Marnix Dekker works at ENISA, the EU agency for Cybersecurity, as NIS Directive coordinator and breach reporting team lead. Marnix will speak about cyber security breach reporting, a cornerstone of EU cybersecurity legislation. He will explain the approach, processes, tooling and experiences from 9 years of breach reporting in the telecom sector and discuss challenges and pitfalls. He will also discuss the new breach reporting under the NIS Directive and discuss some of the opportunities and challenges here.Additionally, at the end of the talk, he will give you a broader update on the overall cybersecurity policy landscape, discussing the new EECC, the status of the work under the NIS Directive, the work of the NIS Cooperation group, the 5G toolbox, and some details about the ongoing reviews of the NIS Directive and the eIDAS regulation.
Marnix works at ENISA, the European Union Agency for Cybersecurity, where he is the NIS Directive coordinator and the team lead for telecom security, cybersecurity breach reporting, and cloud security. He has a Ph.D. degree in Computer security and an M.Sc. degree in Theoretical physics, with a thesis in Quantum mechanics.
Previously, he worked at the European Commission’s CISO office, where he was responsible for the corporate IT security strategy, the corporate policy, and responsible for linking between operational security teams and the political level and press.
Before joining ENISA he worked as an IT auditor at KPMG in The Hague, as an IT architect and protocol designer for the Dutch government’s e-ID systems, as a software develoer in Pisa, as a university teacher, and as a sailor in the North Sea offshore.
All time indications are given in Central European Time (GMT+1)
Papers are available to conference participants here. Please note that these files are protected by copyright and are not inteded for distribution. Once the formal proceedings from Springer are ready, a link will appear here.
Keynote Prof. Elisa Bertino, Purdue UniversitySession chair: Simin Nadjm-Tehrani, Linköping University
Session 1: Malware and attacksSession chair: Magnus Almgren, Chalmers University
Session 2: Formal analysisSession chair: Rene Rydhof Hansen, Aalborg University
Keynote Dr. Marnix Dekker, ENISASession chair: Mikael Asplund, Linköping University
Session 3: Applied cryptographySession chair: Martin Hell, Lund University
|13.15-14.45||Session 4: Security mechanisms and training |
Session chair: Ville Leppännen, University of Turku
Session chair: Felipe Boeira, Linköping University
|15.15-16.30||Session 5: Applications and privacy
Session chair: Nils Gruschka, University of Oslo
NordSec is an annual research conference series that has been running since 1996. The NordSec conferences address a broad range of topics on IT security. The events bring together security researchers from the Nordic countries, Northern Europe, and beyond. In addition to being venue for academic publishing, NordSec is an important meeting place for university faculty, students, and industry experts from the region. The proceedings consist of peer-reviewed articles and are published in the Springer Lecture Notes in Computer Science series.
Nordsec 2020 will be arranged as a online conference with virtual participation.
NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. In addition to regular research paper submissions, we invite participants to present their current ideas and work-in-progress in a virtual poster session format.
Possible topics include, but are not limited to:
Contributions should reflect original research, developments, studies and experience. Submitted papers should not exceed 16 pages (including references and appendices) in Springer LNCS format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
We welcome poster submissions for Nordsec2020. Work-in-progress, visionary ideas, demonstrations, and practical experience reports that relate to the topics or Nordsec are of interest. Since the conference will be held online, we will hold a virtual poster session with a short presentation of all posters followed by individual presentation rooms where each poster slide is shown and participans can ask questions to the authors. Posters will be selected based on a four-page written summary (LNCS format).
The registration is now open! Conference registration fees are provided in the table below:
|Paper presenter||100 EUR*|
* The actual invoice will be in Swedish Krona with the equivalent sum
In order for us to be able to send you the connection information to the event, we ask you to register no later than Friday November 20. Later registrations will be processed as soon as we have time, but might mean missing large parts of the program.
The registration is done in Microsoft Forms using this link. Any personal data that you provide will be used solely for the purpose of conference organization and billing.
Please note that delegates representing a company or organization from a country outside of Sweden are NOT required to pay Swedish VAT on the registration fee. If you are from an EU country – a valid VAT number is mandatory, otherwise, VAT will be added. Private persons from Sweden are required to pay VAT on the registration fee (25%).
An invoice will be sent to the billing address that you provide. We are not able to accept credit card payments.
|Notification of acceptance:||2020-10-12|
|Poster submission deadline||
|Camera ready copy||2020-10-30|
|Author registration deadline||2020-10-30|
Selection of posters are made based on a four-page summary (LNCS format), and shoud not be anonymous. At the conference posters are presented using a one-slide presentation, followed by a break-out session discussion for each poster. Posters will appear on the conference web page, but will not be published in the proceedings.
Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
There are two options for the Consent-to-Publish form.
You need to submit three items.
All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission:
All submissions will be peer-reviewed by the program committee listed below.
Papers should be formatted using the Springer LNCS format and must be submitted online, in PDF format, via Easychair.
All previous conferences can be found here