Deliverable 6.4 Future Internet Initiatives Year 1
|
|
- Doris Morris
- 8 years ago
- Views:
Transcription
1 Theme [ICT ] Trustworthy ICT SECurity and trust COoRDination and enhanced collaboration Project Nº Deliverable 6.4 Future Internet Initiatives Year 1 Responsible: Contributors: Internal Reviewers: Massimo Felici, Nick Wainwright (HP Labs) Aljosa Pasic (ATOS) Olga Gadyatskaya (UNITN) Keith Howker, Paul Malone (WIT) Document Reference: D6.4 Future Internet Initiatives Year 1 Dissemination Level: PU Version: 2.0 Date: November 4, 2013
2 Change Record Version Date Author Change Description /07/2013 M. Felici Table of Content; General description of each section /10/2013 M. Felici Draft of all different sections /10/2013 N. Wainwright Comments on the different sections /10/2013 M. Felici Comments Addressed /10/2013 M. Felici Full draft of the deliverable /10/2013 N. Wainwright Comments on the different sections /10/2013 M. Felici Comments Addressed, version ready for internal review /10/2013 A. Pasic Contribution to the section on Industrial Liaison /10/2013 O. Gadyatskaya Comments on the deliverable /10/2013 K. Howker Comments on the executive summary /10/2013 P. Malone Comments on the deliverable /10/2013 K. Howker Various comments and suggestions in order to improve the readability of the deliverable /10/2013 N. Wainwright Comments on the Executive Summary /10/2013 M. Felici Addressed all comments and suggestions Deliverable 6.4 Future Internet Initiatives Year 1 Page 2 of 28
3 Executive Summary This deliverable reports on the tasks and specific activities performed by Work Package 6 during the reporting period Year 1. It describes the general process that brings the tasks of the work package together to achieve the principle objective of the WP, and the specific activities of tasks. This deliverable highlights the main work package objectives and clarifies how the work package activities contribute towards achieving them. Work Package 6 has leading responsibility for the objective to provide a forward, strategic perspective of the emerging and developing trust and security issues, challenges, requirements, and priorities. The main goal then of WP6 is to identify and explore required research directions for future developments, to integrate the findings into a coherent picture, and to inform relevant stakeholders. Achievement of the objective presents two major challenges: The first challenge is fundamental to the objective itself: to project current trends how the digital environment cyberspace will develop, what new, consequent problems may arise, what research and developments will be needed, and how, in turn, this research and development will shape the strategic directions for future user perceptions, industry practices, and policy decisions. The second challenge is concerned with response to on-going developments that impact the goals of the work package. New technologies (e.g. cloud computing) can lead to major shifts in the way ICT is deployed and used across communities and organizations; opening up new opportunities for the private citizen (users of technologies) as well as industry (suppliers, providers, vendors); they also shapes markets and economies that rely on such technological developments. Alongside the economic and technological development, there are on-going regulatory, legislative, and standardization activities needed to keep order in the digital environment and its dependants. The main tasks carried out by Work Package 6 in Year 1 contributing to the objective comprise a number of activities. In order to coordinate tasks within the work package as well as to identify clear means of interactions between work packages, this deliverable describes a Work Package process. Each task involves activities that contribute to specific project outcomes. During the reporting period Year 1, some work package s activities have focused on the economics of cyber security and privacy. The selected topic was discussed with the Advisory Focus Group, which confirmed the importance of economics for research and practice in cyber security and privacy. The Advisory Focus Group also helped in identifying the main focus for Year 2, that is, technology readiness, technology transfer and impact of research and practice in cyber security and privacy. Year 1 activities provided a means to critically analyse the selected topic. Similarly, other activities will support the analysis in a pragmatic manner of the identified topics for Year 2 and Year 3. This deliverable describes the activities and their main outcomes, and also identifies how they have contributed towards the work package tasks and to the work package itself. It also summarizes the work package progress with respect to the specified process. This deliverable discusses some early conclusions drawn from carrying out work package tasks and related activities (coordinated by the work package process). It summarizes the achievements objectives for Year 1 and the main insights, and identifies future activities for Year 2. Deliverable 6.4 Future Internet Initiatives Year 1 Page 3 of 28
4 TABLE OF CONTENTS Change Record... 2 Executive Summary... 3 List of Figures... 6 List of Tables... 6 Abbreviations Strategic Directions EU Context Document Objectives Document Organisation Work Package Process and Tasks Work Package Process Work Package Tasks Task 6.1 Advisory Focus Group Task 6.2 Investigation and Analysis Task 6.3 Communication and Participation Work Package Contributions and Dependencies Future Internet Initiatives: Year Work Package Activities A1: Advisory Focus Group Setup A2: Identification and Analysis of Key Topics A3: Workshop on Economics of Security in the Cloud A4: Volume on Cyber Security and Privacy A5: Other Communication and Participation Activities A6: Industrial Liaison A7: Monitoring Relevant Policies Work Package Progress Year 1 Achievements and Insights Achieved Objectives Deliverable 6.4 Future Internet Initiatives Year 1 Page 4 of 28
5 4.2 Main Insights Future Work References Appendix A: Work Package 6 Process Appendix B: Economics of Security in the Cloud (ESC) Workshop Appendix C: Cyber Security and Privacy: Table of Contents Deliverable 6.4 Future Internet Initiatives Year 1 Page 5 of 28
6 List of Figures Figure 1 Work Package Structure Links Figure 2 Advisory Focus Group s support and communication Figure 3 Key topic areas Figure 4 Volume on Cyber Security and Privacy (cover) Figure 5 Activity Timeline Year Figure 6 Work Package 6 Process List of Tables Table 1 Activity contributions to Work Package Tasks Table 2 Activities Contributions and Work Package Interactions Deliverable 6.4 Future Internet Initiatives Year 1 Page 6 of 28
7 Abbreviations AFG CCIS CloudCom CSA CSP EU FORUM CYSPA EEMA ENISA EOS EP3R ESC FIA ICT NIS SecCord TDL Advisory Focus Group Communications in Computer and Information Science IEEE Conference on Cloud Computing Technology and Science Cloud Security Alliance Cyber Security & Privacy Forum European Cyber Security Protection Alliance European Association for e-identity and Security European Union Agency for Network and Information Security European Organisation for Security European Public Private Partnership for Resilience Economics of Security in the Cloud Future Internet Assembly Information and Communication Technology Network and Information Security SECurity and trust COoRDination and enhanced collaboration Trust in Digital Life Deliverable 6.4 Future Internet Initiatives Year 1 Page 7 of 28
