Security Workshop

Asia/Taipei
3F, Conference Room (Building of Humanities and Social Sciences (BHSS))

3F, Conference Room

Building of Humanities and Social Sciences (BHSS)

Description

Security Workshop (Two days + Three Sessions)

Organizers:

David Crooks (david.crooks@stfc.ac.uk), Sven Gabriel (sveng@nikhef.nl), David Groep (davidg@nikhef.nl), Daniel Kouril (kouril@ics.muni.cz), David Kelsey (david.kelsey@stfc.ac.uk)  and Barbara Krasovec (barbara.krasovec@ijs.si)

                                                                        

ISGC 2026 will host a Security Workshop led by the EGI CSIRT, aimed at building a practical and structured understanding of information security across modern computing environments.

The workshop is intended for students, engineers, and scientists with a few years of experience in computing, information security, or related technical fields. Applications are welcome from participants of all countries and nationalities.

Scope and Topics

The workshop will provide an end-to-end view of security, covering both preventive and reactive aspects. Topics include:

  1. Risk management and threat assessment
  2. Security architecture and security controls
  3. Security operations and operational security practices
  4. Protection, detection, and response mechanisms
  5. Incident response planning and execution
  6. Digital forensics fundamentals
  7. Security logging, monitoring, and traceability

The content will combine conceptual foundations with practical considerations drawn from real-world environments.

Learning Objectives

After completing the workshop, participants will be able to:

  1. Understand security as a risk-driven process, starting from threat and risk assessment.
  2. Identify and evaluate appropriate security controls based on risk, impact, and operational constraints.
  3. Understand the key elements required to design a robust security architecture that supports prevention, detection, and response.
  4. Understand the role of security operations in maintaining continuous visibility and control.
  5. Prepare for security incidents through advance planning, including logging, monitoring, and response readiness.
  6. Understand how to respond effectively to security incidents, including containment, analysis, and recovery.
  7. Understand the basics of incident investigation and forensics, including evidence handling and traceability

Format

The workshop will consist of lectures and guided discussions, focusing on how security principles apply in practice across research, academic, and operational computing environments.ž

Registration

Please register here: https://indico4.twgrid.org/event/64/page/97-registration

Early-Bird Registration: Before/ on Monday, 23 February 2026

Registration Deadline: Monday, 9 March 2026

The agenda of this meeting is empty