Building up a European Cybersecurity

Size: px
Start display at page:

Download "Building up a European Cybersecurity"

Transcription

1 Milano 18/03/2014 Building up a European Cybersecurity Luigi REBUFFI EOS CEO CLUSIT Security Summit 2014

2 Cyber (cybersecurity; cybercrime; cyberdefence; cyberterrorism ) actors in Brussels European Commission EU Parliament European Council Council of the European Union DGs: CONNECT / HOME / ENTR / MOVE / ENER / TAXUD / MARKET / MARE / JRC Agencies: ENISA / EUROPOL / EU LISA Committees: SEDE / BUDG/ ITRE / LIBE / AFET / IMCO EEAS EDA EU Counterterrorism coordinator EU Data Protection Supervisor Presidency of the Union: GR, IT, COREPER II - Committee of Permanent Representatives Sectoral Associations Member States

3 European Parliament: co-legislation activities on cybersecurity Report on Cyber Security and Defence (2012/2096(INI)) Report on the proposal for a regulation of the European Parliament and of the Council concerning the European Network and Information Security Agency (ENISA) 28/02/2013 European Parliament legislative resolution of 4 July 2013 on the proposal for a directive of the European Parliament and of the Council on attacks against information systems Report on on critical information infrastructure protection achievements and next steps: towards global cyber-security (2011/2284(INI)) NIS Directive (13/03/2014)

4

5 Some Units dealing with Cybersecurity in DG CONNECT H3 - development and deployment of EU Digital Public Services, focussing on cross-border excellence in egovernment, and based on the egovernment Action Plan Public services: digital service infrastructures in the Connecting Europe Facility Public services: egovernment Action Plan Public services: on-line, cross border egovernment services H4 - policy, research and innovation solutions and carry out activities enhancing the security of Internet networks and services and the protection of citizens' on-line privacy and security. Cybersecurity Strategy for the European Union Cybersecurity, privacy and trustworthy ICT: research and innovation eprivacy H5 - policy framework to ensure that digital technologies improve sustainability in general including energy security and resource utilisation; accelerate the deployment of integrated energy, transport and ICT solutions at local level Green ICT and Resource Efficiency ICT for Mobility Smart Cities Smart Grids E2 - leading an integrated cloud strategy for Europe. Software & Services, Cloud: European Cloud Computing Strategy Software & Services, Cloud: research and innovation Software: Innovation and growth E3 - provide support for web entrepreneurship and Internet businesses in Europe. Collective awareness platforms Future Internet Public-Private Partnership Web Entrepreneurs and Businesses

6 INDUSTRIAL LEADERSHIP : ICT Topic: Cybersecurity, Trustworthy ICT; ICT Research & Innovation Actions Security-by-design for end-to-end security Cryptography Activities supporting the Cryptography Community H2020 Opportunities for Cybersecurity Call for Proposals SECURE SOCIETIES - DIGITAL SECURITY: CYBERSECURITY, PRIVACY AND TRUST H2020-DS-2014 Privacy (give users control over their data) Access Control (user friendly, non-password based) Risk management and assurance models (adapt existing risk management frameworks to cyber-threats) H2020-DS-2015 The role of ICT in Critical Infrastructure Protection (test interdependencies on critical ICT) Secure Information Sharing (highly secure information sharing that creates trust) Trust eservices (business cases for esignature, eauthentication) INDUSTRIAL LEADERSHIP : ICT Topic: Advanced Cloud Infrastructures and Services; ICT Research & Innovation actions: Cloud security Innovation Actions: platforms for trusted cloud systems.

7 European Organisation for Security Main objectives: Develop a larger and harmonised Security Market across EU countries Develop activities, solutions and business in: Border Control, Cyber Security, Civil Protection, Protection of Critical Infrastructures, Urban Security, EOS Members (42, from 13 European countries): From all major sectors: civil security, ICT, energy, transport, defence, services, research (centers and universities). 2 million employees worldwide, more than 65% of the European security systems market.

