Friday, May 21, 2021, SECREV provides an open and inclusive event that streams from locations around the world from UTC 0:00 until midnight. It is absolutely free to attend and requires no registration. The 24 hour Live stream will be viewable here, and the Premiere Videos will be available from the links below. You can ask questions in the chat and on twitter at #SECREV2021.


0:00 UTC

local time (Local)
Response to Cybercrime and Digital Forensic in South Korea
Sungkyunkwan University - South Korea

Dr. Gibum Kim, Sr. Res. Sungjin Lee, Sr. Res. Jaehyeok Han, Sr. Res. Hyeonmin Park, Sr. Res. Sangpil Yoon, Res. Minji Um, Res. Hyunji Moon

This session will focus on the trends and issues of digital forensic, cybercrime, and cybersecurity in Korea. The presenters from Sungkyunkwan University & Korea University will talk about their research including law, technology, and investigation. The presentation of this session will cover a total of 4 topics, eg. 1. “Digital Forensic Readiness for Financial Companies in Korea”, 2. “File fingerprint for provenance tracking”, 3. "Voice Phishing crime techniques and how to respond", 4. “Keep Your Eyes on Security Vulnerability: Policy Issues”.

2:00 UTC

local time (Local)
Cybercrime in the Indo-Pacific Region
Monash University - Australia

Dr. Lennon Chang, Dr. Christy Chiang (Taiwan), Dr. Hai Thanh Luong (Vietnam), Dr. Jompon Pitaksantayothin (Thailand), Dr. Latha Subramanian (India), Ms Andi Brown (Australia), Mr Duc Huy Pham (Vietnam), Mr Daniel Wells (Australia)

This session will discuss cybercrime in the Indo-Pacific region, including but not limited to countries such as Thailand, Vietnam, Myanmar, Taiwan and Australia. Presenters in this session will talk about their research on different type of cybercrime, eg. IoT and intimate partner abuse and online fraud. It will also touch on topics such as sousveillance, the governance of cyberspace and internet vigilantism.

4:00 UTC

local time (Local)
Using automated methods to detect, analyse and investigate cybercrime
Adelaide University - Australia

Dr. Russell Brewer, Bryce Westlake, Enrique Guerra, Francesca Fanucchi

The continually increasing abundance of child sexual abuse material (CSAM) being distributed online coupled with the psychological and physical harms experienced by those investigating has necessitated the use of automated techniques for investigating CSAM. Most automated techniques currently rely on hash values for identification. While the use of hash values has increased the number of media that can be analysed in a given time frame, they are not without their limitations. One of the most important limitations is that the majority of hash values are only flagged once. Because of the limitations, the use of other attributes found in CSAM is the next phase of combating distribution. This has already begun with the introduction of facial recognition but has the potential for much more. In this thematic panel, we discuss the development of an automated software infrastructure prototype designed to ‘crawl’ the Surface and/or Deep Web, collect videos, extract faces and voices from said videos, and match videos based on these two biometric attributes, or an existing database of victims and/or offenders. We review the challenges of biometric detection, how these techniques can better focus investigations, and how other structural attributes of websites can also be used.

6:00 UTC

local time (Local)
Insider Threats: Challenges and Opportunities
The Hebrew University of Jerusalem - Israel

Dr. Tamar Berenblum, Asaf Lubin, Eiant Albin

This session will discuss the issue of the insider threat to information security. Although the incidence of insider threat attempts may be less than those of external threats to the security of systems, the level of access creates a particular issue with regards to the harm resulting from those attempts. Defending against these threats presents a particular difficulty, as there is a tension between the surveillance needed to detect cyber-attacks from insiders and the requirements needs of employees for privacy. We will also discuss insurance as a potential measure for creating resilience for these systems. Finally, we will share the initial findings from an experiment examining what happens when responding to the threat of ransomware attacks delivered via a phishing vector.

