Jyväskylä Cyber Security Ecosystem

Size: px
Start display at page:

Download "Jyväskylä Cyber Security Ecosystem"

Transcription

1 Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto

2 High Level Cyber Security Comment President Sauli Niinistö highlighted cyber security. Our key functions are more and more dependent on information technology and data networks. Cyber influence forms a part of the picture of future conflicts separately or alongside other ways of applying pressure or using force. While the cyber dimension is not pervasive, it is present.

3 Finland s Cyber Security Strategy 2013

4 Strategic Guidelines Cyber security development will heavily invest in cyber research and development as well as in education, employment and product development so that Finland can become one of the leading countries in cyber security.

5 Strategic Guidelines A strategic cyber security centre of excellence will facilitate the conditions for the establishment of a robust national cyber security cluster.

6 Cyber Security Strategic Research Agenda 4 Research themes were identified to fulfill the target of SRA Theme 1: Security technology Theme 2: Security management and governance Theme 3: Situation awareness Theme 4: Resiliency Vision: Finland will be a globally recognized hub for trusted and trust enhancing digital services based on top level cyber security solutions and services actively developed and maintained in international cooperation by leading experts and companies.

7 Cyber Trust program Goals at the program level: Cyber Trust program is recognized as a Brand: Methods to enable integration of seamless cyber security into everyday life Cyber Trust program has begin to return privacy and trust in digital world Scientific references, public research papers, invited speakers Strong collaboration network through leading cyber security research program will help us to: Show competitive world-class security Make Finland world leader in CyberSecurity Create new security business opportunities Maintain Finnish Cyber security know-how

8 Finland s Cyber Security Strategy The implementation of cyber security R&D and education at different levels does not only strengthen national expertise, it also bolsters Finland as an information society.

9 CYBER SECURITY DEVELOPMENT IN JYVÄSKYLÄ

10 Cyber Security Education Evolution in Jyväskylä Central Finland ICTstrategy Finland s Cyber Security Strategy Implementation plan of the Finland s Cyber Security Strategy Report: Needs of Cyber Security research and education Central Finland Security Programme Cyber Security Master of Science Education Cyber Security Second-cycle degree education Cyber Security Live Exercise

11 Cyber security education University of Jyväskylä Cyber Security Master of Science Programmme: - Technical profile - Organizational profile JAMK University of Applied Science Master s Degree Programme in Cyber Security

12 University of Jyväskylä Cyber Security Profiling Academy of Finland want to strengthen Finnish universities' research profiles. Profiling carried out by the University supports the achievement of the Cyber Security Strategy of the European Union, according to which the Member States should intensify national action in the field of ICT and cyber security research and education. In addition, profiling supports the goal of Finland s Cyber Security Strategy.

13 JYVSECTEC at JAMK University of Applied Sciences JYVSECTEC Cyber Security Situational Center - a place for training and cooperation: Defence Forces, business and academia.

14 JYVSECTEC at JAMK University of Applied Sciences JYVSECTEC is Finland s leading research and development and training centre and the national and international co-operation network of companies and actors. With the RGCE development environment (Real Global Cyber Environment) JYVSECTEC has been able to offer modern facilities as well as expertise and systems to develop the cyber security knowledge of organizations and create systems to implement cyber security exercises.

15 JYVÄSKYLÄ, CYBER SECURITY CITY

16 Jyväskylä cyber security ecosystem

17 INKA Innovative Cities New national urban policy initiative Jyväskylä was assigned a national coordinator role in cyber security Implementation started from 1st January 2014

18 Cyber INKA - Vision and Objectives Objectives: Develop cyber security business Create new businesses & attract foreign companies to Finland Build a National Cyber Security Centre of Excellence A cyber security centre of excellence will provide an opportunity for top research teams and companies to engage in effective mutual cooperation over the long term.

19 Jyväskylä Cyber Security City The City of Jyväskylä has strategic importance in cyber security. It has a special and important position as a node comprising security networks, data warehouse centers, public security stakeholders, important cyber security industries, military establishments and cyber security research and educational institutions.

