Orchestrating Industrial and Academic Expertise: The IMG-S Security Research Roadmap (SRR)
|
|
- Noreen Hutchinson
- 8 years ago
- Views:
Transcription
1 Orchestrating Industrial and Academic Expertise: The IMG-S Security Research Roadmap (SRR) Heinrich Daembkes Cassidian Engineering ASD Chairman SRT Member IMG-S Coordination Group (SCG) 1
2 Societal and Industrial Needs Security is fundamental for quality of life for citizens: daily life with food, transportation, communication no threat by crime and disorder increase of prosperity through innovation, enhancement of knowledge and collaboration Security needs innovation to face new threats Industries task: bring innovative products and services to the citizen to serve the needs of society and owners 2
3 IMG-S: The Joint Approach Industry can t do alone: Involvement of all key expertise from all relevant players! Establishment of open cooperation forum Integrated Mission Group for Security (IMG-S) - Industry (large and small) - Academia - RTOs - End users working in a bottom-up and fully transparent process Objectives Understand the future needs of the security market (at a EU defragmented level) through the eyes of IMG-S members Identify existing and emerging research needs Convince authorities to support this research and development 3
4 Structure of IMG-S A set of Technology Areas (TA) bringing together experts in relevant domains to identify the priorities for RTD TA1 Surveillance Systems TA2 Communicati on TA3 Identification Systems TA4 Protection, neutralisation & restoration technologies TA5 Information processing & management TA6 CBRNE A synthesis and Co-ordination Group (SCG) gathers together the TA technology proposals and organizes these into a set of coherent recommendations. 4
5 Organisation of the Security Research Roadmap Work organized along 6 Missions, Foundation Topics, and Critical Technologies to address Societal Needs Mission 1: Security of Citizen Mission 2: Security of Infrastructure and Utilities Mission 3: Intelligence, Surveillance, and Border Control Mission 4: Restoring Security and Safety in Time of Crisis Mission 5: Security and Society Mission new: External Security Foundation topics Critical Technologies For each of them (incl. many relevant technical subthemes) a complete and consistent roadmap is proposed 5
6 Roadmap example Protection of the citizen in public places Demo Project CBRNEmap Inter Authority Resilience (SA) Operational requirements for CBRE attack of a shopping centre Protecting a shopping centre from CBRE threat DECOTESSC1 Integra ation Proje ect Integrated CBRE protection and decontamination systems Multi-sensor fusion and systems for CBRE detection Capability Project Stand-off detection of hazardous substances Rapid Response Bio-Sensing Indoor Simulation Tools Interoperability, training & testing 6
7 Summary Key priorities: Security deserves to be a key priority in Horizon 2020 Security needs joint end user and market driven activities Work should be organized in a mid to long term concerted program approach Key Achievements o IMG-S produced a SRR complementary to the EU approaches, that provides a candidate set of topics to support implementation of Security Research Agendas, e.g. ESRIA o Roadmap credible, achievable and consistent with present spending plans. o Work will continue to refine and expand content o o IMG-S invites you for your contributions! IMG-S is a network of experts, Europe wide, incl. new member states Available as advisor and facilitator at national and EU level providing an innovation platform for security IMG-S is tool to link national issues to create bilateral/multilateral approaches incl. linking the national platforms in informal way 7
8 Download your own copy: IMG-S: 8
9 IMG-S patchwork (partial ) 9
Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board
Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN
Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D
More informationGrahame Mansell-Grace Business Development Manager. KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013
Grahame Mansell-Grace Business Development Manager KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013 70 BILLION + * Horizon 2020 is now expected to receive 78.6bn in current prices over the
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):
More informationOhio Homeland Security Strategic Plan 2013-2016