8:00 UTC

local time (Local)
Interdisciplinary Research: Solving for Cybersecurity
Cambridge University - UK

Dr. YiTing Chua, Dr. Ildiko Pete, Dr. Maria Bada, Dr. Andrew Caines, Helen Oliver, Dr. Lydia Wilson, Dr. Sergio Pastrana, Dr. Richard Clayton

Cybersecurity and cybercrime research present complex challenges, which are not limited to purely technical issues. Such complex problems call for an interdisciplinary approach where experts contribute to solutions using their invaluable experience from their respective fields. Thus, the overarching theme for this session is interdisciplinary research in cybercrime and cybersecurity. There will be presentations and panel discussions on various aspects on the topic, including but not limited to, the data collection and analyses processes, research approaches, challenges with datasets, and types of toolkits. There will also be short academic presentations and the datasets offered by the Cambridge Cybercrime Centre will be introduced during the session

10:00 UTC

local time (Local)
The Human Factor in Cybercrime and Cybersecurity
The Hague University - The Netherlands

Dr. Rutger Leukfeldt, Dr. Marleen Weulen Kranenbarg, Jim Schiks, Dr. Asier Moneva, Dr. Steve van de Weijer, Dr. Susanne van 't Hoff-de Goede, Luuk Bekkers, Dr. Remco Spithoven, with Hilary Muramira (Africa Cybersecurity Consortium)

This session will be about the human factor in cybercrime and cybersecurity and will provide an introduction to the Centre of Expertise Cybersecurity of The Hague University of the Netherlands, and include presentations about ongoing or recently finished studies into: - Insider threats: Results of a survey amongst 500 companies in the Netherlands. Insight into prevalence and nature of the incidents. - Hack_Right: The evaluation of the alternative Dutch intervention for juvenile cybercriminals. Based on interviews with the intervention developers, the case managers and convicted hackers we will provide insight into the functioning of the unique intervention. - Intermezzo: Our work building our own "Human Behavior Lab" including the goals and outline of the lab. - Interventions against money mules. Results of an experiment with an online intervention against money mules.

12:00 UTC

local time (Local)
Combating Fake News and Interpreting AI-based Cybercrime Prediction
Canadian Institute for Cybersecurity (CIC),The University of New Brunswick - Canada

Faruk Ener, Dr. Saqib Hakak, Dr. Sajjad Dadkhah, Dr. Haruna Isah

This session of SECREV will concentrate on two important topics, Fake News and Machine Learning Interperability. Fake news is primarily distributed or propagated through the Internet to deceive deliberately, befool, or seduce the readers for various incentives such as political, financial, or other profits. The spread of fake content's speed and magnitude is presumably directly attached to financial and political incentives, both offline and online. As Fake news manages to be more authentic, social users are drawn to such incentives, possibly the outcome of negativity preference or their desire to pay more attention to fake information. In this talk, we will highlight the major challenges in combating fake news and provide a brief overview of the mitigation techniques. Machine Learning (ML) is being used to combat cybercrime in many critical sector organizations,including criminal justice and financial services. However, a major setback to the application of ML and AI in cybercrime detection and prevention is the inability of humans to understand how these technologies make their decision. ML-based systems in the cybersecurity domain, especially those developed for user profiling and risk prediction, must explain, and validate how they arrived at their decision. This is becoming a regulatory requirement and is aimed at enabling fairness, accountability, and transparency in automated decision-making. This presentation provides an overview of how interpretable ML is being applied to enable humans to understand Machine Learning decision-making.

14:00 UTC

local time (Local)
The dark world of cybersecurity, cybercrime and policing online
University of Montreal - Canada

Dr. Benoit Dupont, Dr. Francis Fortin, Dr. David Decary-Hetu, Katherine Caron, Isabelle Fraser et Geneviève Chauvin, Camille Faubert, Dr. Sarah Paquette, Francesco Campisi

This session will showcase a wide range of research in cybercrime and cybersecurity. Presentations will focus on - illicit market: a presentation on the criminal achievement of offenders in the largest hacking forum's marketplace using a longitudinal model that spans over more than years' worth of illicit activities. - policing of cybercrime: impact of police operation on darweb market place and perception of law enforcement officers - sexual offenders: profiling the virtual identities and subterfuge activities undertaken by online sexual offenders - cybercrime and cybersecurity

16:00 UTC

local time (Local)
Practical Approaches for Securing Critical Infrastructure
Carleton University - Canada

Dr. Jason Jaskolka, James Baak, Alvi Jawad, Luke Newton, Joe Samuel, Bohdana Sereda, Gieorgi Zakurdaev

