Building up a European Cybersecurity
|
|
- Stephen Brooks
- 8 years ago
- Views:
Transcription
1 Milano 18/03/2014 Building up a European Cybersecurity Luigi REBUFFI EOS CEO CLUSIT Security Summit 2014
2 Cyber (cybersecurity; cybercrime; cyberdefence; cyberterrorism ) actors in Brussels European Commission EU Parliament European Council Council of the European Union DGs: CONNECT / HOME / ENTR / MOVE / ENER / TAXUD / MARKET / MARE / JRC Agencies: ENISA / EUROPOL / EU LISA Committees: SEDE / BUDG/ ITRE / LIBE / AFET / IMCO EEAS EDA EU Counterterrorism coordinator EU Data Protection Supervisor Presidency of the Union: GR, IT, COREPER II - Committee of Permanent Representatives Sectoral Associations Member States
3 European Parliament: co-legislation activities on cybersecurity Report on Cyber Security and Defence (2012/2096(INI)) Report on the proposal for a regulation of the European Parliament and of the Council concerning the European Network and Information Security Agency (ENISA) 28/02/2013 European Parliament legislative resolution of 4 July 2013 on the proposal for a directive of the European Parliament and of the Council on attacks against information systems Report on on critical information infrastructure protection achievements and next steps: towards global cyber-security (2011/2284(INI)) NIS Directive (13/03/2014)
4
5 Some Units dealing with Cybersecurity in DG CONNECT H3 - development and deployment of EU Digital Public Services, focussing on cross-border excellence in egovernment, and based on the egovernment Action Plan Public services: digital service infrastructures in the Connecting Europe Facility Public services: egovernment Action Plan Public services: on-line, cross border egovernment services H4 - policy, research and innovation solutions and carry out activities enhancing the security of Internet networks and services and the protection of citizens' on-line privacy and security. Cybersecurity Strategy for the European Union Cybersecurity, privacy and trustworthy ICT: research and innovation eprivacy H5 - policy framework to ensure that digital technologies improve sustainability in general including energy security and resource utilisation; accelerate the deployment of integrated energy, transport and ICT solutions at local level Green ICT and Resource Efficiency ICT for Mobility Smart Cities Smart Grids E2 - leading an integrated cloud strategy for Europe. Software & Services, Cloud: European Cloud Computing Strategy Software & Services, Cloud: research and innovation Software: Innovation and growth E3 - provide support for web entrepreneurship and Internet businesses in Europe. Collective awareness platforms Future Internet Public-Private Partnership Web Entrepreneurs and Businesses
6 INDUSTRIAL LEADERSHIP : ICT Topic: Cybersecurity, Trustworthy ICT; ICT Research & Innovation Actions Security-by-design for end-to-end security Cryptography Activities supporting the Cryptography Community H2020 Opportunities for Cybersecurity Call for Proposals SECURE SOCIETIES - DIGITAL SECURITY: CYBERSECURITY, PRIVACY AND TRUST H2020-DS-2014 Privacy (give users control over their data) Access Control (user friendly, non-password based) Risk management and assurance models (adapt existing risk management frameworks to cyber-threats) H2020-DS-2015 The role of ICT in Critical Infrastructure Protection (test interdependencies on critical ICT) Secure Information Sharing (highly secure information sharing that creates trust) Trust eservices (business cases for esignature, eauthentication) INDUSTRIAL LEADERSHIP : ICT Topic: Advanced Cloud Infrastructures and Services; ICT Research & Innovation actions: Cloud security Innovation Actions: platforms for trusted cloud systems.
7 European Organisation for Security Main objectives: Develop a larger and harmonised Security Market across EU countries Develop activities, solutions and business in: Border Control, Cyber Security, Civil Protection, Protection of Critical Infrastructures, Urban Security, EOS Members (42, from 13 European countries): From all major sectors: civil security, ICT, energy, transport, defence, services, research (centers and universities). 2 million employees worldwide, more than 65% of the European security systems market.