GOAL 1 Strengthen Ohio s intelligence and information sharing system for the detection and prevention of threats to public safety. Objective 1.1 Support continued development of the information sharing
More informationREPORT DECEMBER 2009
ESRIF FINAL REPORT DECEMBER 2009 Disclaimer: The responsibility for this report lies with ESRIF. The European Commission supported its publication, but is not responsible for its content. More information
More informationSEC-19-BES-2016: Data fusion for maritime security applications
SEC-19-BES-2016: Data fusion for maritime security applications Research at EXUS 19 on-going projects 12 as coordinator Security Group Current projects / Key people SECURITY OF INFRASTRUCTURES AND UTILITIES
More informationThird EU Health Programme 2014-2020
Third EU Health Programme 2014-2020 THE CHALLENGES - increasingly challenging demographic context threating the sustainability of health systems - fragile economic recovery limiting the resources available
More informationINTERNATIONAL WORKSHOP ON EMERGENCY MANAGEMENT FOR CRITICAL INFRASTRUCTURES CRISES - 04 October 2012
Security, a new Dimension of CIP INTERNATIONAL WORKSHOP ON EMERGENCY MANAGEMENT FOR CRITICAL INFRASTRUCTURES CRISES - 04 October 2012 SERIT SEcurity Research in ITaly SERIT is the Italian Technological
More informationThe Commission Health Emergency Operations Facility:
EUROPEAN COMMISSION The Commission Health Emergency Operations Facility: for a coordinated management of public health emergency at EU level Neither the European Commission nor any person acting on its
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationIMPORTANT PROJECT OF COMMON EUROPEAN INTEREST (IPCEI)
IMPORTANT PROJECT OF COMMON EUROPEAN INTEREST (IPCEI) ON HIGH PERFORMANCE COMPUTING AND BIG DATA ENABLED APPLICATIONS (IPCEI-HPC-BDA) European Strategic Positioning Paper Luxembourg, France, Italy (& Spain)
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationTechnical security standardization aspects. PRACTICE Workshop on Standardization
Technical security standardization aspects PRACTICE Workshop on Standardization Alina Iatan CEN-CENELEC, Brussels, 22 September 2014 1 CONTENT Standardization- a unique system CEN deliverables CBRN-related
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationPolicy Paper on Non-Formal Education: A framework for indicating and assuring quality
Policy Paper on Non-Formal Education: A framework for indicating and assuring quality Adopted by the Council of Members/ Extraordinary General Assembly 2-3 May 2008 (Castelldefels, Catalonia - Spain) 0.
More informationROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
More informationWORK PROGRAMME 2009 COOPERATION THEME 10 SECURITY. (European Commission C(2008)4598 of 28 August 2008)
WORK PROGRAMME 2009 COOPERATION THEME 10 SECURITY (European Commission C(2008)4598 of 28 August 2008) This work programme includes all activities using the budget of 2009, but does not replace the work
More informationCouncil of the European Union Brussels, 13 February 2015 (OR. en)
Council of the European Union Brussels, 13 February 2015 (OR. en) 6022/15 NOTE From: To: Presidency RECH 19 TELECOM 29 COMPET 30 IND 16 Permanent Representatives Committee/Council No. Cion doc.: 11603/14
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationOverview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
More informationHow To Protect The Railway From Attack
FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with
More informationHTA NETWORK MULTIANNUAL WORK PROGRAMME 2016-2020
EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HEALTH AND FOOD SAFETY Healthcare systems, medical products and innovation Medical products: quality, safety, innovation Brussels, 20 May 2016 HTA NETWORK MULTIANNUAL
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More information2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
More information17-11-05 ANNEX IV. Scientific programmes and initiatives
17-11-05 ANNEX IV Scientific programmes and initiatives DG TAXUD Pre-feasibility study for an observation system of the External Border of the European Union In this study, the external border will be
More informationBoard of Member States ERN implementation strategies
Board of Member States ERN implementation strategies January 2016 As a result of discussions at the Board of Member States (BoMS) meeting in Lisbon on 7 October 2015, the BoMS set up a Strategy Working
More informationExecutive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