Securing critical infrastructure remains among the top priorities for the federal, state, and local governments, and commercial providers of communications, financial, electric, and other services. Practical approaches for securing the increasingly distributed, complex, and richly connected critical infrastructure have been sought after by many cybersecurity R&D programs, specifically those aiming to promote the robust, effective design and construction of cyber-physical systems and infrastructure. As critical infrastructure is built and refreshed, those involved in making design decisions face challenges regarding ways to identify, analyze, and prepare for threats and hazards, mitigate vulnerabilities, and minimize potential impacts and consequences. This presents a wide range of complex challenges. The larger and more complex our systems and networks become, the more potentially vulnerable they become, which inevitably leaves them susceptible to cybersecurity exposures. There is an increasingly important need, particularly in light of the growth in complexity and connectivity of critical infrastructure sectors, for the development of rigorous and practical methods and tools for determining whether such systems are sufficiently protected from cyber-threats. The presentations and discussion during this session will explore practical ways to address the many cross-cutting, multi-faceted, and multi-disciplinary security challenges and considerations that must be taken into account when securing the critical infrastructure upon which we rely in our daily lives. Presentations include:

  • Effective Security Assurance for Critical Infrastructure: Current Challenges and Future Directions
  • Analyzing the Impact of Cyberattacks on Critical Infrastructure
  • Roundtable Discussion: Practical Approaches for Securing Critical Infrastructure

18:00 UTC

local time (Local)
Understanding the Role of the Human and the Machine in Cybercrime and Cybersecurity
Michigan State University - USA

Dr. Tom Holt, Jin R. Lee, Dr. Kevin F Steinmetz, Ryan Scrivens, Brenna Helm, George Burruss, Jordan Howell, Cassandra Dodge, Dr. Ruth Shillair

This session of SECREV will explore a wide range of research related to the human factors affecting involvement in cybercrime and wrongdoing on and offline. Presentations will consider the threats posed by terrorism and extremists, as well as economic offenses enabled by technology. Fraud and social engineering will also be considered in detail.Participants in this session will provide active discussion to better understand the nuances surrounding how technology enables criminality, but also identify ways that global policy challenges could help to minimize critical threats to cybersecurity practice. Presentations include:

  • Understanding signals of vendor reliability within the online stolen data market
  • The Identification of a Model Victim for Social Engineering: A Qualitative Analysis
  • Searching for signs of extremism online using machine learning techniques
  • Online incel subculture and the technological facilitation of harm
  • New Frontiers in Cybercrime Research
  • Cybersecurity Capacity Building: Cross-National Benefits and International Divides

20:00 UTC

local time (Local)
Cyber Economic Victimization
Tanque de Ciberpensamento (TCP-IP) - Latin America

T.C Marlon Mike Toro-Álvarez, Dr. Juan Carlos Nieto, Dr. Kyung-shick Choi, Salvador Samper, Nazly Borrero, Dr. Carlos Cortes, Ing. Mabel Cortes, Dra Ana Castaneda, Luciano Monchiero


Each year shows both the highest number of digital incident complaints and the highest dollar losses reported compared with the last period. The economic impact from cybercriminal operations is affecting each state and making a slower post-pandemic recovery. Considering that implementing learned lessons from fraud and organized crime investigations have helped to block criminal actions by affecting their finances, our SECREV session will include research outcomes from digital security experts and cybercrime investigators who will share key aspects for criminal counter fighting and digital assets protection, as well as inviting scholars and institutions to address prospective studies about the cyber economic victimization phenomenon. Presentations include:

  • Organized crime and economic cybervictimization
  • Child pornography cybermonetization
  • Money laundry and cybercriminals
  • Cybercriminal profiling in SMEs
  • New technologies for cybercriminal finances

22:00 UTC

local time (Local)
Mis/Disinformation and Critical Infrastucture
Simon Fraser University - Canada

Dr. Richard Frank, Barry Cartwright, Cicilia Zhang, Noelle Warkentin, Naomi Zakimi

