Achieving Global Cyber Security Through Collaboration
|
|
- Olivia Berry
- 8 years ago
- Views:
Transcription
1 Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security
2 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 2 2
3 ENISA The European Network & Informa7on Security Agency (ENISA) was formed in The Agency is a Centre of Exper7se that supports the Commission and the EU Member States in the area of informa7on security. We facilitate the exchange of informa7on between EU ins7tu7ons, the public sector and the private sector. European Union Agency for Network and Information Security 3
4 Ac-vi-es The Agency s principal ac7vi7es are as follows: Advising and assis7ng the Commission and the Member States on informa7on security. Collec7ng and analysing data on security prac7ces in Europe and emerging risks. Promo7ng risk assessment and risk management methods. Awareness- raising and co- opera7on between different actors in the informa7on security field. European Union Agency for Network and Information Security 4
5 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 5 5
6 EU Cyber Security Strategy The Five strategic objec7ves of the strategy: Achieving cyber resilience Dras7cally reducing cybercrime Developing cyberdefence policy and capabili7es related to the Common Security and Defence Policy (CSDP) Developing the industrial and technological resources for cybersecurity Establishing a coherent interna7onal cyberspace policy for the European Union and promote core EU values. ENISA explicitly called upon. European Union Agency for Network and Information Security 6
7 EU Cybersecurity Strategy The Commission asks ENISA to: Assist the Member States in developing strong na7onal cyber resilience capabili7es. Examine in 2013 the feasibility of Computer Security Incident Response Team(s) for Industrial Control Systems (ICS- CSIRTs) for the EU. Con7nue suppor7ng the Member States and the EU ins7tu7ons in carrying out regular pan- European cyber incident exercises. Propose in 2013 a roadmap for a "Network and Informa7on Security driving licence". Support a cybersecurity championship in 2014, where university students will compete in proposing NIS solu7ons. European Union Agency for Network and Information Security 7
8 EU Cybersecurity Strategy The Commission asks ENISA to: Support the organisa7on of a yearly cybersecurity month. Develop, in coopera7on with relevant stakeholders, technical guidelines and recommenda7ons for the adop7on of NIS standards and good prac7ces in the public and private sectors. Collaborate with Europol to iden7fy emerging trends and needs in view of evolving cybercrime and cybersecurity pa[erns so as to develop adequate digital forensic tools and technologies. European Union Agency for Network and Information Security 8
9 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 9 9
10 The ENISA Threat Landscape The ENISA Threat Landscape provides an overview of threats and current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 120 recent reports from a variety of resources have been analysed. European Union Agency for Network and Information Security 10
11 Developed overview European Union Agency for Network and Information Security 11
12 Cyber Exercises Cyber Europe Europe s first ever interna7onal cyber security exercise EU- US exercise, Also a first : work with COM & MS to build transatlan7c coopera7on Cyber Europe Developed from 2010 & 2011 exercises. Involves MS, private sector and EU ins7tu7ons. Highly realis7c exercise, Oct 2012 European Union Agency for Network and Information Security 12
13 Securing New Technologies European Union Agency for Network and Information Security 13
14 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security
15 Austria Czech Republic Estonia Finland France Germany Hungary Lithuania Luxemburg Netherlands Poland Romania Slovakia United Kingdom Member States with NCSS European Union Agency for Network and Information Security 15
16 Good Prac-ce Guide ENISA deliverable of 2012 Describes: Known good prac7ces, standards and policies The elements of a good Cyber Security Strategy Ins7tu7ons and roles iden7fied in a Strategy Par7es involved in the development lifecycle Challenges in developing and maintaining a Strategy European Union Agency for Network and Information Security
17 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security
18 Suppor-ng Opera-onal Communi-es - Overview European Union Agency for Network and Information Security
19 in 2005 Na-onal/governmental CERTs the situa-on has changed ESTABLISHED IN 2005: Finland France Germany Hungary The Netherlands Norway Sweden UK Baseline capabilities of n/g CERTs Initially defined in 2009 (operational aspects) In 2010 Policy recommendations drafted In 2012 ENISA continues to work on a harmonisation together with MS Status Report 2012 National/governmental CERT capabilities updated recommendations 2012 European Union Agency for Network and Information Security 19
20 CERT Exercises and training material ENISA CERT training/exercise material, used since 2009, was extended to host 23 different topics and training exercises including: Technical aspects Organisa7onal aspects Opera7onal aspects Addi7onally a Roadmap was created to answer the ques7on How could ENISA provide more proac7ve and efficient CERT training? European Union Agency for Network and Information Security 20
21 Fostering CERT- LEA Collabora-on Main goals: Define key concepts Describe the technical and legal/regulatory aspects of the fight against cybercrime Compile an inventory of opera7onal, legal/regulatory and procedural barriers and challenges and possible ways to overcome these challenges Collect exis7ng good and best prac7ces Develop recommenda7ons Focus on CERT- LEA coopera7on European Union Agency for Network and Information Security
22 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security
23 Security & Data Breach No-fica-on Suppor7ng MS in implemen7ng Ar7cle 13a of the Telecommunica7ons Framework Direc7ve Supported NRA s in implemen7ng the provisions under ar7cle 13a Developed and implemented the process for collec7ng annual na7onal reports of security breaches Developed minimum security requirements and propose associated metrics and thresholds Suppor7ng COM and MS in defining technical implementa7on measures for Ar7cle 4 of the eprivacy Direc7ve. Recommenda7ons for the implementa7on of Ar7cle 4. Collabora7on with Art.29 TS in producing a severity methodology for the assessment of breaches by DPAs European Union Agency for Network and Information Security