20 Jyväskylä cyber security ecosystem Results: - Over 100 MSc students in the university of Jyväskylä and JAMK - Over 200 Cyber Security minor students - Over 30 Cybersecurity doctoral students - Leading role in Cyber security programs - International Cyber Security Conferences - International Cyber Security and Defence short courses (CIP, IoT security, Password cracking) - Finland s leading research and development and training centre (JYVSECTEC) - City of Jyväskylä is assigned a national coordinator role in cyber security (INKA) - Many Cyber security development programs - Strong national and international cooperation network - New Cyber security business

21 Cyber Security in Finland 2020 Vision 2020: Finland will become an internationally recognized global forerunner in cyber security business and awareness of cyber threats. Citizens, the authorities and businesses can effectively utilize a safe cyber domain and the competence arising from cyber security measures, both nationally and internationally. Efficient cyber infrastructure Excellent Cyber Security competencies Depth and width of high-level education International networking Cyber Security CoE Effective situational picture Up to date legislation Modern Cyber Security Capabilities Niche business Joint and shared situational awareness Finnish Cyber Security Brand

22 JYVÄSKYLÄ - CYBER SECURITY CITY Thank you

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Author(s): Lehto, Martti Title: Cyber security competencies : cyber

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

The European CYberSecurity cppp ECYS Draft Proposal

The European CYberSecurity cppp ECYS Draft Proposal The European CYberSecurity cppp ECYS Draft Proposal 12 April 2016 The urgency to act We cannot miss the window opportunity for budgetary reasons: create a synergy among the different EC budgets via the

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

23.9.2015. Kangas Cybersecurity strategy

23.9.2015. Kangas Cybersecurity strategy Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures

More information

Witty City Smart city programme 5/2013 Virpi Mikkonen

Witty City Smart city programme 5/2013 Virpi Mikkonen Witty City Smart city programme 5/2013 Virpi Mikkonen Expertise and networks for innovations Tekes Finnish Funding Agency for Technology and Innovation The main public funding and expert organisation for

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Cyber Security VTT and the Finnish Approach

Cyber Security VTT and the Finnish Approach Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies

More information

FinNode & Smart Water: Finnish Innovation Network in Action. Michael Lovejoy FinNode USA 3 rd EU-Russia Innovation Forum 15 June 2012

FinNode & Smart Water: Finnish Innovation Network in Action. Michael Lovejoy FinNode USA 3 rd EU-Russia Innovation Forum 15 June 2012 FinNode & Smart Water: Finnish Innovation Network in Action Michael Lovejoy FinNode USA 3 rd EU-Russia Innovation Forum 15 June 2012 Cluster Evolution Finnish Innovation Environment Parliament of Finland

More information

GENERAL INFORMATION STUDIES DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2016 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE

GENERAL INFORMATION STUDIES DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2016 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE Curriculum 1 (5) GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2016 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE Master s Degree Programme in Information Technology The recommended period

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Jyväskylä - an attractive centre of growth

Jyväskylä - an attractive centre of growth Jyväskylä - an attractive centre of growth One of the fastest growing cities in Finland, current population 136 000 Annual population growth of 1 1.5 % Estimated population in 2030: 149 000 2nd most popular

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

GUIDELINES GUIDELINES FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST

GUIDELINES GUIDELINES FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST 1 (25) decision by Vice-Chancellor, 26/03/2012 Ref. no. 2012/231 A 21 FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST The university's employment regulations specify the rules applied when

More information

Regional case: East Finland

Regional case: East Finland ERRIN ICT WG Photonics Meeting, 11 th June 2014, Brussels Regional case: East Finland Photonics innovation platform in Finland Juha Purmonen Photonics Finland Finland East Finland - Joensuu Finland East-Finland

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Cybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015

Cybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015 Cybersecurity Franck Greverie Analyst Day Paris, 28 May 2015 Disclaimer This presentation does not contain or constitute an offer of securities for sale or an invitation or inducement to invest in securities

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

Industrial Cybersecurity Center Are you looking for End-Users, Close to Market Approaches, Requirements, Validation and Dissemination?

