EDPS Guidelines on controllers, processors and joint controllers

On 7 November 2019 the European Data Protection Supervisor published their guidelines on the concepts of controller, processor and joint controllership. While the EDPS is the supervising authority for EUI (European Union Institutions), whose data protection activities fall under Regulation 2018/1725 and not the GDPR, the document is of importance… Continue reading

First NATO Workshop on Autonomous Cyberdefence

On March 19 NATO IST152 Research Task Group on Autonomous Intelligent Agents for Cyberdefence organised the first NATO-Industry workshop on Autonomous Cyber Defence at Cranfield University, UK. The workshop saw a very good participation both in terms of audience size and interaction with the group members. In the first part… Continue reading

The Geopolitics of AI

I delivered a talk on how Artificial Intelligence is influencing geopolitics balance and international relations at the 2019 Pirate Security Conference in Munich. The conference is organised by the German Pirate Party and others and represents and “alternative” to the Munich Security Conference, held on the same days. After summarising… Continue reading

IET Cyberdefence Workshop Talk on Intelligent Agents

At the annual CS4ICS conference organised at its Savoy Place venue in London by the Institution of Engineering and Technology (IET), I presented on February 8 2019 the work of the NATO IST-152 Research Group on Autonomous Intelligent Agents. The talk was part of the “Internet of Battle Things (IoBT):… Continue reading

EU Strategy on Artificial Intelligence

The European Commission published on April 25 2018 a Communication outlining the strategy of the EU for Artificial Intelligence. This post looks at the document, its structure and main points. While the first two chapters deal with a general introduction an AI scenarios and Europe’s competitive posture in the international… Continue reading

Corporate Forensics Presentation at ISSE 2017

For organisations, wether big or small, the priority when an Information Security incident happens is to resume operations as quickly as possible and minimise disruption. What is very often overlooked is the management of digital evidence generated by an incident, whatever its nature. The sessions endeavoured to explain how to… Continue reading