8 1 Strategic Directions This section provides a general introduction to the document. It describes the main WP6 objectives and clarifies how the work package activities contribute towards achieving them. The overall objective of WP6 (as stated in the DoW [1] and reported in the frame below) is to highlight research directions for future developments and to inform relevant stakeholders. The main tasks carried out by WP6 contribute to this objective. Each task will involve multiple activities. The overall objective is to establish and maintain a forward perspective of the issues, challenges, requirements, and priorities as they develop over the lifetime of the project and to communicate this to the Programme and its clients. This outlook may address policy and deployment as well as research and development. Identify, establish and run an Advisory Focus Group Setup and coordinate the running of two focus groups (academic and industrial) Identify key topical areas and emerging issues Creation of hot topic white papers with findings Disseminate such whitepapers through various channels (WP4 portal, clustering groups, other security forums, national and European level) Contribution to and participation in future internet initiatives events as they arise, promoting T&S inclusion. This deliverable reports on the progress of the activities conducted during the reporting period Year 1. The achievement of the overall objective presents two major challenges. The first one is due to the nature of the objective itself. It has to project current trends in research and development in order to identify appropriate strategic directions shaping future research dimensions, industry practices and policy decisions. The second one is concerned with on-going European developments that may be relevant for the objective of the work package. This is further discussed in the next section. The remainder of this section highlights project constraints and the deliverable objectives. 1.1 EU Context The task of setting out future strategic directions is complicated by the rapidly evolving social, economic and technological contexts. New technologies such as cloud computing represent a major shift in the way Information and Communication Technology (ICT) is deployed across organisations opening up new opportunities for the users private and corporate as well as industry providers, suppliers and vendors of services and equipment. It also shapes markets and economies that rely on such technological developments. Alongside such economic and technological development, there are on-going legislative (and standardisation) activities in order to regulate such markets and technologies. Among many on-going initiatives, one of particular relevance is the revision of the European Data Protection Directive [2], which clarifies the roles and responsibilities of data controllers and data processors in order to protect data subjects (that is, their personal data). Any revision of the current data protection directive (and its subsequent legislation) will have an impact on technologies too. Another initiative that is particular relevant is the recent European Cybersecurity Strategy [3], which intends to secure the European cyberspace in order to protect its users and promote a safe Internet. Deliverable 6.4 Future Internet Initiatives Year 1 Page 8 of 28
9 1.2 Document Objectives The main objective of this document is to report on the WP 6 activities conducted during the reporting period Year 1. The document describes the main activities conducted and the resulting outcomes. It defines a process guiding and orchestrating the work package activities. The work package process combined with a timeline highlights the main activities conducted in the reporting period and planned for the following one (that is, Year 2). 1.3 Document Organisation This section describes the structure and the main objectives of the deliverable (as highlighted in the Executive Summary). Section 2 defines a process for WP6 in relation with the project dependencies. The defined process structures a workflow coordinating the different tasks. It also points out how the different tasks contribute to specific outcomes. Section 2 furthermore describes the objectives for each task. Section 3 reports the activities conducted during Year 1. It describes how each activity contributed to specific outcomes and tasks. Section 4 highlights the main Year 1 remarks and preliminary identifies some future activities. Deliverable 6.4 Future Internet Initiatives Year 1 Page 9 of 28
10 2 Work Package Process and Tasks This section describes the main tasks conducted by WP6 Strategic Directions. In order to coordinate tasks (described in Section 2.2) within the work package as well as to identify clear means of interactions between SecCord s work packages, we have defined a Work Package Process (described in Section 2.1). Each task involves different activities that contribute to specific project outcomes (Described in Section 3). The remainder of this section introduces the work package process and clarifies the objectives of each task. This organisational structure will form the basis for reporting yearly advancements of the described process, conducted activities and planned future initiatives. 2.1 Work Package Process This section describes the overall process identified to guide the execution of WP6 Strategic Directions. The rationale is to have a process that coordinates WP6 tasks and identifies clear outcomes to report every year. The yearly execution of process allows the achievement of WP 6 objectives. Each year the tasks change their focus in order to adjust to the overall progress of the project. Therefore, the overall process is similar for each year of the project. Figure 6 (in Appendix A) shows the WP6 Process over the three years of SecCord. The workflow coordinating each task is such to support the production of project deliverables as well as the collaboration with the other work packages. During Year 1, Task 6.1 Advisory Focus Group is concerned with the work package s objectives of: Identify, establish and run an Advisory Focus Group Setup and coordinate the running of two focus groups (academic and industrial). These two objectives are critical for Task 6.2 Investigation and Analysis pursuing the objectives of identifying and critically analysing relevant topics: Identify key topical areas and emerging issues Creation of hot topic white papers with findings. The discussions and analyses of key topics provide material for further discussion and engagement with relevant communities of researchers and practitioners as well as policy-makers. Task 6.3 Communication and Participation contributes towards the objectives of: Disseminate such whitepapers through various channels (WP4 portal, clustering groups, other security forums, national and European level) Contribution to and participation in future internet initiatives events as they arise, promoting T&S inclusion. Every year, each task focuses on different topics in order to investigate a broad spectrum of research in Security and Trust. Therefore, the workflow of Year 2 and Year 3 are similar to that of Year 1. However, tasks will focus on different strategic directions and involve different activities in order to achieve project objectives. The following section describes in details the objectives of each task. 2.2 Work Package Tasks This section describes the tasks of the work package as identified in the Description of Work [1]. The description of each task clarifies the objectives as well as the interactions with other tasks and the Deliverable 6.4 Future Internet Initiatives Year 1 Page 10 of 28
11 other work packages. Although the focus of each task may vary with the progress of the project, the overall objectives remain constant. They are achieved by different means and activities identified and planned yearly. Section 3 reports the activities and outcomes during the reporting period Year Task 6.1 Advisory Focus Group The main role of the Advisory Focus Group (AFG) is to advise SecCord on the identification of key topical areas and emerging issues in trust and security research. On the one hand, the AFG advises SecCord on the identification of multidisciplinary research areas that highlight legal, social and economic aspects of trust and security technologies. On the other hand, it contributes to the discussion of barriers that inhibit research results to industry impact. Among the main objectives for the AFG is to identify key topic areas, trends and emerging issues. The identified key topic areas will be further analysed and described in future deliverables, and disseminated through various channels. The overall objective is to establish and maintain a forward perspective of the issues, challenges, requirements and priorities as they develop over the lifetime of the project and to communicate this to European stakeholders. This addresses ICT research, development, deployment and policy. This task is concerned with establishing and supporting an AFG that helps to identify key priorities for future action, particularly with respect to the needs of the European ICT industry, its suppliers and consumers. The AFG involves industry stakeholders, leading visionary research experts, and Trust and Security (T&S) external initiative key representatives. It consists of two focus subgroups that make up the overall advisory focus group: an academic focus group supporting the needs of Task6.2 and WP3 Analysis of Trust and Security Programme Achievements and an industrial focus group supporting the needs of Task5.1 Industrial Liaison and WP3. The AFG, therefore, provides guidance to the project on research priorities. These research priorities are assessed against current research and development initiatives (Task6.2 in collaboration with WP3 and WP5). They inform a European