{"id":22410,"date":"2015-03-24T11:31:06","date_gmt":"2015-03-24T09:31:06","guid":{"rendered":"https:\/\/www.hiig.de\/?p=22410"},"modified":"2023-03-28T16:54:04","modified_gmt":"2023-03-28T14:54:04","slug":"berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/","title":{"rendered":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015"},"content":{"rendered":"<p>One week ago, the <a href=\"http:\/\/www.csit.qub.ac.uk\/News\/Events\/Belfast2015\/\" target=\"_blank\" rel=\"noopener\">5th Global Cybersecurity Technology Research Summit<\/a> organised by the Centre for Secure Information Technologies (<a href=\"http:\/\/www.csit.qub.ac.uk\" target=\"_blank\" rel=\"noopener\">CSIT<\/a>) at Queen\u2019s University Belfast (<a href=\"http:\/\/www.qub.ac.uk\/\" target=\"_blank\" rel=\"noopener\">QUB<\/a>) took place. This year\u2019s conference was underpinned by the theme &#8220;A Future Legacy&#8221; and was tied to Belfast\u2019s heritage as a hub for industry and engineering. Among the more than hundred participants from academia, industry and governments, future technological developments and challenges were discussed. Specifically the societal element of cybersecurity was one of the core focuses of this year\u2019s keynotes and break-out sessions, depicting a new as well as a necessary trend within the field.<\/p>\n<h3>Day 0: Let the hacking begin<\/h3>\n<p>One day prior to the official start of the main Summit, attendees had the chance to engage in a capture the flag hackathon. Some Twitter-Posts display that the competitors took the task very seriously and &#8211; for once and officially &#8211; hacking was allowed and actually more than welcomed. Day 0 ended with a brief speaker\u2019s session which involved Pizza and free drinks and hopefully comforted all the ones who lost or simply missed to eat throughout the day.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"de\"><p>Nobody has gone up for sandwiches yet! The hackers are too busy hacking &#8211; food is an unwanted distraction! <a href=\"https:\/\/twitter.com\/hashtag\/Belfast2015?src=hash\">#Belfast2015<\/a><\/p>\n<p>\u2014 Cyberlytic (@CyberlyticUK) <a href=\"https:\/\/twitter.com\/CyberlyticUK\/status\/578171783821586433\">18. M\u00e4rz 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<h3>Security means Resilience<\/h3>\n<p>The main Summit started on Thursday the 19<sup>th<\/sup> of March and opened with the <a href=\"#d.en.490239\" target=\"_blank\" rel=\"noopener\">announcement<\/a> that CSIT at QUB had secured further funding for cyber security research on Smart Cities and the Internet of Things.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"de\"><p>Prof John McCanny kicking off proceedings at <a href=\"https:\/\/twitter.com\/hashtag\/Belfast2015?src=hash\">#Belfast2015<\/a> with \u00a338 million announcement of funding for next 5 years <a href=\"http:\/\/t.co\/sl6BeTlWaf\">pic.twitter.com\/sl6BeTlWaf<\/a> \u2014 CSIT (@CSIT_QUB) <a href=\"https:\/\/twitter.com\/CSIT_QUB\/status\/578511821579096064\">19. M\u00e4rz 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<p>With this pleasant news in mind the event was kicked off by Professor John McCanny (CSIT), whereby in the course of the next days all speakers accentuated the importance to be able to assess, prevent and defeat cyber threats and to generate a robust and resilient internet based on adequate software and hardware solutions. Certainly methods such as detecting anomalies, conducting malware or behavioural analyses or simply monitoring access controls \u2013 which have been discussed and displayed at the Summit &#8211; are ways of dealing with the issue. However, the presenters were aware that not addressing the root causes of threats and risks will not provide sufficient solutions for the future. It is therefore that the aspects of human security and collaboration were prominent ideas across the Summit.<\/p>\n<h3>The Human Element in Cybersecurity<\/h3>\n<p>The factor human in cybersecurity ranges from the handling of insider threats, ensuring privacy and data protection, to the notion of victimology, up to the general needs and requirements of customers. The Summit took in this regard a specific interest in emphasising the individual, which was reflected in all presentations but was specifically discussed in the context of two break-out sessions which dealt with the topic of political activism and psychological dynamics online.\u00a0Besides, as it is difficult to guarantee technical security despite the fallibility caused by human errors, the human element is and should be part of any cybersecurity equation.