BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Vrije Universiteit Amsterdam//NONSGML v1.0//EN
NAME:PhD defence B.G. Johannesmeyer
METHOD:PUBLISH
BEGIN:VEVENT
DTSTART:20260112T134500
DTEND:20260112T151500
DTSTAMP:20260112T134500
UID:2026/phd-defence-b-g-johannesm@8F96275E-9F55-4B3F-A143-836282E12573
CREATED:20260409T095644
LOCATION:(1st floor) Auditorium, Main building De Boelelaan 1105 1081 HV Amsterdam
SUMMARY:PhD defence B.G. Johannesmeyer
X-ALT-DESC;FMTTYPE=text/html: <html> <body> <p>Information Flow-Based 
 Vulnerability Modeling</p> <h3><strong>Cyberattacks Uncovered: Resear
 ch Identifies Hidden Security Flaws Before They Cause Damage</strong>
 </h3><p>Computer security researcher Brian Johannesmeyer has develope
 d a new way to detect advanced cyberattacks earlier and more accurate
 ly by focusing not on a single flaw, but on the path data takes throu
 gh a computer system. His research shows that many serious digital in
 cidents arise because sensitive or malicious data moves unnoticed thr
 ough different parts of software and only causes harm after multiple 
 steps.<br>Read more in the <a data-item-id="2ae09bd6-dfbc-4fb1-b94f-f
 acde1ecb852" href="/en/news/2026/research-identifies-hidden-security-
 flaws-before-they-cause-damage">news item</a></p><p>More information 
 on the <a href="https://hdl.handle.net/1871.1/68ea29b3-43d0-4e37-926e
 -52ec48305ddb" data-new-window="true" target="_blank" rel="noopener n
 oreferrer">thesis</a></p> </body> </html>
DESCRIPTION: <h3><strong>Cyberattacks Uncovered: Research Identifies H
 idden Security Flaws Before They Cause Damage</strong></h3> Computer 
 security researcher Brian Johannesmeyer has developed a new way to de
 tect advanced cyberattacks earlier and more accurately by focusing no
 t on a single flaw, but on the path data takes through a computer sys
 tem. His research shows that many serious digital incidents arise bec
 ause sensitive or malicious data moves unnoticed through different pa
 rts of software and only causes harm after multiple steps.<br>Read mo
 re in the <a data-item-id="2ae09bd6-dfbc-4fb1-b94f-facde1ecb852" href
 ="/en/news/2026/research-identifies-hidden-security-flaws-before-they
 -cause-damage">news item</a> More information on the <a href="https:/
 /hdl.handle.net/1871.1/68ea29b3-43d0-4e37-926e-52ec48305ddb" data-new
 -window="true" target="_blank" rel="noopener noreferrer">thesis</a> I
 nformation Flow-Based Vulnerability Modeling
END:VEVENT
END:VCALENDAR
