year's event is to demonstrate the reality of how PETs work - to discuss the barriers that are being overcome, the barriers that remain, and to share best practice that can facilitate further successful PET implementations.

    Organised by four of the UK's Knowledge Transfer Networks (KTN), A Fine Balance 2008 pushes the agenda of this international privacy debate further than ever before. A morning of presentations will include speakers across Europe including representatives from IBM Research, Microsoft EMEA, the Information Security Awareness Forum (ISAF) and the UK Department for Transport.

    The afternoon will comprise a series of chaired working sessions, each focusing on different areas related to securing the success of PETs in action. They will discuss and recommend areas for development, as well as isolating examples of best practice that could increase the number of successful implementations.

    Speakers and panellists include:

    The Earl of Errol - House of Lords

    Jan Camenisch - IBM Research

    Caspar Bowden - Chief Security Officer, Microsoft EMEA

    Professor Brian Collins - Chief Scientific Advisor, Department for Transport

    David King - Chair of the Information Security Awareness Forum (ISAF)

    Mike Hawkes - Director for Security, Mobile Data Association

    Attendance, including lunch and refreshments, is £75+VAT at the early bird rate, rising to £95+VAT on 30th September.

    we are interested in slides or reporting :)

  • London 6 & 7th november Conference about the Insider Threat

    'The Malicious Exploitation of Information Systems Countering the Rise of Insider Threat'

    Leading speakers from Europe and the US will attend the event, which will include insights from a former fraudster on issues such as sabotage, profiling offenders and the psychology of offenders. Confirmed speakers so far include Laurence Mulley from the Serious Organised Crime Agency (SOCA); Shari Lawrence Pfleeger from the RAND Corporation; Robert Coles from Merrill Lynch; Clive Blackwell from the Information
    Security Group, Royal Holloway, University of London; and Peter Sommer from the London School of Economics.

    Topics covered at the conference include:
    · how to conduct digital insider threat forensic investigations
    · effective use of post-insider threat incident analysis
    · improving security processes to avoid security threats
    · detecting malicious insider threat from behaviour patterns

    6th-7th November at UCL in London, please call Catherine Baker on: 0116 222 5550, or email:

    Will probably interest the banking industry in these hard times.

    We are interested in slides :)

  • European conference on data protection 15/17 october

    We, the President of the French Data Protection Authority (CNIL) and the German Federal Commissioner for Data Protection and Freedom of Information (BfDI) are happy to announce that our institutions will jointly organise this year's 30th International Conference in Strasbourg (France). The gala dinner of the Conference will be held in Baden-Baden (Germany). By holding this conference we want to celebrate the 30th anniversary of our institutions and the existence of our data protection laws.

    Therefore, we have the great pleasure to invite you cordially to the 30th International Data Protection Conference from 15-17 October 2008 under the motto : "Protecting privacy in a borderless world"

    If anyone has slides or papers, please send them to us


  • European Dialogue on Internet Governance 20/21 october 08

    Particular features and objektives of EuroDIG: 

    1. Platform to discuss and shape European multi-stakeholder perspectives on Internet governance (universal access, security, privacy and openness on the Internet, critical Internet resources).
    1. Priority given to moderated audience-led discussion (no formal presentations/powerpoints) between all stakeholders (representatives of business, civil society, governments, international organisations, etc.).
    1. Visibility to and linking of different European initiatives related to Internet governance, including planned European-led workshops held at the global Internet Governance Forum (IGF) 2008 in Hyderabad, India.
    1. Reach out to/for European actors who will not be able to participate in the 2008 IGF in India.
    1. Discuss future plans and initiatives for European dialogue on Internet governance. 
    1. Report back to the 2008 IGF in India about European perspectives and initiatives.

  • European workshop on personal data and borders 21/10/2008

    The European Commission organises on 21 October 2008 in Brussels a Workshop on International Transfers of Personal Data jointly with the Article 29 Data Protection Working Party - the independent EU Advisory Body on Data Protection and Privacy - and the United States Department of Commerce's International Trade Administration.

    This Workshop is a follow up of the previous Conferences held in Brussels in October 2006 and in Washington in October 2007 organised by the European Commission, the Working Party and the US Department of Commerce.

