<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">
Dear all, <br class="">
<br class="">
<span class="Apple-tab-span" style="white-space:pre"> </span>I would like to invite you all to attend the forthcoming talks on cyber security by distinguished speakers from Roke and DSTL <br class="">
<br class="">
<b class="">Title: </b>“What’s in a name?” – identity and anonymity online.<br class="">
<b class="">Speaker:</b> Prof. Mark West<br class="">
<div class=""><b class="">When: </b>Tue. 24th 10:00am</div>
<div class=""><b class="">Where:</b> B7 Room 3031</div>
<div class=""><b class=""><br class="">
</b></div>
<div class=""><b class="">Abstract:</b> This lecture will explore some thoughts about what constitutes an identity online and how names, and pseudonyms, can be hidden.<br class="">
<b class="">Bio: </b>Prof. Mark West is head of cyber at Roke Manor Research, having previously run the information security practice area. Since joining Roke 20 years ago, Mark has worked on a variety of topics including internet standardisation, collaborative
research projects in mobile and military networks, and on the design and evaluation of secure systems. He is an experienced consultant, delivering solutions to government and commercial customers on all aspects of cyber security.</div>
<div class=""><br class="">
</div>
<div class=""><b class=""><br class="">
</b></div>
<div class=""><b class="">Title: </b>“A non-traditional view of cyber defence and cyber security” – the experience of a DSTL fellow.<br class="">
<b class="">Speaker:</b> Rob Ashmore<br class="">
<div class=""><b class="">When: </b>Fri. 27th 3:00pm</div>
<div class=""><b class="">Where:</b> B54 Room 5027</div>
</div>
<div class=""><br class="">
</div>
<div class="">
<div class=""><b class="">Abstract: </b>The lecture begins with a brief overview of Dstl. This is followed by a non-traditional view of the nature of cyber defence and cyber security. Three specific, technical challenges to cyber security are then discussed,
including a description of some of the associated real-world issues that need to be considered when responding to them.<br class="">
<b class="">Bio:</b> Rob is a Dstl Fellow. He has over 20 years' experience in defence software, covering all aspects of the software lifecycle, including regulation and certification. Rob also plays a significant role in research related to the assurance of
autonomous systems. He holds both Bachelors and Masters degrees from the University of Cambridge and is a Chartered Scientist (CSci), a Chartered Mathematician (CMath) and a Fellow of the Institute of Mathematics and its Applications (FIMA).<br class="">
<br class="">
</div>
</div>
<div class=""><br class="">
</div>
<div class="">Please come numerous. </div>
<div class=""><br class="">
</div>
<div class="">See you there,</div>
<div class=""><br class="">
</div>
<div class="">Andrea</div>
<div class=""><br class="">
</div>
</body>
</html>