Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech
|
|
- Dylan Blaise Booth
- 8 years ago
- Views:
Transcription
1 Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies and researchers in Brazil, India, and South Africa within Trustworthy ICT, including trust, privacy and security, Understand the activities and planning of the target countries; Carry out a mapping of the European Commission s planning to them, such that a common technical and policy alignment is viable. Building long term strategy for INCO >going further than bilateral activities (slide 2); Challenges - alignment of priorities and mechanisms Takes significant time for bi-lateral activities and even longer for multi-lateral activities; Having strong support from programme management essential. Timeline in Year 3 (ends Dec. 2013) Next events: 6-7 th June 2013 WGs workshop and BIC Annual forum in Q4, Outputs / Synergy with other projects International Advisory Group (IAG) and Working Groups (WGs) with members from projects and BIC countries (slide 3) BIC recommendations for H2020 (slides 4 and 5): Inputs from the IAG/WGs and their projects; Bi-lateral activities e.g. cooperation Workshops; other activities and initiatives where BIC participated in and contributed to; EU prioritisation of themes. BIC active with other projects and depends on them for proactive inputs. BIC Annual forum 2013 in Q4 date/location still TBD there could be some benefit for co-location. Relation to current major EC policy actions WG2 directly related to Network Information and Cyber security Bringing together cyber security experts from around the globe; Proposed architecture for international data sharing specifically for cyber security; Close ties with ENISA. WG1 has number of experts from the data protection, privacy, crypto and e-id communities; BIC has been active in the DG CNCT European Cloud expert group providing inputs on international research for trust and security in cloud computing; Direct Input to H2020 planning on future INCO strategy. In terms of an infrastructure for NIS Technology platform, how would you like to see it? Addresses the international challenges for cyber security that is responsive to fast changing environment; Must incorporate effective international liaison with other bodies/initiatives/agencies/ The BIC International Advisory Group provides a good model as it contains programme management, policy, industry (innovation) and research; There needs to also be a strong research community support element on a multi-lateral basis (see model proposed by BIC slide 6) Incentives = reducing fragmentation, increasing efficiency, enabling truly multi-lateral cooperation that is required to leverage and combine international expertise on cyber security. Track 14, 19 th April :00 13:00 [53]
2 BIC = Moving towards a strategic approach How do we achieve it? Track 14, 19 th April :00 13:00 [54]
3 BIC structure WG1 Human Oriented / citizen approaches to trust, privacy and security BIC International Advisory Group (IAG) WG2 Network Information and Cyber security WG3 Programme Focus; Funding; Identify Community Track 14, 19 th April :00 13:00 [55]
4 Recommendations (1/2) Interim recommendations published (see BIC web site - project impact section) Harmonisation, openness and interoperability Design of models, metrics, tools and mechanisms Evolutionary integration models Trust models, Risk metrics for cloud usage Governance model Global flow agreement for export control Education and research User awareness programmes and cyber defence exercises Global research frameworks for multi-lateral cooperation Track 14, 19 th April :00 13:00 [56]
5 Recommendations (2/2) Security, protection, crisis management Models and tools to increase trustworthiness Audit mechanisms and tools for a virtual world Traffic management models for emergencies Contingency plans Legal framework and design of institutional observatory Cyber-deterrence framework (constitutional implications) Data ownership rules, transparent cyber-policing rules Anti-cyber laundering initiative Themes for International cooperation are now being prioritised and ranked within the BIC countries. Report available in June Track 14, 19 th April :00 13:00 [57]
6 BIC IAG Multi-lateral co-operation model Extended WG EWG Core WG EWG EWG Track 14, 19 th April :00 13:00 [58]
BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)
Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical
More informationTrack 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security
Track 14 Networking and Coordination Cluster of CSAs / NoEs in Trust and Security Session proposed and chaired by Jim Clarke, Waterford Institute of Technology TSSG, Project coordinator of FP7 BIC CA.