8 EOS TEAM (Strategy Integration & Support) Definition of common positions via indipendent platforms: EOS Working Groups Board of Directors (Strategy) Border Control Civil Protection Critical Infrastructure Protection Protection & Resilience of the Cyber Space Checks and Surveillance of Land and Maritime Borders Smart Borders Checks carried out at border crossing points Border Surveillance Surveillance of land and EU sea borders (and beyond) CBNRE, Crisis Management, Training, Response Simulation Urban Security Urban security, emergencies, vital infrastructure protection (including mass and land transportation, energy, food, financial etc.) Protection and Resilience of Critical Infrastructures Civil Aviation & Supply Chain End-to-End Civil Aviation Security for passengers and goods and Supply Chain Security Cybersecurity, Cybercrime & Cyber Terrorism, Cyber Defence Task Forces on: Privacy and Data Protection EU Funds EU Security Industrial Policy (PCP, Standardisation, Certification, etc.) EU Land Transport Security

9 EOS working group on cybersecurity Advice to EC and EP R&D priorities EP reports EU Cybsersecurity Strategy EU Cybersecurity Industrial Policy White Papers NIS Platform (WG 1,2,3) Projects (coordinated by EOS): CYSPA: European Alliance to protect cyberspace in Critical Infrastructures (Transport/ Energy/ egov / Finance) CAPITAL: Integrated research and innovation agenda for Cybersecurity and privacy COURAGE: Cybercrime and Cyberterrorism European Research Agenda (DG ENTR)

10 EU Cybersecurity Industry context THE MARKET A 56B worldwide market dominated by North America B 43 77% B 13 23% CyberDefence markets driven by trusted national players (Raytheon, LM, L3Com, BAE, Cassidian, Selex, Rhode & Schwartz, Secunet, Thales, Indra ) Some markets closed : China, Russia, Enterprise markets driven by global players : IBM, Microsoft, Cisco, Checkpoint, Symantec, McAfee, Kaspersky, CA 17% 14% 19% 50% Sources : ASDReports, Gartner, Thales

11 EU Cybersecurity Industry context THE SITUATION Increasing demand to cope with risks arising from ICT pervasiveness new challenges coming from mobility (incl. payments and identity schemes), big data, cloud computing, M2M, physical-logical security interaction, e-supply chain, etc. 28 EU Member States with different regulations and approaches to managing network and information systems security and data privacy leading to a fragmented market and difficulty to reach critical size Sovereignty issues and civil-defence links reinforce national approaches Cybersecurity industry competitiveness hampered by lack of end-to-end approach and insufficient uptake of comprehensive risk analysis ICT security still seen as a matter of buying the right products Complexity to access to funding for European innovators and difficult to move from innovations to markets R&D funding mechanisms too slow to keep pace with fast evolving cyber threats Data privacy : a constraint or an opportunity? Low level of investment on capabilities

12 EU ICT / cybersecurity technology independence Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): why the US managed to succeed in intercepting our conversation / data? Why we are so unprepared and unsecured against such threats? Why does so much of our data leave Europe? Why do our citizens prefer American platforms? Why are our European equivalents unable to compete? The revelations of Snowden came as a shock to many, but in a sense they were a wake-up call. European reaction is still weak: there are no major investments to build up European capacities. Is it too late for Europe to create major European competitors for ICT infrastructures? Is there a political will in European Member States to support such development? Digital Sovreignty Digital Independence

13 Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace The EU vision presented in the strategy is articulated in five strategic priorities: Achieving cyber resilience Drastically reducing cybercrime Developing cyberdefence policy and capabilities related to the Common Security and Defence Policy (CSDP) Develop the industrial and technological resources for cybersecurity Establish a coherent international cyberspace policy for the European Union and promote core EU values Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): the European Cybersecurity Strategy is providing us with the right building blocks Q: But do we have the plan of the house to use wisely these building blocks? Q: Are public and private stakeholders in Europe ready to build such a common cyberhouse?

