"],"_oembed_time_d97f76f8b433f402047bbc4059463872":["1516592792"],"_oembed_19676642f69e8af7344312c7428547f1":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure Information Technologies (CSIT) (@CSIT_QUB) March 19, 2015
"],"_oembed_time_19676642f69e8af7344312c7428547f1":["1516592793"],"_oembed_9d261893a48adbc88a46addbb51d0a90":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_9d261893a48adbc88a46addbb51d0a90":["1516592793"],"_wp_attachment_metadata":[""],"_oembed_58a58c42a8b1a757cce462d0a6d871ff":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_58a58c42a8b1a757cce462d0a6d871ff":["1523736023"],"_oembed_3b831404ef38597e2dfc0170a669959f":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
","

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
"],"_oembed_time_3b831404ef38597e2dfc0170a669959f":["1523736023","1523736024"],"_oembed_1b2134eecf9632bdd085d4b09743cf66":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
","

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_1b2134eecf9632bdd085d4b09743cf66":["1523736024","1523736024"],"_wp_page_template":["default"],"_yoast_wpseo_content_score":["30"],"post_doi":[""],"_post_doi":["post_doi"],"ampforwp_custom_content_editor":[""],"ampforwp_custom_content_editor_checkbox":[null],"ampforwp-amp-on-off":["default"],"ampforwp-redirection-on-off":["enable"],"_yoast_wpseo_primary_category":["221"],"_wpml_media_duplicate":["1"],"_wpml_media_featured":["1"],"_encloseme":["1"],"saswp_schema_type_product_pros_enable_cons":["0"],"_wpml_media_has_media":["1"],"_last_translation_edit_mode":["translation-editor"]}},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","streetAddress":"Französische Straße 9","addressLocality":"Berlin","addressRegion":"Berlin","PostalCode":"10117","addressCountry":"Germany"}},"baseSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"estimatedSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"title":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015","description":"One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast (QUB) took place. This year’s conference was underpinned by the theme \"A Future Legacy\" and was tied to Belfast’s heritage as a hub for industry and engineering. Among the more than hundred participants from academia, industry and governments, future technological developments and challenges were discussed. Specifically the societal element of cybersecurity was one of the core focuses of this year’s keynotes and break-out sessions, depicting a new as well as a necessary trend within the field.\r\nDay 0: Let the hacking begin\r\nOne day prior to the official start of the main Summit, attendees had the chance to engage in a capture the flag hackathon. Some Twitter-Posts display that the competitors took the task very seriously and - for once and officially - hacking was allowed and actually more than welcomed. Day 0 ended with a brief speaker’s session which involved Pizza and free drinks and hopefully comforted all the ones who lost or simply missed to eat throughout the day.\r\nNobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015\r\n\r\n— Cyberlytic (@CyberlyticUK) 18. März 2015\r\n\r\nSecurity means Resilience\r\nThe main Summit started on Thursday the 19th of March and opened with the announcement that CSIT at QUB had secured further funding for cyber security research on Smart Cities and the Internet of Things.\r\nProf John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf — CSIT (@CSIT_QUB) 19. März 2015\r\n\r\n\r\nWith this pleasant news in mind the event was kicked off by Professor John McCanny (CSIT), whereby in the course of the next days all speakers accentuated the importance to be able to assess, prevent and defeat cyber threats and to generate a robust and resilient internet based on adequate software and hardware solutions. Certainly methods such as detecting anomalies, conducting malware or behavioural analyses or simply monitoring access controls – which have been discussed and displayed at the Summit - are ways of dealing with the issue. However, the presenters were aware that not addressing the root causes of threats and risks will not provide sufficient solutions for the future. It is therefore that the aspects of human security and collaboration were prominent ideas across the Summit.\r\nThe Human Element in Cybersecurity\r\nThe factor human in cybersecurity ranges from the handling of insider threats, ensuring privacy and data protection, to the notion of victimology, up to the general needs and requirements of customers. The Summit took in this regard a specific interest in emphasising the individual, which was reflected in all presentations but was specifically discussed in the context of two break-out sessions which dealt with the topic of political activism and psychological dynamics online. Besides, as it is difficult to guarantee technical security despite the fallibility caused by human errors, the human element is and should be part of any cybersecurity equation.\r\n\"The weakest link in any secure system...in other words...the human\" - @maryCyPsy #cybersecurity #Belfast2015\r\n\r\n— Jonny Voon (@JonnyVoon) 19. März 2015\r\n\r\n\r\nThe inclusion of non-technical research areas at the Summit is therefore a positive development and should foster a debate on the progression of a multi- and transdisciplinary research field that touches upon both technical as well as societal factors. The just recently set up Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at QUB will hopefully influence this trend further.