More informationJA to support the ehealth Network
JA to support the ehealth Network ehealth Network & ehgi Directive 2011/24/EU of the European Parliament and of the Council on the application of patients` rights in cross-border healtcare 08.05.2015 2
More informationGrahame Mansell-Grace Business Development Manager
Grahame Mansell-Grace Business Development Manager Technology Solutions for Transport Priorities in the East Midlands De Montfort University, Leicester 14 December 2012 What am I going to talk about? Benefits
More informationTowards the Seventh Framework Programmes 2007-2013
Building the Europe of Knowledge Towards the Seventh Framework Programmes 2007-2013 EC Seventh Framework Programme Proposed duration: 7 years (2007 to 2013) Budget initially proposed: ~72 billion Budget
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationCEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationPartnership for Progress Factories of the Future. December 2013 Maurizio Gattiglio Chairman
Partnership for Progress Factories of the Future December 2013 Maurizio Gattiglio Chairman Factories of the Future Manufacturing: Key to our Economy Since some years the important of manufacturing has
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationOportunidades no 7.º Programa-Quadro e no Horizonte 2020 para o setor da Saúde. Sessão de apresentação do ProjetoDo IT
Oportunidades no 7.º Programa-Quadro e no Horizonte 2020 para o setor da Saúde Vision Mission Flagship Initiative Innovation Union Europe 2020 (Mar 2010) 6 other Flagships Structural Funds Strategy FP7
More information14. Secure societies Protecting freedom and security of Europe and its citizens
HORIZON 2020 WORK PROGRAMME 2014 2015 14. Secure societies Protecting freedom and security of Europe and its citizens Important Notice on the First Horizon 2020 Work Programme This Work Programme covers
More informationThe German interagency approach to SSA
Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA
More informationText Analytics and Big Data
Text Analytics and Big Data META-FORUM 2012 Brussels, 20 th June 2012 Atos Research & Innovation 1 Table of Contents 1. Atos and why we are here 2. Examples 3. BIG: Big Data Public Private Forum 2 2 Atos:
More information1 FOCUS Foresight Security Scenarios
New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military
More informationIndividuals, Societies, Cultures and Health
www.cost.esf.org European Cooperation in Science and Technology ISCH Individuals, Societies, Cultures and Health By Dr Marc Caball Chairman, ISCH October 2010 The COST mission Strengthen Europe in scientific
More informationRevised Policy Paper on Non-Formal Education: A Framework for indicating and assuring quality
Revised Policy Paper on Non-Formal Education: A Framework for indicating and assuring quality ADOPTED BY THE COUNCIL OF MEMBERS ANTWERP, BELGIUM, 6-7 MAY 2011 1 COMEM -FINAL Executive summary Non-Formal
More informationCybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
More informationToward A Closer Digital Alliance
Toward A Closer Digital Alliance Presented at: GOVCERT.NL Symposium 2010 by: Melissa Hathaway HathawayGlobalStrategies@gmail.com 2020 Visions are Not Aligned NATO 2020: ASSURED SECURITY; DYNAMIC ENGAGEMENT
More informationGlobal Biodiversity Sub-Committee (GBSC) Meeting papers
Global Biodiversity Sub-Committee (GBSC) Meeting papers Nanotechnology and biodiversity: an initial consideration of whether research on the implications of nanotechnology is adequate for meeting aspirations
More informationUNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationDraft Horizon 2020 Work Programme 2014-2015 Secure societies Protecting freedom and security of Europe and its citizens
Draft Horizon 2020 Work Programme 2014-2015 Secure societies Protecting freedom and security of Europe and its citizens Important notice: This paper is made public just before the adoption process of the
More informationDHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
More informationACARE Mobility Challenge
ACARE Mobility Challenge Royal Aeronautical Society February, 23 rd, 2016 Content The ACARE mobility challenge Current SRIA content with regards to mobility / integrated transport ACARE mobility Working
More informationDOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
More informationThe European and UK Space Agencies