14 NIS Directive Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): We will have no future without resilient and secure networks and systems. If the NIS Directive in the end does not make the necessary improvements, if it would have only a marginal impact on our trusted and secure networks, that will weaken our business, weaken our economy and maybe weaken our society too. A weak Directive will let down Europe! NIS Directive (envisaged by the EU Cybersecurity strategy - approved by the EP on 13/03/2014, likely by the Council by end 2014) should provide better coordination and risk management for the protection of Information Networks with a smart and effective cooperation between all Member States and all relevant stakeholders.

15 Measures to ensure a high common level of network and information security across the Union. NIS Directive - EP Approval Scope: Compulsory measures should be limited to infrastructures that are critical in a stricter sense (essential for the maintenance of vital economic and societal activities in the fields of energy, transport, banking, financial market infrastructures and health). Information society services and public administrations, software developers and hardware manufacturers should not be included. Protection and processing of personal data: Any use of personal data should be limited only to what is necessary and should be as anonymous as possible, or even totally anonymous. National competent authorities and single points of contact on the security of network and information systems: Designation of one or more competent authorities by Member States. Each Member State should appoint one single point of contact. The single point of contact shall ensure, among other things, cross-border cooperation with other single points of contact. Computer Emergency Response Teams (CERTs): each Member State shall set up at least one Response Team for each of the sectors, responsible for handling incidents and risks according to a well-defined process. CERTs shall be enabled and encouraged to initiate and to participate in joint exercises with other CERTs, with all Member States-CERTs, and with appropriate institutions of non-member States as well as with CERTs of multi- and international institutions.

16 Measures to ensure a high common level of network and information security across the Union. NIS Directive - EP Approval Security requirements and incident notification: no delegated acts but clear criteria to determine the significance of incidents to be reported. To determine the significance of the impact of an incident, the following parameters shall inter alia be taken into account: i) the number of users whose core service is affected; ii) the duration of the incident; iii) the geographic spread with regard to the area affected by the incident. After consultation with the notified competent authority and the market operator concerned, the single point of contact may inform the public about individual incidents, where it determines that public awareness is necessary to prevent an incident or deal with an ongoing incident. Member States shall encourage market operators to make public incidents involving their business in their financial reports on a voluntary basis. Implementation and enforcement: flexibility regarding the evidence for compliance with the security requirements imposed on market operators by admitting proof of compliance provided in a form other than security audits. The single points of contact and the data protection authorities shall develop, in cooperation with ENISA, information exchange mechanisms and a single template to be used both for notifications.

17 NIS Directive and voluntary approach Public administrations and several market operators have been removed from the original Directive proposal (they will not be subject to security regulations) such as internet payment gateways, e-commerce and cloud computing services. Internet service providers (e.g. Google, Amazon, Ebay and Skype) will not be asked to report security incidents Is this really what we need to secure the society, when we all know the growing importance of security in Internet, in transactions and in the cloud? Should we really base the development of such services on voluntary certification schemes? President Obama issued in February 2013 the Executive Order on Improving Critical Infrastructure Cybersecurity which calls for the development of a voluntary riskbased Cybersecurity Framework a set of industry standards and best practices to help organizations manage cybersecurity risks. Is this voluntary approach, strongly supported by American companies operating in Europe, really the most adapted to our 28 Member States or it is simply a way of leaving the control of our cyber space to those who control it already today?

18 NIS Platform Collaboration between public and private sector: the NIS Platform The European Cybersecurity Strategy calls for the establishment of a NIS Network Information Security - platform, bringing together relevant European public and private stakeholders tasked to develop incentives to carry out appropriate risk management and adopt security standards and solutions, to find technology-neutral best practice to enhance cyber security as well as possibly establish voluntary EUwide certification schemes Start building a common understanding of needs and cooperation at European level on cybersecurity. Adoption of a common risk management processes (WG1 of the NIS Platform) will determine the development and the adoption of secure ICT solutions Information sharing process (WG2 of the NIS Platform) will help understanding threats and impacts Definition of R&D needs / agenda (WG 3 of the NIS Platform)

19 From the NIS Platform to an EIP on cybersecurity Objective of a possible evolution of the NIS Platform: cyber-architects from Member States should be ready to federate national views, overcome sovereignty constraints, design the plan of the European cyberhouse and build it in a public private cooperation. The NIS Platform could evolve into a specific EU Cybersecurity Programme supported by a European instrument such as the European Innovation Partnership (EIP) to develop an overall political and strategic governance. This Programme could steer all the elements for an end to end approach in this sector: from research and innovation, implementation, training, funding and incentives and other elements, like Research and Innovation as well as standardisation and certification, of a possible European cybersecurity industrial policy.

