{"id":248,"date":"2020-09-23T15:59:21","date_gmt":"2020-09-23T15:59:21","guid":{"rendered":"https:\/\/www.cybermosaic.co.uk\/?p=248"},"modified":"2020-09-23T19:36:13","modified_gmt":"2020-09-23T19:36:13","slug":"test-post","status":"publish","type":"post","link":"https:\/\/www.cybermosaic.co.uk\/?p=248","title":{"rendered":"ADVERSARIAL CYBER SECURITY"},"content":{"rendered":"<p>Today I was privileged to give a talk at the excellent DST-UKIERI VIRTUAL WORKSHOP ON ADVERSARIAL CYBER SECURITY. Due to Covid-19 the event was virtual. It was a collaboration between UKIERI, India Institute of Technology Mandi, Department of Science &amp; Technology, London Metropolitan University, C-MRiC, British Council, Carnegie Mellon University and others.\u00a0<\/p>\n<p>Full details to the programme:<br \/><a href=\"http:\/\/acslab.org\/ukieri\/\">http:\/\/acslab.org\/ukieri\/<\/a><\/p>\n<p>The subject of my talk was entitled &#8220;Enhancing Cyber Security Using Audio Techniques&#8221; and described my research into a new authentication model using audio steganography.<\/p>\n<p>Super useful resource outlining a new\u00a0Cyber Recovery Operational Framework was also presented offering a new focus on cyber recovery activities as opposed to the majority of guidance frameworks aimed at protection, detection and response.<br \/><a href=\"https:\/\/cyberframework.c-mric.com\">https:\/\/cyberframework.c-mric.com<\/a><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I was privileged to give a talk at the excellent DST-UKIERI VIRTUAL WORKSHOP ON ADVERSARIAL CYBER SECURITY. Due to Covid-19 the event was virtual. It was a collaboration between UKIERI, India Institute of Technology Mandi, Department of Science &amp; Technology, London Metropolitan University, C-MRiC, British Council, Carnegie Mellon University and others.\u00a0 Full details to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-248","post","type-post","status-publish","format-standard","hentry","category-sec"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=248"}],"version-history":[{"count":5,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/248\/revisions\/266"}],"wp:attachment":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}