8 EOS TEAM (Strategy Integration & Support) Definition of common positions via indipendent platforms: EOS Working Groups Board of Directors (Strategy) Border Control Civil Protection Critical Infrastructure Protection Protection & Resilience of the Cyber Space Checks and Surveillance of Land and Maritime Borders Smart Borders Checks carried out at border crossing points Border Surveillance Surveillance of land and EU sea borders (and beyond) CBNRE, Crisis Management, Training, Response Simulation Urban Security Urban security, emergencies, vital infrastructure protection (including mass and land transportation, energy, food, financial etc.) Protection and Resilience of Critical Infrastructures Civil Aviation & Supply Chain End-to-End Civil Aviation Security for passengers and goods and Supply Chain Security Cybersecurity, Cybercrime & Cyber Terrorism, Cyber Defence Task Forces on: Privacy and Data Protection EU Funds EU Security Industrial Policy (PCP, Standardisation, Certification, etc.) EU Land Transport Security
9 EOS working group on cybersecurity Advice to EC and EP R&D priorities EP reports EU Cybsersecurity Strategy EU Cybersecurity Industrial Policy White Papers NIS Platform (WG 1,2,3) Projects (coordinated by EOS): CYSPA: European Alliance to protect cyberspace in Critical Infrastructures (Transport/ Energy/ egov / Finance) CAPITAL: Integrated research and innovation agenda for Cybersecurity and privacy COURAGE: Cybercrime and Cyberterrorism European Research Agenda (DG ENTR)
10 EU Cybersecurity Industry context THE MARKET A 56B worldwide market dominated by North America B 43 77% B 13 23% CyberDefence markets driven by trusted national players (Raytheon, LM, L3Com, BAE, Cassidian, Selex, Rhode & Schwartz, Secunet, Thales, Indra ) Some markets closed : China, Russia, Enterprise markets driven by global players : IBM, Microsoft, Cisco, Checkpoint, Symantec, McAfee, Kaspersky, CA 17% 14% 19% 50% Sources : ASDReports, Gartner, Thales
11 EU Cybersecurity Industry context THE SITUATION Increasing demand to cope with risks arising from ICT pervasiveness new challenges coming from mobility (incl. payments and identity schemes), big data, cloud computing, M2M, physical-logical security interaction, e-supply chain, etc. 28 EU Member States with different regulations and approaches to managing network and information systems security and data privacy leading to a fragmented market and difficulty to reach critical size Sovereignty issues and civil-defence links reinforce national approaches Cybersecurity industry competitiveness hampered by lack of end-to-end approach and insufficient uptake of comprehensive risk analysis ICT security still seen as a matter of buying the right products Complexity to access to funding for European innovators and difficult to move from innovations to markets R&D funding mechanisms too slow to keep pace with fast evolving cyber threats Data privacy : a constraint or an opportunity? Low level of investment on capabilities
12 EU ICT / cybersecurity technology independence Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): why the US managed to succeed in intercepting our conversation / data? Why we are so unprepared and unsecured against such threats? Why does so much of our data leave Europe? Why do our citizens prefer American platforms? Why are our European equivalents unable to compete? The revelations of Snowden came as a shock to many, but in a sense they were a wake-up call. European reaction is still weak: there are no major investments to build up European capacities. Is it too late for Europe to create major European competitors for ICT infrastructures? Is there a political will in European Member States to support such development? Digital Sovreignty Digital Independence
13 Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace The EU vision presented in the strategy is articulated in five strategic priorities: Achieving cyber resilience Drastically reducing cybercrime Developing cyberdefence policy and capabilities related to the Common Security and Defence Policy (CSDP) Develop the industrial and technological resources for cybersecurity Establish a coherent international cyberspace policy for the European Union and promote core EU values Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): the European Cybersecurity Strategy is providing us with the right building blocks Q: But do we have the plan of the house to use wisely these building blocks? Q: Are public and private stakeholders in Europe ready to build such a common cyberhouse?
14 NIS Directive Commissioner Kroes at the High Level Cybersecurity Conference (28/02/2014): We will have no future without resilient and secure networks and systems. If the NIS Directive in the end does not make the necessary improvements, if it would have only a marginal impact on our trusted and secure networks, that will weaken our business, weaken our economy and maybe weaken our society too. A weak Directive will let down Europe! NIS Directive (envisaged by the EU Cybersecurity strategy - approved by the EP on 13/03/2014, likely by the Council by end 2014) should provide better coordination and risk management for the protection of Information Networks with a smart and effective cooperation between all Member States and all relevant stakeholders.
15 Measures to ensure a high common level of network and information security across the Union. NIS Directive - EP Approval Scope: Compulsory measures should be limited to infrastructures that are critical in a stricter sense (essential for the maintenance of vital economic and societal activities in the fields of energy, transport, banking, financial market infrastructures and health). Information society services and public administrations, software developers and hardware manufacturers should not be included. Protection and processing of personal data: Any use of personal data should be limited only to what is necessary and should be as anonymous as possible, or even totally anonymous. National competent authorities and single points of contact on the security of network and information systems: Designation of one or more competent authorities by Member States. Each Member State should appoint one single point of contact. The single point of contact shall ensure, among other things, cross-border cooperation with other single points of contact. Computer Emergency Response Teams (CERTs): each Member State shall set up at least one Response Team for each of the sectors, responsible for handling incidents and risks according to a well-defined process. CERTs shall be enabled and encouraged to initiate and to participate in joint exercises with other CERTs, with all Member States-CERTs, and with appropriate institutions of non-member States as well as with CERTs of multi- and international institutions.