20 EU Cybersecurity Industry future MOVING FORWARD EOS calls for a fast adoption and implementation of a European Cybersecurity Industrial Policy (CYSIP) in order to: Secure European societies with European technology Establish a competitive and efficient European industrial base in cybersecurity Develop European solutions and services Boost the European cybersecurity market Sustain the development of the European digital economy

21 EU Cybersecurity Industry policy WHAT COULD BE AN EU CYBERSECURITY INDUSTRIAL POLICY? As for any industrial policy, an EU CYSIP would build upon : A strategic vision based on market assessment and make-or-buy orientations An analysis of the technological dependence and its consequences on digital economic sustainability, societal impacts and sovereignty issues A coordinated R&D and innovation policy A coordinated public procurement policy: For the protection of state-owned / operated infrastructures and large governmental ICT systems A business-oriented, balanced and technology-neutral regulation framework: Ensuring a level-playing field throughout Europe Reaching the right balance between incentives and compulsory frameworks Compensating efforts by co-funding and labelling measures Promoting European standards

22 EU Cybersecurity Industry policy WHY DO WE NEED SUCH A POLICY? Example of the ICT domain : Most HW and SW products procured from outside EU Still strong supply base for services in EU (IT and telecoms) : IT applications development and operations reflect specific business models over-harmonisation has benefits but also costs Cyber security business models are currently drawn from ICT ones: With specific exceptions (e.g. encryption systems) or niche start-ups With an under-developed services market Why do we need an EU industrial supply? Because of data protection issue (personal and trade data) Because of a de facto link to cyber defence Because EU has a strong supply base coming from the ICT and the security industry to build upon a wider market

23 EU Cybersecurity Industry policy Where could / should there be a specific European product policy? Likely not in commodity protection products, close to the ICT mass markets (firewalls, antivirus, IDS software ) where global mature suppliers exist Opportunities in specific areas (components / equipments) such as probes and core network routers Opportunities in supervision and monitoring tools for CIs and security services centers deployment (SOCs) Potentially in niches from new smart markets (smart security systems, smart and secure mobility, smart and safe city) as well as SCADA and Industrial Control Systems

24 How to pave the way for an EU Cybersecurity Industry policy? Establish a coherent and harmonised set of European policies Support the implementation of the NIS Directive Comprehensive and relevant scope National strategies and CERTs deployment Governance and adequate infrastructures Encourage Public Private dialogue & Cooperation Encourage participation of the European cyber security industry at the NIS Platform Include private sector in EU-wide cyber exercises Leverage on and coordinate existing public-private initiatives (NATO, ENISA, NISP, EC3, EIP, KIC )

25 How to achieve a CYSIP? R&D and supporting the adoption of new technologies R&D at EU level: Horizon 2020 programme for the development of new technologies and capabilities to face new and fast evolving threats. Missing strategy in the R&D workprogramme Derive work programmes and topics from gap analysis and users / operators driven operational needs (also EC Advisory Group for the Security Programme) Threats are evolving rapidly, much faster than the pace of the European funded research Ensure timely and simple administrative processes (cut the red tape) Implement PCP schemes to bridge the innovation-to-market gap and harmonise specifications (with the support of national administrations and users/operators) Align EU initiatives (TDL, CSP, CYSPA, etc.) into an overarching strategy and roadmap In the cyber space, MS administrations are not setting the pace for implementation and use of innovative solutions (as in other security markets): it is a free environment, linked to a liberal market, with very limited control. Economic and societal constraints will drive the pace of adoption of new technologies.

