Achieving Global Cyber Security Through Collaboration

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Achieving Global Cyber Security Through Collaboration"

Transcription

1 Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security

2 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 2 2

3 ENISA The European Network & Informa7on Security Agency (ENISA) was formed in The Agency is a Centre of Exper7se that supports the Commission and the EU Member States in the area of informa7on security. We facilitate the exchange of informa7on between EU ins7tu7ons, the public sector and the private sector. European Union Agency for Network and Information Security 3

4 Ac-vi-es The Agency s principal ac7vi7es are as follows: Advising and assis7ng the Commission and the Member States on informa7on security. Collec7ng and analysing data on security prac7ces in Europe and emerging risks. Promo7ng risk assessment and risk management methods. Awareness- raising and co- opera7on between different actors in the informa7on security field. European Union Agency for Network and Information Security 4

5 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 5 5

6 EU Cyber Security Strategy The Five strategic objec7ves of the strategy: Achieving cyber resilience Dras7cally reducing cybercrime Developing cyberdefence policy and capabili7es related to the Common Security and Defence Policy (CSDP) Developing the industrial and technological resources for cybersecurity Establishing a coherent interna7onal cyberspace policy for the European Union and promote core EU values. ENISA explicitly called upon. European Union Agency for Network and Information Security 6

7 EU Cybersecurity Strategy The Commission asks ENISA to: Assist the Member States in developing strong na7onal cyber resilience capabili7es. Examine in 2013 the feasibility of Computer Security Incident Response Team(s) for Industrial Control Systems (ICS- CSIRTs) for the EU. Con7nue suppor7ng the Member States and the EU ins7tu7ons in carrying out regular pan- European cyber incident exercises. Propose in 2013 a roadmap for a "Network and Informa7on Security driving licence". Support a cybersecurity championship in 2014, where university students will compete in proposing NIS solu7ons. European Union Agency for Network and Information Security 7

8 EU Cybersecurity Strategy The Commission asks ENISA to: Support the organisa7on of a yearly cybersecurity month. Develop, in coopera7on with relevant stakeholders, technical guidelines and recommenda7ons for the adop7on of NIS standards and good prac7ces in the public and private sectors. Collaborate with Europol to iden7fy emerging trends and needs in view of evolving cybercrime and cybersecurity pa[erns so as to develop adequate digital forensic tools and technologies. European Union Agency for Network and Information Security 8

9 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security 9 9

10 The ENISA Threat Landscape The ENISA Threat Landscape provides an overview of threats and current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 120 recent reports from a variety of resources have been analysed. European Union Agency for Network and Information Security 10

11 Developed overview European Union Agency for Network and Information Security 11

12 Cyber Exercises Cyber Europe Europe s first ever interna7onal cyber security exercise EU- US exercise, Also a first : work with COM & MS to build transatlan7c coopera7on Cyber Europe Developed from 2010 & 2011 exercises. Involves MS, private sector and EU ins7tu7ons. Highly realis7c exercise, Oct 2012 European Union Agency for Network and Information Security 12

13 Securing New Technologies European Union Agency for Network and Information Security 13

14 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security

15 Austria Czech Republic Estonia Finland France Germany Hungary Lithuania Luxemburg Netherlands Poland Romania Slovakia United Kingdom Member States with NCSS European Union Agency for Network and Information Security 15

16 Good Prac-ce Guide ENISA deliverable of 2012 Describes: Known good prac7ces, standards and policies The elements of a good Cyber Security Strategy Ins7tu7ons and roles iden7fied in a Strategy Par7es involved in the development lifecycle Challenges in developing and maintaining a Strategy European Union Agency for Network and Information Security

17 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security

18 Suppor-ng Opera-onal Communi-es - Overview European Union Agency for Network and Information Security

19 in 2005 Na-onal/governmental CERTs the situa-on has changed ESTABLISHED IN 2005: Finland France Germany Hungary The Netherlands Norway Sweden UK Baseline capabilities of n/g CERTs Initially defined in 2009 (operational aspects) In 2010 Policy recommendations drafted In 2012 ENISA continues to work on a harmonisation together with MS Status Report 2012 National/governmental CERT capabilities updated recommendations 2012 European Union Agency for Network and Information Security 19

20 CERT Exercises and training material ENISA CERT training/exercise material, used since 2009, was extended to host 23 different topics and training exercises including: Technical aspects Organisa7onal aspects Opera7onal aspects Addi7onally a Roadmap was created to answer the ques7on How could ENISA provide more proac7ve and efficient CERT training? European Union Agency for Network and Information Security 20