research and development roadmap, which will contribute to the shaping of future research and development initiatives. SecCord intends to engage technically in discussion with the AFG. SecCord promotes activities (e.g. white papers and workshops) that aim to enhance the interaction with relevant research and industry stakeholders (Task 6.3). The outcomes of such activities inform WP6 conclusions and recommendations for strategic directions for research. The AFG meets once or twice a year in order to discuss relevant emerging research issues and topics and to provide feedback on the consortium activities. The structure of the AFG is such as to support the activities of WP3, WP5 and WP Task 6.2 Investigation and Analysis This task investigates specific multidisciplinary research directions within the problem space of ICT Security and Trust. It provides a series of studies of key topics, with the support of the AFG from its own assessment of the future directions: emergent key issues challenging the Internet, its services, and its users. Critical analyses supported by relevant literature provide insights about research and development perspectives identified and discussed by the AFG. The AFG helps to prioritise these research and development perspectives in the areas of ICT Security and Trust (S&T). Security and Trust together with technical and socio-economic-legal perspectives represent a vast research problem space in terms of identifying multidisciplinary research topics that need to be explored selectively. It also helps assessing research and development outcomes. This informs the SecCord strategic research direction agenda (road-mapping). Deliverable 6.4 Future Internet Initiatives Year 1 Page 11 of 28
12 2.2.3 Task 6.3 Communication and Participation This task in collaboration with the other work packages contributes to the dissemination activities of SecCord conclusions and recommendations. It consists of three main components: Delivering position papers: Topic papers to make available the findings of the AFG; contributing to appropriate channels, forums, and events Participating in networking activities: Liaise with and contribute to key future internet initiatives associated with the Programme, e.g.: future Strategic Research Agenda; follow-on to the Future Internet Assembly (FIA) and its support activities Supporting community involvements: Provide content and commentary to channels propagated through the project s own portal. 2.3 Work Package Contributions and Dependencies There are a number of dependencies and commitments (described in the DoW [1]) between WP6 and the other WPs. This section highlights the role of WP6 with respect to the other WPs. Figure 1 shows graphically the interactions between the work packages. Figure 1 Work Package Structure Links WP2 Support Enhanced Collaboration: WP6 helps with the update of the clustering activities. It also coordinates the interaction between the Advisory Focus Group and WP2. WP3 Analysis of Trust and Security Programme Achievements: WP6 coordinates the interaction between the Advisory Focus Group and WP3. The identified Key Topics will inform the revision of Trust and Security research. Deliverable 6.4 Future Internet Initiatives Year 1 Page 12 of 28
13 WP4 Dissemination and Conference: WP6 contributes to the dissemination activities as well as to the annual conference. It also coordinates the interaction between the Advisory Focus Group and WP4 in order to identify opportunities for participations and involvements. WP5 Research to Industry Impact: WP6 coordinates and facilitates the activities of the industrial sub-group of the Advisory Focus Group in order to support WP5. WP6 Strategic Directions: WP6 is responsible for establishing and maintaining the SecCord s Advisory Focus Group to support WP6, WP3 and WP5 activities. The Advisory Focus Group helps to identify future emergent key issues. WP6 engages and liaises with future Internet activities, and works to make trust and security area very highly visible. Outputs are disseminated via WP4 activities and WP2 collaborative activities. The relationships between work packages can be further expressed in terms of links between tasks. Task 6.1 Advisory Focus Group directly supports Task 5.1 Industrial Liaison and Task 3.1 Research & Innovation Yearbook. The SecCord s AFG provides guidance on the key topics to be critically analysed in order to identify directions for research and development (Task 6.2 Investigation & Analysis). The identification and discussion of such topics provide feedback to the security and trust clusters (Task 2.2 Enhanced Collaboration). Task 6.3 Communication & Participation contributes toward the dissemination as well as the community building and provides direct support to Task 4.3 Trust & Security Community Building and Dissemination. We deal with other emergent links, contributions and dependencies between tasks by coordination and collaboration between work packages. Deliverable 6.4 Future Internet Initiatives Year 1 Page 13 of 28
14 3 Future Internet Initiatives: Year 1 This section details the relevant work package activities conducted during the reporting period. It describes the performed activities and their main outcomes, and also highlights how they have contributed towards the work package tasks. 3.1 Work Package Activities During the reporting period Year 1, all tasks (i.e. Task 6.1 Advisory Focus Group, Task 6.2 Investigation and Analysis, and Task 6.3 Communication and Participation) made progress. The organisation of the tasks and their activities followed the WP 6 process (Figure 6). This section clarifies the work package activities that contributed to the work package. Table 1 lists the main work package activities conducted during Year 1 and highlights their contributions to the work package tasks respectively. The different activities supported successfully the progress of related tasks. Table 1 Activity contributions to Work Package Tasks Activity Task 6.1 Advisory Focus Group Task 6.2 Investigation and Analysis Task 6.3 Communication and Participation A1: Advisory Focus Group Setup A2: Identification and Analysis of Key Topics A3: Workshop on Economics of Security in the Cloud A4: Volume on Cyber Security and Privacy A5: Other Communication and Participation Activities A6: Industrial Liaison A7: Monitoring Relevant Policies The activities conducted during Year 1 have successfully contributed towards the WP tasks. They delivered the expected outcomes with respect to the work package objectives. The following sections describe each of these activities in details A1: Advisory Focus Group Setup This activity was directly related to Task 6.1 Advisory Focus Group; probably the most critical one during the first year of the project in order to start other related tasks and activities. We successfully set up the SecCord s Advisory Focus Group (AFG) consisting of academic and industrial expert groups. We invited experts based on their research interests relating to the scope of the project. The list of people who accepted our invitation to join the AFG and attended the first meeting has been reported in Deliverable D6.1 Advisory Focus Group Setup [1]. While planning the first AFG meeting we wanted to make the organisation as effective as possible, therefore, we decided to collocate the first AFG meeting with the annual Cyber Security & Privacy EU Forum (CSP EU FORUM 2013), which was held Deliverable 6.4 Future Internet Initiatives Year 1 Page 14 of 28
15 in collaboration with the European Association for e-identity and Security (EEMA) and Trust in Digital Life (TDL) and hosted by the European Commission in Brussels on 18 th April 2013 (Deliverable D6.1 reports on the organisation and the outcomes of the first AFG meeting [1]). The collocation with the CSP EU Forum 2013 allowed us to have an effective meeting from two viewpoints: cost-effectiveness and community engagement. We were able to have a large AFG meeting as most members attended the CSP EU FORUM Moreover, this has allowed the AFG members to engage with relevant communities of researchers, practitioners and policy-makers attending the event. It has also given them the opportunity to familiarise with on-going community activities (in particular, Trust and Security Clusters of WP2 Support Enhanced Collaboration, and the Annual Trust and Security Conference of WP4 Dissemination and Conference). Figure 2 shows the direct support and communication between the AFG and the work packages. Figure 2 Advisory Focus Group s support and communication A2: Identification and Analysis of Key Topics In order to achieve the main work package objective to establish and maintain a forward perspective of the issues, challenges, requirements, and priorities as they develop over the lifetime of the project and to communicate this to the Programme and its clients, with the support of the AFG, we have begun to identify trust and security issues relating to legal, social and economic aspects of Information and Communication Technology (ICT). Deliverable 6.4 Future Internet Initiatives Year 1 Page 15 of 28