26 How to achieve a CYSIP? Standardisation and Certification Standardisation and certification of cybersecurity solutions and services at national and European level could drive the implementation of new technologies and help harmonising the European security market and overcome its fragmentation. Develop standards and certification (EU security label) Development of performance-oriented standards, technology neutral, that can better follow rapidly evolving needs, threats and technology, fostering the development of EU references for the global market. Link security standards to certification of new products (standards per se would be useless). This could reduce costs and create stronger EU references for export. EU certified solutions and services to better define and limit insurance premiums, providing combined technology/insurance responses to threats. Create a Cyber European Agreed Product list (e.g. managed by ENISA)

27 How to achieve a CYSIP? Fostering R&D and deployment with an increased and focussed budget for cybersecurity Increase budgets to provide the required level of cybersecurity, at national and EU level. For EU-funded R&D and validation (H2020) for key components development and pilots; for sector-based test-beds for the evaluation of CI (SCADA, ICS ) cyber resilience For purchasing capacities for deployment of large programmes in MS Use of cohesion funds and Public Procurement Initiatives for all those applications and infrastructures leveraging upon the security of communication and exchange of data, encouraging harmonized public procurement for national assets and CIP, through PCP. Security of broadband networks and cyber security of large infrastructure in Cohesion Policy Internal security fund for cyber protection of law enforcement / border management systems Specific funds to accompany security new constraints for market operators and critical infrastructures

28 How to achieve a CYSIP? Fostering R&D and deployment with an increased and focussed budget for cybersecurity For investments to protect Critical Infrastructures, Protect European Institutions and major European Programmes: EU showing the way through major cyber security investments on EU-wide existing or forthcoming assets (with European impact): EU Institutions ICT platforms protection Integrated maritime surveillance, satellite systems and air traffic management, energy transmission systems etc. Deployment of EU based data centers and secured cloud services Specific support mechanisms for cyber security SMEs

29 How to achieve a CYSIP? Awareness and Training Raising awareness and educating users on the benefits of cyber protection to preventing cyber risks and increasing protection of cyber-enabled applications, without creating unnecessary fears. Awareness programs should be implemented at Member State level within the civil society and organisations, promoting data protection and data privacy culture. Basic training in information and communication technologies should start at primary school level (understanding what s behind the screen). Awareness raising at all levels (including C ) of corporate: raising awareness of cyber threats at professional level would help improve risk management of networked infrastructure, encourage better investments and foster resilient services. Operators of key infrastructures leveraging upon ICTs should be educated on how to prevent and react to cyber threats, via relevant behaviours and innovative technologies. Lack of skilled cyber defence architects, engineers, and workers development of university courses to more widely rise a generation of skilled cybersecurity experts. Security of ICT is an excellent way for developing jobs, thus contributing to the recovery of our economies.

30 In the meantime From Federal News Radio, early Aug : Department of Homeland Security has awarded contracts to 17 firms to provide continuous diagnostics and mitigation services, also known as CDM, to the federal government, creating a potential model for private groups to measure and adjust their own cyber security efforts ( ) (and) designed to defend public sector IT networks from cyber threats ( ) Booz Allen, IBM, General Dynamics-IT, Lockheed Martin, Northrop Grumman, Hewlett Packard, SAIC and CGI Federal Inc. (CGI) were among the contract winners. McAfee will provide the tool suites under many of the contracts. The contract is worth up to 6 billion USD.

31 And now in Europe? The European security industry and research centers (EOS) are ready for more concrete steps and develop further a structured public private dialogue and cooperation: within the European countries, across the countries and across sectors. But are public administrations, at European and national level, ready and willing as well to provide the needed political and economic support?