21 Fostering CERT- LEA Collabora-on Main goals: Define key concepts Describe the technical and legal/regulatory aspects of the fight against cybercrime Compile an inventory of opera7onal, legal/regulatory and procedural barriers and challenges and possible ways to overcome these challenges Collect exis7ng good and best prac7ces Develop recommenda7ons Focus on CERT- LEA coopera7on European Union Agency for Network and Information Security

22 Agenda About ENISA The EU Cyber Security Strategy Protec7ng Cri7cal Informa7on Infrastructure Input to EU & MS Cyber Security Strategies Assis7ng Opera7onal Communi7es Security & Data Breach No7fica7on European Union Agency for Network and Information Security

23 Security & Data Breach No-fica-on Suppor7ng MS in implemen7ng Ar7cle 13a of the Telecommunica7ons Framework Direc7ve Supported NRA s in implemen7ng the provisions under ar7cle 13a Developed and implemented the process for collec7ng annual na7onal reports of security breaches Developed minimum security requirements and propose associated metrics and thresholds Suppor7ng COM and MS in defining technical implementa7on measures for Ar7cle 4 of the eprivacy Direc7ve. Recommenda7ons for the implementa7on of Ar7cle 4. Collabora7on with Art.29 TS in producing a severity methodology for the assessment of breaches by DPAs European Union Agency for Network and Information Security

24 Ar-cle 13a - Incidents incidents from 11 countries, 9 countries without significant incidents, 9 countries with incomplete implementa7on Most incidents Affect mobile comms (60%) Are caused by hardware/sokware failures (47%) third party failures (33%), natural disasters (12%) Many involve power cuts (20%) Natural disasters (storm, floods, et cetera) oken cause power cuts, which cause outages European Union Agency for Network and Information Security 24

25 Ar-cle 13a - Incidents incidents from 18 countries, 9 countries without significant incidents, 1 country with incomplete implementa7on Most incidents Are caused by System failures (76%), third party failures (13%), Malicious ac7ons (8%) natural disasters (6%) European Union Agency for Network and Information Security 25

26 Ques-ons? Follow ENISA: European Union Agency for Network and Information Security

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15

More information

Cooperation in Securing National Critical Infrastructure

Cooperation in Securing National Critical Infrastructure Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

CIIP : ENISA s Role in Assisting Member States

CIIP : ENISA s Role in Assisting Member States CIIP : ENISA s Role in Assisting Member States Steve Purser Head of Core Operations SEDE Committee Brussels 21 April 2016 European Union Agency for Network and Information Security ENISA ENISA was formed

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology

More information

Cyber Defense and Cyber Security Policies in the UK and Germany

Cyber Defense and Cyber Security Policies in the UK and Germany The EU and Member States in Global Affairs: Any sign of convergence? 5-6 May 2015 Cyber Defense and Cyber Security Policies in the UK and Germany Marco Mayer, Sant Anna School of Advanced Studies Luigi

More information

Cyber Security for Railway Signalling

Cyber Security for Railway Signalling Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against

More information

Cybercrime: a complex problem requiring a mul4- faceted response. 26 March 2014

Cybercrime: a complex problem requiring a mul4- faceted response. 26 March 2014 Cybercrime: a complex problem requiring a mul4- faceted response 26 March 2014 Challenges and Prospects of Frameworks to combat Cybercrime a cri4cal perspec4ve Prof Basie Von Solms Director : Centre for

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

Session 4: Programmes: the Core of the 10YFP

Session 4: Programmes: the Core of the 10YFP Session 4: Programmes: the Core of the 10YFP * Criteria * Initial and non-exhaustive list * 5 steps model to develop programmes * Request for additional programmas * Criteria and process for new programmes

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

An evaluation Framework for National Cyber Security Strategies. European Union Agency for Network and Information Security. www.enisa.europa.

An evaluation Framework for National Cyber Security Strategies. European Union Agency for Network and Information Security. www.enisa.europa. An evaluation Framework for National Cyber Security Strategies European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for Network and Information

More information

Hungary s labour market indicators continue to improve

Hungary s labour market indicators continue to improve Hungary s labour market indicators continue to improve Employment rate higher again in Hungary According to the latest data, the positive trend regarding growth in the number of people in employment has

More information

Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015

Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

Council Monitoring & Assessment Program Development

Council Monitoring & Assessment Program Development Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,

More information

The Cyber Security Challenge: What Can be Done?