The European and UK Space Agencies A response to the House of Commons Science and Technology Select Committee April 2013 Introduction The Royal Academy of Engineering is pleased to submit evidence to the
More informationEUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology
EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Brussels, 14 September 2012 DG CNECT CALL FOR EXPRESSIONS OF INTEREST FOR THE SELECTION OF EXPERTS FOR "CONNECT
More informationA EUROPEAN DEFENCE RESEARCH & TECHNOLOGY STRATEGY
A EUROPEAN DEFENCE RESEARCH & TECHNOLOGY STRATEGY An Introduction to the EDRT Strategy Alexander Weis, Chief Executive, European Defence Agency Enhancing the effectiveness of the European Defence Research
More informationNOT PROTECTIVELY MARKED Agenda Item: 8
NOT PROTECTIVELY MARKED Agenda Item: 8 TO: FROM: Business Co-ordination Board Chief Constable DATE: 22 May 2013 THE NATIONAL POLICING REQUIREMENT 1. Purpose of Paper This paper provides an overview of
More informationAuthor: inno TSD. August 2012
How to write an FP7 ICT proposal? Author: inno TSD August 2012 AGENDA I. Information: General introduction ti to FP7 II. Your participation: Frequently asked questions III. Training: Generating ideas Strategies
More informationFunding Security Research: a European Issue. ESRAB & ESRP initiatives
Funding Security Research: a European Issue. ESRAB & ESRP initiatives Alessandro ZANASI ESRAB Member Scientific Director of INTELLIGENCE & SECURITY STUDY CENTER Thanks to our network of professionals,
More informationTransforming higher education in the 21 st Century; Innovating pathways to learning and continuous professional education
The Open and Flexible Higher Education Conference 2015 Transforming higher education in the 21 st Century; Innovating pathways to learning and continuous professional education 29-30 October, Hagen EADTU
More informationInformation on the move
Information on the move about OPTIMUM Multi-source Big Data Fusion Driven Proactivity for Intelligent Mobility, or OPTIMUM, is an EU-funded project that looks beyond state-of-the-art IT solutions to improve
More informationJoint statement on supply-chain security
Joint statement on supply-chain security The United States and the European Union face similar challenges and share a common approach to the security ofthe supply-chain. We have witnessed several incidents,
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationCentres of Competence and Virtual Centres of Excellence APARSEN webinar
Centres of Competence and Virtual Centres of Excellence APARSEN webinar Hildelies Balk Pennington de Jongh, 12 September 2012 Overview of this presentation 1. Background and overview of Centres in the
More informationTHE EUROPEAN SPACE TECHNOLOGY HARMONISATION
THE EUROPEAN SPACE TECHNOLOGY HARMONISATION INFORMATION NOTE (P. LIONNET - JC TREUET) INTRODUCTION HARMONISATION OVERVIEW HARMONISATION OBJECTIVES PRINCIPLES HARMONISATION STAKEHOLDERS THE PARTICIPANTS
More information2016 Outlook of the Global Security Industry
Brochure More information from http://www.researchandmarkets.com/reports/3623776/ 2016 Outlook of the Global Security Industry Description: Being aware of future cyber threats and trends at the national
More informationStandardisation Efforts in Electronic Invoicing
Standardisation Efforts in Electronic Invoicing Stefan Engel-Flechsig Chairman of CEN/ISSS Workshop on e-invoicing, Brussels Athens, 18.10.2006 Latest discussions... 2 Recent e-invoice Activities since
More informationROLE SPECIFICATION. The American College of Greece Athens, Greece. Director of Marketing
ROLE SPECIFICATION The American College of Greece Athens, Greece Director of Marketing The American College of Greece. The American College of Greece (ACG), founded in 1875, is the oldest and largest comprehensive
More informationPerspectives from The Domain Name Association
Perspectives from The Domain Name Association Abstract Area: COMBINED INTERNET GOVERNANCE PRINCIPLES AND ROADMAP Entitled by: Kurt Pritz Region: Global Organization: Domain Name Association Sector: Private
More informationBorder technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division
Border technology strategy Chair: Mike Milford, First Assistant Secretary, Major Capability Division Session outline Using technology to improve how we manage the flow of people and goods and identify
More informationWritten Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
More informationTsukuba Communiqué. G7 Science and Technology Ministers Meeting in Tsukuba, Ibaraki 15-17 May 2016