32 THANK YOU! FOR MORE INFORMATION AND SUGGESTIONS: EOS Cyber Security Working Group Coordinator Mari KERT : mari.kert@eos-eu.com EOS coordinator for the CYSPA Alliance (and project) Nina OLESEN: nina.olesen@eos-eu.com EOS - CEO Luigi REBUFFI: luigi.rebuffi@eos-eu.com

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

CYSPA launch event - Turkey

CYSPA launch event - Turkey CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology

More information

CYSPA - EC projects supporting NIS

CYSPA - EC projects supporting NIS CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 7.2.2013 JOIN(2013) 1 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL,

More information

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cloud and Critical Information Infrastructures

Cloud and Critical Information Infrastructures Cloud and Critical Information Infrastructures Cloud computing in ENISA Dr. Evangelos Ouzounis Head of Infrastructure & Services Unit www.enisa.europa.eu About ENISA The European Union Network and Information

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR

More information

Digital Agenda for Europe Cartagena de Indias, September 1, 2015

Digital Agenda for Europe Cartagena de Indias, September 1, 2015 Digital Agenda for Europe Cartagena de Indias, September 1, 2015 Javier Huerta Bravo From the Digital Agenda (2010)... Commission ICT strategy for 2010-2020 Problems identified: Lack of investment in networks

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

9360/15 FMA/AFG/cb 1 DG G 3 C

9360/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM

More information

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 7.2.2013 COM(2013) 48 final 2013/0027 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, XXX [ ](2012) XXX draft Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things

ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future

More information

Scoping Paper for. Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens'

Scoping Paper for. Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens' Scoping Paper for Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens' Important Notice: Working Document This paper is a working document. It

More information

Standards for Cyber Security

Standards for Cyber Security Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-97 97

More information

Cyber Security for Railway Signalling

Cyber Security for Railway Signalling Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against

More information

ROADMAP. A. Context and problem definition

ROADMAP. A. Context and problem definition TITLE OF THE INITIATIVE ROADMAP Commission Communication on EU Risk management and supply chain security LEAD DG RESPONSIBLE UNIT TAXUD B2 DATE OF ROADMAP 10 / 2012 This indicative roadmap is provided

More information

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016 CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital

More information

8970/15 FMA/AFG/cb 1 DG G 3 C

8970/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH

More information

ROADMAP. Proposal on a European Strategy for Internet Security

ROADMAP. Proposal on a European Strategy for Internet Security TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION

More information

European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2

European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2 European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2 ERRIN-EURADA-EUROCITIES-Dutch Provinces Information/ de-brief meeting 14-5-2013 Overview

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Privacy in the Cloud: Data Protection and Security in Cloud Computing

Privacy in the Cloud: Data Protection and Security in Cloud Computing SPEECH/11/859 Viviane REDING Vice-President of the European Commission, EU Justice Commissioner Privacy in the Cloud: Data Protection and Security in Cloud Computing Round-table High Level conference on

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

CEN-CENELEC reply to the European Commission's Public Consultation on demand-side policies to spur European industrial innovations in a global market

CEN-CENELEC reply to the European Commission's Public Consultation on demand-side policies to spur European industrial innovations in a global market CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN-CENELEC reply to the European Commission's Public Consultation on demand-side

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

The EBF would like to take the opportunity to note few general remarks on key issues as follows:

The EBF would like to take the opportunity to note few general remarks on key issues as follows: Ref.:EBF_001314 Brussels, 17 June 2013 Launched in 1960, the European Banking Federation is the voice of the European banking sector from the European Union and European Free Trade Association countries.

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

WORK PROGRAMME 2013 27 NOVEMBER 2012

WORK PROGRAMME 2013 27 NOVEMBER 2012 WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3

More information

Standards in the Digital Single Market: setting priorities and ensuring delivery

Standards in the Digital Single Market: setting priorities and ensuring delivery Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

H2020-LEIT-ICT WP2016-17. Big Data PPP

H2020-LEIT-ICT WP2016-17. Big Data PPP H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst. Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.ISP Click to edit cilli@di.uniroma1.it Master title style http://dsi.uniroma1.it/~cilli

More information

H2020 "Secure Societies" Work Programme Digital Security 2015

H2020 Secure Societies Work Programme Digital Security 2015 H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

More information

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

(DRAFT)( 2 ) MOTION FOR A RESOLUTION 05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](

More information

Address by Stefania Giannini Minister of Education, Universities and Research on the occasion of LET s 2014 " Bologna, October 1, 2014

Address by Stefania Giannini Minister of Education, Universities and Research on the occasion of LET s 2014  Bologna, October 1, 2014 Address by Stefania Giannini Minister of Education, Universities and Research on the occasion of LET s 2014 " Bologna, October 1, 2014 Dear Authorities, Dear Colleagues, Ladies and Gentlemen, The dense

More information

Energy efficiency in communication networks in Horizon 2020 perspective

Energy efficiency in communication networks in Horizon 2020 perspective Energy efficiency in communication networks in Horizon 2020 perspective Pertti Jauhiainen Network Technologies European Commission DG CONNECT September 25, 2013 EU action to tackle climate change 20-20-20

More information

Council of the European Union Brussels, 5 March 2015 (OR. en)

Council of the European Union Brussels, 5 March 2015 (OR. en) Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:

More information

ENISA workshop on Security Certification of ICT products in Europe

ENISA workshop on Security Certification of ICT products in Europe ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

European GNSS Applications in Horizon 2020

European GNSS Applications in Horizon 2020 European GNSS Applications in Horizon 2020 Official International Space Information Day 2015, Brussels 10 November 2015 Marta Krywanis-Brzostowska European GNSS Agency Integrated approach: understanding

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

26.3.2014 A7-0365/133

26.3.2014 A7-0365/133 26.3.2014 A7-0365/133 Amendment 133 Amalia Sartori on behalf of the Committee on Industry, Research and Energy Report A7-0365/2013 Marita Ulvskog Electronic identification and trust services for electronic

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber

More information

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges ALICE Working Groups Descriptions WG1: Sustainable Safe and Secure Supply Chains The vision of the WG is to do more with less and ensuring safety and security in the supply chains thereof contributing

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE

More information

5G Network Infrastructure for the Future Internet

5G Network Infrastructure for the Future Internet 5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies

More information

Specific comments on Communication

Specific comments on Communication Comments on Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Cybersecurity Strategy of the European Union: An Open,

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

SOUTH EAST EUROPE TRANSNATIONAL CO-OPERATION PROGRAMME. Terms of reference

SOUTH EAST EUROPE TRANSNATIONAL CO-OPERATION PROGRAMME. Terms of reference SOUTH EAST EUROPE TRANSNATIONAL CO-OPERATION PROGRAMME 3 rd Call for Proposals Terms of reference Efficient access to a SEE coordinated multimodal freight network between ports and landlocked countries

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

ENISA and Cloud Security

ENISA and Cloud Security ENISA and Cloud Security Dimitra Liveri NIS Expert EuroCloud Forum 2015 Barcelona 07-10-2015 European Union Agency for Network and Information Security Securing Europe s Information Society Operational

More information

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities

More information

HORIZON 2020. Energy Efficiency and market uptake of energy innovations. Linn Johnsen DG ENER C3 Policy Officer

HORIZON 2020. Energy Efficiency and market uptake of energy innovations. Linn Johnsen DG ENER C3 Policy Officer THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION HORIZON 2020 Energy Efficiency and market uptake of energy innovations Linn Johnsen DG ENER C3 Policy Officer EU 2020 Targets Energy Efficiency Energy

More information

European Cloud Computing Strategy

European Cloud Computing Strategy European Cloud Computing Strategy Key actions and state of play Jorge GASOS DG Connect, European Commission Jorge.Gasos@ec.europa.eu Impact on providers and users Cloud services: market forecast Supply

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof, 28.8.2014 Official Journal of the European Union L 257/73 REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document. Proposal for a COUNCIL REGULATION

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document. Proposal for a COUNCIL REGULATION EUROPEAN COMMISSION Brussels, 10.7.2013 SWD(2013) 258 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a COUNCIL REGULATION on the

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

- 'Improving Cyber Security in Europe, the way forward

- 'Improving Cyber Security in Europe, the way forward Report Breakfast Briefing: 'Improving Cyber Security in Europe, the way forward 24 April 2013, European Parliament, Brussels Disclaimer: This report is prepared by the rapporteur, Dr. Alea Fairchild, for

More information