This session of SECREV will concentrate on two important topics, Mis/Disinformation and Critical Infrastructure. The first section will report on the results of two dis/misinformation studies undertaken by the International CyberCrime Research Centre at SFU, one for the Department of National Defense in 2019-2020 on disinformation warfare conducted by hostile foreign actors, and the other for the Minister of Canadian Heritage’s Digital Citizen Contribution Program in 2020-2021 on dis/misinformation pertaining to the COVID-19 pandemic. In particular, we are examining dis/misinformation on social media platforms such as Facebook and Twitter, employing a “mixed methods” approach consisting of customized web-crawling techniques and machine-learning algorithms, supplemented by in-depth qualitative analysis to cross-validate the findings of the machine-learning algorithms and to develop new insights into the motivations and behaviours of individuals, groups and state actors who use (and abuse) social media. The second section will present risks to critical infrastructure, both in Canada and around the world, are becoming increasingly complex. Part of the reason these malicious actors are able to infiltrate these CI companies is that systems are being connected to the internet that were never intended to be networked. This presentation will report on a project aimed at evaluating the cyber-risk posed to Canadian critical energy infrastructure through analyzing the potential threats posed by hackers, the nature of attacks faced by industry providers, and the measures in place to prepare, prevent, and respond to cyberattacks against their systems. The outcomes of this project served to improve the resilience of Canadian critical energy infrastructure through understanding common attack vectors, identifying what types of attacks may occur in the future, and evaluating whether the current best practices for critical energy infrastructure protection meet the needs of industry stakeholders.


0:00 UTC

local time (Local)
Technical leverage, the software metric that does measure your security risk
University of Trento - Italy

Ivan Pashchenko

In finance, companies leverage external assets (e.g. debts instead of shares) to multiply profits. However, leverage also magnifies losses, which may lead to bankruptcy as in 2008. We observe similar trends in modern software: developers leverage the functionality of open-source software dependencies to increase development speed and reduce costs. Yet, software dependencies are known to introduce security vulnerabilities: the Equifax breach, the Panama Papers, VerticalScope breach, and others affected millions of people. In this talk, we will demonstrate Technical Leverage, a simple yet effective metric for measuring software security risks. More details are available at

2:00 UTC

local time (Local)
Young Canadians Speak Out: Considerations for Privacy and Cybersecurity in Canada
MediaSmarts - Canada

Kara Brisson-Boivin, Samantha McAleese

Since 2020, MediaSmarts has published two reports documenting conversations with young Canadians about privacy online. This research counters the stereotype that youth do not care about privacy and offers solutions that policymakers should consider in the review of Canada’s privacy laws. Youth want more information and control in the form of plain language privacy policies and line-by-line consent practices. They also express a desire for a ‘right to be forgotten’ as a form of protection from the unintended consequences of data sharing. We will provide an overview of these two projects, focusing on findings, recommendations, and positioning youth as experts.

4:00 UTC

local time (Local)
Assessing COVID-19’s Effect on Online Routine Activities and Cybercrime: A Snapshot of the Effect of Sheltering in Place
University of Trinidad and Tobago - Trinidad and Tobago

Troy Smith

The study examined the changes in online activities, cybercrime rates and the explanatory power of the Routine Activities Theory (RAT) under the natural experiment conditions resulting from the social and situational changes that accompanied COVID-19. The changes and their cause(s) were assessed using Bayesian t-tests, χ^2-tests, Propensity Score Matching (PSM) along with classification and dependency modelling. The study found moderate to strong evidence that observed increases in online activities and decreased cybercrime victimization were dependent on the COVID-19 pandemic. Additionally, the study found that the predictors of victimization changed and the predictive accuracy of the classification model decreased post-COVID-19 restrictions.

5:00 UTC

local time (Local)
The Cybersecurity Advisors Network (CyAN)
The Cybersecurity Advisors Network (CyAN)

Greg Dzsinich

The Cybersecurity Advisors Network (CyAN) is an international association of professionals which identifies and connects experts from different disciplines.The network aims to strengthen cybersecurity and fight against cybercrime through a multi-disciplinary approach based on mutual trust among its members and on the complementarity of their profiles and experiences.

6:00 UTC

local time (Local)
Knowledgeflow Cybersafety Foundation: Our Progress During The Pandemic Year - Canada
Knowledgeflow Cybersafety

Claudiu Popa

Chairman and Founder Claudiu Popa, CISSP, CISA, CIPP presents a few of the educational events and current initiatives undertaken by the Knowledgeflow Foundation: our educational program, resource library, hackathon and communications initiatives are currently managed by an active team of managers. The current team of young volunteers is augmented by a growing group of seniors who are participating in mentoring and support activities for other seniors, some of which have been victimized by cyberfraud and online scams. The system is now designed to raise and share awareness in a way that allows Knowledgeflow to derive measurable statistics and quantifiable metrics at scale. We will share ambitious upcoming projects including rural connectivity and cultural exchange programs designed to optimize frictionless knowledge transfer about cybersafety over the next 18 months.