24 Ar-cle 13a - Incidents incidents from 11 countries, 9 countries without significant incidents, 9 countries with incomplete implementa7on Most incidents Affect mobile comms (60%) Are caused by hardware/sokware failures (47%) third party failures (33%), natural disasters (12%) Many involve power cuts (20%) Natural disasters (storm, floods, et cetera) oken cause power cuts, which cause outages European Union Agency for Network and Information Security 24
25 Ar-cle 13a - Incidents incidents from 18 countries, 9 countries without significant incidents, 1 country with incomplete implementa7on Most incidents Are caused by System failures (76%), third party failures (13%), Malicious ac7ons (8%) natural disasters (6%) European Union Agency for Network and Information Security 25
26 Ques-ons? Follow ENISA: European Union Agency for Network and Information Security
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15
More informationCooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationCyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
More informationNational Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationProf. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationCyber Defense and Cyber Security Policies in the UK and Germany
The EU and Member States in Global Affairs: Any sign of convergence? 5-6 May 2015 Cyber Defense and Cyber Security Policies in the UK and Germany Marco Mayer, Sant Anna School of Advanced Studies Luigi
More informationEU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
More informationCyber Security for Railway Signalling
Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against
More informationCybercrime: a complex problem requiring a mul4- faceted response. 26 March 2014
Cybercrime: a complex problem requiring a mul4- faceted response 26 March 2014 Challenges and Prospects of Frameworks to combat Cybercrime a cri4cal perspec4ve Prof Basie Von Solms Director : Centre for
More informationMain Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
More informationInformation and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
More informationCyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
More informationSession 4: Programmes: the Core of the 10YFP
Session 4: Programmes: the Core of the 10YFP * Criteria * Initial and non-exhaustive list * 5 steps model to develop programmes * Request for additional programmas * Criteria and process for new programmes
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationCyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and
More informationAn evaluation Framework for National Cyber Security Strategies. European Union Agency for Network and Information Security. www.enisa.europa.
An evaluation Framework for National Cyber Security Strategies European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for Network and Information
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationVolker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationCouncil Monitoring & Assessment Program Development
Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,
More informationThe Cyber Security Challenge: What Can be Done?
The Cyber Security Challenge: What Can be Done? Swiss Business Associa=on Singapore Grand HyaB, 22 October 2015 Presenta)on by Daniel Stauffacher President, ICT4Peace Founda=on www.ict4peace.org Cybersecurity
More informationSpecific comments on Communication
Comments on Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Cybersecurity Strategy of the European Union: An Open,
More informationAnalysis on European landscape & Match making tool for Photonics Industry & Research
Analysis on European landscape & Match making tool for Photonics Industry & Research Contents Topic of this presentation Photonics21 Projects supporting Photonics21 Analysis on European landscape Matchmaking
More informationUnifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study
Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study Sharifah Roziah Mohd Kassim MyCERT CyberSecurity Malaysia Agenda Introduction
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationWSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
More informationDisrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
More informationCybersecurity cooperation
European Union Agency for Network and Information Security www.enisa.europa.eu Page ii About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information
More informationNEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE EUROPEAN UNION 1 Quarter 4 2015
NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE Quarter 4 2015 Alternative fuel vehicle (AFV) registrations: +20.0% in 2015; +21.1% in Q4 In the fourth quarter of 2015, total alternative
More informationDRDC Centre for Security Science (CSS)
DRDC Centre for Security Science (CSS) Created through a Memorandum of Understanding between the Department of Na8onal Defence (DND) and Public Safety Canada in 2006 to establish a dedicated centre for
More information1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4
Bankruptcy Systems and In-court Reorganisation of Firms, 2010 Content: 1. Perception of the Bancruptcy System... 2 2. Perception of In-court Reorganisation... 4 3. Perception of Creditor Committees, Fast
More informationEIOPA Stress Test 2011. Press Briefing Frankfurt am Main, 4 July 2011
EIOPA Stress Test 2011 Press Briefing Frankfurt am Main, 4 July 2011 Topics 1. Objectives 2. Initial remarks 3. Framework 4. Participation 5. Results 6. Summary 7. Follow up 2 Objectives Overall objective
More informationFostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship
Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit Entrepreneurship Definition of Entrepreneurship Entrepreneurship refers to an individual s ability
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More information187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter
187/2014-5 December 2014 This News Release has been revised following an error in the data for Gross Fixed Capital Formation. This affects both the growth of GFCF and its contribution to GDP growth. All
More information99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter
2005Q1 2005Q2 2005Q3 2005Q4 2006Q1 2006Q2 2006Q3 2006Q4 2007Q1 2007Q2 2007Q3 2007Q4 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 2012Q1
More informationFrom Consultancy. Projects to Case Studies. Ins2tute Case Studies: 10 September 2012, SSI Fellows Programme Launch Steve Crouch s.crouch@so#ware.ac.
