![illustration blå vindlingar i cyberrymden](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fzvcdbz5g%2Fict_cybersecurity_utan-text_1920x1080.jpg%3Frxy%3D0.5621447901560184%252C0.5906482321601092%26width%3D1920%26height%3D1080%26v%3D1d9a432fb1137f0%26quality%3D60%26format%3Dwebp&w=3840&q=90)
I samband med styrkeområde IKTs initiativseminarium "Navigera i cybersäkerhetens landskap" vill vi ge dig chansen att veta mer om föreläsarna. Här presenterar vi länkar till de intervjuer vi har gjort.
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fmgvpis5h%2Fbasin2014-medium.jpg%3Frxy%3D0.5290621971767699%252C0.407447512853268%26width%3D600%26height%3D600%26v%3D1d9e235a25da350%26quality%3D60%26format%3Dwebp&w=3840&q=90)
David Basin, ETH Zürich
"With Scion Internet we can regain control and sovereignty over our infrastructure."
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fznoh42tn%2Felena-pagnin_1920x1080.jpg%3Fcc%3D0.16970007331238363%252C0%252C0.2677999266876164%252C0%26width%3D600%26height%3D600%26v%3D1d9d10aaff09cc0%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Elena Pagnin, Chalmers
Kryptografi spelar en viktig roll för cybersäkerheten
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fkkwfd3ib%2Fmarc-stottinger.jpg%3Frxy%3D0.5161490055964922%252C0.2885553870446005%26width%3D600%26height%3D600%26v%3D1d9ea4906e2a850%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Marc Stöttinger, RheinMain University of Applied Sciences
“The dynamic nature of todays threats requires a more integrated and adaptive security strategy”
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fr44ab2zt%2Fsimone-f-h_0085.jpg%3Frxy%3D0.40844573986138627%252C0.5268270411372328%26width%3D600%26height%3D600%26v%3D1d9eb2039c409d0%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Simone Fischer-Hübner, Chalmers and KAU
“It is important to design usable approaches supporting users to manage their access permission.”
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fprvapfqe%2Fpontus-johnson-kth.jpg%3Frxy%3D0.511600009672792%252C0.4202072924785422%26width%3D600%26height%3D600%26v%3D1d9e2354ae86ab0%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Pontus Johnson, KTH
"The only hope for addressing the root of the cybersecurity problem is through research and innovation."
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fgvtcvasu%2Ffoto2.jpeg%3Frxy%3D0.5923928186992249%252C0.2721172000469361%26width%3D600%26height%3D600%26v%3D1d9f130cb4fd030%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Tamara Rezk, Chalmers and INRIA
"Hardware optimizations will deeply impact the effectiveness of software-level isolation.”
![](/_next/image/?url=https%3A%2F%2Fcms.www.chalmers.se%2FMedia%2Fsnyi3pm3%2Ffurdek-large.jpg%3Frxy%3D0.4218942920563149%252C0.36139505942456757%26width%3D600%26height%3D600%26v%3D1d9e5618d4a1050%26quality%3D60%26format%3Dwebp&w=3840&q=90)
Marija Furdek Prekratic, Chalmers
"I see a growing awareness of security vulnerabilities."