8:00 UTC

local time (Local)
PrISMO: A Pragmatic Information Security Management Ontology
Universidad de La Frontera - Chile

Carlos Cares, Julio Lopez Fenner, Mauricio Diéguez Rebolledo

Ontologies are the contemporary way of representing conceptual frameworks in several domains. Information Security has been a particular domain where some ontologies have been proposed, however, none of these have included information technology management, information-security-standard terminology, and technical concepts altogether. We present an ontology proposal integrating technical terminology and information security management concepts in a simple setting. We offer a brief discussion on considered concrete objects as examples for illustrating some abstract classes such as information and their relationships. We include an OWL initial representation of the ontology having assets, information security risk, and vulnerability, among others.

10:00 UTC

local time (Local)
Landscapes of Hope
Project SOMEONE (SOcial Media EducatiON Every day) - Canada

Vivek Venkatesh

Project SOMEONE (SOcial Media EducatiON Every day) explores and curates initiatives dedicated to reducing hate speech, discrimination and violent extremism. We employ innovative, community-facing and participatory action-based research to promote digital literacy, pluralism and resilience against discrimination. Our social pedagogy and performative-based approaches have produced rigorous curricular modules, multimedia presentations, artistic installations and pluralistic dialogic spaces with over 20,000 collaborators in 13 countries. Our work is grounded in a symbiotic methodology which empowers collaborating community members in sustainably magnifying their narratives to create policies that promote inclusion in an era of polarization.

11:00 UTC

local time (Local)
Cybersecurity: Be part of the solution
cyber eco - Canada

Marcel Labelle

To be Confirmed

12:00 UTC

local time (Local)
Ingeniería Social utilizando Seguridad Cognitiva. Caso de estudio Phishing
Universidad de las Fuerzas Armadas ESPE - Ecuador

Walter Fuertez, Luis Recalde Herrera, Diana Arévalo Español

To be Confirmed

13:00 UTC

local time (Local)
Efectos de la Pandemia en la Ciberseguridad de Personas Vulnerables

Lia Hernadez, Gabriel Cajiga Español

La pandemia incrementó la presencia constante del Internet dando así una exposición aparentemente perpetua de contenido a sus usuarios. Se entiende que personas con conocimiento informado pueden filtrar la desinformación, el contenido malicioso, y ser la primera línea de defensa de su privacidad en internet. No obstante, intrínsecamente no podemos decir lo mismo de personas vulnerables que no dimensionan los riesgos de su exposición en el internet. En esta propuesta hacemos un repaso de quiénes entran en la categoría de personas vulnerables en el Internet y cuáles los mecanismos legales de protección con los que cuentan estas personas. (Enfoque Panamá o Centroamérica).

14:00 UTC

local time (Local)
Humanizando a la ciberseguridad: Explorando buenas prácticas para fortalecer la seguridad digital de comunidades vulnerables en el Sur Global.
TEDIC - Paraguay

Fernanda Carlés Español

Tras varios años de capacitar a grupos de mujeres y colectivos LGTBQI en Paraguay y Latinoamérica, TEDIC cuenta con numerosas metodologías y lecciones aprendidas a la hora de capacitar en temas de seguridad digital individual y organizacional en el sur global. La presentación buscará compartir buenas prácticas para relacionarse con dichos colectivos, y generar un debate con otras latitudes para encontrar puntos en común. Cuestiones como el tipo de herramientas digitales utilizadas; estrategias lúdicas para cimentar conceptos y ganar nuevas audiencias y los lenguajes y ejemplos utilizados durante los talleres, brindarán una mayor claridad sobre que ha funcionado a TEDIC en su intercambio con dichos colectivos. Se hará también una reflexión sobre el costo de la inclusión en este tipo de talleres, habida cuenta de la pandemia COVID-19, y como se ha afrontado dicho desafío sin dejar de lado a comunidades históricamente excluidas.