Industrial Cybersecurity Center Are you looking for End-Users, Close to Market Approaches, Requirements, Validation and Dissemination? Industrial Cybersecurity Center Are you looking for End-Users, Close to Market Approaches, Requirements, Validation and Dissemination? Twitter: @info_cci Email: info@cci-es.org Meet the Center Non-profit,

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Advancing cyber security. Cyber Security Academy

Advancing cyber security. Cyber Security Academy Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Maritta Perälä-Heape

Maritta Perälä-Heape Maritta Perälä-Heape OULU INNOVATION ALLIANCE (OIA) BRINGS TOGETHER REGIONAL STAKEHOLDERS MODE OF OPERATION Systematic, contract-based RD co-operation between regional players Composing and coordinating

More information

GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2017 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE

GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2017 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE Curriculum 1 (6) GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2017 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE Master's Degree Programme in Hospitality Management The scope of the

More information

High Performance Computing: implementing the strategy

High Performance Computing: implementing the strategy High Performance Computing: implementing the strategy PRACE Scientific Conference Leipzig 16 June 2013 Kostas Glinos Head of Unit - e-infrastructure European Commission - DG CONNECT HPC: What for? Weather,

More information

LeT s shape The future! Change in the University of Tampere

LeT s shape The future! Change in the University of Tampere Let s shape the future! Change in the University of Tampere 2010 2015 Let s shape the future! Change in the University of Tampere 2010 2015 Strategy of the University of Tampere approved by the University

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Degree Programme in Business Information Systems. Bachelor of Business Administration. The maximum number of admission score

Degree Programme in Business Information Systems. Bachelor of Business Administration. The maximum number of admission score Curriculum 1 (6) GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2017 SCOPE DESCRIPTION Degree Programme in Business Information Systems 210 ECTS credits Business information system skills

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

09 Our Strategy. Part 2: Strategy, areas of action, practical info

09 Our Strategy. Part 2: Strategy, areas of action, practical info 09 Our Strategy Part 2: Strategy, areas of action, practical info 09 Our Strategy Connect 2020 Agenda for global telecommunication/ict development Connect 2020 Vision An information society, empowered

More information

ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK)

ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK) Dean s Decision 1 (10) APPOINTMENT SPECIFICATION Three positions of PROFESSOR or ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK) in the fields of Software Engineering and Software Security, Software Engineering

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

BIG DATA AND CYBERSECURITY:

BIG DATA AND CYBERSECURITY: BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity

More information

ORGANISING NATIONAL CYBERSECURITY CENTRES

ORGANISING NATIONAL CYBERSECURITY CENTRES Information & Security: An International Journal Sarah Backman, vol.32, 2015 http://dx.doi.org/10.11610/isij.3206 ORGANISING NATIONAL CYBERSECURITY CENTRES Sarah BACKMAN Abstract: The emerging trend in

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

NB! This is a translation of the original. The original was

NB! This is a translation of the original. The original was Strategy 2013 2016 Strategy of the University of Vaasa 2013 2016 Contents The University of Vaasa 2013 2016... 2 1. Current State and Future Challenges... 4 2. Vision... 5 3. Strategic Goals and Measures...

More information

Regional strategy for education and research up to 2013

Regional strategy for education and research up to 2013 Opetusministeriö Ministry of Education Regional strategy for education and research up to 2013 Publications of the Ministry of Education, Finland 2004:11 Regional strategy for education and research up

More information

INTELLIGENT BUILT ENVIRONMENT FOR LIFE MAY 30 JUNE 3, 2016 TAMPERE FINLAND CALL FOR PAPERS

INTELLIGENT BUILT ENVIRONMENT FOR LIFE MAY 30 JUNE 3, 2016 TAMPERE FINLAND CALL FOR PAPERS INTELLIGENT BUILT ENVIRONMENT FOR LIFE MAY 30 JUNE 3, 2016 TAMPERE FINLAND CALL FOR PAPERS Welcome to the leading World Building Congress INTELLIGENT BUILT ENVIRONMENT FOR LIFE 7. Shaping materials and

More information

Finland s Cyber security Strategy

Finland s Cyber security Strategy Finland s Cyber security Strategy FINLAND S CYBER SECURITY STRATEGY Government Resolution 24.1.2013 1 TABLE OF CONTENTS 1. INTRODUCTION... 1 2. VISION FOR CYBER SECURITY... 3 3. CYBER SECURITY MANAGEMENT

More information

PROFESSOR IN MANAGEMENT AND ORGANIZATION (PORI UNIT)

PROFESSOR IN MANAGEMENT AND ORGANIZATION (PORI UNIT) 1 (6) PROFESSOR IN MANAGEMENT AND ORGANIZATION (PORI UNIT) Vacant position and its location The post of a Professor in Management and Organization is positioned in the Pori Unit of the Turku School of

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Environmental Management in Lahti. We are developing the Lahti region into a world-class centre for environmental business and research.