More informationStrategy for Coordination of the Cross Domain Activities & Multi-Lateral Approach in International Cooperation
Strategy for Coordination of the Cross Domain Activities & Multi-Lateral Approach in International Cooperation BIC Presentation Paper 1 May 2013 Abhishek Sharma 1 James Clarke 2 1 Abhishek Sharma, BIC
More informationINCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationCouncil of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
More informationCOMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
More informationWorkshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel michel.riguidel@telecom-paristech.fr WG2 : network information & cybersecurity International
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationNIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationEU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationCloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
More informationCYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
More informationICT 6: Cloud computing
computing Jorge GASÓS Software and Services, Cloud Unit DG Connect Jorge.Gasos@ec.europa.eu Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationESKITP7146.01 Authorise strategy, policies and standards relating to IT service delivery performance metrics management
service delivery performance metrics Overview This sub-discipline covers the competencies required to direct the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring
More informationThe European Platform in Network and Information Security (NIS) Fabio Martinelli
The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy Cyber security directive -
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationESKITP714601 Authorise strategy, policies and standards relating to IT service delivery performance metrics management
service delivery performance metrics Overview This sub-discipline covers the competencies required to direct the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationEuropean Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT
European Cloud Computing Cloud standards Strategy Ken Ducatel DG CONNECT The Cloud Computing Strategy The European Commission's strategy 'Unleashing the potential of cloud computing in Europe' Adopted
More informationCloud standards: Ready for Prime Time. CloudWatch webinar: Standards ready for prime time (part 2) 1
Cloud standards: Ready for Prime Time CloudWatch webinar: Standards ready for prime time (part 2) 1 Agenda 15:00 Welcome and introduction 15:05 IEEE P2301: Guide for Cloud Portability and Interoperability
More informationUK Government Information Economy Strategy
Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...
More informationTowards best practice in spectrum use in the EU
RSPG/BEREC event Brussels, 11 November 2014 Towards best practice in spectrum use in the EU Peter Stuckmann (Head of Sector Spectrum Policy) Electronic Communications Networks and Services Directorate
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationData Analytics, Management, Security and Privacy (Priority Area B)
PRIORITY AREA B: DATA ANALYTICS, MANAGEMENT, SECURITY AND PRIVACY ACTION PLAN Data Analytics, Security and Privacy (Priority Area B) Context Data is growing at an exponential rate; information on the web
More informationAgenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability
IHE epsos Connectahon Pisa, 12 April 2011 The European Commission s s vision for ehealth interoperability Benoit Abeloos Research Program Officer, Interoperability - Standardization European Commission
More informationICT 10: Software Technologies
Technologies Jorge GASOS DG CONNECT Jorge.Gasos@ec.europa.eu Odysseas I. Pyrovolakis DG CONNECT Odysseas.Pyrovolakis@ec.europa.eu Software related activities in WP2016-17 Innovating in software: topics
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationDeliverable 6.4 Future Internet Initiatives Year 1
Theme [ICT-2011.1.4] Trustworthy ICT SECurity and trust COoRDination and enhanced collaboration Project Nº 316622 Deliverable 6.4 Future Internet Initiatives Year 1 Responsible: Contributors: Internal
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationFAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
More informationESKITP714401 Implement procedures and standards relating to metrics for IT service delivery
Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and
More informationThe demand of Cloud Computing in Europe: drivers, barriers, market estimates
The demand of Cloud Computing in Europe: drivers, barriers, market estimates Gabriella Cattaneo Associate VP IDC European Government Consulting Research In Future Cloud Computing workshop Bruxelles, May
More informationCYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationCloud and Critical Information Infrastructures
Cloud and Critical Information Infrastructures Cloud computing in ENISA Dr. Evangelos Ouzounis Head of Infrastructure & Services Unit www.enisa.europa.eu About ENISA The European Union Network and Information
More informationENISA s contribution to the development of Network and Information Security within the Community
ENISA s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA WSIS Implementation Mechanism: Action Line C5. 15 May 2006 1
More informationFuture Networks and Communications (Priority Area A)
PRIORITY AREA A: FUTURE NETWORKS AND COMMUNICATIONS ACTION PLAN Future Networks and (Priority Area A) Context The Internet has become a critical infrastructure that forms a key element of our social and