Ins2tute Case Studies: From Consultancy Projects to Case Studies 10 September 2012, SSI Fellows Programme Launch Steve Crouch s.crouch@so#ware.ac.uk In Context Developing the scien/fic compu/ng / so4ware
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
More informationLabour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women
75/2015-27 April 2015 Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women Among the 44.1 million persons in the European Union
More informationCybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
More informationINTERNATIONAL TRACKED POSTAGE SERVICE
INTERNATIONAL TRACKED POSTAGE SERVICE Index Expanding Internationally...03 The Post NL Service...04 How it works... 05 Post NL Rates...06 Transit times...07 Customer Service...08 Expanding Internationally
More information168/2014-4 November 2014. At risk of poverty or social exclusion 2 rate in the EU28, 2008-2013 (% of total population)
168/2014-4 November 2014 At risk of poverty or social exclusion in the EU28 More than 120 million persons at risk of poverty or social exclusion in 2013 Almost 1 out of every 4 persons in the EU in this
More informationEquity Release Schemes in the European Union
Reifner Clerc-Renaud Perez-Carillo Tiffe Knobloch Equity Release Schemes in the European Union institut fur finanzdienstleistungen e.v. Contents PREFACE I EXECUTIVE SUMMARY V TABLES XXIX FIGURES XXX 1.
More informationERASMUS+ MASTER LOANS
ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Masters level
More informationProject Management Introduc1on
Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationNational Cyber Security Strategies. Practical Guide on Development and Execution
National Cyber Security Strategies December 2012 National Cyber Security Strategies National Cyber Security Strategies I About ENISA The European Network and Information Security Agency (ENISA) is a centre
More informationBusiness Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
More informationComputing our Future Computer programming and coding in schools in Europe. Anja Balanskat, Senior Manager European Schoolnet
Computing our Future Computer programming and coding in schools in Europe Anja Balanskat, Senior Manager European Schoolnet ABOUT THE SURVEY What do Ministries currently think about the topic? Curricula
More informationERMInE Database. Presentation by Nils Flatabø SINTEF Energy Research. ERMInE Workshop 2 - Northern Europe Oslo, 1. November 2006
ERMInE Database Presentation by Nils Flatabø SINTEF Energy Research ERMInE Workshop 2 - Northern Europe Oslo, 1. November 26 Overview Content of the Ermine Database Electronic Questionnaire RTD&D Data
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationNational-level Risk Assessments
European Union Agency for Network and Information Security www.enisa.europa.eu Executive summary This report is based on a study and analysis of approaches to national-level risk assessment and threat
More informationEnergy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU
92/2015-27 May 2015 Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU In the European Union (EU), household electricity prices 1 rose by
More informationRou$ng Security Survey: Preliminary Results
Rou$ng Security Survey: Preliminary Results Results of a survey during February/ March 2010 in the RIPE community, and the IXP communi$es from AMS- IX, LINX, DE- CIX, and Netnod- IX. Outline Online survey
More informationHow To Prevent Cyber Crime
, pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More information41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.
Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***
More informationCSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
More informationSize and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments
January 20, 2015 ShadEcEurope31_January2015.doc Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments by Friedrich Schneider *)
More informationNIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting
NIST Email Security Improvements William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting Presenters Scott Rose Computer Scientist, NIST ITL William (Curt) Barker Guest Researcher,
More informationAlcohol Consumption in Ireland 1986-2006 A Report for the Health Service Executive
Alcohol Consumption in Ireland 1986-2006 A Report for the Health Service Executive Prepared by Dr. Ann Hope This report should be referenced: Hope, A. (2007). Alcohol consumption in Ireland 1986-2006.
