Safeguarding Innovation: Cybersecurity Challenges
Author : min-jolicoeur | Published Date : 2025-08-16
Description: Safeguarding Innovation Cybersecurity Challenges for the Science and Research Sector Balancing Academic Excellence with Security in the Digital Age Introduction Growing dependence on digital infrastructure in academia Escalating
Presentation Embed Code
Download Presentation
Download
Presentation The PPT/PDF document
"Safeguarding Innovation: Cybersecurity Challenges" is the property of its rightful owner.
Permission is granted to download and print the materials on this website for personal, non-commercial use only,
and to display it on your personal computer provided you do not modify the materials and that you retain all
copyright notices contained in the materials. By downloading content from our website, you accept the terms of
this agreement.
Transcript:Safeguarding Innovation: Cybersecurity Challenges:
Safeguarding Innovation: Cybersecurity Challenges for the Science and Research Sector Balancing Academic Excellence with Security in the Digital Age Introduction Growing dependence on digital infrastructure in academia Escalating sophistication of cyber-attacks The critical importance of cybersecurity for national security and economic competitiveness Cybersecurity in Academia – The Scale of the Problem Record 75% rise in cyber-attacks in Q3 2024 Education/Research: 3,828 weekly attacks (highest among sectors) 50% of breached organizations belong to academia (2024 Data Breach Investigations Report) The Education/Research sector was the most targeted, with an average of 3,828 weekly attacks, followed by the Government/Military and Healthcare sectors, with 2,553 and 2,434 attacks, respectively A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide, https://blog.checkpoint.com/research/a-closer-look-at-q3-2024-75-surge-in-cyber-attacks-worldwide/ The Impact of Cyberattacks on Academia Data breaches: financial, personal, and intellectual property theft Operational risks: disruption to education and research functions Intellectual property theft: targeting emerging and disruptive technologies Drivers of the Threat Landscape Professionalization of the hacking industry Geo-tech rivalry and state-sponsored cyberespionage (Russia, China, etc.) Hybrid warfare tactics using cyber-attacks EDTs and the Academia - National Security Nexus emerging and Disruptive Technologies (EDTs) examples: AI, quantum computing, biotechnology, autonomous systems dual-use potential: civilian and military applications role of academia leading innovation and technological breakthroughs collaboration with defense and security sectors (e.g., NATO’s DIANA initiative national security implications EDTs critical for economic and geopolitical standing targeted by cyberespionage, especially from adversaries with civil-military fusion strategies High-profile universities targeted in 2024, like e.g. University of Cambridge, Università di Siena Types of attacks: ransomware, phishing, email compromise Case Studies of Recent Attacks Emerging Threats Use of AI in advanced phishing and deepfake attacks Escalating hybrid threats tied to geopolitical confrontations Addressing the Challenges Compliance with the NIS2 Directive Strengthening cybersecurity policies and incident response systems Cross-sectoral cooperation and intelligence-sharing initiatives Practical Measures for Academia Cyber hygiene education for staff and students Investments in SOCs (e.g., SOCCER consortium example) Leadership involvement and securing dedicated funding SOCCER Project www.soccer.agh.edu.pl 10 M euro, five CEE countries consortium Main goals: Development of SOCs or SOC’s capabilities Supporting SOC preparedness and readiness Establishing information & CTI sharing ecosystem across the academic sector in CEE The SOC4Academia Toolbox, a resource designed to share best practices for SOC establishment, deployment models, and integration of services The SOCCER project is funded under Grant Agreement No. 101128073 and is supported by the European Cybersecurity Competence Centre. Conclusion Cybersecurity challenges will intensify,