More informationTHE LATVIAN PRESIDENCY UNLOCKING EUROPEAN DIGITAL POTENTIAL FOR FASTER AND WIDER INNOVATION THROUGH OPEN AND DATA-INTENSIVE RESEARCH
THE LATVIAN PRESIDENCY UNLOCKING EUROPEAN DIGITAL POTENTIAL FOR FASTER AND WIDER INNOVATION THROUGH OPEN AND DATA-INTENSIVE RESEARCH IT-LV-LU TRIO PROGRAMME Overcome the economic and financial crisis Deliver
More informationDG CONNECT (Unit H5) Overview of the European Data Centre/Smart Cities initiatives in DG Connect H5
DG CONNECT (Unit H5) Overview of the European Data Centre/Smart Cities initiatives in DG Connect H5 Svetoslav Mihaylov Scientific/Technical Project Officer Smart Cities and Sustainability Directorate-General
More informationOverview of DG INFSO R&D on Trust & Security
Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are
More informationCEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
More informationDigital Agenda for Europe Cartagena de Indias, September 1, 2015
Digital Agenda for Europe Cartagena de Indias, September 1, 2015 Javier Huerta Bravo From the Digital Agenda (2010)... Commission ICT strategy for 2010-2020 Problems identified: Lack of investment in networks
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationCONNECTing to the Future
CONNECTing to the Future IoT Week Venice, 18 June 2012 Bernard Barani European Commission - DG INFSO Deputy Head of Unit, Networked Enterprise and RFID "The views expressed in this presentation are those
More informationDr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. evangelos.ouzounis@enisa.europa.eu
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA evangelos.ouzounis@enisa.europa.eu 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the
More informationEuropean Union Network Data Board Terms of Reference
28 April 2016 EMA/231985/2016 Terms of Reference 1. Remit, vision and mission The (EUNDB) is an advisory body co-chaired by the Head of Business Data and Support Department (EMA) and a National Competent
More informationUnleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
More informationITU- T Focus Group Cloud Compu2ng
ITU- T Focus Group Cloud Compu2ng International Telecommunication Union 1 ITU-T FG Cloud Management & Structure Management team: Chairman: Victor Kutukov (Russia) Vice-Chairman: Jamil Chawki (France Telecom
More informationRemoving barriers to Cloud Computing in Europe Open Workshop
Removing barriers to Cloud Computing in Europe Open Workshop SMART 2011/0045 - Open workshop By David Bradshaw, Gabriella Cattaneo, Giuliana Folco, IDC Thursday May 10, 2012- Brussels Copyright IDC. Reproduction
More informationHBR Consulting Data Center Service Offerings
HBR Consulting Data Center Service Offerings Executive Brief of Market Needs and Service Delivery Offerings 2014 HBR CONSULTING LLC. All rights reserved. Discussion Outline Practice and Service Overview
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future
More informationTHE EFFECTS OF BIG DATA ON INFRASTRUCTURE. Sakkie Janse van Rensburg Dr Dale Peters UCT 1
THE EFFECTS OF BIG DATA ON INFRASTRUCTURE Sakkie Janse van Rensburg Dr Dale Peters UCT 1 BIG DATA DEFINED Gartner in 2001 first coined the phrase Big Data Volume Velocity Big data is a popular term used
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationASEAN Central Banks Working Committee on Payment and Settlement Systems (WC-PSS) Strategic Report to the ASEAN Central Bank Governors Meeting
ASEAN Central Banks Working Committee on Payment and Settlement Systems (WC-PSS) Strategic Report to the ASEAN Central Bank Governors Meeting Introduction April 2011 1. The WC-PSS was endorsed at the ASEAN
More informationProf. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
More informationSESAR Studies & Demonstration Projects on RPAS & Cyber-Security
SESAR Studies & Demonstration Projects on RPAS & Cyber-Security Brussels, May 20 th 2014 2 Page 2 Rationale RPAS will generate the emergence of a new service sector RPAS limited by flight authorisations
More informationNational-level Risk Assessments
European Union Agency for Network and Information Security www.enisa.europa.eu Executive summary This report is based on a study and analysis of approaches to national-level risk assessment and threat
More informationEuropean Commission initiatives on e- and mhealth
European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,
More informationESKITP7145.01 Manage IT service delivery performance metrics
Overview This sub-discipline covers the competencies required to manage the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring service level performance is a
More informationWORK PROGRAMME 2013 27 NOVEMBER 2012
WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3
More informatione-infrastructures: a digital game changer
e-infrastructures: a digital game changer Pisa, 14 July 2015 Carlos Morais Pires European Commission e-infrastructures, DG CNECT.C1 Author s views do not commit the European Commission summary 1/ Policy
More informationEuropean Cloud Computing Strategy
European Cloud Computing Strategy Key actions and state of play Jorge GASOS DG Connect, European Commission Jorge.Gasos@ec.europa.eu Impact on providers and users Cloud services: market forecast Supply
More informationComprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board
Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationCEN/CENELEC/ETSI Cyber Security Coordination Group (CSCG)
CEN/CENELEC/ETSI Cyber Security Coordination Group (CSCG) White Paper No. 01 Recommendations for a Strategy on European Cyber Security Standardisation CSCG White Paper No. 01 Contents 1 Executive Summary...