The Cyber Security Challenge: What Can be Done? The Cyber Security Challenge: What Can be Done? Swiss Business Associa=on Singapore Grand HyaB, 22 October 2015 Presenta)on by Daniel Stauffacher President, ICT4Peace Founda=on www.ict4peace.org Cybersecurity

More information

Analysis on European landscape & Match making tool for Photonics Industry & Research

Analysis on European landscape & Match making tool for Photonics Industry & Research Analysis on European landscape & Match making tool for Photonics Industry & Research Contents Topic of this presentation Photonics21 Projects supporting Photonics21 Analysis on European landscape Matchmaking

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

Disrup've Innova'ons Track

Disrup've Innova'ons Track Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships

More information

Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study

Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study Sharifah Roziah Mohd Kassim MyCERT CyberSecurity Malaysia Agenda Introduction

More information

NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE EUROPEAN UNION 1 Quarter 4 2015

NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE EUROPEAN UNION 1 Quarter 4 2015 NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE Quarter 4 2015 Alternative fuel vehicle (AFV) registrations: +20.0% in 2015; +21.1% in Q4 In the fourth quarter of 2015, total alternative

More information

Cybersecurity cooperation

Cybersecurity cooperation European Union Agency for Network and Information Security www.enisa.europa.eu Page ii About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Database Grundtvig courses. January 2011 December 2012

Database Grundtvig courses. January 2011 December 2012 Database Grundtvig courses January 2011 December 2012 1. Totals courses Courses aimed at participants receiving: 10 1057 A grant for either Comenius or Grundtvig target groups (COM+GRU) 28% 299 A Grundtvig

More information

EIOPA Stress Test 2011. Press Briefing Frankfurt am Main, 4 July 2011

EIOPA Stress Test 2011. Press Briefing Frankfurt am Main, 4 July 2011 EIOPA Stress Test 2011 Press Briefing Frankfurt am Main, 4 July 2011 Topics 1. Objectives 2. Initial remarks 3. Framework 4. Participation 5. Results 6. Summary 7. Follow up 2 Objectives Overall objective

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

DRDC Centre for Security Science (CSS)

DRDC Centre for Security Science (CSS) DRDC Centre for Security Science (CSS) Created through a Memorandum of Understanding between the Department of Na8onal Defence (DND) and Public Safety Canada in 2006 to establish a dedicated centre for

More information

IMMIGRATION TO CANADA

IMMIGRATION TO CANADA NOTE: IMMIGRATION TO CANADA 1928-1971 RANK COUNTRY OF ORIGIN TOTALS 1 United Kingdom * 1152415 2 United States of America 527346 3 Italy 471940 4 Germany 370641 5 Netherlands 185664 6 Poland 117244 7 Greece

More information

1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4

1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4 Bankruptcy Systems and In-court Reorganisation of Firms, 2010 Content: 1. Perception of the Bancruptcy System... 2 2. Perception of In-court Reorganisation... 4 3. Perception of Creditor Committees, Fast

More information

187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter

187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter 187/2014-5 December 2014 This News Release has been revised following an error in the data for Gross Fixed Capital Formation. This affects both the growth of GFCF and its contribution to GDP growth. All

More information

Projected Population of Scotland (2008-based) Figures

Projected Population of Scotland (2008-based) Figures Projected Population of Scotland (2008-based) Figures Contents Figure 1 Estimated population of Scotland, actual and projected, 1951-2083 Figure 2 Births and deaths, actual and projected, Scotland, 1951-2033

More information

99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter

99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter 2005Q1 2005Q2 2005Q3 2005Q4 2006Q1 2006Q2 2006Q3 2006Q4 2007Q1 2007Q2 2007Q3 2007Q4 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 2012Q1

More information

Fostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship

Fostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit Entrepreneurship Definition of Entrepreneurship Entrepreneurship refers to an individual s ability

More information

From Consultancy. Projects to Case Studies. Ins2tute Case Studies: 10 September 2012, SSI Fellows Programme Launch Steve Crouch s.crouch@so#ware.ac.