More informationQuality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014
Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design
More informationERASMUS+ MASTER LOANS
Ref. Ares(2015)660570-17/02/2015 ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students
More informationPlanned Healthcare in Europe for Lothian residents
Planned Healthcare in Europe for Lothian residents Introduction This leaflet explains what funding you may be entitled to if you normally live in Lothian (Edinburgh, West Lothian, Midlothian and East Lothian
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationImplementing the cooperation mechanisms of the RES directive current status and open questions
Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy
More information2 ND CALL FOR PROPOSALS 27 October 2008 30 January 2009
2 ND CALL FOR PROPOSALS 27 October 2008 30 January 2009 1. INTRODUCTION Authorities and stakeholders at local and regional level have a vital role to play in the achievement of the EU s strategies for
More informationEnvironmental Liability Directive; Implementation, Enforcement,
Environmental Liability Directive; Implementation, Enforcement, and the Future Valerie Fogleman Consultant, Stevens & Bolton LLP Professor, Cardiff University School of Law Topics Environmental Liability
More informationIT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic
IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate
More informationStatus Report 2012. Deployment of Baseline Capabilities of National/ Governmental CERTs
Status Report 2012 Deployment of Baseline Capabilities of National/ Governmental CERTs Document History Date Version Modification Author December 2009 1.0 initial draft Baseline Capabilities of national/governmental
More informationEuropean Union Agency for Network and Information Security ENISA ANNUAL REPORT
European Union Agency for Network and Information Security ENISA ANNUAL REPORT 2013 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*):
More informationERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME
PRESS DOSSIER INDEX PRESS DOSSIER...1 INDEX...2 ERASMUS FOR YOUNG ENTREPRENEURS : A NEW EXCHANGE PROGRAMME...3 WHO CAN PARTICIPATE?...5 WHAT BENEFITS AND FOR WHOM?...6 HOW DOES IT WORK? STRUCTURE AND IMPLEMENTATION...7
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationElectricity and natural gas price statistics 1
Electricity and natural gas price statistics 1 Source: Statistics Explained (http://epp.eurostat.ec.europa.eu/statistics_explained/) - 21/11/2011-09:11:44 Electricity and natural gas price statistics Data
More informationCyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons
Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Bob Gourley, Partner, Cognitio September 9, 2015 How we think. Disclaimer There is a great deal of text on these slides.
More informationProblem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified:
DISCUSSION PAPER (16 JULY 2014) EU BATTLEGROUPS: USE THEM OR LOSE THEM SUBMITTED BY THE DELEGATION OF THE NETHERLANDS TO THE ITALIAN PRESIDENCY PARLIAMENT OF THE IPC CFSP/CSDP Introduction At the European
More informationPan European Fire Strategy 2020 A safer Europe for all
Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7
More informationMAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION
MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION (MIPIE) An exploration of challenges and opportunities for developing indicators
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More informationEUF STATISTICS. 31 December 2013
. ESTIMATES OF EU TURNOVER VOLUMES. Turnover volumes by product, allocation and notification (Estimates of EU s, Millions of ) Estimate of the EU % on Turnover Significance of the sample on total turnover
More informationHow To Understand Factoring
EIF Project "Jeremie" General Report on Factoring 1 Market analysis on Factoring in EU 25+2 prepared by International Factors Group (IFG) for European Investment Fund (EIF) project JEREMIE Preliminary
More informationThe innovation value chain:
The innovation value chain: Context: where is the demand for demand-side innovation policy at in Europe? Lead Market Initiative: And lessons learned And future directions Henriette van Eijl EC, DG Enterprise,
More informationEUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT
EUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT Research, development and innovation are key policy components of the EU strategy for economic growth: Europe 2020. By fostering market take-up of new, innovative
More informationKeeping European Consumers safe Rapid Alert System for dangerous non-food products 2014
Keeping European Consumers safe Rapid Alert System for dangerous non-food products 2014 COMPLETE STATISTICS Justice and Consumers Directorate-General for Justice and Consumers Directorate Consumers Unit
More informationEU Lesson Plan. Name of Teacher: Sharon Goralewski School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity
EU Lesson Plan Name of Teacher: School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity Grades: 6th or 7 th Description: This lesson introduces the students to the countries
More informationFUSIONS Food waste data set for EU-28. New Estimates and Environmental Impact
FUSIONS Food waste data set for EU-28 New Estimates and Environmental Impact 15 October 2015 Food waste is an issue of importance to global food security and good environmental governance, directly linked
More informationMulti-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
More informationENISA Work programme
ENISA Work programme 2016 SECURITY Including multiannual planning www.enisa.europa.eu European Union Agency for Network and Information Security About ENISA The European Union Agency for Network and Information
More information