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"de\"><p>&#8220;The weakest link in any secure system&#8230;in other words&#8230;the human&#8221; &#8211; <a href=\"https:\/\/twitter.com\/maryCyPsy\">@maryCyPsy<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash\">#cybersecurity<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Belfast2015?src=hash\">#Belfast2015<\/a><\/p>\n<p>\u2014 Jonny Voon (@JonnyVoon) <a href=\"https:\/\/twitter.com\/JonnyVoon\/status\/578554361065930752\">19. M\u00e4rz 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<p>The inclusion of non-technical research areas at the Summit is therefore a positive development and should foster a debate on the progression of a multi- and transdisciplinary research field that touches upon both technical as well as societal factors. The just recently set up Leverhulme Interdisciplinary Network on Cybersecurity and Society (<a href=\"http:\/\/www.qub.ac.uk\/research-centres\/isctsj\/News\/Title,487256,en.html\" target=\"_blank\" rel=\"noopener\">LINCS<\/a>) at QUB will hopefully influence this trend further.<\/p>\n<h3>How to Influence People To Care?<\/h3>\n<p>Align with the idea to focus more on the human element in cybersecurity considerations, speakers such as Jon Browning (<a href=\"https:\/\/www.gov.uk\/government\/groups\/office-of-cyber-security-and-information-assurance\" target=\"_blank\" rel=\"noopener\">OCSIA<\/a>) stressed the need to get more people demand appropriate security solutions. This sentiment on making people aware of the importance of cybersecurity and to evaluate and be cautions about potential security risk online was followed by the request to involve more people in cybersecurity education and was specifically thematised by Dr Douglas Maughan (<a href=\"http:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener\">US DHS<\/a>). A quick survey among the Summit participants in the course of his presentation revealed an age gap\u00a0among the audience; less than ten people were under thirty years of age. This outcome reflects the overall cybersecurity sector which is facing a significant recruitment problem across all nation states and was noted by Maughan.<\/p>\n<h3>Collaboration and Information Sharing<\/h3>\n<p>This idea of not being able to simply protect the internet and\/or the human online was accompanied by the constant and reoccurring theme to engage in collaboration and information sharing. Zach Tudor (<a title=\"SRI International \" href=\"http:\/\/www.sri.com\/\" target=\"_blank\" rel=\"noopener\">SRI International<\/a>) and Suren Gupta (<a title=\"Allstate\" href=\"https:\/\/www.allstate.com\/\" target=\"_blank\" rel=\"noopener\">Allstate<\/a>) articulated this issue as a prevalent topic in cyber protection and essential to proceed with future developments. This was echoed by Mark Schloesser (<a href=\"http:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"noopener\">Rapid7<\/a>) who in the course of his presentation referred to the <a href=\"https:\/\/scans.io\/\" target=\"_blank\" rel=\"noopener\">Internet-Wide Scan Data Repository<\/a> and <a href=\"https:\/\/github.com\/rapid7\/recog\" target=\"_blank\" rel=\"noopener\">Recog<\/a> as positive examples of research data sharing and publicly archiving collected information. According to Schloesser the cybersecurity field has to embrace the community and reduce Intellectual Property while using Open Source Software where possible. This statement certainly set his presentation apart from the rest and highlights one of the first commitments and hopefully also future developments to the demand for collaboration expressed across the attendees.<\/p>\n<h3>My Personal R\u00e9sum\u00e9<\/h3>\n<p>Overall, the 5th Global Cybersecurity Technology Research Summit 2015 encompassed far more than the here outlined issues. The topics stretched from the successful setup and support of start-ups up to the governmental steps taken to implement cybersecurity in small and medium-sized enterprises. However, what I take away from these couple of days is certainly that companies seem to require and actually want users to demand security. It is therefore that we should not tolerate flawed and insufficiently debugged software and make our voice heard. Moreover, security should no longer be an opt-in option \u2013 neither for users nor the industry &#8211; but ensured and guaranteed by default.<\/p>\n<p>This goes along with the need to shift the focus from a purely technical to an interdisciplinary research field that is able to address all factors which come into play when developing cybersecurity solutions. Social scientists and ethicists are needed to not let technology run ahead of itself, leaving major societal developments or problems aside. As we live in a digitalised society, but are most certainly not yet digital beings, the human has to be at the heart of all debates on and developments in cybersecurity. Treating the internet as a separate entity independent of society can simply not lead to favourable outcomes.\u00a0Thus, all sectors of the cybersecurity field \u2013 academia, industry and policy makers \u2013 need to be committed to knowledge exchange which underlines the importance of events such as the Cybersecurity Summit in Belfast.