16 Measures to ensure a high common level of network and information security across the Union. NIS Directive - EP Approval Security requirements and incident notification: no delegated acts but clear criteria to determine the significance of incidents to be reported. To determine the significance of the impact of an incident, the following parameters shall inter alia be taken into account: i) the number of users whose core service is affected; ii) the duration of the incident; iii) the geographic spread with regard to the area affected by the incident. After consultation with the notified competent authority and the market operator concerned, the single point of contact may inform the public about individual incidents, where it determines that public awareness is necessary to prevent an incident or deal with an ongoing incident. Member States shall encourage market operators to make public incidents involving their business in their financial reports on a voluntary basis. Implementation and enforcement: flexibility regarding the evidence for compliance with the security requirements imposed on market operators by admitting proof of compliance provided in a form other than security audits. The single points of contact and the data protection authorities shall develop, in cooperation with ENISA, information exchange mechanisms and a single template to be used both for notifications.
17 NIS Directive and voluntary approach Public administrations and several market operators have been removed from the original Directive proposal (they will not be subject to security regulations) such as internet payment gateways, e-commerce and cloud computing services. Internet service providers (e.g. Google, Amazon, Ebay and Skype) will not be asked to report security incidents Is this really what we need to secure the society, when we all know the growing importance of security in Internet, in transactions and in the cloud? Should we really base the development of such services on voluntary certification schemes? President Obama issued in February 2013 the Executive Order on Improving Critical Infrastructure Cybersecurity which calls for the development of a voluntary riskbased Cybersecurity Framework a set of industry standards and best practices to help organizations manage cybersecurity risks. Is this voluntary approach, strongly supported by American companies operating in Europe, really the most adapted to our 28 Member States or it is simply a way of leaving the control of our cyber space to those who control it already today?
18 NIS Platform Collaboration between public and private sector: the NIS Platform The European Cybersecurity Strategy calls for the establishment of a NIS Network Information Security - platform, bringing together relevant European public and private stakeholders tasked to develop incentives to carry out appropriate risk management and adopt security standards and solutions, to find technology-neutral best practice to enhance cyber security as well as possibly establish voluntary EUwide certification schemes Start building a common understanding of needs and cooperation at European level on cybersecurity. Adoption of a common risk management processes (WG1 of the NIS Platform) will determine the development and the adoption of secure ICT solutions Information sharing process (WG2 of the NIS Platform) will help understanding threats and impacts Definition of R&D needs / agenda (WG 3 of the NIS Platform)
19 From the NIS Platform to an EIP on cybersecurity Objective of a possible evolution of the NIS Platform: cyber-architects from Member States should be ready to federate national views, overcome sovereignty constraints, design the plan of the European cyberhouse and build it in a public private cooperation. The NIS Platform could evolve into a specific EU Cybersecurity Programme supported by a European instrument such as the European Innovation Partnership (EIP) to develop an overall political and strategic governance. This Programme could steer all the elements for an end to end approach in this sector: from research and innovation, implementation, training, funding and incentives and other elements, like Research and Innovation as well as standardisation and certification, of a possible European cybersecurity industrial policy.