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationStrengthening America s Data Agency. DOC Update and Response to CDAC Recommendations
Strengthening America s Data Agency DOC Update and Response to CDAC Recommendations 1 Data Introduction & Strategic Plan Revision 2 Review of DOC Data Goal and Strategic Objectives Strategic Goal: Maximize
More informationHow To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
More informationCLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES
CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES GLOBAL FORUM 2009 ICT & The Future of the Internet - Monday, October 19 th 2009 paolo.balboni@bakernet.com Introduction & Structure ENISA Working Group
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationSofware Engineering, Services and Cloud Computing
Work Programme 2013 Objective ICT-2013.1.2: Sofware Engineering, Services and Cloud Computing DG CONNECT Unit E2: Software and Service, Cloud Target Outcomes Delivering services in an effective, efficient
More informationDaniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016
Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016 SLALOM is ready to use Cloud SLAs SLALOM will take theory to practice, providing a trusted verifiable starting point
More informationEDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry
EDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry Yuri Demchenko University of Amsterdam EDISON Education for Data Intensive Science
More informationcreating a connected world NTT clouds overview
creating a connected world NTT clouds overview The NTT Group companies There is a reason why the NTT Group comprises a very select group of global technology companies. It is not just that we excel in
More informationEUK-02-2016: South Korea: IoT joint research
HORIZON 2020 WP 2016-17 EUK-02-2016: South Korea: IoT joint research DG CONNECT/DG AGRI/DG MOVE/DG RTD European Commission RIA EUK-02-2016: South Korea: IoT joint research Challenge: IoT has moved from
More informationNew Zealand s international air transport policy discussion document - Tourism New Zealand comments
New Zealand s international air transport policy discussion document - Tourism New Zealand comments Date: 18 June 2012 Objective What should the objective of New Zealand s international air transport policy
More informationCyber security in education in Greece
Cyber security in education in Greece Sokratis K. Katsikas ska@unipi.gr NIST SP800-50 NIS education in Europe EU Cyber security strategy and NIS directive http://eeas.europa.eu/policies/eu-cybersecurity/cybsec_comm_en.pdf
More informationData Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance
Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue
More informationChairman s Statement. Contents & Introduction. Introduction
Business Plan 2016 Contents Chairman s & Introduction Statement Introduction Chairman s Statement About the Commission Our major priorities for 2016 Facilitating market access & other benefits to industry
More information9360/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM
More informationEuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure!
Cloud Computing is the future! For sure! But secure! ISO/IEC JTC1 national day 2011 The EuroCloud Network EuroCloud Europe was founded on Jan., 22 nd 2010 in Paris Today EuroCloud is present in 27 European
More informationRolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market
Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European
More informationResearch Infrastructures in Horizon 2020
Research Infrastructures in Horizon 2020 Philippe Froissard Deputy Head of Unit - Research Infrastructures European Commission DG Research & Innovation Research Infrastructures Research infrastructures
More information5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
More informationCybercrime: Improving international cooperation
The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference [765004] Version [2] Discussion paper Europol Public Information 1 Introduction In preparation
More informationENISA Cloud Computing Security Strategy
ENISA Cloud Computing Security Strategy Dr Giles Hogben European Network and Information Security Agency (ENISA) What is Cloud Computing? Isn t it just old hat? What is cloud computing ENISA s understanding
More informationInformation Management & Technology (IM&T) Strategic Plan 2013-2016
Information Management & Technology (IM&T) Strategic Plan 2013-2016 DSTO: Science and Technology for Safeguarding Australia Introduction This document sets out a four-year strategy for information management
More informationStandards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
More information