<\/p>\n<h3>Further Links of Relevance:<\/h3>\n<ul>\n<li>PhD opportunities with the Leverhulme Interdisciplinary Network on Cybersecurity and Society (<a href=\"http:\/\/www.qub.ac.uk\/research-centres\/isctsj\/Study\/PhDScholarshipOpportunities2015\/LeverhulmeLINCSPhDScholarshipOpportunities\/\" target=\"_blank\" rel=\"noopener\">LINCS<\/a>) at Queen\u2019s University Belfast (Deadline: 1st April 2015)<\/li>\n<li>Representatives of the cybersecurity sector are invited to participate in my current study on the perceptions of digital disobedience in the context of the tech-industry. The <a href=\"https:\/\/dl.dropboxusercontent.com\/u\/13677106\/TANCZER_ParticipantInformationSheet_Study1.pdf\" target=\"_blank\" rel=\"noopener\">Participant Information Sheet <\/a>provides details on the scope and focus of the study and the data protection measures taken in this research.<\/li>\n<\/ul>\n<h4>This post is part of a weekly series of articles by doctoral canditates of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact\u00a0<a href=\"mailto:info@hiig.de\">info@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fberlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Berlin%20meets%20Belfast%3A%20A%20Recap%20of%20the%205th%20Global%20Cybersecurity%20Technology%20Research%20Summit%202015 https%3A%2F%2Fwww.hiig.de%2Fen%2Fberlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fberlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015%2F&subject=Berlin%20meets%20Belfast%3A%20A%20Recap%20of%20the%205th%20Global%20Cybersecurity%20Technology%20Research%20Summit%202015\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen\u2019s University Belfast (QUB) took place. This year\u2019s conference was underpinned by the theme &#8220;A Future Legacy&#8221; and was tied to Belfast\u2019s heritage as a hub for industry and engineering. Among the more than hundred&hellip;<\/p>\n","protected":false},"author":85,"featured_media":22411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[226],"tags":[],"class_list":["post-22410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015 &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015 &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen\u2019s University Belfast (QUB) took place. This year\u2019s conference was underpinned by the theme &#8220;A Future Legacy&#8221; and was tied to Belfast\u2019s heritage as a hub for industry and engineering. Among the more than hundred&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-24T09:31:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T14:54:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2015\/03\/castle-538722_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leonie Tanczer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leonie Tanczer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015 &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/","og_locale":"en_US","og_type":"article","og_title":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015 &#8211; Digital Society Blog","og_description":"One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen\u2019s University Belfast (QUB) took place. This year\u2019s conference was underpinned by the theme &#8220;A Future Legacy&#8221; and was tied to Belfast\u2019s heritage as a hub for industry and engineering. Among the more than hundred&hellip;","og_url":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/","og_site_name":"HIIG","article_published_time":"2015-03-24T09:31:06+00:00","article_modified_time":"2023-03-28T14:54:04+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2015\/03\/castle-538722_1920.jpg","type":"image\/jpeg"}],"author":"Leonie Tanczer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leonie Tanczer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/"},"author":{"name":"Leonie Tanczer","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/3fb8f4c69954cacf3f20fec7e4459157"},"headline":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015","datePublished":"2015-03-24T09:31:06+00:00","dateModified":"2023-03-28T14:54:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/"},"wordCount":1252,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Knowledge"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/","url":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/","name":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015 &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2015-03-24T09:31:06+00:00","dateModified":"2023-03-28T14:54:04+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/berlin-meets-belfast-a-recap-of-the-5th-global-cybersecurity-technology-research-summit-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/3fb8f4c69954cacf3f20fec7e4459157","name":"Leonie Tanczer","sameAs":["https:\/\/www.hiig.de"]}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/22410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=22410"}],"version-history":[{"count":14,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/22410\/revisions"}],"predecessor-version":[{"id":49484,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/22410\/revisions\/49484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/22411"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=22410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=22410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=22410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}