20 EU Cybersecurity Industry future MOVING FORWARD EOS calls for a fast adoption and implementation of a European Cybersecurity Industrial Policy (CYSIP) in order to: Secure European societies with European technology Establish a competitive and efficient European industrial base in cybersecurity Develop European solutions and services Boost the European cybersecurity market Sustain the development of the European digital economy
21 EU Cybersecurity Industry policy WHAT COULD BE AN EU CYBERSECURITY INDUSTRIAL POLICY? As for any industrial policy, an EU CYSIP would build upon : A strategic vision based on market assessment and make-or-buy orientations An analysis of the technological dependence and its consequences on digital economic sustainability, societal impacts and sovereignty issues A coordinated R&D and innovation policy A coordinated public procurement policy: For the protection of state-owned / operated infrastructures and large governmental ICT systems A business-oriented, balanced and technology-neutral regulation framework: Ensuring a level-playing field throughout Europe Reaching the right balance between incentives and compulsory frameworks Compensating efforts by co-funding and labelling measures Promoting European standards
22 EU Cybersecurity Industry policy WHY DO WE NEED SUCH A POLICY? Example of the ICT domain : Most HW and SW products procured from outside EU Still strong supply base for services in EU (IT and telecoms) : IT applications development and operations reflect specific business models over-harmonisation has benefits but also costs Cyber security business models are currently drawn from ICT ones: With specific exceptions (e.g. encryption systems) or niche start-ups With an under-developed services market Why do we need an EU industrial supply? Because of data protection issue (personal and trade data) Because of a de facto link to cyber defence Because EU has a strong supply base coming from the ICT and the security industry to build upon a wider market
23 EU Cybersecurity Industry policy Where could / should there be a specific European product policy? Likely not in commodity protection products, close to the ICT mass markets (firewalls, antivirus, IDS software ) where global mature suppliers exist Opportunities in specific areas (components / equipments) such as probes and core network routers Opportunities in supervision and monitoring tools for CIs and security services centers deployment (SOCs) Potentially in niches from new smart markets (smart security systems, smart and secure mobility, smart and safe city) as well as SCADA and Industrial Control Systems
24 How to pave the way for an EU Cybersecurity Industry policy? Establish a coherent and harmonised set of European policies Support the implementation of the NIS Directive Comprehensive and relevant scope National strategies and CERTs deployment Governance and adequate infrastructures Encourage Public Private dialogue & Cooperation Encourage participation of the European cyber security industry at the NIS Platform Include private sector in EU-wide cyber exercises Leverage on and coordinate existing public-private initiatives (NATO, ENISA, NISP, EC3, EIP, KIC )
25 How to achieve a CYSIP? R&D and supporting the adoption of new technologies R&D at EU level: Horizon 2020 programme for the development of new technologies and capabilities to face new and fast evolving threats. Missing strategy in the R&D workprogramme Derive work programmes and topics from gap analysis and users / operators driven operational needs (also EC Advisory Group for the Security Programme) Threats are evolving rapidly, much faster than the pace of the European funded research Ensure timely and simple administrative processes (cut the red tape) Implement PCP schemes to bridge the innovation-to-market gap and harmonise specifications (with the support of national administrations and users/operators) Align EU initiatives (TDL, CSP, CYSPA, etc.) into an overarching strategy and roadmap In the cyber space, MS administrations are not setting the pace for implementation and use of innovative solutions (as in other security markets): it is a free environment, linked to a liberal market, with very limited control. Economic and societal constraints will drive the pace of adoption of new technologies.
26 How to achieve a CYSIP? Standardisation and Certification Standardisation and certification of cybersecurity solutions and services at national and European level could drive the implementation of new technologies and help harmonising the European security market and overcome its fragmentation. Develop standards and certification (EU security label) Development of performance-oriented standards, technology neutral, that can better follow rapidly evolving needs, threats and technology, fostering the development of EU references for the global market. Link security standards to certification of new products (standards per se would be useless). This could reduce costs and create stronger EU references for export. EU certified solutions and services to better define and limit insurance premiums, providing combined technology/insurance responses to threats. Create a Cyber European Agreed Product list (e.g. managed by ENISA)
27 How to achieve a CYSIP? Fostering R&D and deployment with an increased and focussed budget for cybersecurity Increase budgets to provide the required level of cybersecurity, at national and EU level. For EU-funded R&D and validation (H2020) for key components development and pilots; for sector-based test-beds for the evaluation of CI (SCADA, ICS ) cyber resilience For purchasing capacities for deployment of large programmes in MS Use of cohesion funds and Public Procurement Initiatives for all those applications and infrastructures leveraging upon the security of communication and exchange of data, encouraging harmonized public procurement for national assets and CIP, through PCP. Security of broadband networks and cyber security of large infrastructure in Cohesion Policy Internal security fund for cyber protection of law enforcement / border management systems Specific funds to accompany security new constraints for market operators and critical infrastructures
28 How to achieve a CYSIP? Fostering R&D and deployment with an increased and focussed budget for cybersecurity For investments to protect Critical Infrastructures, Protect European Institutions and major European Programmes: EU showing the way through major cyber security investments on EU-wide existing or forthcoming assets (with European impact): EU Institutions ICT platforms protection Integrated maritime surveillance, satellite systems and air traffic management, energy transmission systems etc. Deployment of EU based data centers and secured cloud services Specific support mechanisms for cyber security SMEs
29 How to achieve a CYSIP? Awareness and Training Raising awareness and educating users on the benefits of cyber protection to preventing cyber risks and increasing protection of cyber-enabled applications, without creating unnecessary fears. Awareness programs should be implemented at Member State level within the civil society and organisations, promoting data protection and data privacy culture. Basic training in information and communication technologies should start at primary school level (understanding what s behind the screen). Awareness raising at all levels (including C ) of corporate: raising awareness of cyber threats at professional level would help improve risk management of networked infrastructure, encourage better investments and foster resilient services. Operators of key infrastructures leveraging upon ICTs should be educated on how to prevent and react to cyber threats, via relevant behaviours and innovative technologies. Lack of skilled cyber defence architects, engineers, and workers development of university courses to more widely rise a generation of skilled cybersecurity experts. Security of ICT is an excellent way for developing jobs, thus contributing to the recovery of our economies.