15:00 UTC

local time (Local)
La investigación a través de Deep web y Dark web: un estudio exploratorio empírico
Universidad Camilo José Cela - Spain

Carmen Sánchez Pérez Español

Internet ha transformado nuestras rutinas digitalizando conductas, incluidas las constitutivas de delitos. Pero existen espacios específicos que ofrecen ventajas especiales para la comisión de delitos, tal es el caso de Deep Web y Dark Web. Este escenario especialmente anonimizado supone un auténtico reto global en términos de investigación. Este estudio exploratorio pretende identificar las características principales de las investigaciones de los delitos perpetrados o para cuya perpetración es necesario acudir a Deep Web y Dark Web a partir del estudio de sentencias españolas (n=44), con el propósito de conocer tanto las características particulares como qué elementos procesales son clave en su persecución

16:00 UTC

local time (Local)
Ciberseguridad y justicia centrada en las mujeres, el caso de Puebla
Consejo Ciudadano de Seguridad y Justicia del Estado de Puebla - Mexico

Samantha Páez Guzmán Español

Cuando analizamos las cifras de violencia digital en el estado de Puebla, tomando como base los delitos de violación a la intimidad sexual -que se refiere a la difusión y solicitud de imágenes íntimas sin consentimiento- y ciberacoso -que se refiere a las amenazas y acoso con alguna connotación sexual a través del espacio digital-, nos damos cuenta que son las mujeres las principales víctimas y que los impactos en las sobrevivientes y sus familiares son altos: desplazamiento forzado, transtornos alimenticios, ruptura del proyecto de vida, abandono escolar y ruptura de las relaciones personales. A pesar de ello, las dependencias de investigación y procuración de justicia, así como instituciones de educación, no han centrado las acciones de ciberseguridad, justicia y reparación del daño en las mujeres, sino que han dejado de lado la perspectiva diferenciada respecto al género para la investigación, sanción y, sobre todo, prevención de los delitos. En ese sentido, desde el Consejo Ciudadano de Seguridad y Justicia del Estado de Puebla, hacemos una propuesta de justicia restaurativa y transversal.

17:00 UTC

local time (Local)
Repercusión del Covid19 en los procesos de reclutamiento y radicalización de etiología Yihadista.
Colegio Profesional de la Criminología de la Comunidad de Madrid - Spain

Ramón Chippirrás Moreno, Christina Prieto Español

Actualmente, la pandemia del COVID-19 a nivel global ha causado un aumento exponencial de la cibercriminalidad debido al mayor uso de las nuevas tecnologías. A consecuencia de ello, en cuanto a grupos terroristas se refiere, se ha producido un crecimiento en la captación y autoadoctrinamiento, a través de internet por el uso de redes sociales, videojuegos y servicios de mensajearía, entre otros. En este sentido, destacar que diversos informes nos indican el incremento de la actividad online de menores y jóvenes hasta un 200 %. Por ello, se hace importante la prevención sobre dicho ámbito debido al cambio de la situación actual de la criminalidad.

18:00 UTC

local time (Local)
Amenazas Cibernéticas a la Seguridad y Defensa Nacional. Reflexiones y perspectivas en Colombia
Escuela Superior de Guerra: ESDEG - Colombia

Tc. Milena Elizabeth Realpe Diaz Español

Las amenazas cibernéticas que imponen las tecnologías disruptivas a las Fuerzas de Ley de un Estado reflejan una tendencia peligrosa a la seguridad y defensa nacionales. Para mitigar los riesgos en el ciberespacio se requiere una estrategia integral que permita contrarrestar y, si es necesario, resistir los ataques perturbadores y destructivos. En consecuencia, a través de la ponencia se presenta un análisis general de la situación actual en materia de ciberdefensa en Colombia. Se identifican las amenazas cibernéticas latentes y emergentes, considerando al instrumento denominado la Ventana de AREM, de cara a siete (7) tecnologías disruptivas analizadas por el Instituto Tecnológico de Massachusetts a corto plazo, con el fin de proponer una estrategia militar de ciberdefensa que permita responder a las amenazas cibernéticas con una visión integral, sistémica y prospectiva.

19:00 UTC

local time (Local)
La ciberseguridad en los vehículos autónomos/ Cybersecurity in autonomous vehicles
Universidad Camilo José Cela - Spain