Environmental Management in Lahti. We are developing the Lahti region into a world-class centre for environmental business and research. Environmental Management in Lahti We are developing the Lahti region into a world-class centre for environmental business and research. Content City of Lahti Centre of environmental expertise Environmental

More information

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business

More information

Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia

Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia Centre for Security Cooperation Military Academy General Mihailo Apostolski - Skopje Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia The workshop Building a Cyber

More information

Strategic Platforms Information Security 2014

Strategic Platforms Information Security 2014 Strategic Platforms Information Security 2014 -------------------------- Data Mining for security process monitoring New authentication mechanism for System Information Call for «Expression of Interest»

More information

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting Towards new mission-oriented RTI policy and new rationales for programming and priority-setting Insights from the case of security K. Matthias Weber (AIT) E. Anders Eriksson (FOI) EU-SPRI Conference Helsinki,

More information

Public Private Partnerships in Network and Information Security Education

Public Private Partnerships in Network and Information Security Education 1 European Union Agency for Network and Information Security www.enisa.europa.eu 2 European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for

More information

Discussion Paper. This document is intended to nurture the debate of the informal Council of Ministers meeting in Turin on the 24 September.

Discussion Paper. This document is intended to nurture the debate of the informal Council of Ministers meeting in Turin on the 24 September. INFORMAL E.U. CULTURE MINISTERS MEETING Venaria Reale, Turin, 24 September 2014 Discussion Paper This document is intended to nurture the debate of the informal Council of Ministers meeting in Turin on

More information

SRO-EA s Cyber security Initiatives in Eastern Africa

SRO-EA s Cyber security Initiatives in Eastern Africa UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

8970/15 FMA/AFG/cb 1 DG G 3 C

8970/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

TOPICS FOR DISSERTATIONS 2011 2012

TOPICS FOR DISSERTATIONS 2011 2012 MEPP Master of European Politics and Policies Member of European Master in Public Administration network Parkstraat 45 Box 3609 3000 Belgium KATHOLIEKE UNIVERSITEIT LEUVEN TOPICS FOR DISSERTATIONS 2011

More information

The European Platform in Network and Information Security (NIS) Fabio Martinelli

The European Platform in Network and Information Security (NIS) Fabio Martinelli The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy Cyber security directive -

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

Education expertise from Turku - FinnWayLearning

Education expertise from Turku - FinnWayLearning Education expertise from Turku - FinnWayLearning Kirsti Virtanen Manager, Global Education Services Turku University of Applied Sciences Turku University of Applied Sciences Nearly 10,000 students and

More information

9360/15 FMA/AFG/cb 1 DG G 3 C

9360/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM

More information

NEA Leadership Competencies Guide

NEA Leadership Competencies Guide NEA Leadership Competencies Guide NEA Leadership Competencies Guide Table of Contents NEA Vision, Mission, and Values 5 Setting the context for leadership competencies 7 Leadership competency framework

More information

CONTENTS. Energy engineering students on their way to expertise in sustainable energy 10/18/2012. Helena Mälkki

CONTENTS. Energy engineering students on their way to expertise in sustainable energy 10/18/2012. Helena Mälkki RTU 53rd International Scientific conference, the 150th anniversary and the 1st Congress of World Engineers and Riga Polytechnical Institute / RTU Alumni Energy engineering students on their way to expertise

More information

CEPOL Cybercrime forensics & digital evidence course

CEPOL Cybercrime forensics & digital evidence course CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn

More information

Degree Programme in Business Information Systems. Bachelor of Business Administration. The maximum number of admission score

Degree Programme in Business Information Systems. Bachelor of Business Administration. The maximum number of admission score Curriculum 1 (6) GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2013-2016 SCOPE DESCRIPTION Degree Programme in Business Information Systems 210 ECTS credits Business information system skills