16 For this first year, we have decided to focus on economic perspectives. We felt that it is critical to the prioritisation of research and development activities as well as investments, as in the past European funded research and development outcomes have often failed to be taken up by industry. This is often characterised by the valley of death problem [5], that is, research and development outcomes in cyber security facing difficulties of being deployed into industry practices (this was confirmed by the discussions at the AFG meeting [4]). We critically analysed the discussions at the first AFG meeting and supported them with relevant literature. We summarised these discussions into four research dimensions in security and trust [4]: Technology Operational Impact People. Figure 3 shows and summarises the identified key topic areas. Figure 3 Key topic areas The economic perspective of research and development in security and trust is concerned with both operational and impact dimensions. In order to investigate such directions for timely technology developments, we focused our activities on the Economics of Security in the Cloud. In order to investigate such research topic in a pragmatic way, we have started to organise related activities (e.g. a related workshop and review of related literature) A3: Workshop on Economics of Security in the Cloud The economic aspects of cloud computing are still only vaguely understood. Different deployments of cloud computing involving different stakeholders enable new or alternative business models. Deliverable 6.4 Future Internet Initiatives Year 1 Page 16 of 28
17 However, emerging issues (e.g. see CSA report on the top threats affecting cloud computing [6]) about security and trust may affect the economics of cloud computing as well as its adoption. We have organised a workshop 1 on Economics of Security in the Cloud (ESC), co-located with CloudCom (a major event for researchers and practitioners in cloud computing), in order to engage with related stakeholders. The workshop s call for paper concerned major topics (e.g. behavioural security and privacy, economics models for security in the cloud, cyber-defence strategy and game theory, economics of privacy and anonymity). The programme committee comprising experts from academia and industry has peer-reviewed submissions, and selected five papers to be presented at the workshop and published in the conference proceedings. Among the selected papers (see the preliminary programme in Appendix B) were also submissions from on-going European projects (A4CLOUD, Accountability For Cloud and Other Future Internet Services; TREsPASS, Technologysupported Risk Estimation by Predictive Assessment of Socio-technical Security) and other nationallyfunded initiatives A4: Volume on Cyber Security and Privacy The CSP EU FORUM was organised in collaboration with the European Association for e- Identity and Security (EEMA) and Trust in Digital Life (TDL) and hosted by the European Commission in Brussels. The Trust in the Digital World and Cyber Security & Privacy EU Forum consisted of a variety of presentations and panel discussions covering the key challenges and strategies available to effectively manage employee, citizen and corporate trust. The conference provided an opportunity for those in business, the public sector, research and government who are involved in the policy, security, systems and processes surrounding trust to exchange ideas and views. In order to engage technically with researchers as well as to enhance the visibility of the event, this two-day conference organised by EEMA, TDL and CSP EU FORUM (and hosted by DG CONNECT, European Commission) in partnership with the SECCORD project invited presenters, panellists and exhibitors to contribute to a volume published by Springer in the Communications in Computer and Information Science (CCIS) series 4. The call-for-paper solicited two types of papers (not previously published or concurrently submitted elsewhere) to be published in the post-proceedings of the conference: 1) Practical Experience Reports and Tools presenting an in-depth description of practitioner experience, a case study, a test bed or a tool, providing new insights to the community 2) Research Papers presenting recent original research results with an archival quality conference publication. Papers submitted in both categories were peer-reviewed by program committee members and experts. Papers submitted have been peer-reviewed by (at least three) program committee members and experts. The peer-review process provided authors with valuable feedback in order to improve Deliverable 6.4 Future Internet Initiatives Year 1 Page 17 of 28
18 their papers. The selected papers grouped in thematic parts of the proceedings capture just a snapshot of the two-day conference (see Appendix C), which provided an opportunity to present and debate on-going cyber security and privacy research and development in Europe. These proceedings intend to inform researchers, practitioners and policy-makers about research developments and technological opportunities for innovation in cyber security and privacy. The selected and revised papers are now published in the CCIS volume published by Springer [7]. Figure 4 shows the cover of the proceedings, which are available in printed as well as digital media online 5. Figure 4 Volume on Cyber Security and Privacy (cover) A5: Other Communication and Participation Activities The discussions at the first AFG meeting highlighted two particular perspectives defining strategic directions: Research Impact and Research Dimensions [1]. The former (research impact) stresses that it is necessary to understand how to enhance research impact on user practices and industry products and services. Technology transfer may face some obstacles due to (lack of) technology maturity or (lack of) innovation stimuli. Other barriers may be due to (lack of) research support (in terms of legal, commercial or intellectual property instruments). In order to understand better the issues faced by research and development in trust and security, we will carry on different analyses that will be reported by publications and white papers (in collaboration with the other work packages) concerned with: 5 Deliverable 6.4 Future Internet Initiatives Year 1 Page 18 of 28
19 R&D Challenges in Cybersecurity: the outcomes of the first AFG meeting were presented in a panel at the Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy (co-located with Trust 2013, the 6th International Conference on Trust and Trustworthy Computing, Department of Computing at Imperial College London). The objective of the workshop was to foster discussion on innovation strategies to address, some aspects of cybersecurity R&D, including cybersecurity R&D strategy and innovative collaboration models. Our position statement presented the readiness-innovation space (identified in [4]) to discuss strategies to support research impact. Economics of Security in the Cloud: this will review literature that we have identified in order to organise the related workshop. The planned white paper will highlight current understanding of economics of security in the context of cloud computing. It will give an example of how an economic perspective may give us a different viewpoint of analysis of technologies and critical features like security. Economics of Cyber Security and Privacy: in order to generalise our understandings of economics of cyber security and privacy, we have made enquiries to a scientific journal about publication of a special issue on Economics of Cyber Security and Privacy. Technological Readiness and Maturity: research outcomes are often assessed against criteria that provide limited information about their potential impact and effective operational usage; this limits our understanding of innovation cycles and research-to-industry impact. Research Policy and Market: alternative funding and supportive instruments create a market for research outcomes, however it is unclear whether or not current funding and regulatory instruments create the most favourable conditions for innovation and research transfers. Research-to-Industry Technological Transfer: trust and security research outcomes face