Logo INTERSCT. stakeholder engagement network



HOME

ABOUT

CONSORTIUM

BLOG

CONTACT

Governance

Advisory Board

Davide Balzarotti

Davide Balzarotti

Professor at EURECOM

Davide Balzarotti is a Professor and head of the Software and System Security group at Eurecom. He received his Ph.D. from Politecnico di Milano in 2006 and his research interests include most aspects of system security and in particular the areas of binary and malware analysis, reverse   engineering, embedded system security, computer forensics, and web security. He authored more than 100 publications in leading conferences and journals. He has been the Program Chair ACSAC 2017,  RAID 2012, and Eurosec 2014 and he is a member of the editorial board of the IEEE   Security & Privacy Magazine. He received in 2017 an ERC Consolidator Grant for his research in the analysis of compromised systems. He is also member of the “Order of the Overflow” team that organizes the DEF CON CTF competition.

» Read More

Lee A. Bygrave

Lee A. Bygrave

Professor at University of Oslo

Prof. dr. Lee A. Bygrave is professor at the Department of Private Law, University of Oslo, where he is Director of the Norwegian Research Center for Computers and Law (NRCCL). He currently heads two major research projects at the NRCCL: VIROS (‘Vulnerability in the Robot Society’), which canvasses legal and ethical implications of AI-empowered robotics; and SIGNAL (‘Security in Internet Governance and Networks: Analysing the Law’), which studies transnational changes in the legal frameworks for security of critical internet infrastructure and cloud computing. Lee has published particularly extensively within the fields of data protection law and internet governance. His most significant work of recent times is a comprehensive article-by-article analysis of the EU General Data Protection Regulation – The EU General Data Protection Regulation (GDPR): A Commentary (Oxford University Press 2020), which he co-edited and co-wrote.

» Read more

One of the chief challenges in achieving adequate IoT security is getting all actors involved in developing and disseminating IoT products to take the nascent regulatory principle of ‘security by design’ seriously and, concomitantly, to understand that such design is not a one-off step but an ongoing iterative process demanding considerable investment.

Lee A. Bygrave

Professor, University of Oslo

Lorrie Cranor

Lorrie Cranor

Professor at Carnegie Melon University

Prof. dr. Lorrie Faith Cranor is the Director and Bosch Distinguished Professor of the CyLab Security and Privacy Institute and FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. She also directs the CyLab Usable Privacy and Security Laboratory (CUPS) and co-directs the MSIT-Privacy Engineering masters program. In 2016 she served as Chief Technologist at the US Federal Trade Commission. She co-founded Wombat Security Technologies, a security awareness training company that was acquired by Proofpoint. She is a fellow of the ACM and IEEE and a member of the ACM CHI Academy.

» Read more

Thorsten Holz

Thorsten Holz

Professor at Ruhr-Universität Bochum

Prof. dr. Thorsten Holz is pro­fes­sor in Systems Security at the Fa­cul­ty of Elec­tri­cal En­gi­nee­ring and In­for­ma­ti­on Tech­no­lo­gy at Ruhr-Uni­ver­si­ty Bo­chum, Ger­ma­ny. His re­se­arch in­te­rests in­clu­de tech­ni­cal as­pects of se­cu­re sys­tems, with a spe­ci­fic focus on sys­tems se­cu­ri­ty. Cur­rent­ly, his work con­cen­tra­tes on re­ver­se en­gi­nee­ring, au­to­ma­ted vul­nerabi­li­ty de­tec­tion, and stu­dy­ing la­test at­tack vec­tors. He re­cei­ved the Dipl.-In­form. de­gree in Com­pu­ter Sci­ence from RWTH Aa­chen, Ger­ma­ny (2005), and the Ph.D. de­gree from Uni­ver­si­ty of Mann­heim (2009). Prior to joi­ning Ruhr-Uni­ver­si­ty Bo­chum in April 2010, he was a post­doc­to­ral re­se­ar­cher in the Au­to­ma­ti­on Sys­tems Group at the Tech­ni­cal Uni­ver­si­ty of Vi­en­na, Aus­tria. In 2011, Thors­ten re­cei­ved the Heinz Mai­er-Leib­nitz Prize from the Ger­man Re­se­arch Fo­un­da­ti­on (DFG) and in 2014 an ERC Star­ting Grant. Fur­ther­mo­re, he is Co-Spo­kes­per­son of the Clus­ter of Ex­cel­lence “CASA – Cyber Se­cu­ri­ty in the Age of Lar­ge-Sca­le Ad­ver­sa­ries” (with C. Paar and E. Kiltz).