More information

National Cyber Security Strategy 2

National Cyber Security Strategy 2 National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport Titel brochure hier invullen 1 2 National Cyber Security Strategy (NCSS) 2 From awareness

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Peer Review of The Jyväskylä Region of Finland. Executive summary

Peer Review of The Jyväskylä Region of Finland. Executive summary Organisation for Economic Co-operation and Development Directorate for Education Education Management and Infrastructure Division Programme on Institutional Management of Higher Education (IMHE) Supporting

More information

TAMPERE LOCAL ACTION PLAN

TAMPERE LOCAL ACTION PLAN TAMPERE LOCAL ACTION PLAN 1. INTRODUCTION The city of Tampere, Finland is a partner in European EUniverCities cooperation network and EUniverCities Urbact project. The EUniverCities network unites 10 medium

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

EXCELLENCE AND DYNAMISM. University of Jyväskylä 2017

EXCELLENCE AND DYNAMISM. University of Jyväskylä 2017 EXCELLENCE AND DYNAMISM University of Jyväskylä 2017 Approved at the University Board Meeting of 25 March 2010 FOREWORD The compilation of a University Strategy extending until 2017 could hardly have

More information

Critical Infrastructure in a CyberPhysicalHuman World

Critical Infrastructure in a CyberPhysicalHuman World Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,

More information

New Technology and Education in Finland

New Technology and Education in Finland Please cite this paper as: Kivi, R. (2000), New Technology and Education in Finland, PEB Exchange, Programme on Educational Building, 2000/12, OECD Publishing. http://dx.doi.org/10.1787/830666883232 PEB

More information

Your door to future governance solutions

Your door to future governance solutions Your door to future governance solutions www.egovlab.eu 2 3 not just in theory but also in practice 4 5 www.egovlab.eu * Word from egovlab s director Vasilis Koulolias: The power of information and communication

More information

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

ICT 30-2015: Internet of Things and Platforms for Connected Smart Objects

ICT 30-2015: Internet of Things and Platforms for Connected Smart Objects LEIT ICT WP2014-15 ICT 30-2015: Internet of Things and Platforms for Connected Smart Objects Francisco Ibanez-Gallardo DG CONNECT, Network Technologies Werner Steinhögl DG CONNECT, Complex Systems & Advanced

More information

Trends in Cybersecurity and Privacy

Trends in Cybersecurity and Privacy www.pwc.com/ca/security Trends in Cybersecurity and Privacy Insights from The Global State of Information Security Survey 2016 Ottawa, Ontario April 13, 2016 Your speakers today David Craig Anthony Dias

More information

The development of Shinawatra University s international graduate program in joint public and business administration (PBA)

The development of Shinawatra University s international graduate program in joint public and business administration (PBA) The development of Shinawatra University s international graduate program in joint public and business administration (PBA) Introduction: Given the fact that management challenges in terms of political-economic-societaltechnological

More information

Opportunities in Standing Programs Opportunities in Special Programs. Dr. Robert O Connor Dr. David McGinnis

Opportunities in Standing Programs Opportunities in Special Programs. Dr. Robert O Connor Dr. David McGinnis Opportunities in Standing Programs Opportunities in Special Programs Dr. Robert O Connor Dr. David McGinnis All of them Particularly Decision, Risk and Management Sciences Infrastructure Management and

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION

FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION FROM EU SECURITY POLICIES TO SECURITY RESEARCH and INNOVATION LUIGI REBUFFI EOS CEO www.eos-eu.com 9TH CONGRESS ON EUROPEAN SECURITY AND DEFENCE BERLIN 09 NOV 2010 PANEL 6 European Organisation for Security

More information

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director EIT ICT Labs Education Systematic Approach to EIT Label Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director Our Education Strategy aims at breeding and attracting top talents EIT ICT Labs Education

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION

EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION Brussels, 24 January 2013 CALL FOR EXPRESSIONS OF INTEREST FOR THE SELECTION OF EXPERTS FOR THE HORIZON 2020 ADVISORY GROUPS 1. Background

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Future trends in HR? HR from the outside in

Future trends in HR? HR from the outside in Future trends in HR? HR from the outside in Ontario Hospitals Association November 2014 Dave Ulrich dou@umich.edu www.rbl.net Overall Goals 2 Ideas: About new business realities and how HR professionals

More information