\r\nHow to Influence People To Care?\r\nAlign with the idea to focus more on the human element in cybersecurity considerations, speakers such as Jon Browning (OCSIA) stressed the need to get more people demand appropriate security solutions. This sentiment on making people aware of the importance of cybersecurity and to evaluate and be cautions about potential security risk online was followed by the request to involve more people in cybersecurity education and was specifically thematised by Dr Douglas Maughan (US DHS). A quick survey among the Summit participants in the course of his presentation revealed an age gap among the audience; less than ten people were under thirty years of age. This outcome reflects the overall cybersecurity sector which is facing a significant recruitment problem across all nation states and was noted by Maughan.\r\nCollaboration and Information Sharing\r\nThis idea of not being able to simply protect the internet and/or the human online was accompanied by the constant and reoccurring theme to engage in collaboration and information sharing. Zach Tudor (SRI International) and Suren Gupta (Allstate) articulated this issue as a prevalent topic in cyber protection and essential to proceed with future developments. This was echoed by Mark Schloesser (Rapid7) who in the course of his presentation referred to the Internet-Wide Scan Data Repository and Recog as positive examples of research data sharing and publicly archiving collected information. According to Schloesser the cybersecurity field has to embrace the community and reduce Intellectual Property while using Open Source Software where possible. This statement certainly set his presentation apart from the rest and highlights one of the first commitments and hopefully also future developments to the demand for collaboration expressed across the attendees.\r\nMy Personal Résumé\r\nOverall, the 5th Global Cybersecurity Technology Research Summit 2015 encompassed far more than the here outlined issues. The topics stretched from the successful setup and support of start-ups up to the governmental steps taken to implement cybersecurity in small and medium-sized enterprises. However, what I take away from these couple of days is certainly that companies seem to require and actually want users to demand security. It is therefore that we should not tolerate flawed and insufficiently debugged software and make our voice heard. Moreover, security should no longer be an opt-in option – neither for users nor the industry - but ensured and guaranteed by default.\r\n\r\nThis goes along with the need to shift the focus from a purely technical to an interdisciplinary research field that is able to address all factors which come into play when developing cybersecurity solutions. Social scientists and ethicists are needed to not let technology run ahead of itself, leaving major societal developments or problems aside. As we live in a digitalised society, but are most certainly not yet digital beings, the human has to be at the heart of all debates on and developments in cybersecurity. Treating the internet as a separate entity independent of society can simply not lead to favourable outcomes. Thus, all sectors of the cybersecurity field – academia, industry and policy makers – need to be committed to knowledge exchange which underlines the importance of events such as the Cybersecurity Summit in Belfast.\r\nFurther Links of Relevance:\r\n\r\n \tPhD opportunities with the Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at Queen’s University Belfast (Deadline: 1st April 2015)\r\n \tRepresentatives of the cybersecurity sector are invited to participate in my current study on the perceptions of digital disobedience in the context of the tech-industry. The Participant Information Sheet provides details on the scope and focus of the study and the data protection measures taken in this research.\r\n\r\nThis post is part of a weekly series of articles by doctoral canditates of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact info@hiig.de.","url":"https://www.hiig.de/en/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015/","employmentType":{"_edit_lock":["1530518214:194"],"_edit_last":["194"],"_thumbnail_id":["22411"],"_esft_meta":["none"],"waterdrops_options_array":["{\"waves\":\"2\"}"],"page_contacts":["a:2:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:0:\"\";}"],"_oembed_d97f76f8b433f402047bbc4059463872":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_d97f76f8b433f402047bbc4059463872":["1516592792"],"_oembed_19676642f69e8af7344312c7428547f1":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure Information Technologies (CSIT) (@CSIT_QUB) March 19, 2015
"],"_oembed_time_19676642f69e8af7344312c7428547f1":["1516592793"],"_oembed_9d261893a48adbc88a46addbb51d0a90":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_9d261893a48adbc88a46addbb51d0a90":["1516592793"],"_wp_attachment_metadata":[""],"_oembed_58a58c42a8b1a757cce462d0a6d871ff":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_58a58c42a8b1a757cce462d0a6d871ff":["1523736023"],"_oembed_3b831404ef38597e2dfc0170a669959f":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
","

