The European Cybersecurity Seminar (ECS) provides cybersecurity researchers and practitioners with a platform to present and get feedback on research projects and papers.
We hold monthly hour-long seminar meetings where participants can present research to the community. To ensure high-quality feedback, for each presentation ECS will identify and assign an expert discussant to each paper who will provide detailed comments, before opening up the discussion to all participants.
This Seminar has three main goals. First, it promotes cutting-edge research and interdisciplinary dialogue. Second, it aims to foster a community of trust among Europe’s cybersecurity experts. Third, it aspires to support junior scholars who may lack local networks providing guidance since cybersecurity remains an emerging field of research. To that end, we explicitly welcome submissions by junior scholars.
Would you like to present your paper or be discussant at the ECS? Please email us your title and abstract (max. 250 words) at CyberSeminar@eccri.eu
|30.09.21||Frederick Douzet||The Geopolitics of Data Routing|
|21.10.21||Anita Gohdes||Repression in the digital age: Cyber controls and state violence in the 21st century. The title of the chapter is: Global evidence: Internet outages and repression.|
|25.11.21||Dennis Broeders||Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy|
|16.12.21||Tim Stevens||Cyber Risk: Hyperconnectivity and the Political Economy of Uncertainty|
|27.01.22||James Shires||Book Launch:The Politics of Cybersecurity in the Middle East|
|24.02.22||Lucas Kello||Cyber Legalism|
|07.04.22||Ola Michalec||When new tools enter the old world: can safety and cyber security coexist in modern critical infrastructures?|
|05.05.22||Irene Poetranto & Jakub Dalek||Internet filtering and network shutdowns in the context of the ethno-religious conflicts in Myanmar and Indonesia|
|30.06.22||Mischa Hansel||Bug Bounty Programs as a Global Public Good|
|28.07.22||Nina Bindel & Kristen Csenkey||Post-Quantum Cryptographic Assemblages and the Governance of theQuantum Threat|
|25.08.22||Erik Van den Sandt||Hansa Market, Cyberbunker, and Encrochat: The Need for Data Scientific Investigations|
|29.09.22||Jan Lemnitzer||Back to the roots? – history, neutrality and the future of due diligence in cyberspace|