1,021 search results for “cyber security” in the Public website
-
ISGA gains major European cyber project: EU Cyber Direct
Dennis Broeders, professor of global security and technology at ISGA (Institute of Security and Global Affairs), together with two partners, has been granted a major European project: EU Cyber Direct. Together with EU ISS and Carnegie Europe, ISGA forms a new consortium for 3 years with a total budget…
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Cyber agent technology and intelligence agencies
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
-
Security by behavioural design
In 2021, the National Cyber Security Centre (NCSC) asked Leiden University to conduct a rapid review of best practices and possibilities for follow-up research on the integration of behavioral sciences in security by design methodologies and projects. This academic field is called security by behavioral…
-
Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
-
Bibi van den Berg about the Dutch brain drain in Cyber security
Bibi van den Berg, Professor of Cyber Security Governance at the Institute of Security and Global Affairs (ISGA), has been interviewed by Financieel Dagblad (FD) and BNR Nieuwsradio about the considerable shortage of cyber security specialists in the Netherlands. Van den Berg warns of a brain drain,…
-
Marco Romagna
Faculty Governance and Global Affairs
m.romagna@fgga.leidenuniv.nl | +31 70 800 9506
-
Olga Gadyatskaya
Science
o.gadyatskaya@liacs.leidenuniv.nl | +31 71 527 7033
-
Security and threat
Polarisation in our society is on the rise. What makes people increasingly radical? How do we protect ourselves from extremist, terrorist or criminal threats, be they physical or in the cyber world? And what role do intelligence services play in this?
-
Cyber Operations and International Law
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
-
Is the Gulf Cooperation Council (GCC) Cyber Resilient?
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
-
Call for papers: The Hague Program for Cyber Norms Conference
This year The Hague Program for Cyber Norms organises the first conference of an annual series to encourage academic diversity in the study of cyber security. The theme is Responsible Behavior in Cyberspace. The conference will take place in The Hague from 5 to 7 November 2018. Deadline submission of…
-
Data Breaches and Effective Crisis Communication: A Comparative Analysis of Corporate Reputational Crises
Online data breaches are recurrent and damaging cyber incidents fors organizations worldwide. This study examines how organizations can effectively mitigate reputational damages in the aftermath of data breaches by hacking, through situational crisis communication strategies.
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
Institute of Security and Global Affairs
The Institute of Security and Global Affairs (ISGA) focuses on multidisciplinary research and education within the international scientific field of security studies.
-
Introductie webinar cyber security
Study information, Webinar
-
Security Studies (BSc)
In the Bachelor’s in Security Studies you study 21st century security challenges and learn to devise strategic solutions to a complex world.
-
Call for papers: The Hague Program for Cyber Norms Conference 2019
The Hague Program for Cyber Norms organises the second conference of an annual series to encourage academic diversity in the study of cyber security. The theme is 'Dealing with Uncertainty'. The conference will take place in The Hague on 5 and 6 November 2019. Deadline submission of extended abstracts…
-
Online webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
- Security Studies
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Information evening Executive MSc Cyber Security
Study information
-
Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
-
Security Studies
Security is key to survival for any living organism: life is full of perils and threats, both physically, environmentally, and societally. Security challenges such as terrorism, natural disasters, and cybercrime rank among the most pressing issues of our time, affecting the security and safety of millions…
-
Unmasking the Term 'Dual Use' in EU Spyware Export Control
This article illustrates how the term 'dual use' has become associated with a broader dichotomy between ‘legitimate’ and ‘illegitimate’ purposes.
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Closing the Gap 2023 is just around the corner: three questions about this conference
On 6 and 7 December, the third edition of the Closing the Gap conference will be held in The Hague, hosted by EU Cyber Direct.
-
Daan Weggemans on the impact ICT malfunctions have on hospitals
On Monday 2 September, a computer malfunction severely crippled several hospitals in the Dutch province of Gelderland. Which had a huge impact on patients’ appointments. Daan Weggemans, researcher at the Institute for Security and Global Affairs (ISGA) was interviewed on the issue by Dutch regional…
-
The Facebook scandal: guidance and tips
Facebook is under attack due to the scandal with Cambridge Analytica: Data of tens of millions of users have been leaked. Does this mean the end of Facebook? ‘The storm will pass,’ says security expert Erik van der Kouwe. He provides tips on how to keep Facebook from following your every move.
-
Intelligence and Security
Our main goal is to improve understanding of how intelligence and security services operate, how they are embedded in broader political, bureaucratic, and societal contexts, and how their methodologies can be complemented.
-
From cyber to Syria: the many aspects of security
During the final session of the PRE-University Class Security Challenges in the 21st Century, students showcased their thorough analysis of contemporary safety and security challenges. The results were impressive, according to both the teachers and the assessors: ‘You almost forget that they’re high…
-
2024 Conference on International Cyber Security: Democracy and Cyberspace
Conference
-
Farewell Professor Jan van den Berg (ISGA)
A farewell seminar was held on 22 November 2018 in honour of the departure of Prof. dr. Jan van den Berg, Professor in Cyber Security and Scientific Director of the Cyber Security Academy foundation (CSA).
-
Henning Lahmann
Faculteit Rechtsgeleerdheid
h.c.lahmann@law.leidenuniv.nl | +31 71 527 8838
-
Get to know Crisis and Security Management
Crises arising from terrorism, war, violence, cyber threats, and natural disasters dominate world news and make crisis and security a heavily politicised and hotly debated topic at the top of the national and global societal and governance agenda. This master Crisis and Security Management focuses on…
-
Get to know Crisis and Security Management
Crises arising from terrorism, war, violence, cyber threats, and natural disasters dominate world news and make crisis and security a heavily politicised and hotly debated topic at the top of the national and global societal and governance agenda. This master Crisis and Security Management focuses on…
-
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.