Cyber Threats Create Business Opportunities

university_of_jyvaskyla.jpg

University of Jyväskylä

Cyber attacks represent a real risk to the functioning of the information society. One of Finland’s most important clusters for education and research in information security is being built in the Jyväskylä Region.

Attacks targeting information networks have become an everyday occurrence. Finland takes cyber threats seriously, because a successful attack could cripple the whole of society. The Finnish Government has introduced a programme that aims to make Finland a global pioneer in cyber threat preparedness by 2016.
“Cyber attacks can impede and interfere with ser-vices in IT-based societies, produce data leaks, and cause damage. In particular, research based education in information security should be increased,” says Mikko Siponen, Professor of Information Systems at the University of Jyväskylä.

During the last few years universities have sought to bring new skills into the field by increasing research and education in cyber security.There are many types of cyber threat. Cyber criminals and cyber terrorists, for example, have different objectives.
“The scale extends all the way from nerdy hackers to state cyber warfare,” Siponen explains.
Even though a cyber attack is a nightmare scenario, cyber threats can provide new opportunities for business. It has been calculated that the worldwide market for protection against cyber attacks will have reached 80 billion dollars by 2017.

Two projects currently running at the University of Jyväskylä – Cyberwar and Truly Project – aim at commercialising the outcomes of research studies. The Cyberwar project seeks to develop a method of protecting information systems by studying abnormal models of behaviour among masses of data, and then performing an analysis and determining the seriousness of the observed behaviours for information security. Truly Project aims to develop methods to protect digital media such as video games, movies and music.

Cassidian Finland Oy, which is involved in the project, is the world’s leading player in the field of security and defence systems. According to Vesa Arkko, Senior Manager at Cassidian Finland, JYVSECTEC supports the further development of the company’s cyber security expertise and business activities. The project has attracted interest not only in Finland, but also within Cassidian’s international network of contacts.
“The field of cyber security is a growing area of business. Cyber security affects all companies and organisations, because the pursuit of economic advantage and ideological conflicts lead to increased cyber attacks. We believe that Finnish cyber security expertise will become a significant export product,” Arkko says.
Jykes: http://bit.ly/1gwXeyR

« WikiLeaks and the NSA’s Hobby of Spying On Allies
Elon Musk Aims to Save the World from Evil AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.