Prof. Vassilis Prevelakis Keynote Speaker at a ESORICS 2019 workshop
September 26th, 2019 in Lyxembourg City
Prof. Vassilis Prevelakis invited as a Keynote Speaker for the IOSEC/MSTEC/FINSEC workshop
As part of the activities of the 24th edition of the European Symposium on Computer Security Research (ESORICS2019), AEGIS Director of Research, Prof Vassilis Prevelakis was invited as one of the Keynote Speakers of the IOSEC/MSTEC/FINSEC workshop about “Cybersecurity for the protection of critical infrastructures”.
Security for Financial Critical Infrastructures and Services — Information & Operational Technology Security Systems — Simulation and Training Environments for Cybersecurity workshop took place on September 26, 2019 in the Diekirch room of Parc Alvisse Hotel on the outskirts of Luxembourg city, and was one of the ESORICS 2019 activities.
Introduction of AEGIS Forensics Visualization Toolkit (FVT)
As the keynote speaker of the IOSEC-MSTEC-FINSEC workshop, Prof. Vasillis Prevelakis had the chance to introduce to the audience AEGIS Digital Forensics Service focusing on AEGIS Forensics Visualization Toolkit (FVT).
AEGIS FVT is a complete toolkit that aims to help investigators analyze security and privacy related incidents and react fast in cases of security breaches and threats. Such an advanced environment is presented in an easy to use and understandable way to the end users so as to help them embrace the offered features and understand the benefits of using such an ecosystem by removing the complexity of the underlying technologies. Therefore, the interface elements follow an intuitive and flexible design that can be adjusted to any device and allow the end users manage the monitoring of their industrial infrastructure, inspect the incidents that might occur and view generated statistics and insights. The securely and privacy-preserving stored data, analytics results, and user transactions are presented by advanced visualisations that can foster real-time threat hunting processes (empowered by correlation algorithms for almost real-time mitigation of security incidents) and post-mortem digital forensics investigations (including physical security-like incidents).