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
"],"_oembed_time_3b831404ef38597e2dfc0170a669959f":["1523736023","1523736024"],"_oembed_1b2134eecf9632bdd085d4b09743cf66":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
","

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_1b2134eecf9632bdd085d4b09743cf66":["1523736024","1523736024"],"_wp_page_template":["default"],"_yoast_wpseo_content_score":["30"],"post_doi":[""],"_post_doi":["post_doi"],"ampforwp_custom_content_editor":[""],"ampforwp_custom_content_editor_checkbox":[null],"ampforwp-amp-on-off":["default"],"ampforwp-redirection-on-off":["enable"],"_yoast_wpseo_primary_category":["221"],"_wpml_media_duplicate":["1"],"_wpml_media_featured":["1"],"_encloseme":["1"],"saswp_schema_type_product_pros_enable_cons":["0"],"_wpml_media_has_media":["1"],"_last_translation_edit_mode":["translation-editor"]},"image":[{"@type":"ImageObject","@id":"https://www.hiig.de/en/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015/#primaryimage","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1920x1080.png","width":"1920","height":"1080"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x900.png","width":"1200","height":"900"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x675.png","width":"1200","height":"675"}]}] Skip to content
Cybersecurity
24 March 2015

Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015

One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast (QUB) took place. This year’s conference was underpinned by the theme “A Future Legacy” and was tied to Belfast’s heritage as a hub for industry and engineering. Among the more than hundred participants from academia, industry and governments, future technological developments and challenges were discussed. Specifically the societal element of cybersecurity was one of the core focuses of this year’s keynotes and break-out sessions, depicting a new as well as a necessary trend within the field.

Day 0: Let the hacking begin

One day prior to the official start of the main Summit, attendees had the chance to engage in a capture the flag hackathon. Some Twitter-Posts display that the competitors took the task very seriously and – for once and officially – hacking was allowed and actually more than welcomed. Day 0 ended with a brief speaker’s session which involved Pizza and free drinks and hopefully comforted all the ones who lost or simply missed to eat throughout the day.

Security means Resilience

The main Summit started on Thursday the 19th of March and opened with the announcement that CSIT at QUB had secured further funding for cyber security research on Smart Cities and the Internet of Things.

With this pleasant news in mind the event was kicked off by Professor John McCanny (CSIT), whereby in the course of the next days all speakers accentuated the importance to be able to assess, prevent and defeat cyber threats and to generate a robust and resilient internet based on adequate software and hardware solutions. Certainly methods such as detecting anomalies, conducting malware or behavioural analyses or simply monitoring access controls – which have been discussed and displayed at the Summit – are ways of dealing with the issue. However, the presenters were aware that not addressing the root causes of threats and risks will not provide sufficient solutions for the future. It is therefore that the aspects of human security and collaboration were prominent ideas across the Summit.

The Human Element in Cybersecurity

The factor human in cybersecurity ranges from the handling of insider threats, ensuring privacy and data protection, to the notion of victimology, up to the general needs and requirements of customers. The Summit took in this regard a specific interest in emphasising the individual, which was reflected in all presentations but was specifically discussed in the context of two break-out sessions which dealt with the topic of political activism and psychological dynamics online. Besides, as it is difficult to guarantee technical security despite the fallibility caused by human errors, the human element is and should be part of any cybersecurity equation.

