﻿{"id":5166,"date":"2025-01-24T08:30:52","date_gmt":"2025-01-24T08:30:52","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5166"},"modified":"2025-02-06T09:00:51","modified_gmt":"2025-02-06T09:00:51","slug":"afternoon-on-internet-security","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2025\/01\/24\/afternoon-on-internet-security\/","title":{"rendered":"Afternoon on Internet Security"},"content":{"rendered":"<p>ICANN is organising a series of presentations on Internet Security that is hosted at ISCNIC on Thursday, 6th of February 2025, 13:00-16:30:<br \/>\n<a href=\"https:\/\/www.icann.org\/es\/engagement-calendar\/details\/afternoon-on-internet-security-2025-02-06\">Details and registration<\/a>.<\/p>\n<p>Thomas Welsh from the Computer Science department of University of Iceland will be giving a talk there on <em>Threat analysis in cyber-physical systems via topology modelling<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-670x283.png\" alt=\"\" width=\"670\" height=\"283\" class=\"alignnone size-medium wp-image-5311\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-670x283.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-1024x433.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-150x63.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-768x325.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity-1536x649.png 1536w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/afternooninternetsecurity.png 1562w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/p>\n<p>Note: Registration is closed because the maximum number of attendees has been reached. Also note that because of the <a href=\"https:\/\/en.vedur.is\/alerts\/area\/faxafloi\">red weather alert<\/a>, this event starts 1 hour later, i.e. at 14:00.<\/p>\n<hr>\n<p>This talk is in the context of our <a href=\"https:\/\/uni.hi.is\/helmut\/cybersecurity\/\">cybersecurity activities<\/a> and the ECCC\/EU co-funded projects <a href=\"https:\/\/uni.hi.is\/helmut\/research\/icedef-defend-iceland\/\">ICEDEF \u2013 Defend Iceland<\/a> and <a href=\"https:\/\/uni.hi.is\/helmut\/research\/eyvor-ncc\/\">Eyv\u00f6r \u2013 the National Cybersecurity Coordination Centre of Iceland (NCC-IS)<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png\" alt=\"\" width=\"150\" height=\"49\" class=\"alignright size-thumbnail wp-image-5148\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo.png 442w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><br \/>\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg\" alt=\"\" width=\"150\" height=\"31\" class=\"alignright size-thumbnail wp-image-3911\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-670x141.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-768x161.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS.jpg 991w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ICANN is organising a series of presentations on Internet Security that is hosted at ISCNIC on Thursday, 6th of February 2025, 13:00-16:30: Details and registration. Thomas Welsh from the Computer Science department of University of Iceland will be giving a talk there on Threat analysis in cyber-physical systems via topology modelling. Note: Registration is closed [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208],"tags":[],"class_list":["post-5166","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5166"}],"version-history":[{"count":13,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5166\/revisions"}],"predecessor-version":[{"id":5318,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5166\/revisions\/5318"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}