{"id":679,"date":"2020-07-14T13:19:26","date_gmt":"2020-07-14T13:19:26","guid":{"rendered":"https:\/\/websites.fraunhofer.de\/sappan-project-eu\/?p=679"},"modified":"2022-01-17T12:53:19","modified_gmt":"2022-01-17T12:53:19","slug":"soccrates-and-sappan-organise-international-workshop-on-ng-soc-in-conjunction-with-ares-august-25-2020","status":"publish","type":"post","link":"https:\/\/sappan-project.eu\/?p=679","title":{"rendered":"SOCCRATES and SAPPAN organise International Workshop on NG SOC in conjunction with ARES, August 25, 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"679\" class=\"elementor elementor-679\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbd7d3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbd7d3a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68a2809\" data-id=\"68a2809\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86b7b48 elementor-widget elementor-widget-heading\" data-id=\"86b7b48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Overview: <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f23bd49 elementor-widget elementor-widget-text-editor\" data-id=\"f23bd49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organisations in Europe face the difficult task of detecting and \nresponding to increasing numbers of cyber-attacks and threats, given \nthat their own ICT infrastructures are complex, constantly changing \n(e.g. by introduction of new technologies) and there is a shortage of \nqualified cybersecurity experts. There is a great need to drastically \nreduce the time to detect and respond to cyber-attacks. A key means for \norganizations to stay ahead of the threat is through the establishment \nof a Security Operations Center (SOC). The primary purpose of a SOC is \nto monitor, assess and defend the information assets of an enterprise, \nboth on a technical and organizational level.<\/p><p>The aim of the \nNG-SOC 2020 workshop is to create a forum for researchers and \npractitioners to discuss the challenges associated with SOC operations \nand focus on research contributions that can be applied to address these\n challenges. The workshop will draw on expertise from two EU-funded \nH2020 projects: SAPPAN (<a href=\"https:\/\/websites.fraunhofer.de\/sappan-project-eu\/\">https:\/\/websites.fraunhofer.de\/sappan-project-eu\/<\/a>) and SOCCRATES (<a href=\"https:\/\/www.soccrates.eu\/\">https:\/\/www.soccrates.eu\/<\/a>).\n Selected members of the projects\u2019 consortia will present their research\n activities. The workshop will include a panel session to foster \ndiscussion on the major operational challenges that enterprises and SOC \noperators face and provide insights into promising research-based \nsolutions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf7573f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf7573f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3eeaff7\" data-id=\"3eeaff7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ab9b67 elementor-widget elementor-widget-heading\" data-id=\"2ab9b67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Project Descriptions:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63e9339 elementor-widget elementor-widget-text-editor\" data-id=\"63e9339\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><\/strong><\/p><p>The workshop is jointly organized by two H2020 projects that are funded by the European Commission:<\/p><p><strong>SAPPAN <\/strong>project (<a href=\"https:\/\/websites.fraunhofer.de\/sappan-project-eu\/\">https:\/\/websites.fraunhofer.de\/sappan-project-eu\/<\/a>)\n aims to enable efficient protection of modern ICT infrastructures via \nadvanced data acquisition, threat analysis, and privacy-aware sharing \nand distribution of threat intelligence aimed to dynamically support \nhuman operators in response and recovery actions. The SAPPAN project \nwill develop a collaborative, federated, and scalable attack detection \nto support response activities and allow for timely responses to newly \nemerging threats supporting different privacy-levels. We plan to \nidentify a standard for the interoperable and machine-readable \ndescription of incident response reports and recovery solutions. The \nrisk assessment, privacy, and security will be addressed in the standard\n design. Results of both attack detection and recovery and response \nprocesses will be shared on a global level to achieve an advanced \nresponse and recovery via knowledge sharing and federated learning. We \ndevelop a mechanism for sharing information on threat intelligence, \nwhich implements a combination of encryption and anonymization to \nachieve GDPR compliance. Novel visualization techniques will be \ndeveloped to assist security and IT personnel and provide an enhanced \ncontent of context of the response and recovery, and improved visual \npresentation of the process.<\/p><p><strong>SOCCRATES<\/strong> project (https:\/\/www.soccrates.eu\/) will develop and implement a new security platform for <a>Security\n Operation Centres (SOCs) and Computer Security Incident Response Teams \n(CSIRTs), that will significantly improve an organisation\u2019s capability \nto quickly and effectively detect and respond to new cyber threats and \nongoing attacks.