From Consultancy. Projects to Case Studies. Ins2tute Case Studies: 10 September 2012, SSI Fellows Programme Launch Steve Crouch s.crouch@so#ware.ac. Ins2tute Case Studies: From Consultancy Projects to Case Studies 10 September 2012, SSI Fellows Programme Launch Steve Crouch s.crouch@so#ware.ac.uk In Context Developing the scien/fic compu/ng / so4ware

More information

Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women

Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women 75/2015-27 April 2015 Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women Among the 44.1 million persons in the European Union

More information

INTERNATIONAL TRACKED POSTAGE SERVICE

INTERNATIONAL TRACKED POSTAGE SERVICE INTERNATIONAL TRACKED POSTAGE SERVICE Index Expanding Internationally...03 The Post NL Service...04 How it works... 05 Post NL Rates...06 Transit times...07 Customer Service...08 Expanding Internationally

More information

Equity Release Schemes in the European Union

Equity Release Schemes in the European Union Reifner Clerc-Renaud Perez-Carillo Tiffe Knobloch Equity Release Schemes in the European Union institut fur finanzdienstleistungen e.v. Contents PREFACE I EXECUTIVE SUMMARY V TABLES XXIX FIGURES XXX 1.

More information

Status Report 2012. Deployment of Baseline Capabilities of National/ Governmental CERTs

Status Report 2012. Deployment of Baseline Capabilities of National/ Governmental CERTs Status Report 2012 Deployment of Baseline Capabilities of National/ Governmental CERTs Document History Date Version Modification Author December 2009 1.0 initial draft Baseline Capabilities of national/governmental

More information

168/2014-4 November 2014. At risk of poverty or social exclusion 2 rate in the EU28, 2008-2013 (% of total population)

168/2014-4 November 2014. At risk of poverty or social exclusion 2 rate in the EU28, 2008-2013 (% of total population) 168/2014-4 November 2014 At risk of poverty or social exclusion in the EU28 More than 120 million persons at risk of poverty or social exclusion in 2013 Almost 1 out of every 4 persons in the EU in this

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Masters level

More information

ERMInE Database. Presentation by Nils Flatabø SINTEF Energy Research. ERMInE Workshop 2 - Northern Europe Oslo, 1. November 2006

ERMInE Database. Presentation by Nils Flatabø SINTEF Energy Research. ERMInE Workshop 2 - Northern Europe Oslo, 1. November 2006 ERMInE Database Presentation by Nils Flatabø SINTEF Energy Research ERMInE Workshop 2 - Northern Europe Oslo, 1. November 26 Overview Content of the Ermine Database Electronic Questionnaire RTD&D Data

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

National-level Risk Assessments

National-level Risk Assessments European Union Agency for Network and Information Security www.enisa.europa.eu Executive summary This report is based on a study and analysis of approaches to national-level risk assessment and threat

More information

Computing our Future Computer programming and coding in schools in Europe. Anja Balanskat, Senior Manager European Schoolnet

Computing our Future Computer programming and coding in schools in Europe. Anja Balanskat, Senior Manager European Schoolnet Computing our Future Computer programming and coding in schools in Europe Anja Balanskat, Senior Manager European Schoolnet ABOUT THE SURVEY What do Ministries currently think about the topic? Curricula

More information

Project Management Introduc1on

Project Management Introduc1on Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?

More information

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc. Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis

More information

Specific comments on Communication

Specific comments on Communication Comments on Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Cybersecurity Strategy of the European Union: An Open,

More information

Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU

Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU 92/2015-27 May 2015 Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU In the European Union (EU), household electricity prices 1 rose by

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50. Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***

More information

An International Comparative Study on Cyber Security Strategy

An International Comparative Study on Cyber Security Strategy , pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom

More information

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial

More information

European Union Agency for Network and Information Security ENISA ANNUAL REPORT

European Union Agency for Network and Information Security ENISA ANNUAL REPORT European Union Agency for Network and Information Security ENISA ANNUAL REPORT 2013 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*):

More information

Rou$ng Security Survey: Preliminary Results

Rou$ng Security Survey: Preliminary Results Rou$ng Security Survey: Preliminary Results Results of a survey during February/ March 2010 in the RIPE community, and the IXP communi$es from AMS- IX, LINX, DE- CIX, and Netnod- IX. Outline Online survey

More information

The Wake Up Bus project in the European countries

The Wake Up Bus project in the European countries The Wake Up Bus project in the European countries Ludger Grote Sahlgrenska University Hospital Gothenburg, Sweden The Wake Up Bus project in the European Countries The European Network of Na1onal Sleep

More information

Pan European Fire Strategy 2020 A safer Europe for all

Pan European Fire Strategy 2020 A safer Europe for all Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of