The inclusion of non-technical research areas at the Summit is therefore a positive development and should foster a debate on the progression of a multi- and transdisciplinary research field that touches upon both technical as well as societal factors. The just recently set up Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at QUB will hopefully influence this trend further.

How to Influence People To Care?

Align with the idea to focus more on the human element in cybersecurity considerations, speakers such as Jon Browning (OCSIA) stressed the need to get more people demand appropriate security solutions. This sentiment on making people aware of the importance of cybersecurity and to evaluate and be cautions about potential security risk online was followed by the request to involve more people in cybersecurity education and was specifically thematised by Dr Douglas Maughan (US DHS). A quick survey among the Summit participants in the course of his presentation revealed an age gap among the audience; less than ten people were under thirty years of age. This outcome reflects the overall cybersecurity sector which is facing a significant recruitment problem across all nation states and was noted by Maughan.

Collaboration and Information Sharing

This idea of not being able to simply protect the internet and/or the human online was accompanied by the constant and reoccurring theme to engage in collaboration and information sharing. Zach Tudor (SRI International) and Suren Gupta (Allstate) articulated this issue as a prevalent topic in cyber protection and essential to proceed with future developments. This was echoed by Mark Schloesser (Rapid7) who in the course of his presentation referred to the Internet-Wide Scan Data Repository and Recog as positive examples of research data sharing and publicly archiving collected information. According to Schloesser the cybersecurity field has to embrace the community and reduce Intellectual Property while using Open Source Software where possible. This statement certainly set his presentation apart from the rest and highlights one of the first commitments and hopefully also future developments to the demand for collaboration expressed across the attendees.

My Personal Résumé

Overall, the 5th Global Cybersecurity Technology Research Summit 2015 encompassed far more than the here outlined issues. The topics stretched from the successful setup and support of start-ups up to the governmental steps taken to implement cybersecurity in small and medium-sized enterprises. However, what I take away from these couple of days is certainly that companies seem to require and actually want users to demand security. It is therefore that we should not tolerate flawed and insufficiently debugged software and make our voice heard. Moreover, security should no longer be an opt-in option – neither for users nor the industry – but ensured and guaranteed by default.

This goes along with the need to shift the focus from a purely technical to an interdisciplinary research field that is able to address all factors which come into play when developing cybersecurity solutions. Social scientists and ethicists are needed to not let technology run ahead of itself, leaving major societal developments or problems aside. As we live in a digitalised society, but are most certainly not yet digital beings, the human has to be at the heart of all debates on and developments in cybersecurity. Treating the internet as a separate entity independent of society can simply not lead to favourable outcomes. Thus, all sectors of the cybersecurity field – academia, industry and policy makers – need to be committed to knowledge exchange which underlines the importance of events such as the Cybersecurity Summit in Belfast.

Further Links of Relevance:

  • PhD opportunities with the Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at Queen’s University Belfast (Deadline: 1st April 2015)
  • Representatives of the cybersecurity sector are invited to participate in my current study on the perceptions of digital disobedience in the context of the tech-industry. The Participant Information Sheet provides details on the scope and focus of the study and the data protection measures taken in this research.

This post is part of a weekly series of articles by doctoral canditates of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact info@hiig.de.

This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

Leonie Maria Tanczer

Former Fellow: Global Constitutionalism and the Internet

Sign up for HIIG's Monthly Digest

and receive our latest blog articles.

Further articles

two Quechuas, sitting on green grass and looking at their smartphones, symbolising What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies

Exploring digitalisation: Indigenous perspectives from Puno, Peru

What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies.

eine mehrfarbige Baumlandschaft von oben, die eine bunte digitale Publikationslandschaft symbolisiert

Diamond OA: For a colourful digital publishing landscape

The blog post raises awareness of new financial pitfalls in the Open Access transformation and proposes a collaborative funding structure for Diamond OA in Germany.

a pile of crumpled up newspapers symbolising the spread of disinformation online

Disinformation: Are we really overestimating ourselves?

How aware are we of the effects and the reach of disinformation online and does the public discourse provide a balanced picture?