<\/a> The SOCCRATES Platform consists of an orchestrating\n function and a set of innovative components for automated \ninfrastructure modelling, attack detection, cyber threat intelligence \nutilization, threat trend prediction, and automated analysis using \nattack defence graphs and business impact modelling to aid human \nanalysis and decision making on response actions, and enable the \nexecution of defensive actions at machine-speed. The SOCCRATES Platform \naims to enable organisations to improve the resilience of their \ninfrastructures and increase productivity and efficiency at the SOC. The\n outcomes of the project will contribute to a more secure cyberspace and\n strengthen competitiveness in the EU digital single market.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98b7fbf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98b7fbf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c6a426\" data-id=\"5c6a426\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c87c04 elementor-widget elementor-widget-heading\" data-id=\"7c87c04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><strong>Workshop Agenda (Tuesday, 25<sup>th<\/sup> of August 2020 | 9:00 \u2013 17:45)<\/strong><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cb61d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cb61d6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96da662\" data-id=\"96da662\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cae700 elementor-widget elementor-widget-text-editor\" data-id=\"3cae700\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><br><\/p>\n<figure>\n<table>\n<tbody>\n<tr>\n<td><b>Time<\/b><\/td>\n<td><b>Talk<\/b><\/td>\n<td><b>Description&nbsp; \\ Duration [min]<\/b><\/td>\n<\/tr>\n<tr>\n<td>\n<h6>Session 1 (Ewa Piatkowska)<\/h6>\n<\/td>\n<td>\n<h6>90<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>09:00<\/h6>\n<\/td>\n<td>\n<h6>09:05<\/h6>\n<\/td>\n<td>\n<h6>Welcome <em>Ewa Piatkowska<\/em><\/h6>\n<\/td>\n<td>\n<h6>5<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>09:05<\/h6>\n<\/td>\n<td>\n<h6>9:25<\/h6>\n<\/td>\n<td>\n<h6>The SOCCRATES Project: Overview and Objectives <em>Frank Fransen (TNO)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>9:25<\/h6>\n<\/td>\n<td>\n<h6>9:45<\/h6>\n<\/td>\n<td>\n<h6>The SAPPAN Project: Overview and Objectives <em>Avikarsha Mandal (Fraunhofer FIT)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>9:45<\/h6>\n<\/td>\n<td>\n<h6>10:30<\/h6>\n<\/td>\n<td>\n<h6>Keynote: Semi-Automated Cyber Threat Intelligence (ACT) <em>Martin Eian (Mnemonic)<\/em><\/h6>\n<\/td>\n<td>\n<h6>45<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>10:30<\/h6>\n<\/td>\n<td>\n<h6>11:00<\/h6>\n<\/td>\n<td>\n<h6><em>Coffee break<\/em><\/h6>\n<\/td>\n<td>\n<h6>30<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>Session 2 (Tomas Jirsik)<\/h6>\n<\/td>\n<td>\n<h6>100<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>11:00<\/h6>\n<\/td>\n<td>\n<h6>11:20<\/h6>\n<\/td>\n<td>\n<h6>Monitoring Malicious Infrastructures to Produce Threat Intelligence <em>Piotr Kijewski (Shadowserver)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>11:20<\/h6>\n<\/td>\n<td>\n<h6>11:40<\/h6>\n<\/td>\n<td>\n<h6>Pipeline development for Automatically Generated Domain detection <em>Irina Chiscop (TNO)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>11:40<\/h6>\n<\/td>\n<td>\n<h6>12:00<\/h6>\n<\/td>\n<td>\n<h6>Leveraging Machine Learning for DGA Detection <em>Arthur Drichel (RWTH Aachen University)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>12:00<\/h6>\n<\/td>\n<td>\n<h6>12:20<\/h6>\n<\/td>\n<td>\n<h6>Knowledge Management and Anonymization Techniques in Cyber-Threat Intelligence <em>Lasse Nitz <\/em>and<em> Mehdi Akbari Gurabi (Fraunhofer FIT)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>12:20<\/h6>\n<\/td>\n<td>\n<h6>12:40<\/h6>\n<\/td>\n<td>\n<h6>Reputation Management Techniques for IP addresses, domains, and mail <em>Mischa Obrecht <\/em>and<em>&nbsp;<\/em><i>Jeroen van Meeuwen<\/i><em style=\"font-size: 1.0666rem;\">&nbsp;(DreamLab)<\/em><\/h6>\n<h6><em><\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>12:40<\/h6>\n<\/td>\n<td>\n<h6>13:45<\/h6>\n<\/td>\n<td>\n<h6><em>Lunch break<\/em><\/h6>\n<\/td>\n<td>\n<h6>65<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>Session 3 (Avikarsha Mandal)<\/h6>\n<\/td>\n<td>\n<h6>80<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>13:45<\/h6>\n<\/td>\n<td>\n<h6>14:05<\/h6>\n<\/td>\n<td>\n<h6>Host and Application Behaviour Modelling <i>Tomas Jirsik<\/i><em> (Masaryk University) <\/em>and<em> <\/em><i>Sebastian<\/i><em> Schaefer (RWTH Aachen University)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>14:05<\/h6>\n<\/td>\n<td>\n<h6>14:25<\/h6>\n<\/td>\n<td>\n<h6>L-ADS: Live Anomaly Detection System <em>Alejandro Garcia Bedoya (ATOS)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>14:25<\/h6>\n<\/td>\n<td>\n<h6>14:45<\/h6>\n<\/td>\n<td>\n<h6>Adversarial Examples against Intrusion Detection Systems <em>Ewa Piatkowska (AIT)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>14:45<\/h6>\n<\/td>\n<td>\n<h6>15:05<\/h6>\n<\/td>\n<td>\n<h6>Fast and Scalable Cybersecurity Data Processing<em>&nbsp;Gabriela Aumayr (HPE)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>15:05<\/h6>\n<\/td>\n<td>\n<h6>15:30<\/h6>\n<\/td>\n<td>\n<h6><em>Coffee break<\/em><\/h6>\n<\/td>\n<td>\n<h6>25<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>Session 4 (Irina Chiscop)<\/h6>\n<\/td>\n<td>\n<h6>80<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>15:30<\/h6>\n<\/td>\n<td>\n<h6>15:50<\/h6>\n<\/td>\n<td>\n<h6>Attack Analysis with Attack Defence Graphs <em>Erik Ringdahl (Foreseeti)<\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>15:50<\/h6>\n<\/td>\n<td>\n<h6>16:10<\/h6>\n<\/td>\n<td>\n<h6>Attack Graph-based Courses of Action for Defense <em>Wojciech Widel (KTH)<\/em><em><\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>16:10<\/h6>\n<\/td>\n<td>\n<h6>16:30<\/h6>\n<\/td>\n<td>\n<h6>Visual Analytics for Cyber Security Data <em>Christoph M\u00fcller and Franziska Becker (University of Stuttgart)<\/em><em><\/em><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>16:30<\/h6>\n<\/td>\n<td>\n<h6>16:50<\/h6>\n<\/td>\n<td>\n<h6>Process Launch Distribution Model <i>Dmitry Komashinskiy, David Karpuk, Samuel Marsha<\/i>l and Alexey <i>Kirichenko (Fsecure)<\/i><\/h6>\n<\/td>\n<td>\n<h6>20<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>16:50<\/h6>\n<\/td>\n<td>\n<h6>17:05<\/h6>\n<\/td>\n<td>\n<h6><em>Coffee break<\/em><\/h6>\n<\/td>\n<td>\n<h6>15<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>Panel Session<\/h6>\n<\/td>\n<td>\n<h6>45<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>17:05<\/h6>\n<\/td>\n<td>\n<h6>17:35<\/h6>\n<\/td>\n<td>\n<h6>Discussion on Future Challenges for SOC <em>Speakers:<\/em> <em>Pavel Kacha (CESNET)<\/em>,&nbsp;<em>Sarka Pekarova (DreamLab)<\/em>&nbsp; and&nbsp;<em>Paul Smith (AIT)<\/em> Panel chair:<em> Tomas Jirsik (Masaryk University)<\/em><\/h6>\n<\/td>\n<td>\n<h6>30<\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>\n<h6>17:35<\/h6>\n<\/td>\n<td>\n<h6>17:45<\/h6>\n<\/td>\n<td>\n<h6>Wrap up <em>Ewa Piatkowska (AIT)<\/em><\/h6>\n<\/td>\n<td>\n<h6>10<\/h6>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong><br><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c2dcef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c2dcef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6121c1\" data-id=\"f6121c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1805701 elementor-widget elementor-widget-text-editor\" data-id=\"1805701\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Workshop Website<\/strong><\/p><figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-ares-conference\"><div class=\"wp-block-embed__wrapper\"><blockquote class=\"wp-embedded-content\" data-secret=\"yYvjyK0VBC\"><a href=\"https:\/\/www.ares-conference.eu\/workshops-eu-symposium\/ng-soc-2020\/\">NG-SOC 2020<\/a><\/blockquote><\/div><\/figure><p><strong>Venue and Registration<\/strong><\/p><p>NG-SOC\n 2020 workshop is organised in conjunction with the ARES 2020 \nconference, which this year will be held all-digital. Registration for \nthe workshop is required and costs 40\u20ac (Regular Attendee) or 20\u20ac \n(Student attendee). The registration fee includes the entrance to all \nARES &amp; CD-MAKE conference and workshop sessions. If you want to \nattend, please register at <a href=\"https:\/\/www.ares-conference.eu\/registration-all-digital-conference\">https:\/\/www.ares-conference.eu\/registration-all-digital-conference<\/a> .<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01a275a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01a275a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782da91\" data-id=\"782da91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Overview: Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks and threats, given that their own ICT infrastructures are complex, constantly changing (e.g. by introduction of new technologies) and there is a shortage of qualified cybersecurity experts. There is a great need to drastically reduce the time to&hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[19],"tags":[],"coauthors":[10],"class_list":["post-679","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/posts\/679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=679"}],"version-history":[{"count":12,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/posts\/679\/revisions"}],"predecessor-version":[{"id":1112,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=\/wp\/v2\/posts\/679\/revisions\/1112"}],"wp:attachment":[{"href":"https:\/\/sappan-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=679"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sappan-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcoauthors&post=679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}