More information

Actual annual working time in France and in Europe in 2013

Actual annual working time in France and in Europe in 2013 Actual annual working time in France and in Europe in 2013 Update to the January 2012 study plus new data Summary of the Working Paper N.49 : La durée effective du travail en France et en Europe (June

More information

Planned Healthcare in Europe for Lothian residents

Planned Healthcare in Europe for Lothian residents Planned Healthcare in Europe for Lothian residents Introduction This leaflet explains what funding you may be entitled to if you normally live in Lothian (Edinburgh, West Lothian, Midlothian and East Lothian

More information

National Cyber Security Strategies. Practical Guide on Development and Execution

National Cyber Security Strategies. Practical Guide on Development and Execution National Cyber Security Strategies December 2012 National Cyber Security Strategies National Cyber Security Strategies I About ENISA The European Network and Information Security Agency (ENISA) is a centre

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS Ref. Ares(2015)660570-17/02/2015 ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students

More information

EU Lesson Plan. Name of Teacher: Sharon Goralewski School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity

EU Lesson Plan. Name of Teacher: Sharon Goralewski School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity EU Lesson Plan Name of Teacher: School: Oakland Schools Title of Lesson Plan: The European Union: United in Diversity Grades: 6th or 7 th Description: This lesson introduces the students to the countries

More information

Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments

Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments January 20, 2015 ShadEcEurope31_January2015.doc Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments by Friedrich Schneider *)

More information

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting NIST Email Security Improvements William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting Presenters Scott Rose Computer Scientist, NIST ITL William (Curt) Barker Guest Researcher,

More information

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design

More information

Implementing the cooperation mechanisms of the RES directive current status and open questions

Implementing the cooperation mechanisms of the RES directive current status and open questions Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION KEY POLICY MESSAGES

MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION KEY POLICY MESSAGES MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION KEY POLICY MESSAGES Introduction The purpose of this paper is to give an overview of the findings of the European Agency for Development in

More information

Alcohol Consumption in Ireland 1986-2006 A Report for the Health Service Executive

Alcohol Consumption in Ireland 1986-2006 A Report for the Health Service Executive Alcohol Consumption in Ireland 1986-2006 A Report for the Health Service Executive Prepared by Dr. Ann Hope This report should be referenced: Hope, A. (2007). Alcohol consumption in Ireland 1986-2006.

More information

Session V: Cybersecurity

Session V: Cybersecurity Session V: Cybersecurity 12 th EU-US Energy Regulators Roundtable 26 th April 2016 Philipp Irschik, CEER, Chair Cybersecurity Workstream AGENDA 1. Why is Cybersecurity (in the energy sector) such a hot

More information

Environmental Liability Directive; Implementation, Enforcement,

Environmental Liability Directive; Implementation, Enforcement, Environmental Liability Directive; Implementation, Enforcement, and the Future Valerie Fogleman Consultant, Stevens & Bolton LLP Professor, Cardiff University School of Law Topics Environmental Liability

More information

Energy Efficiency Directive Article 8

Energy Efficiency Directive Article 8 Fourth Project Workshop Monitoring of energy efficiency in the EU ODYSSEE-MURE 21-22 May 2015, Den Haag, The Netherlands Energy Efficiency Directive Article 8 Energy audits and energy management systems

More information

2 ND CALL FOR PROPOSALS 27 October 2008 30 January 2009

2 ND CALL FOR PROPOSALS 27 October 2008 30 January 2009 2 ND CALL FOR PROPOSALS 27 October 2008 30 January 2009 1. INTRODUCTION Authorities and stakeholders at local and regional level have a vital role to play in the achievement of the EU s strategies for

More information

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate

More information

MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION

MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION MAPPING THE IMPLEMENTATION OF POLICY FOR INCLUSIVE EDUCATION (MIPIE) An exploration of challenges and opportunities for developing indicators

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Problem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified:

Problem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified: DISCUSSION PAPER (16 JULY 2014) EU BATTLEGROUPS: USE THEM OR LOSE THEM SUBMITTED BY THE DELEGATION OF THE NETHERLANDS TO THE ITALIAN PRESIDENCY PARLIAMENT OF THE IPC CFSP/CSDP Introduction At the European

More information

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Bob Gourley, Partner, Cognitio September 9, 2015 How we think. Disclaimer There is a great deal of text on these slides.

More information