» Read more

Kees van der Klauw

Kees van der Klauw

Dr. Kees van der Klauw graduated from the department of Electronics Engineering of Delft University of Technology in the Netherlands and received a Ph.D. in the area of semiconductor devices (CCD’s) in 1987. During his professional career, he has contributed to and has led several digital transformations and innovations inside and outside Philips. He joined Philips Research in 1987 where he worked several years on the design and characterization of CMOS devices and processes in the analogue to digital transition in microelectronics. In 1992 he moved to Philips’ Flat Panel Displays where he held positions in project management, engineering-, operations- and general management of Philips LCD activities and was involved in the establishment of Philips’ LCD joint ventures in Japan and Korea. Subsequently he worked for nearly 10 years in Philips Consumer Electronics as development manager and CTO for Philips Television, Monitors and Professional Display Business during which period TV’s and business transformed to ‘flat, digital, high speed and on-line’. He joined Philips Lighting in 2009, where he was the Chief Architect and the R&D Manager for Professional Lighting Solutions driving the transition to LED lighting and Internet-of-Things. From October 2013, he has been the Head of the Research for Philips Lighting and he played a key role in the split off of Philips Lighting, now Signify.
During this period Kees was also a driving force in the establishment of the Alliance for Internet of Things Innovation (AIOTI) and he was the first elected chairman. 

Starting in 2018, Kees now runs his own Innovation Consultancy Company, InnoAdds and is engaged with digital innovation in various areas. He is currently leading the Netherlands AI Coalition NL AIC, engaging over 400 parties from business, government, education and science and society, building a national artificial intelligence ecosystem.

Evangelos Markatos

Evangelos Markatos

Professor at FORTH

Prof. dr. Evangelos P. Markatos is …

Sacha Romanosky

Sacha Romanosky

RAND Europe

Sasha Romanosky researches topics on the economics of security and privacy, national security, applied microeconomics, and law & economics. He is a Policy Researcher at the RAND Corporation, a faculty member of the Pardee RAND Graduate School, and an affiliated faculty in the Program on Economics & Privacy at the Antonin Scalia Law School, George Mason University. Sasha holds a Ph.D. in Public Policy and Management from Carnegie Mellon University and a B.S. in Electrical Engineering from the University of Calgary, Canada. He was a Microsoft research fellow in the Information Law Institute at New York University School of Law, and a security professional for over 10 years. Sasha is one of the original authors of the Common Vulnerability Scoring System (CVSS), an international standard for scoring computer vulnerabilities (ITU-T X.1521), and co-creator of EPSS, an emerging standard for predicting software vulnerability exploitation. Sasha is a former Cyber Policy Advisor in the Office of the Secretary of Defense for Policy (OSDP) at the Pentagon. He oversaw the Department’s Vulnerability Equities Process (VEP), the Vulnerability Disclosure Program (VDP), and other cyber policy matters, for which he received the Defense Medal for Exceptional Public Service.

 

» Read More

Martin Pekarek

Research Coordinator at Dutch Ministry of Justica and Security

Martin Pekarek is …

David Waltermire

SCAP Architect NIST

David Waltermire is the Lead Standards Architect for the Security Automation Program at the National Institute of Standards and Technology. He is a significant contributor to the National Vulnerability Database (NVD) and leads the Security Content Automation Protocol (SCAP), Continuous Monitoring and many other security automation projects. He has worked as a Security Consultant advancing security automation capabilities within the government sector. His background is in systems and network operations for Internet service providers and also working as a Software Engineer designing and developing distributed systems. His research experience includes incident handling, continuous monitoring, vulnerability identification, anomaly detection, and data analysis and modeling techniques.