    More information on the programme. (PDF File 69 KB)

    For further information, please contact:

  • European Next Future Internet assembly december 2008

    The next Future Internet Assembly (FIA) is currently being prepared by the Organising Committee (OC) which includes representatives of the European Commission the European Technology Platforms and the concerned work groups.

    The final grouping of sessions and the planning for the FIA Madrid workshop is available. The structure brings as much as possible similar issues together, limiting the number of parallel streams.


  • Internet Governance Forum (IGF) meeting december 2008

    the Internet Governance Forum (IGF), run by the IGF Secretariat. Its purpose is to support the United Nations Secretary-General in carrying out the mandate from the World Summit on the Information Society (WSIS) with regard to convening a new forum for multi-stakeholder policy dialogue - the Internet Governance Forum (IGF).

    Invitation to the third IGF meeting by Under-Secretary-General Sha Zukang. The meeting is to be held in Hyderabad, India, from 3-6 December 2008.

    [NEW] Registration is now open.

    [NEW] A list of FAQs on the Hyderabad meeting is available here.

    A presentation given by the host country, showing the venue and giving information about the city can be viewed here. [ odp ] [ pdf ] [ ppt ]

  • Brussels 19 november ICT standarisation and patents

    19 November 2008
    IPR in ICT standardisation Workshop Brussels

    ICT standardisation is facing an increased impact from the inclusion of
    "patented" technologies in ICT standards and specifications which raises
    a number of questions to be addressed. For ICT standardisation to continue
    its role as a major instrument to support competitiveness, to increase interoperability and to respond to industry expectations and societal needs, an adequate balance has to be found between the need for standardised approaches and the interests of IPR owners. Standards developing organisations should be able to implement effective IPR policies while respecting the requirements of competition law.

    The European Commission is therefore organising a one-day workshop on intellectual property rights and ICT standards on 19 November in Brussels.

    for more information click on the following link

  • ENISA European CERT studies possibilities of DNSSEC, IPv6 and MPLS (Event in November)

    Recently a vulnerability of Domain Name System (DNS) caught a lot of media attention. A flaw in the DNS threatened to bring chaos to the Internet by poisoning the servers that translate domain names into Internet protocol addresses.

    The European Network and Information Security Agency, ENISA, is stock taking the policies and regulations that exist across the EU Member States, the measures operators take and the technologies available to improve the resilience (availability and integrity) of public eCommunication Networks. This work is undertaken in close collaboration with regulators, policy makers, network operators, network equipment vendors and academia.

    Three technologies, namely MPLS (Multiprotocol Label Switching), DNSSEC, IPv6, have been identified as promising to ensure this. To assess their effectiveness and identify potential problems or gaps that could compromise the availability of networks and services, the Agency is interviewing a number of network operators in the EU. The collected input will be analyzed, in direct consultation with all leading stakeholders, and lead to EU guidelines.

    The final results will be presented at an Agency workshop “Resilience of Public eCommunication Networks”, that will take place in Brussels, 12-13 November.


    Ulf Bergström, Press and Communications Officer, ENISA

    Tel: , Mob:

  • Online European Survey on Information Security Breaches you can participate in

    This survey coordinated by Loughborough University asks about the information security breaches you have experienced over the past 12 months at work. The survey takes 15 minutes to complete. Participation is completely voluntary, and the majority of questions are optional.

    If you have questions or comments about the survey, please contact Jen Mailley at +44 (0)1509 223616 or by email

  • Brussels Seminar on Engineering complex software services 16th october

    European Commission (EC) and the European Research Consortium for
    Informatics and Mathematics (ERCIM) seminar entitled:

    ‘Engineering Secure Complex Software Systems and Services’ taking place in Brussels on 16th October are available now.

    The event aims to share academic and industrial expertise in secure software engineering, to highlight best
    practice in the field, and increase the trustworthiness of the resulting ICT systems.

    The EC-ERCIM strategic seminar will:
    · present the latest progress on secure software research
    · encourage dialogue between scientists and industrial players from the field with a view to promoting
    · identify future key research challenges to be addressed

    The seminar is aimed at IT professionals, large companies, SME’s and academics. Further information can be found at: