A pioneering courses, University of East London’s Master of Science in Terrorism and Counter Terrorism Studies was the first course of its kind in England and, having started in 2006 and is today the longest-running Master in Terrorism and Counter Terrorism in the UK. Designed to investigate the growth of the phenomena, its political context and most importantly, to provide a thorough examination of the counter-terrorism measures. This programme assesses terrorism events and issues of the 20th and 21st centuries and analyses the increasing ‘securitisation’ of social life. It connects the conceptual basis of academic study to practical issues facing the international community and considers emerging terrorism threats and issues pertaining to counter-terrorism, law enforcement, government agencies and the private sector.
As demand for cyber security professionals in the UK and worldwide continues to surge, this course will prepare you for the challenge of keeping IT environments safe and secure in a world where data is constantly under attack.
This course will give you a broad understanding of the latest practice and techniques for cyber security systems development and operations.
You will be able to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security and be guided by the adoption of appropriate professional, ethical and legal practices.
The course is particularly designed to tackle industry needs and job market challenges, and produces informed graduates who are suitably equipped to thrive.
On graduation from this course you will have the critical skills and techniques essential for security-related jobs/roles in a rapidly evolving and diverse environment to appropriately solve typical cyber security problems.
In this presentation I discuss what cyber and information security professionals can learn from generic crisis management insights. I discuss several myths and some general good practices that can be applied to cyber crisis management. In the voice-over, I illustrate the good practices with relevant cyber examples. I conclude with three straightforward but important takeaways.
This session is sponsored by Fortinet.
Chair: Frances Burton, security services group manager, Jisc.
Cybersecurity has long been an area of activity for those responsible for providing, protecting and supporting digital services in research and education, but recent events have focused public and media attention on the scale of the threat.
Our security thread at this year’s conference is picking up on some of these themes and we have sessions covering a number of cybersecurity areas. There will be presentations on organisation experiences of email phishing and the results of our RPZ trial. Accreditation of services is being requested more often by project funders and will have a case study presentation on experience of obtaining ISO27001.
Running order of talks:
11:30-11:55 - RPZ trial
Speaker: Peter Dorey, Spamhaus
11:55-12:20 - Addressing the skills shortage in cybersecurity
Speaker: Debbie Tunstall, Cyber Security Challenge.
12:20-12:45 - Institutional issues with Bitcoin
Speaker: Jethro Perkins, London School of Economics and Political Science (LSE).
This Master of Science in Cyber Security is designed to equip you with an understanding of the criminological, legal and research context of cybercrime. Furthermore, it aims to equip you with an understanding of computing skills and capabilities that will help to respond to online threats to personal information as well as the organisational environment.
A pioneering courses, University of East London’s Master of Science in Terrorism and Counter Terrorism Studies was the first course of its kind in England and, having started in 2006 and is today the longest-running Master in Terrorism and Counter Terrorism in the UK. Designed to investigate the growth of the phenomena, its political context and most importantly, to provide a thorough examination of the counter-terrorism measures. This programme assesses terrorism events and issues of the 20th and 21st centuries and analyses the increasing ‘securitisation’ of social life. It connects the conceptual basis of academic study to practical issues facing the international community and considers emerging terrorism threats and issues pertaining to counter-terrorism, law enforcement, government agencies and the private sector.
As demand for cyber security professionals in the UK and worldwide continues to surge, this course will prepare you for the challenge of keeping IT environments safe and secure in a world where data is constantly under attack.
This course will give you a broad understanding of the latest practice and techniques for cyber security systems development and operations.
You will be able to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security and be guided by the adoption of appropriate professional, ethical and legal practices.
The course is particularly designed to tackle industry needs and job market challenges, and produces informed graduates who are suitably equipped to thrive.
On graduation from this course you will have the critical skills and techniques essential for security-related jobs/roles in a rapidly evolving and diverse environment to appropriately solve typical cyber security problems.
In this presentation I discuss what cyber and information security professionals can learn from generic crisis management insights. I discuss several myths and some general good practices that can be applied to cyber crisis management. In the voice-over, I illustrate the good practices with relevant cyber examples. I conclude with three straightforward but important takeaways.
This session is sponsored by Fortinet.
Chair: Frances Burton, security services group manager, Jisc.
Cybersecurity has long been an area of activity for those responsible for providing, protecting and supporting digital services in research and education, but recent events have focused public and media attention on the scale of the threat.
Our security thread at this year’s conference is picking up on some of these themes and we have sessions covering a number of cybersecurity areas. There will be presentations on organisation experiences of email phishing and the results of our RPZ trial. Accreditation of services is being requested more often by project funders and will have a case study presentation on experience of obtaining ISO27001.
Running order of talks:
11:30-11:55 - RPZ trial
Speaker: Peter Dorey, Spamhaus
11:55-12:20 - Addressing the skills shortage in cybersecurity
Speaker: Debbie Tunstall, Cyber Security Challenge.
12:20-12:45 - Institutional issues with Bitcoin
Speaker: Jethro Perkins, London School of Economics and Political Science (LSE).
This Master of Science in Cyber Security is designed to equip you with an understanding of the criminological, legal and research context of cybercrime. Furthermore, it aims to equip you with an understanding of computing skills and capabilities that will help to respond to online threats to personal information as well as the organisational environment.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
3. Terrorist Attacks of 2017
• Paris
• London
• Manchester
Conscious we have staff and students studying all over the globe
Setup Emergency Management Group
4. Hydra Minerva Suite
Major Incident Simulation Facility
• 84 Worldwide
• 6 UK Universities
•Chester University
•Canterbury Christ Church University
•Leeds Beckett University
•Liverpool University
•UCLan
•University of South Wales
• Mainly used in Police and Fire Services
4
5. Mass Notification
• SMS Messaging Service
• 150,000 TXT per year
• Able to send out volume bundles, all messages should go out in
under 5 minutes (30,000)
• Need to retain 100,000 credits
8. So What’s all this got to do with Cyber Security?
A major incident on a campus is in effect a DOS attack, which
can very quickly become a DDOS attack as the impact spreads
and key resources are diverted from their day jobs to assist.
What may seen as a simple fire in a waste bin, could end up
becoming a major incident affecting large portions of the
campus, surrounding community and businesses.
9. Lesson Learnt
• Assume nothing
• Risk assess the impact of getting it wrong
• Watch out for school boy errors
• Early communications in the lead up
• Messages should be unambiguous
• Make sure you follow your own procedures (Links in emails)
• Periodic testing with all staff is essential
• Keep it simple - First 20 minutes are crucial
What I like about these events is the openness and that colleagues are happy to share their experiences, both good and bad. I think we are quite unique in that sense and priverlaged
Talk about the exerscie
No Clear means of Mass communication
SMS was seen as the best route for widest participation
Obtained number