uncertainty in their successful transfer to practice and industry; this is not indicative of their potential, but it is often due to lack of support, misunderstanding of market complexity, and misalignment of incentives better understating of such barriers would enhance research-toindustry impact of security and trust research A6: Industrial Liaison During the first meeting of SecCord AFG, the industrial subgroup discussed on the alignment of industrial research positions and their placement in the context of the on-going European Commission initiatives. In particular, it discussed the publication of the European Cybersecurity Strategy [8] and the Communication on Cybersecurity directive and the plan to set up the Network and Information Security (NIS) Platform that was finally established in June SecCord performed an analysis of the existing industry-led initiatives and presented this to the AFG in order to discuss the best way for the future collaborations. Trust in Digital Life TDL founded in 2008 by Microsoft, Nokia, Gemalto and Philips, with priority to acquire new members and establish a solid governance and financial base. New members were recruited and today it has more than 30 members. Public funding was awarded (ACTOR) to build the ecosystem with members, working group delivered papers on use cases, technical requirements, and strategic research agenda was delivered. So called sprint projects were done to demonstrate some technologies e.g. E-authentication. However, the high level impact and link to national groups were missing. Focus was mainly on technology and less on policy. In 2013 TDL started a new phase and established itself as a legal entity. The European Public Private Partnership for Resilience (EP3R) is the group led by the European Union Agency for Network and Information Security (ENISA) for Deliverable 6.4 Future Internet Initiatives Year 1 Page 19 of 28
20 resilience of information and communications technology infrastructure, which works to foster cooperation between the public and private sectors on security and resilience objectives, baseline requirements, policy practices, and measures. In 2013 it was revamped by ENISA and new thematic areas have been announced with their terms of references: Key assets, resources and functions for the continuous and secure provisioning of electronic communications across countries Baseline requirements for security and resilience of electronic communications Coordination and cooperation needs and mechanisms to prevent and respond to large scale disruptions affecting electronic communications However, after the establishment of NIS platform, these groups have been integrated in the new platform. EOS, the European Organisation for Security, is registered as a limited liability cooperative company under Belgian Law with equal shareholder Members and run not-for-profit. As of 2013, EOS represents the interests and expertise of 43 Members involved in Security although only about the half of these companies is active in ICT. The working group called ICT security (which has issued a number of White papers from 2010 to 2013) was renamed cybersecurity in 2013 and is closely linked to CYSPA project (EOS is the coordinator) which aims to launch European Cyber Security Protection Alliance. The actual launch is postponed until Besides these groups, analysis of the other related networks of excellence, thematic networks, large scale projects, as well as non-security partnerships, such as Future Internet PPP, has been prepared and presented to the AFG. Thanks to the Industry liaison activity of SecCord, different initiatives and industrial efforts came together for the first time in April as a part of AFG, including the chairman of TDL Steering board, CEO of EOS, representatives of EP3R, Stork etc. However, the emergence of NIS platform as the glue or unifying initiative has changed the overall context and the future SecCord activities will address this new landscape A7: Monitoring Relevant Policies This activity benefits from our direct involvements in related groups, e.g. working groups of the Network and Information Security (NIS) Platform and European projects (e.g. A4CLOUD among many others) as well as interactions with other on-going projects (e.g. by means of the clustering and dissemination activities). Our main focus is on legislative activities concerned with data protection [2] and cyber security [8]. Further attention is given to the forthcoming European Framework Programme for research and innovation, Horizon The objective is twofold. First, it is necessary to make our activities as relevant and timely as possible with on-going legislative efforts. This is also useful to inform other stakeholders (e.g. European research projects). Second, our activities intend to identify gaps in current research, practice and policy and to identify opportunities for future research and innovation. 3.2 Work Package Progress This section summarises the work package progress with respect to the specified process (Figure 6). The work package process highlights a workflow that links all tasks (which may link directly or indirectly with other project tasks). Work package activities have contributed toward progress of all relevant tasks. Table 2 summarises the main activities contributions and interactions with other work packages. Deliverable 6.4 Future Internet Initiatives Year 1 Page 20 of 28
21 Table 2 Activities Contributions and Work Package Interactions Activity A1: Advisory Focus Group Setup A2: Identification and Analysis of Key Topics A3: Workshop on Economics of Security in the Cloud A4: Volume on Cyber Security and Privacy A5: Other Communication and Participation Activities Contribution Highlights Setup of the Advisory Focus Group; First AFG Meeting; Identification of Key Topics Identification of Key Topics; Critical analysis of Key Topics Community engagement on a selected topic Community engagement and dissemination Identification of key topics to be critically analysed and discussed with relevant communities A6: Industrial Liaison Communication of relevant European initiatives, and discussion on potential alignment and engagement A7: Monitoring Relevant Policies Identification of and involvement in relevant initiatives WP Interactions WP5 WP3 WP2, WP3 WP3, WP4 WP5 WP3 The work package process guided the different tasks and identifies how the outcomes are used by or contribute to each task. The activities conducted during the reporting period Year 1 have contributed towards the progress of each task. Moreover, they have supported the interactions with the other work packages. The work package has contributed towards three types of outcomes: Critical Analyses (the critical analysis of the AFG meeting has identified specific key topics), Dissemination (in terms of presentations or publications) and Community Interactions (with relevant stakeholders and experts). Work package 6 is in line with the expected objectives for the reporting period Year 1. Deliverable 6.4 Future Internet Initiatives Year 1 Page 21 of 28
22 4 Year 1 Achievements and Insights This section highlights some remarks drawn from carrying out WP 6 tasks and related activities (coordinated by the work package process). It summarises the achieved objectives for Year 1 and the lessons learned. Moreover, it identifies some activities to be carried out during Year 2. Figure 5 shows the activity timeline for Year 1. It highlights the main activities conducted during the reporting period. Moreover, it preliminary identifies some activities that will be carried out during Year 2. The remainder of this section summarises the achieved objectives for Year 1, the main insights and some preliminary identified activities for Year 2. Figure 5 Activity Timeline Year Achieved Objectives Work package 6 has successfully achieved all its objectives (as identified in Section 2) for Year 1. It has conducted specific activities (Section 3) that contributed towards such objectives and concrete outcomes: Advisory Focus Group, Key Topics, and Community Engagement. Advisory Focus Group: the work package has successfully established an Advisory Focus Group (AFG) for the project. The first meeting AFG meeting, collocated with the CSP EU FORUM 2013, highlighted research dimensions to be investigated in order to guide future initiatives and to draw a roadmap for research and development in security and trust. Key Topics: the critically analysis of the input provided by the AFG combined with a review of relevant literature identified key topics of interests for future initiatives in cyber security and Deliverable 6.4 Future Internet Initiatives Year 1 Page 22 of 28
