European Intelligence
and Security Informatics Conference (EISIC) 2017
September 11-13, 2017
Dekelia Air Base, Attica, Greece

The Premier European Conference on Counterterrorism and Criminology

Keynote Speakers


  • Christos Douligeris
    University of Piraeus, Greece

    Christos Douligeris, currently a professor at the department of Informatics, University of Piraeus, Greece held positions with the Department of Electrical and Computer Engineering at the University of Miami. He was an associate member of the Hellenic Authority for Information and Communication Assurance and Privacy and the President and CEO Hellenic Electronic Governance for Social Security SA. Dr. Douligeris has published extensively in the networking scientific literature and he has participated in many research and development projects. He is the co-editor of a book on ''Network Security'' published by IEEE Press/ John Wiley and he is on the editorial boards of several scientific journals as well as on the technical program committees of major international conferences. He has been involved extensively in curriculum development both in the USA and Greece. His latest work has focused on the use of big data and artificial intelligence techniques in several areas, mainly in Telecommunications Planning and Management and in Security Analysis of Port Information Systems. Moreover, he has been working in data analytic techniques in Learning and Education and Emergency Response Operations.

    Keynote: Modelling of Supply Chain Service Systems' Security

    A Supply Chain Service (SCS) is a complex network of interconnected business partners, including all the information, processes and assets required for the movement of goods and the performance of services. However, the smooth operation of an SCS could suffer from interruptions and delays due to a variety of reasons ranging from acknowledged business and financial factors (e.g. frequent changes in business partners' leadership and demand uncertainty) to the exploitation of physical threats (e.g. bombing of a storage room) and/or cyber threats (e.g. gaining unauthenticated access to an alarm system and changing the alarm settings). Cyber threat exploitation results from the lack of implemented security controls, making the assets vulnerable to these threats.

    This lecture introduces a process-centric approach for modelling security concepts in order to improve Supply Chain sustainability. We focus on the Vehicle Transport Service (VTS) and we present a business-process oriented model. In order to show how security issues can be visualized we apply simulation techniques on the developed process models. The three model infrastructures are component materials of the MITIGATE EU project, which has a goal the development of a platform that provides risk assessment techniques in critical maritime cyber assets aiming to manage risks that could compromise the organization's information security.

  • Vishal M. Patel
    Rutgers University, USA

    Vishal M. Patel is an A. Walter Tyson Assistant Professor in the Department of Electrical and Computer Engineering at Rutgers University. Prior to joining Rutgers University, he was a member of the research faculty at the University of Maryland Institute for Advanced Computer Studies (UMIACS). He completed his Ph.D. in Electrical Engineering from the University of Maryland, College Park, MD, in 2010. His current research interests include signal processing, computer vision, and pattern recognition with applications in biometrics and imaging. He has received a number of awards including the 2016 Office of Naval Research (ONR) Young Investigator Award, the 2016 Jimmy Lin Award for Invention, A. Walter Tyson Assistant Professorship Award, the Best Paper Award at IEEE BTAS 2015, and Best Poster Awards at BTAS 2015 and 2016. He currently serves as a member of the Information Forensics and Security Technical Committee of the IEEE Signal Processing Society and Associate Editor of the IEEE Biometrics Compendium. He is a member of Eta Kappa Nu, Pi Mu Epsilon, and Phi Beta Kappa.

    Keynote: Active user authentication on mobile devices

    Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in use of mobile devices, one has to constantly worry about the security and privacy, as the loss of a mobile device would compromise personal information of the user. To deal with this problem, active authentication (also known as continuous authentication) systems have been proposed in which users are continuously monitored after the initial access to the mobile device. This talk will provide an overview of different continuous authentication methods on mobile devices. We will discuss merits and drawbacks of available approaches and identify promising avenues of research in this rapidly evolving field.

  • Georgios Papaprodromou
    Director, Cyber Crime Center of the Hellenic Police, Greece

    Police Director PAPAPRODROMOU Georgios was born in 1965 at Giannitsa Pellas. He joined the Hellenic Police in 1984. He served as an officer in numerous but also special services mainly in Northern Greece. He is a graduate of the Law Faculty of the Aristotle University of Thessaloniki. He is an expert as Forensic Document Examiner, having served since 1999 in the Laboratory Department of the Forensic Division of the Hellenic Police Headquarters. At the same time, he was the founder (2002) of the Laboratory of Forensic Document Examination in Forensic Subdivision of Northern Greece, in which he served until 2011. From 20-08-2015 until 26-05-2016 he served as Director of the newly-established Cyber Crime Subdivision of Northern Greece. From 27-05-2016 until today he is the Director of the Cyber Crime Division of the Hellenic Police Headquarters.

