Monday Feb 1, 2021,
10h05 - 16h55 online using bigbluebutton. |
|
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
_
|
10h25 |
|
Introduction |
Cees de Laat |
|
|
|
10h30
|
66 |
Containerized deployment of SURFnet8 service layer
network. |
Pim Paardekooper, Inigo Gonzalez de Galdeano |
SURF |
1
|
|
10h55
|
|
Break
|
|
|
|
|
11h05 |
34 |
Analysis of a rarely implemented security feature:
signing Docker images with a Notary server.
|
Mohanad Elamin, Rio Kierkels |
KPMG
|
1
|
|
11h30 |
56 |
Analysis of a new privacy technology and its
implementation: Image Cloaking.
|
Simon Carton, Danny Janssen |
KPMG |
1
|
|
11h55 |
|
Lunch
|
|
|
|
|
13h05
|
14
|
Using a verifiable and decentralized ledger as a
basis for trusting hospital endpoints.
|
Matthijs Bartelink |
WhiteBox
|
1
|
|
13h30
|
6
|
Designing structured metadata for CVE reports.
|
Bart van Dongen |
Tjaldur |
1
|
|
13h55 |
|
Break |
|
|
|
|
14h05 |
41
|
Real time asset inventory in ICS. |
Artemis Mytilinaios |
Deloitte |
1
|
|
14h30 |
42
|
Improving availability in Industrial Control
Systems using Software-Defined Networking. |
Marios Andreou, Joris Jonkers Both |
Deloitte |
2
|
|
14h55 |
|
Break |
|
|
|
|
15h05 |
57
|
Certificate Authorities as a Service in the Cloud:
Is It Secure? |
Anand Groenewegen, Maurits Maas |
Deloitte |
1
|
|
15h30 |
31
|
Profiling (ab)user behavior of leaked credentials.
|
Maurice Mouw |
Deloitte |
1
|
|
15h55 |
|
Break |
|
|
|
|
16h05 |
27
|
Detection Real time video attack. |
Joris Janssen |
NFI |
1
|
|
16h30 |
67
|
Typo-tolerant authentication systems.
|
Philippe Partarrieu |
NFI |
1
|
|
16h55 |
|
Close
|
|
|
|
|