eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

211
active users

#csm24

0 posts0 participants0 posts today

As our #CyberSecMonth campaign ‘Your brain is the first line of defence’ comes to a close, Urpo Kaila, Head of Security Policies at CSC, shares his reflections on #InformationSecurity and on what he believes to be also the ‘last line of defence’:

“The last line of defence is not about listing requirements, regulations and standards, or the latest hype in #cybersecurity tools. It is you!"

👉 connect.geant.org/2024/10/29/t

We often hear that the #HumanFactor is the weakest link in the #security chain, but as cyber attacks continue to evolve, so too do our protective measures and #SecurityAwareness

According to Enrico Venuto, CISO at Politecnico di Torino, humans are beginning to serve as the most acute and sensitive sentinels against cyber attacks: connect.geant.org/2024/10/28/t

"The human brain is the most resilient link in the chain and the first line of defence in #cybersecurity"

#CrisisManagement is everyone's business.

For #CyberSecMonth, Maria Edblom Tauson (@sunet) explains why it's fundamental for all of us to be prepared for a crisis and to know exactly what to do when a crisis strikes.

Crisis management is a collective responsibility, and during a crisis, collaboration is the key. Being prepared is always better than being caught off guard.

🔗 connect.geant.org/csm24

@nordunet #CSM24 #Cybersecurity #SecurityAwareness #ECSM #IncidentResponse #CyberCrisis

How would your institution respond if an ordinary system check uncovered a major #security incident?

That’s what the University of Rijeka in #Croatia faced when an IT team member discovered an unauthorised virtual machine template — just as the academic year began.

For #CyberSecMonth, we hear from Vice-Rector Senka Macesic and Head of IT Ivan Marinovic, on how the #university managed the breach, key challenges and lessons learned: connect.geant.org/2024/10/25/f

Continued thread

Practical steps for secure and ethical #AI use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):

3️⃣ 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗲 𝗔𝗜 𝘁𝗼𝗼𝗹𝘀 𝘄𝗶𝘁𝗵 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗽𝗿𝗶𝘃𝗮𝗰𝘆 𝗶𝗻 𝗺𝗶𝗻𝗱
Before using AI tools, ensure you fully understand how they work, what data they collect, and where that data is stored. Set them up thoughtfully — don’t rely on automated decisions or default settings to ensure compliance with security and data privacy standards.

connect.geant.org/2024/10/24/p

#CSM24 #GenAI @SURF

GÉANT CONNECT Online | The leading collaboration on e-infrastructure and services for research and education · Practical steps for secure and ethical AI use by educators and researchers | GÉANT CONNECT OnlineWhat does secure and ethical use of AI look like in practice in higher education and research? Marlon Domingus, data protection officer and AI lead at Erasmus University Rotterdam, believes that a proactive and critical approach is key to ensuring the responsible use of AI. He invokes physicist Richard Feynman: “Embrace AI as much as
Continued thread

Practical steps for secure and ethical #AI use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):

2️⃣ 𝗧𝗵𝗶𝗻𝗸 𝗰𝗿𝗶𝘁𝗶𝗰𝗮𝗹𝗹𝘆
AI can help spark creativity and get people out of ‘bubbles’ of thinking by presenting different perspectives — but critical thinking is vital. “AI outputs can look dazzling, but you only benefit from them if you understand the domain & topic well enough to distinguish nonsense from genuinely valid insights.”

connect.geant.org/2024/10/24/p

#CSM24 @SURF

GÉANT CONNECT Online | The leading collaboration on e-infrastructure and services for research and education · Practical steps for secure and ethical AI use by educators and researchers | GÉANT CONNECT OnlineWhat does secure and ethical use of AI look like in practice in higher education and research? Marlon Domingus, data protection officer and AI lead at Erasmus University Rotterdam, believes that a proactive and critical approach is key to ensuring the responsible use of AI. He invokes physicist Richard Feynman: “Embrace AI as much as
Continued thread

Practical steps for secure and ethical #AI use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):

1️⃣ 𝗩𝗲𝗿𝗶𝗳𝘆 𝗔𝗜-𝗴𝗲𝗻𝗲𝗿𝗮𝘁𝗲𝗱 𝗶𝗻𝘀𝗶𝗴𝗵𝘁𝘀
Don’t blindly trust AI outputs — always verify sources and context. “In science, it is usual to, in principle, challenge every truth claim, to test its validity. With the growing societal impact of AI, this should also become common-sense practice for daily life.”

connect.geant.org/2024/10/24/p

#CSM24 #SecurityAwareness #GenAI @SURF

GÉANT CONNECT Online | The leading collaboration on e-infrastructure and services for research and education · Practical steps for secure and ethical AI use by educators and researchers | GÉANT CONNECT OnlineWhat does secure and ethical use of AI look like in practice in higher education and research? Marlon Domingus, data protection officer and AI lead at Erasmus University Rotterdam, believes that a proactive and critical approach is key to ensuring the responsible use of AI. He invokes physicist Richard Feynman: “Embrace AI as much as

How do you prepare students to not just navigate but shape the digital landscape in a meaningful and responsible way?

At #UniversityOfZurich, the Digital Society Initiative is tackling this challenge through an innovative set of interdisciplinary #education programmes combining technical skills with critical thinking and ethical considerations.

For #CyberSecMonth, we interviewed Leyla Ciragan, Education and Community #Cybersecurity Coordinator at DSI: connect.geant.org/2024/10/23/t

#Tailgating comes in different forms - whether it’s a stranger trying to sneak in, or a colleague claiming to have left the badge at home, letting them through can open the door to serious #security risks.

Watch the new mini-series by CARNET (the Croatian Academic and Research Network) in the context of our #CyberSecMonth campaign to see different tailgating scenarios and learn how to recognise these #SocialEngineering tactics: youtube.com/playlist?list=PLEL

As cyber threats become increasingly sophisticated, Jisc is taking a proactive stance to help their members navigate the challenges of protecting their valuable digital assets.

In the context of #CyberSecMonth, we are delighted to share the news about the forthcoming launch of the Jisc #Security Operation Centre: jisc.ac.uk/innovation/projects

JiscSecurity centre - JiscAs the cyberthreat landscape evolves at an alarming speed, the only way our sector can stay ahead of threat actors is by strengthening their cybersecurity posture. The launch of the security operation centre (SOC) POC is responding to the sector's needs.

How can #universities embrace #AI-driven innovation while safeguarding #privacy, data #security, and #StrategicAutonomy?

For #CyberSecMonth, we interviewed Marlon Domingus, #DPO and AI lead at #ErasmusUniversity #Rotterdam, on how AI is transforming #DataProtection in #education and #research, how universities can rise to the ethical challenges it presents, why responsible use of AI is more important than ever: connect.geant.org/2024/10/18/a

@SURF #CSM24 #ECSM #Ethics #Academia #LLMs #DataProtection

How can stretched university IT teams strengthen #SecurityAwareness against increasingly sophisticated cyber threats while also supporting digitalisation?

During #CyberSecMonth, Cornelia Puhze (Switch) tells us more about their recently launched #Security Communications and Learning Community (SCLC): connect.geant.org/2024/10/16/s

Spear-phishing is a more targeted form of #phishing, where attackers focus on specific individuals and craft personalised emails, based on gathered information.

For #CyberSecMonth, we hear from João Machado (#Cybersecurity Analyst at FCT -FCCN) how #SpearPhishing works, how widespread and damaging these attacks have become, how to prevent and counter them, and some real world examples: connect.geant.org/2024/10/15/s