    He is a graduate of the Joint War College (12th Educational Series) as well as an e-student of the National Defense School (7th Educational Series). He has been trained, among other things, in Organization and Management and in new Information and Communication Technologies (ICT), on e-Government, Forensics, Radicalization, Civil Protection, Critical Infrastructure and anti-drug policies. He has taught courses in Public Institutes of Vocational Training and in various schools of the Police Academy. He speaks English and German. He is married, having two (2) children, students in the Department of Applied Informatics and in the Law Faculty, Aristotle University of Thessaloniki.

    Keynote: Effective Prevention and Investigation of Cybercrime

    During the lecture, the lecturer will analyze the mission and the goals of the Hellenic Police HQ Cybercrime Division, will emphasize on the offenses committed in the Cyberspace and present relevant statistics. The lecture will also include issues of the existing legal framework concerning the cybercrime, what is happening in Greece and in Europe. Finally, the lecturer will present the development of preventive and raise awareness actions carried out by the Hellenic Police HQ Cybercrime Division.

  • Spyros Papageorgiou
    Director, Cyber Defence Directorate, Hellenic National Defence General Staff, Greece

    Navy Captain Spyridon Papageorgiou, MSc (Computer Science), present Assignment: Director of Cyber Defense Directorate. Navy Captain Papageorgiou has significant experience (more than 16 years) in information security and cyber defense research and implementations. He is responsible for organizing National Cyber Defense Exersice and Cyber Defense School. He is GIAC Certified Security Professional (Incident Handling, Reversing Malware, System and Network Penetration Tester, Forensics analyst). He teaches as an expert in the University of Piraeus, Windows Forensics and System Penetration testing.

    Since 2013 he has been member of the red team in the Cyber Defense Exercise "LOCKED Shields", organized by the NATO Cooperative Cyber Defense Centre of Excellence. He is a regular speaker regarding cyber security and cyber defense presentations at Suprime Joint War College (ADISPO) and also at Hellenic National Defense College.

    Keynote: Hunting the cyber threats: Intelligence driven Incident response

    The adversaries are always steps ahead of us. They use unknown tools, tactics and procedures to compromise our systems and networks. Their goal is to steal our data. Our mission is to stop them completing their mission. In order to be close to them we must develop skills to defend actively our networks.

    Active defense is the reaction to an attack. It is not hack back. There is no security with out detection and no protection with out reaction. Active defense is the Intelligence driven Incident response. Deploying Intelligence driven Incident response we can respond to an incident both proactively by hunting the unknown threats and also reactively when an incident alert occurs. Working both proactively and reactively we are closer to the attackers and we reduce the amount of time, necessary to detect and locate advanced persistent threats (unknown threats).

  • Panel: Ethical Dilemmas in Intelligence Analaysis: Implications for Systems and Operations

    Chairs:
    B.L. William Wong, Middlesex University London, UK
    Ioanna Lakea, Hellenic Air Force Academy, Greece

    Panelists:

    Overview

    The field of ethics is concerned with the study of the concepts of right and wrong behaviour, and generally involves three broad subject areas: metaethics, normative ethics, and applied ethics. Metaethics investigates where our ethical principles come from, and what they mean; normative ethics refer to our study and determination of moral standards that regulate right and wrong conduct; while applied ethics involves the examination of specific controversial issues such as abortion, animal rights, environmental concerns. In this panel, we will identify and discuss ethics issues as they apply to a number of emergent challenges in the design and development of intelligence analysis systems, as well as during day-to-day operations of law enforcement and military officers. In many discussions on ethics, there is a tendency for the discussions to remain at a high level and surround the main principles of ethics, e.g. respect for autonomy, non-maleficence or do no harm, beneficence, and justice. In this panel, we present some concrete problems that emerged through our research in projects such as the FP7 VALCRI, as we seek to respect the rights of European citizens to liberty and security. These problems include the mosaic effect, protection of personal data, potential mis-use and abuse during information exploitation and analysis activities encountered during intelligence and investigative analysis. How should we design to ensure computational and analytic transparency in the decision-making processes? How we design systems and processes that are visible and open to inspection by colleagues and overseers? These are some issues that will be addressed by this Panel.