23 privacy. These key topics grouped together point out critical research areas. Moreover, a preliminary analysis of the barriers affecting technology transfers of cyber security research outcomes provides some hints of emerging tensions between research, development and policy. Addressing such tensions between research, development and policy would enhance research impact to practice and industry. Community Engagement: the work package has actively engaged with relevant communities. The overall strategy has been to engage with them technically, that is, by supporting activities that provided a means to discuss critical aspects of security and trust. This has created the conditions to explore multi-disciplinary dimensions (e.g. economics) capturing complex aspects of trustworthy ICT. 4.2 Main Insights The activities conducted during Year 1 gave us some useful insights that will be taken into account for organising activities in Year 2. These insights capture three critical aspects concerning with the management of the Advisory Focus Group, the exploration of a multidisciplinary research agenda and the effectiveness of project activities. Advisory Focus Group: the organisation of the first AFG meeting successfully achieved the intended objectives. The collocation with the CSP EU FORUM was very effective (both in terms of costs as well as logistics) in bringing together a large AFG. This also facilitated the engagement of the AFG with relevant communities as well as with project activities. Future AFG meetings will follow a similar strategy, i.e. co-locating the AFG meetings with relevant project activities (e.g. clustering meetings, CSP EU FORUM). Multidisciplinary Research Agenda: security and trust encompasses a vast research space. Exploring such a space exhaustively is beyond the scope and the capability of the project. The AFG feedback is useful to prioritise specific research and development directions. It is possible to identify topics that naturally highlight economic, social or legal perspectives of security and trust. Rather than simply discussing such topics, it has been useful to promote and organise activities (e.g. workshops, publications) that provide channels for technical engagement with relevant communities. Future activities will explore pragmatically the security and trust research space in order to define a multidisciplinary research agenda. Effective Coordination: the combined effort of the different work packages and the coordination of specific activities (e.g. AFG Setup and CSP EU FORUM) allowed us to make the most of the available resources. For instance, this has allowed the gathering of a large AFG, which was partially supported directly by SecCord. Similar combined efforts resulted in outcomes (e.g. the publication of a Volume on Cyber Security and Privacy) enhancing the visibility of SecCord activities. 4.3 Future Work Future activities (in Year 2) will continue to support related tasks. Some of the activities carried out during the reporting period (Year 1) will be continued in order to deliver specific outcomes. For instance, we foresee that: Activity 1 (AFG Setup) will continue as management of the AFG in order to organise future involvement of the AFG Deliverable 6.4 Future Internet Initiatives Year 1 Page 23 of 28
24 Activity 2 (Identification and Analysis of Key Topics) will continue to discuss (and if necessary, to update) the identified topics in order to prioritise them for detailed analysis Activity 3 (Workshop on Economics of Security in the Cloud) will probably be terminated in order to move our focus on another topic (according to the indications of the AFG) Activity 4 (Volume on Cyber Security and Privacy), based on our first experience in publishing post-proceedings for the CSP EU FORUM, we will try to update such activity in order to best serve the CSP EU FORUM community Activity 5 will synthesise analyses in white papers and contribute to appropriate dissemination channels Activity 6 will continue to seek opportunities to align our objectives and engage with ongoing European initiatives Activity 7 will monitor relevant policies by continuous engagement and interaction with relevant communities. The above activities together with new ones will be clarified while progressing with the process guiding Work Package 6. Deliverable 6.4 Future Internet Initiatives Year 1 Page 24 of 28
25 References [1] SecCord, Annex I Description of Work, Grant Agreement , Version Date [2] Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, 23/11/1995, p (1995). [3] European Commission, High Representative of the European Union for Foreign Affairs and Security Policy, JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013) 1 final, Brussels, [4] SecCord, Deliverable D6.1 Advisory focus group setup, Version 2.0, June [5] Maughan, D., Balenson, D. Lindqvist, U., Tudor, Z., Crossing the Valley of Death : Transitioning Cybersecurity Research into Practice. IEEE Security & Privacy 11(2):14-23, March/April [6] CSA, The Notorious Nine: Cloud Computing Top Threats in 2013, Top Threats Workinh Group, Cloud Security Alliance, February [7] Felici, M. (Ed.), Cyber Security and Privacy, Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers, Springer, Communications in Computer and Information Science (CCIS), Vol. 182, October [8] European Commission, High Representative of the European Union for Foreign Affairs and Security Policy, JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013) 1 final, Brussels, Deliverable 6.4 Future Internet Initiatives Year 1 Page 25 of 28
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationTrack 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security
Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.
More informationETIP Wind Steering Committee meeting Monday 7th March 2016 11:00 16:45 EWEA office, Rue d Arlon 80 6th floor Bruxelles AGENDA
ETIP Wind Steering Committee Meeting: ETIP Wind Steering Committee meeting Monday 7th March 2016 11:00 16:45 EWEA office, Rue d Arlon 80 6th floor Bruxelles AGENDA 11:00 11:30 11:30 12:00 12:00-12:45 12:45
More informationEconomics, Security and Innovation
Economics, Security and Innovation Massimo Felici Security and Cloud Lab Hewlett-Packard Laboratories Long Down Avenue Bristol BS34 8QZ United Kingdom massimo.felici@hp.com Abstract. This paper takes into
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationCYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationCOMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationFrequently Asked Questions regarding European Innovation Partnerships
May 2012 Frequently Asked Questions regarding European Innovation Partnerships 6 December 2010 FAQs 1. What are the objectives behind European innovation partnerships? 2. What concrete benefits can be
More informationCouncil of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationCEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationCYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationEUROPEAN COMMISSION Enterprise and Industry DG
EUROPEAN COMMISSION Enterprise and Industry DG EUROPEAN COMMISSION Internal Market and Services DG THE EUROPEAN MULTI STAKEHOLDER FORUM ON E-INVOICING: ACHIEVEMENTS AND THE WAY AHEAD Introduction The European
More informationCybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
More informationBuilding International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech
Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies
More informationEUROPEAN COMMISSION Employment, Social Affairs and Equal Opportunities DG COMMUNITY PROGRAMME FOR EMPLOYMENT AND SOCIAL SOLIDARITY (PROGRESS)
EUROPEAN COMMISSION Employment, Social Affairs and Equal Opportunities DG Directorate-General General Coordination, Interinstitutional Relations Brussels, 21 December 2006 01/FB D(2006) PROGRESS/003/2006
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationUnleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationYour door to future governance solutions
Your door to future governance solutions www.egovlab.eu 2 3 not just in theory but also in practice 4 5 www.egovlab.eu * Word from egovlab s director Vasilis Koulolias: The power of information and communication
More informationCYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationInternational Collaboration on Research Data Infrastructure
Project Acronym Project Title icordi International Collaboration on Research Data Infrastructure Project Number 312424 Deliverable Title Quality plan and Risk register Deliverable No. D1.1 Delivery Date
More information1.1. Do the outputs of the Network and Centres contribute to enhancing mobility and awareness of the European dimension in guidance and counselling?