María Petronela Popiuc Español

"Con la llegada de los vehículos autónomos, estudios en el área, revelan que para 2030 se incorporarán un total de 18 millones de vehículos al parque automovilístico mundial, esto provoca importantes cambios tanto desde el punto de vista de la conectividad como de la ciberseguridad. Por ello, a lo largo de la ponencia, se explicará los retos a los que se enfrentan los vehículos autónomos desde el punto de vista de la ciberseguridad a través de diversos interrogantes como, por ejemplo ¿Qué tipo de ciberataques sufren los vehículos autónomos?¿Existe algún tipo de regulación desde la Unión Europea?¿De que trata el Reglamento ONU/UNECE/WP.29/2020/79?¿Existe actualmente algún tipo de test en ciberseguridad preventivo en el mundo? ¿Y en España? … With the advent of autonomous vehicles, studies in the area reveal that by 2030 a total of 18 million vehicles will be incorporated into the world's vehicle fleet, causing major changes both from the point of view of connectivity and cybersecurity. Therefore, throughout the presentation, the challenges faced by autonomous vehicles from the point of view of cybersecurity will be explained through various questions such as: What kind of cyber-attacks do autonomous vehicles suffer?, is there any kind of regulation from the European Union?, what is the UN/UNECE/WP.29/2020/79 Regulation?, is there currently any kind of preventive cybersecurity test in the world, and in Spain, etc.?"

20:00 UTC

local time (Local)
El Factor Humano de la Ciberseguridad
Universidad a Distancia de Madrid (UDIMA) - Spain

Juan José Carrillo Miranda Español

Una de las grandes teorías criminológicas, la “teoría de actividades cotidianas” (Cohen & Felson, 1979) es una de las mejores para explicar el factor humano en la ciberseguridad actual, ya que es el factor principal en la prevención y defensa ante el Cibercrimen, siendo posible aplicarlos al ciberespacio. En cada una de las partes de la teoría nos encontramos con el componente humano, sus peculiaridades, sus características psicológicas, etc.. El ciberdelincuente tiene sus propias características con lo que podemos colocarlos en unas tipologías, las víctimas las podemos seccionar por tipo de víctima, tanto personal, empresa o gubernamental.

21:00 UTC

local time (Local)
Uso de la inteligencia cibernética como eje en el diseño e implementación de políticas de ciberseguridad
Instituto Nacional de Administración Pública - Mexico

Amaury Fierro


La integración de políticas o programas de ciberseguridad al interior de las organizaciones se ha convertido en una necesidad de primer nivel; sin embargo, la falta de experiencia y de talento técnico-operativo, aunada a la amplia y creciente oferta de servicios en este rubro, complican de forma considerable la creación y puesta en marcha de dichas políticas. En esta ponencia se presentan los fundamentos de MINERVA, un nuevo enfoque de gestión basado en la inteligencia cibernética orientado a facilitar, mejorar y agilizar los procesos de diseño, implementación y evaluación de políticas de seguridad cibernética.

22:00 UTC

local time (Local)
DataJam Canada 2021 : La innovación tecnológica como medio de prevención y herramienta de lucha contra la trata humana.
Centro Internacional para la Prevención de la criminalidad - Canada

Fernando A. Chinchilla, Juan Pablo García Español

En 2021, el Centro internacional para la prevención de la criminalidad, CIPC (Montreal, Canadá) coorganizo, junto a la Fundación Pasos Libres (Bogotá, Colombia) el primer DataJam contra la explotación en Canadá. El DataJam es un concurso de innovación tecnológica que busca sensibilizar el publico sobre la trata de personas, mejorar las capacidades técnicas y el conocimiento sobre el tema de los participantes, y favorecer la cooperación multidisciplinaria y multisectorial en la materia. Esta presentación ofrece una perspectiva general e introductoria sobre la iniciativa, sus principios básicos, los obstáculos a su implementación, su pasado y su presente, así como los resultados obtenidos, y explica por qué la innovación tecnológica es crucial para luchar contra la trata de personas.

23:00 UTC

local time (Local)
La experiencia del InFo-Lab: Laboratorio de Investigación y Desarrollo de Tecnología en Informática Forense
InFo-Lab, Universidad FASTA - Argentina

Eng. Bruno Constanzo, Eng. Santiago Trigo Español

Una presentación enfocada en el laboratorio InFo-Lab, integrado por la Universidad FASTA, el Ministerio Público de la Provincia de Buenos Aires (Argentina) y la Municipalidad de General Pueyrredon, que detalla sus 5 líneas de investigación y desarrollo, focalizando en el proyecto "nombreee"..que esta desarrollando junto a la UAI, FIE-UNDEF, la Dirección Nacional de Ciberseguridad de Argentina (dependiente de la Jefatura de Gabinete de Ministros) y el Comando Conjunto de Ciberdefensa, orientado a la protección de infraestructuras críticas industriales.

SECREV2021 is Co-Organized by: