CEPOL Cybercrime forensics & digital evidence course

Size: px
Start display at page:

Download "CEPOL Cybercrime forensics & digital evidence course"

Transcription

1 CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn 19 November 2014

2 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on the cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 2 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

3 Definition of Cyber-Security Security: protection of valuable assets Crime: human action convicted by the criminal law Defense: measures taken to protect against a potential or existing offense Cyber: electronic space Cyber-security: protection of valuable assets in the electronic space 19/11/2014 Slide 3 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

4 Who and Where are we European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice We are located in Tallinn Estonia (Headquarters) Strasbourg France (Operations) SJP Austria (Backup Operations) Liaison Office in Brussels 19/11/2014 Slide 4 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

5 What do we do Operational management of SIS II Schengen Information System VIS visa Information System EURODAC European dactyloscopic system Communications infrastructure 19/11/2014 Slide 5 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

6 Why we do Legal bases Regulations are the foundation of our activities High focus on security, data protection and business continuity aspects of the three large IT systems Security is a legal obligation 19/11/2014 Slide 6 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

7 How and when are we secure eu-lisa makes use of common frameworks to organise security, which is divided in to the following domains: Physical security Information security INFOSEC - CIA triad Organisational security Personnel security Industrial security 19/11/2014 Slide 7 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

8 Role of eu-lisa in the Cybersecurity Broad view, per large scale IT systems nature Actively contribute in the implementation of the cybersecurity strategy at EU level Operational cooperation with MS Security Officers Network - SON 19/11/2014 Slide 8 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

9 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 9 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

10 eu-lisa Strategy Strategic Goals of the Agency 1: Continue to grow as a contributor to and facilitator for freedom, security and justice policies in the EU 2: Become an acknowledged EU ICT centre of excellence and service provider 3: Grow as the principal EU ICT technology centre and expertise hub 4: Develop a modern efficient and agile organisation 19/11/2014 Slide 10 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

11 eu-lisa Strategy Strategic Goal 3: Grow as the principal EU ICT technology centre and expertise hub Continue to grow its internal expertise in relevant technical areas Exchange ICT best practices, experiences and knowledge with identified partners Deepening and strengthening partnerships 19/11/2014 Slide 11 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

12 Research as a driver for success Technology monitoring Desk study and media monitoring Liaison with MS, academic and industry experts Participation in project panels (e.g. security theme of H2020) Attendance at meetings, conferences and courses 19/11/2014 Slide 12 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

13 Operationally implementing outcomes of research Small-scale proofs of concept Possible upcoming projects in the cyber security realm Testing in dedicated environments Roll-out, future-proofing, lessons learned, dissemination to partners PKI systems Identity and Access management in distributed systems Advanced cryptography Automated tools for internal security assurance 19/11/2014 Slide 13 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

14 Strengthening partnerships SON WAs with Europol, EASO, Frontex signed, others planned. The parties may assist each other with know-how, expertise, best practices, lessons learned and advice in technical, operational and IT security related matters 19/11/2014 Slide 14 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

15 A look to the (near) future eu-lisa and beyond System consolidation will be key for reasons of efficiency and future-proofing and protection from cyber threats. Identity management will become more crucial and lessons from eu-lisa may be adapted to scale. Knowledge sharing within the EU and with the private sector will need to be more efficient. Technologies and procedures for incident detection and response will require advancement. eu-lisa will play an increasingly key role in EU internal security, including cybersecurity. 19/11/2014 Slide 15 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

16 19/11/2014 Slide 16 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

1 eu-lisa Strategy

1 eu-lisa Strategy 1 eu-lisa Strategy 2014 2020 eu-lisa Strategy 2014 2020 January 2014 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice Europe Direct

More information

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011.

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011. OPEN CALL AGENCY S INTERNSHIP Internship No: eu-lisa/14/int/hr/5.1 Unit/Department: Location: Human Resources and Training Unit Tallinn, Estonia Starting date: 16 September 2014 Level of Security Clearance:

More information

eu-lisa Annual Activity Report

eu-lisa Annual Activity Report eu-lisa Annual Activity Report 2013 Annual Activity Report 2013 February 2014 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800

More information

Security Audit VIS Central System. Summary Report

Security Audit VIS Central System. Summary Report Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

More information

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners Eurojust s Multi-annual Strategic Plan 2012-2014 Operational work Centre of expertise Partners Organisational developments Introduction Eurojust is entering a crucial phase of development as it approaches

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

OUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S

OUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S Council of the European Union 13870/15 (OR. en) PROVISIONAL VERSION PRESSE 66 PR CO 58 OUTCOME OF THE COUNCIL MEETING 3422nd Council meeting Justice and Home Affairs Brussels, 9 November 2015 President

More information

TESTA NG. Testa new generation Pieter.wellens@ec.europa.eu

TESTA NG. Testa new generation Pieter.wellens@ec.europa.eu TESTA NG Testa new generation Pieter.wellens@ec.europa.eu 2 nd International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sept 2013, Athens, Greece Agenda Mission Challenges Experiences

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Council of the European Union Brussels, 2 March 2015 (OR. en)

Council of the European Union Brussels, 2 March 2015 (OR. en) Council of the European Union Brussels, 2 March 2015 (OR. en) 6606/15 LIMITE JAI 114 PESC 213 COSI 28 COPS 55 ENFOPOL 52 COTER 41 SIRIS 13 FRONT 48 COPEN 63 DROIPEN 21 NOTE From: To: Subject: Presidency

More information

NCSRA-II Workshop. Event X. Critical Infrastructures. Cyber Security Research. Aug 29, July 3, Erik, Herbert, Frank, Sandro,

NCSRA-II Workshop. Event X. Critical Infrastructures. Cyber Security Research. Aug 29, July 3, Erik, Herbert, Frank, Sandro, NCSRA-II Workshop Event X Critical Infrastructures Cyber Security Research Aug 29, 2013 July 3, 2013 Erik, Herbert, Frank, Sandro, Herbert Bos (VU) Sandro Etalle(TUE) Frank Fransen (TNO) Erik Poll (RU)

More information

Network Operations Officer (2 posts) Strasbourg, France

Network Operations Officer (2 posts) Strasbourg, France VACANCY NOTICE Ref. : eu-lisa/15/ca/fgiv/7.1 Network Operations Officer Post: Sector/Unit/Department: Function Group/Grade: Location: Starting date: Network Operations Officer (2 posts) Operations and

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex. Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

13469/1/14 REV 1 1 DG D 1C LIMITE EN

13469/1/14 REV 1 1 DG D 1C LIMITE EN Council of the European Union Brussels, 27 November 2014 (OR. en) 13469/1/14 REV 1 LIMITE ENFOPOL 288 COTER 65 NOTE From: To: Presidency Permanent Representatives Committee/Council No. prev. doc.: 9956/14

More information

Council of the European Union Brussels, 5 June 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 5 June 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 5 June (OR. en) 6183/2/15 REV 2 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development POLGEN

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 27.3.2013 COM(2013) 172 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Data Protection and Cybercrime By Eva Ignatuschtschenko United Nations

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC A Business Perspective on Promoting Cybersecurity Art Reilly Cisco Systems For the ICC Topics Culture of Cybersecurity Role of Business Cooperation with the Stakeholders ICC Companion documents to the

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

J O I N T D E C L A R A T I O N

J O I N T D E C L A R A T I O N REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting

More information

Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol

Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Europol Unclassified - Basic Protection Level Aspects of Information

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Pan European Fire Strategy 2020 A safer Europe for all

Pan European Fire Strategy 2020 A safer Europe for all Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7

More information

How do EU agencies and other bodies contribute to the Europe 2020 Strategy and to the Juncker Commission Agenda? Executive summary

How do EU agencies and other bodies contribute to the Europe 2020 Strategy and to the Juncker Commission Agenda? Executive summary How do EU agencies and other bodies contribute to the Europe 2020 Strategy and to the Juncker Commission Agenda? Executive summary November 2016 Report prepared by Deloitte Project team: Thierry Van Schoubroeck

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

The EU approach to Cybersecurity and Cybercrime

The EU approach to Cybersecurity and Cybercrime The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security

More information

eulisa.europa.eu ISBN 978-92-95203-92-1 ISSN 2443-8294 doi:10.2857/567010 Catalogue number: EL-AE-15-001-EN-N

eulisa.europa.eu ISBN 978-92-95203-92-1 ISSN 2443-8294 doi:10.2857/567010 Catalogue number: EL-AE-15-001-EN-N Report on the technical functioning of Central SIS II and the Communication Infrastructure, including the security thereof and the bilateral and multilateral exchange of supplementary information between

More information

Level of Security Clearance: SECRET UE/EU SECRET 1 Parent Directorate- General/Service

Level of Security Clearance: SECRET UE/EU SECRET 1 Parent Directorate- General/Service VACANCY NOTICE AGENCY S TEMPORARY STAFF Ref. : eu-lisa/15/ta/ad7/8.1 Security Officer Post: Sector/Unit/Department: Security Officer Security Sector Function Group/Grade: AD 7 Location: Starting date:

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

PUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 8 July 2005 11037/05 LIMITE CRIMORG 67 ENFOPOL 88

PUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 8 July 2005 11037/05 LIMITE CRIMORG 67 ENFOPOL 88 Conseil UE COUNCIL OF THE EUROPEAN UNION Brussels, 8 July 2005 PUBLIC 11037/05 LIMITE CRIMORG 67 FOPOL 88 OUTCOME OF PROCEEDINGS of: Article 36 Committee on: 7 and 8 July 2005 No. prev. doc. : 8255/05

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

Eurojust. The European Union s Judicial Cooperation Unit

Eurojust. The European Union s Judicial Cooperation Unit Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Kenya s Experience in CERT Implementation

Kenya s Experience in CERT Implementation Kenya s Experience in CERT Implementation Commonwealth Cybersecurity Forum 2015 22-24 th April 2015, London, UK Outline Cybersecurity Agenda in Kenya Cybersecurity Governance Framework in Kenya ITU Technical

More information

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga BACKGROUND Riga, 27 January, 2015 Informal JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga The Informal Meeting of Ministers for JUSTICE and HOME AFFAIRS (JHA) will be chaired

More information

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper Council of the European Union Brussels, 24 November 2014 (OR. en) 15715/14 LIMITE JAI 902 PESC 1201 COSI 117 COPS 308 ENFOPOL 373 COTER 82 SIRIS 79 FRONT 242 NOTE From: To: Subject: EU Counter-Terrorism

More information

Council of the European Union Brussels, 14 April 2016 (OR. en)

Council of the European Union Brussels, 14 April 2016 (OR. en) Council of the European Union Brussels, 14 April 2016 (OR. en) 7726/16 LIMITE JAI 266 COSI 55 FRONT 170 ASIM 52 DAPIX 51 ENFOPOL 93 SIRIS 65 DATAPROTECT 25 VISA 95 FAUXDOC 12 COPEN 101 NOTE From: To: Subject:

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 11.3.2014 COM(2014) 154 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation The importance of public-private partnership Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation Cybersecurity, safety and trust 1) Strategic documents: National Cybersecurity Strategy

More information

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

Cybersecurity Competence Building Trends

Cybersecurity Competence Building Trends Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 678 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Progress Report on the Implementation of the hotspots in Greece

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Smarter Borders 2015 Attendee List 18.02.15

Smarter Borders 2015 Attendee List 18.02.15 Job Title Account Country Customs Counselor New Zealand Embassy to the EU & NATO New Zealand Project Manager International Centre for Migration Policy Development (ICMPD) Austria Head of Aviation, Security

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

12002/15 PO/es 1 DG D 1B

12002/15 PO/es 1 DG D 1B Council of the European Union Brussels, 14 September 2015 (OR. en) 12002/15 JAI 659 ASIM 86 FRONT 187 RELEX 711 NOTE From: To: Subject: Presidency Delegations Conclusions After the discussions on migration

More information

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Candidate Pack Project Manager Moves and Changes

Candidate Pack Project Manager Moves and Changes Candidate Pack Project Manager Moves and Changes Project Manager Moves and Changes Grade 7 48,004-56,405 Sheffield or Liverpool, 52,969-62239 Croydon or London The salary offered will be dependent upon

More information

FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION

FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION LUIGI REBUFFI EOS CEO www.eos-eu.com 9TH CONGRESS ON EUROPEAN SECURITY AND DEFENCE BERLIN 09 NOV 2010 PANEL 6 European Organisation for Security

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law School Centre for of something Criminal Justice Studies School of Law FACULTY OF OTHER The Changing Cyberthreat Landscape and the Challenge of Policing Cybercrimes in the EU EVIDENCE-BASED POLICING, 2015

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Memorandum Cybersecurity - how should the legislation meet the new challenges?

Memorandum Cybersecurity - how should the legislation meet the new challenges? ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 5.7.2016 COM(2016) 410 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

More information

Council of the European Union Brussels, 16 January 2015 (OR. en)

Council of the European Union Brussels, 16 January 2015 (OR. en) Council of the European Union Brussels, 16 January 2015 (OR. en) 5250/15 ENFOPOL 13 NOTE From: Europol To: Delegations Subject: Europol Work Programme 2015 1. Article 37(10) (b) of the Council Decision

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 671 final 2015/0310 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the European Border and Coast Guard and repealing

More information