Tsukuba Communiqué G7 Science and Technology Ministers Meeting in Tsukuba, Ibaraki 15-17 May 2016 Introduction We, the Science and Technology Ministers of Canada, France, Germany, Italy, Japan, the United
More informationInvesting in Research Infrastructures: bankability, financial and business plans. 9th March. Amsterdam
Investing in Research Infrastructures: bankability, financial and business plans A journey to develop RI financial and managerial maturity 9th March Amsterdam 1 2 3 4 PART ONE PART TWO PART THREE PART
More informationSeamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationCouncil of the European Union Brussels, 10 November 2015 (OR. en)
Council of the European Union Brussels, 10 November 2015 (OR. en) 13645/1/15 REV 1 CULT 76 RELEX 871 DEVG 215 NOTE From: To: General Secretariat of the Council Permanent Representatives Committee/Council
More informationChallenges of Health Sector
The Informed Patient Dublin, 17-18 February, 2004 The role of the information management and of new technologies in developing healthcare for patients and citizens Jean-Claude Healy and Diane Whitehouse
More informationEuropol Public Information VACANCY NOTICE. Senior Specialist Information Architect (AD8), within the ICT Business Area of Europol
The Hague, 26 October 2015 Reg. nº: Europol/2015/TA/AD8/201 VACANCY NOTICE Name of the Post: Senior Specialist Information Architect (AD8), within the ICT Business Area of Europol Reporting to: Head of
More informationMilan, July 22, 2014
Informal Meeting of EU Ministers of Competitiveness (Research) Milan, July 22, 2014 Research Infrastructures: a European Challenge Research infrastructures (RI) play an important role in the advancement
More informationEUA Aarhus Declaration 2011. Investing Today in Talent for Tomorrow
EUA Aarhus Declaration 2011 Investing Today in Talent for Tomorrow European Commission President José Manuel Barroso told conference participants that universities have a key role to play in helping Europe
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationCiclo virtual en H2020
Ciclo virtual en H2020 Thematic BIODIVERSITY in H2020 Name: Zuzana Boukalova (METCENAS) Zuzana.boukalova@metcenas.cz ALCUE NET has received funding from the European Unions Seventh Framework Programme
More informationECHA s Regulatory Science Strategy
ECHA s Regulatory Science Strategy 2 ECHA s Regulatory Science Strategy Reference: ECHA-15-A-03-EN Publ.date: February 2015 Language: EN European Chemicals Agency, 2015 If you have questions or comments
More informationTowards new mission-oriented RTI policy and new rationales for programming and priority-setting
Towards new mission-oriented RTI policy and new rationales for programming and priority-setting Insights from the case of security K. Matthias Weber (AIT) E. Anders Eriksson (FOI) EU-SPRI Conference Helsinki,
More informationBusiness Continuity Planning
Business Continuity Planning Public Entities Risk Management Forum 5 th July 2012 Presented by Mark Penberthy FBCI Overcoming Practical Challenges Business Continuity Management (BCM) AGENDA 1. What is
More informationICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services ICT 9: Tools and Methods for Software Development Dan-Mihai
More informationScoping Paper for. Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens'
Scoping Paper for Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens' Important Notice: Working Document This paper is a working document. It
More informationThe CQC s approach to regulating urgent care. Ruth Rankine Deputy Chief Inspector for Primary Care CQC
The CQC s approach to regulating urgent care Ruth Rankine Deputy Chief Inspector for Primary Care CQC NHS Confederation Urgent and Emergency Care Forum Ruth Rankine Deputy Chief Inspector of General Practice
More informationSummary. Remit and points of departure
Summary The digital society and the digital economy are already here. Digitalisation means that it is becoming natural for people, organisations and things to communicate digitally. This changes how we
More informationState of Ohio Homeland Security STRATEGIC PLAN
State of Ohio Homeland Security 2011 Contents Introduction... 1 Mission Areas... 2 Goals... 3 Appendix A. Roundtable Advisory Committees... 14 Appendix B. Homeland Security Advisory Council... 17 Appendix
More informationOverview of DG INFSO R&D on Trust & Security
Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are
More information