BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Identification and Investigation of Cyber Risk Hotspots in a Large
  Computer Network  - Shahzad Awan\, Cardiff University
DTSTART:20151103T140000Z
DTEND:20151103T150000Z
UID:TALK60890@talks.cam.ac.uk
CONTACT:Laurent Simon
DESCRIPTION:*Abstract:*\nQuantifying the risk of cyber-attacks due to soft
 ware applications on a computer network at any given time\, measuring the 
 impact of an attack\, and understanding attack patterns\, are complex and 
 challenging tasks. The complexity is compounded by an increasing number of
  networked devices being brought into modern networked environments on an 
 ad-hoc basis. Such devices often have a large number of software applicati
 ons (‘apps’) installed\, which can leave the devices\, and subsequentl
 y the whole network\, vulnerable to cyber threats. Given the vulnerabiliti
 es inherent in ‘apps’ running on these devices\, with new ones being d
 iscovered by cyber criminals on a daily basis\; and the variance in the se
 verity of an exploit\, conducting real-time risk assessments and determini
 ng the most pertinent risks to manage at any given time is far from straig
 htforward. A need arises for an effective\, cost-efficient and reliable me
 chanism for continuously monitoring and assessing risk arising due to soft
 ware applications. In this talk\, I will present a risk assessment framewo
 rk that could help in: i) identifying cyber-risk hotspots emerging over a 
 period of time in a computer network\; and ii) investigating the causes of
  emerging cyber risk hotspots associated with a particular software applic
 ation. A real-world case study will be used for validating the risk assess
 ment framework.\n\n*Bio:*\nShahzad Awan is a research associate in the Sch
 ool of Computer Science & Informatics at Cardiff University working on an 
 EPSRC funded project – “Identifying and modelling victim\, business\, 
 regulatory and malware behaviours in a changing cyber threat landscape”.
  His research interests include cybersecurity\, data mining/analysis\, big
  data and distributed systems. He holds a PhD in Computer Science from the
  University of Warwick\, UK.
LOCATION:Room FW26\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