EXECUTIVE SUMMARY 1. Evaluation task and methods The external evaluation of the Euroguidance Network (National Resource Centres for Vocational Guidance, NRCVG) had a two-fold task: 1) to assess the performance
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationINDICATIVE GUIDELINES ON EVALUATION METHODS: EVALUATION DURING THE PROGRAMMING PERIOD
EUROPEAN COMMISSION DIRECTORATE-GENERAL REGIONAL POLICY Thematic development, impact, evaluation and innovative actions Evaluation and additionality The New Programming Period 2007-2013 INDICATIVE GUIDELINES
More informationResearch and information management strategy 2015-18. Using research and managing information to ensure delivery of the Commission s objectives
Research and information management strategy 2015-18 Using research and managing information to ensure delivery of the Commission s objectives 1 1. Introduction This strategy sets out a range of research
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
More informationI. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED
SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the
More informationHow To Help The European Single Market With Data And Information Technology
Connecting Europe for New Horizon European activities in the area of Big Data Márta Nagy-Rothengass DG CONNECT, Head of Unit "Data Value Chain" META-Forum 2013, 19 September 2013, Berlin OUTLINE 1. Data
More informationPolicy Paper on Non-Formal Education: A framework for indicating and assuring quality
Policy Paper on Non-Formal Education: A framework for indicating and assuring quality Adopted by the Council of Members/ Extraordinary General Assembly 2-3 May 2008 (Castelldefels, Catalonia - Spain) 0.
More informationWorld e-parliament Conference 2016
World e-parliament Conference 2016 28-30 June 2016 Co-organized by the Inter-Parliamentary Union and the Chamber of Deputies of Chile #eparliament NOTE FOR SPEAKERS AND MODERATORS 16 June 2016 Thank you
More informationThe Cybersecurity Research Alliance
The Cybersecurity Research Alliance Executive Summary Motivation is a national priority that must be addressed to defend our society economy from attacks that undermine their digital foundation. A coherent
More informationNational Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
More informationWritten Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
More informationHERON (No: 649690): Deliverable D.2.6 DATA MANAGEMENT PLAN AUGUST 2015. Partners: Oxford Brookes University and Università Commerciale Luigi Bocconi
HERON (No: 649690): Deliverable D.2.6 DATA MANAGEMENT PLAN AUGUST 2015 Partners: Oxford Brookes University and Università Commerciale Luigi Bocconi Institutions: Low Carbon Building Group, Oxford Brookes
More informationJob Description. Industry business analyst. Salary Band: Purpose of Job
Job Description Job Title: Industry business analyst Division/Company: Industry Policy/Payments UK Reporting To: Director of Industry Policy Salary and: C Purpose of Job To provide thought leadership and
More informationISA Work Programme SECTION I
ISA Work Programme SECTION I TABLE OF CONTENTS INTRODUCTION...4 1. THE CONTEXT...4 1.1. The need for the ISA programme...4 1.2. The political context...4 2. THE ISA PROGRAMME...5 3. THE EUROPEAN INTEROPERABILITY
More informationFAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
More informationSecond Horizon 2020 Call Robotics ICT24
Second Horizon 2020 Call Robotics ICT24 Juha Heikkilä, PhD Head of Unit Robotics Directorate-General for Communication Networks, Content and Technology European Commission Robotics Horizon 2020 ICT Call
More informationFET-Open in Horizon2020 Work Programme 2014-2015. Roumen Borissov Future and Emerging Technologies FET-Open Research Executive Agency
FET-Open in Horizon2020 Work Programme 2014-2015 Roumen Borissov Future and Emerging Technologies FET-Open Research Executive Agency Content Future and Emerging Technologies (FET) in Horizon 2020 FET-Open
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationSaskatoon North Partnership for Growth (P4G) Draft Communications and Engagement Strategy
Saskatoon North Partnership for Growth (P4G) Draft Communications and Engagement Strategy Introduction This Communications and Engagement Strategy (Strategy) sets the communications and engagement framework
More informationUoD IT Job Description
UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management
More informationNIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
More informationCOMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34
More informationEU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
More information- 'Improving Cyber Security in Europe, the way forward
Report Breakfast Briefing: 'Improving Cyber Security in Europe, the way forward 24 April 2013, European Parliament, Brussels Disclaimer: This report is prepared by the rapporteur, Dr. Alea Fairchild, for
More informationGuideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010
Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More information16094/14 MM/mj 1 DG E - 1C
Council of the European Union Brussels, 26 November 2014 (OR. en) 16094/14 OUTCOME OF PROCEEDINGS From: On: 25 November 2014 To: CULT 134 AUDIO 69 MI 945 RELEX 980 STATIS 128 Education, Youth, Culture
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More information8970/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH
More informationResearch and Innovation Strategy: delivering a flexible workforce receptive to research and innovation
Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation Contents List of Abbreviations 3 Executive Summary 4 Introduction 5 Aims of the Strategy 8 Objectives
More informationStandards for Cyber Security
Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-97 97
More informationFuture and Emerging Technologies (FET) in H2020. Ales Fiala Future and Emerging Technologies DG CONNECT European Commission
Future and Emerging Technologies (FET) in H2020 51214 Ales Fiala Future and Emerging Technologies DG CONNECT European Commission H2020, three pillars Societal challenges Excellent science FET Industrial
More information5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
More informationEU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
More informationJA to support the ehealth Network
JA to support the ehealth Network ehealth Network & ehgi Directive 2011/24/EU of the European Parliament and of the Council on the application of patients` rights in cross-border healtcare 08.05.2015 2
More informationApril 26-27, 2014 Vienna, Austria. Executive Summary
BELMONT FORUM COLLABORATIVE RESEARCH ACTION ON E-INFRASTRUCTURE AND DATA MANAGEMENT PHASE 1: DEVELOPING A COMMUNITY STRATEGY AND IMPLEMENTATION PLAN SECOND STEERING COMMITTEE MEETING April 26-27, 2014
More informationEUROTECH UNIVERSITIES ALLIANCE CONTRIBUTION TO THE PUBLIC CONSULTATION SCIENCE 2.0-SCIENCE IN TRANSITION
