Towards a Global Center of Excellence for Cybersecurity R&D through collaboration with industry and academia
Preventive protection of systems
Detection of security incidents
Handling of security incidents
Implementation of security solutions
Preventive protection of systems
- Continuously monitor threat developments
- Analyze threats and prepare information
- Procedures and tools for penetration tests, vulnerability scans, and compliance scans
- Proactive threat hunting
- Methods and tools for deceiving attackers
Use deceptive methods - Provide technical advice to stakeholders
Detection of security incidents
Monitor systems during operations
・Analyse and interpret data
・Triage security incidents
・Document security incidents
・Supervise the handling of security incidents
Handling of security incidents
- Requirements set forth in the incident response plan
- Static and dynamic malware analysis
- System, network, and memory forensics
- Methods and techniques used for structured root cause analysis (RCA)
- Establish and take protective measures
- Business continuity management (BCM)
Implementation of security solutions
- Delineate system boundaries and specify requirements
- Feasibility assessment methods
- Cost plan and cost calculation
- Financial controlling and reporting
- Development of evaluation criteria
- Planning of projects and sub-projects
- Risk management and communication
- Leadership behavior adapted to specific contexts and situations
- Models and rules of communication
- Team building and motivation
- Conflict management