European Intelligence
and Security Informatics Conference (EISIC) 2019
November 26-27, 2019
University of Oulu, Oulu, Finland

The Premier European Conference on Counterterrorism and Criminology

Keynote Speakers

  • Dr. Marios Thoma
    Training Manager (Cyber), European Security and Defence College, Belgium

    Keynote: Cyber training activities of the European Security and Defence College

    During this presentation, we will introduce the European Security Defence College (ESDC) and its role in the EU Cyber Ecosystem. The ESDC is established as a network college, bringing together the existing national and international training institutes dealing with security and defence policy issues within the Union. In 2018, the existing mandate of the ESDC was broadened, and the Cyber Education Training Exercise and Evaluation (ETEE) Platform was created. Having analysed the EU cyber ecosystem and the training requirements on cyber of the Member States, a new model was identified regarding the training on cyber in ESDC. The model foresees that the Cyber ETEE Platform will deal with all cybersecurity domains, such as Cyber Crime, Network Information Security, Cyber Defence and External Relations.

  • Dr. Ian Oliver
    Nokia Bell Labs, Finland

    Keynote: Understanding Firmware Forensics using the Trusted Platform Module

    In this talk we present the Trusted Platform Module - TPM - and its role in the integrity of the boot sequence of devices, typically servers, laptops etc, but also extend this to IoT devices. By understanding what is being measured and how measurements can be trusted and utilised we can build an understanding of how firmware behaves, how changes to the firmware can be detected and how this can be used to protect the hardware and software running on those devices. We then explore notions and reasons of 'trust failure', how this is detected, techniques such as root cause analysis, failure model and effects analysis in this context and how mitigations can be constructed against firmware attacks. Finally we extend these concepts to supply-chain integrity and trust and show how integrity and trust could be utilised.

  • Prof. Juha Röning
    University of Oulu, Finland

    Keynote: AI: Trustworthy or not on software security?

    The National Institute of Standards and Technology plans to move to a vulnerability scoring method that uses IBM’s Watson artificial intelligence system by October 2019. So far, Watson stumbled when evaluating new and complex vulnerabilities. So AI is sneaking in to cyber security business, but does it make us stronger or more vulnerable. AI in its recent form and development is a powerful tool but contains some risks and ethical questions we should be aware and consider. We should not just trust learning AI methods like a magic black box. The decision-making should be “transparent”. We need to understand how it works and have command over it. At the same time, our officials’ main concern is not anymore that hackers will steal data, but that they will change data. This follows that users will unwittingly rely on false information. Recent terroristic attacks with common tools or equipment have resulted to demands to test products for abusability. Tech firms should foresee the unintended consequence of technology. What about the malicious use of AI. With this talk, I would like to raise the issues, how much one can trust AI-based decisions. What risks of autonomous response actions might have? Double blade of AI i.e. AI arms race between defenders and attackers.