EUROTECH UNIVERSITIES ALLIANCE CONTRIBUTION TO THE PUBLIC CONSULTATION SCIENCE 2.0-SCIENCE IN TRANSITION A: INTRODUCTION TO THE ALLIANCE S CONTRIBUTION The EuroTech Universities Alliance is a strategic
More informationCALL FOR QUOTATION For COMMUNICATION SERVICES
CALL FOR QUOTATION For COMMUNICATION SERVICES Background EuroHealthnet invites tenders from communications agencies in order to establish a framework agreement for a maximum duration of 3 years, subject
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE
EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE DGVT Meeting in Ireland 21 22 May 2013 Agenda item II Document 3 OMC THEMATIC WORKING GROUPS IN EDUCATION AND TRAINING Education Ministers
More informationEuropean Innovation Partnership on Active and Healthy Ageing. Action Group C2 Interoperable Independent Living Solutions
European Innovation Partnership on Active and Healthy Ageing Action Group C2 Interoperable Independent Living Solutions Peter Wintlev-Jensen and Marianne van den Berg European Commission 21-22 June 2012
More informationH2020-LEIT-ICT WP2016-17. Big Data PPP
H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale
More informationIoT Week 2015 Lisbon June 16th 18th
IoT Week 2015 Lisbon June 16th 18th Towards Large- Scale Internet- of- Things deployments IoT IS LIFE, LIFE IS ART: The role of artistic practices as catalysts of innovation in IoT. of the Roundtable Discussion
More informationMiddlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager
Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationD 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive
Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:
More informationData Analytics, Management, Security and Privacy (Priority Area B)
PRIORITY AREA B: DATA ANALYTICS, MANAGEMENT, SECURITY AND PRIVACY ACTION PLAN Data Analytics, Security and Privacy (Priority Area B) Context Data is growing at an exponential rate; information on the web
More informationCouncil of the European Union Brussels, 13 February 2015 (OR. en)
Council of the European Union Brussels, 13 February 2015 (OR. en) 6022/15 NOTE From: To: Presidency RECH 19 TELECOM 29 COMPET 30 IND 16 Permanent Representatives Committee/Council No. Cion doc.: 11603/14
More information(Article 131(2) of the Financial Rules of the Innovative Medicines Initiative Joint Undertaking)
Annual report of the Executive Director to the Discharge on measures taken in the light of the Discharge s recommendations of 2012 in respect of the implementation of the budget of 2010 (Article 131(2)
More informationPlease contact me on 0207 213 4378 or geoff.lane@uk.pwc.com if you would like to discuss this further.
House of Commons Public Bill Committee, Scrutiny Unit, 7 Millbank, London, SW1P 3JA. 8 September 2014 Dear Sirs, Modern Slavery Bill call for written evidence We appreciate the opportunity to respond to
More informationEUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology
EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Brussels, 14 September 2012 DG CNECT CALL FOR EXPRESSIONS OF INTEREST FOR THE SELECTION OF EXPERTS FOR "CONNECT
More informationICT Project Management
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact
More informationCommunication Plan. for the. ATLANTIC AREA 2007-2013 Transnational Cooperation Programme
Communication Plan for the ATLANTIC AREA 2007-2013 Transnational Cooperation Programme Prepared by the Managing Authority 18 January 2008 Index 0. Introduction... 2 1. Communication Strategy... 2 1.1
More informationWORK PROGRAMME 2013 27 NOVEMBER 2012
WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3
More information9360/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM
More informationENISA Work programme
ENISA Work programme 2016 SECURITY Including multiannual planning www.enisa.europa.eu European Union Agency for Network and Information Security About ENISA The European Union Agency for Network and Information
More informationEuropean Distribution System Operators for Smart Grids
European Distribution System Operators for Smart Grids Network and information security (NIS): Recommendations for information sharing and risk management September 2014 Executive summary Our modern society
More informationJyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
More informationThe NREN cloud strategy should be aligned with the European and national policies, but also with the strategies of the member institutions.
4 External influences PESTLE Analysis A PESTLE analysis is a useful tool to support the investigation and decision process relating to cloud services. PESTLE in general covers Political, Economic, Social,
More informationCall for experts for INSPIRE maintenance & implementation
INSPIRE Infrastructure for Spatial Information in Europe Call for experts for INSPIRE maintenance & implementation Title Creator Call for experts for INSPIRE maintenance & implementation EC & EEA INSPIRE
More informationINVITATION TO BECOME AN ASSOCIATE OF THE EDUCATION AND TRAINING FOUNDATION
INVITATION TO BECOME AN ASSOCIATE OF THE EDUCATION AND TRAINING FOUNDATION Table of Contents 1. Introduction... 2 2. The Education and Training Foundation... 2 3. The Role of Associates in the Foundation...4
More informationEUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION
EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION Brussels, 24 January 2013 CALL FOR EXPRESSIONS OF INTEREST FOR THE SELECTION OF EXPERTS FOR THE HORIZON 2020 ADVISORY GROUPS 1. Background
More informationHORIZON 2020. Energy Efficiency and market uptake of energy innovations. Linn Johnsen DG ENER C3 Policy Officer
THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION HORIZON 2020 Energy Efficiency and market uptake of energy innovations Linn Johnsen DG ENER C3 Policy Officer EU 2020 Targets Energy Efficiency Energy
More informationEDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry
EDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry Yuri Demchenko University of Amsterdam EDISON Education for Data Intensive Science
More informationENISA workshop on Security Certification of ICT products in Europe
ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification
More informationTDL Recommendations to NIS (WG3/SRA)
TDL Recommendations to NIS (WG3/SRA) Editors: Pascal Bisson, Jim Clarke, Amardeo Sarma, Daan Velthausz, Volkmar Lotz, Arthur Leijtens, Stefan Bumerl Contributors: community members at large with special
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationASSESSING THE EFFECTIVENESS OF COMPANY GRIEVANCE MECHANISMS
REPORT SUMMARY ASSESSING THE EFFECTIVENESS OF COMPANY GRIEVANCE MECHANISMS CSR Europe s Management of Complaints Assessment (MOC-A) Results THE FULL VERSION OF THIS REPORT IS AVAILABLE AT: HTTP://WWW.CSREUROPE.ORG/COMPANY_MECHANISMS_FOR_ADDRESSING_HUMAN_RIGHTS_COMPLAINTS.HTML
More information