30 In the meantime From Federal News Radio, early Aug : Department of Homeland Security has awarded contracts to 17 firms to provide continuous diagnostics and mitigation services, also known as CDM, to the federal government, creating a potential model for private groups to measure and adjust their own cyber security efforts ( ) (and) designed to defend public sector IT networks from cyber threats ( ) Booz Allen, IBM, General Dynamics-IT, Lockheed Martin, Northrop Grumman, Hewlett Packard, SAIC and CGI Federal Inc. (CGI) were among the contract winners. McAfee will provide the tool suites under many of the contracts. The contract is worth up to 6 billion USD.
31 And now in Europe? The European security industry and research centers (EOS) are ready for more concrete steps and develop further a structured public private dialogue and cooperation: within the European countries, across the countries and across sectors. But are public administrations, at European and national level, ready and willing as well to provide the needed political and economic support?
32 THANK YOU! FOR MORE INFORMATION AND SUGGESTIONS: EOS Cyber Security Working Group Coordinator Mari KERT : mari.kert@eos-eu.com EOS coordinator for the CYSPA Alliance (and project) Nina OLESEN: nina.olesen@eos-eu.com EOS - CEO Luigi REBUFFI: luigi.rebuffi@eos-eu.com
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationCYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationEU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
More informationCYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationComprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board
Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):
More informationCOMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
More informationCouncil of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationJOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 7.2.2013 JOIN(2013) 1 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL,
More informationUnleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationCloud and Critical Information Infrastructures
Cloud and Critical Information Infrastructures Cloud computing in ENISA Dr. Evangelos Ouzounis Head of Infrastructure & Services Unit www.enisa.europa.eu About ENISA The European Union Network and Information
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR
More informationDigital Agenda for Europe Cartagena de Indias, September 1, 2015
Digital Agenda for Europe Cartagena de Indias, September 1, 2015 Javier Huerta Bravo From the Digital Agenda (2010)... Commission ICT strategy for 2010-2020 Problems identified: Lack of investment in networks
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationNational Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
More information9360/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM
More informationProposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 7.2.2013 COM(2013) 48 final 2013/0027 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationThe EU s approach to Cyber Security and Defence
Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific
More informationProposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, XXX [ ](2012) XXX draft Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationCyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
More informationETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future
More informationScoping Paper for. Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens'
Scoping Paper for Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens' Important Notice: Working Document This paper is a working document. It
More informationStandards for Cyber Security
Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-97 97
More informationCyber Security for Railway Signalling
Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against
More informationROADMAP. A. Context and problem definition
TITLE OF THE INITIATIVE ROADMAP Commission Communication on EU Risk management and supply chain security LEAD DG RESPONSIBLE UNIT TAXUD B2 DATE OF ROADMAP 10 / 2012 This indicative roadmap is provided
More informationCEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
More information8970/15 FMA/AFG/cb 1 DG G 3 C
Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH
More informationROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
More informationEuropean Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2
European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2 ERRIN-EURADA-EUROCITIES-Dutch Provinces Information/ de-brief meeting 14-5-2013 Overview
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationCouncil of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development
Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development
More informationProf. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationPrivacy in the Cloud: Data Protection and Security in Cloud Computing
SPEECH/11/859 Viviane REDING Vice-President of the European Commission, EU Justice Commissioner Privacy in the Cloud: Data Protection and Security in Cloud Computing Round-table High Level conference on
More informationCyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationCEN-CENELEC reply to the European Commission's Public Consultation on demand-side policies to spur European industrial innovations in a global market
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN-CENELEC reply to the European Commission's Public Consultation on demand-side
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationEU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationThe EBF would like to take the opportunity to note few general remarks on key issues as follows:
Ref.:EBF_001314 Brussels, 17 June 2013 Launched in 1960, the European Banking Federation is the voice of the European banking sector from the European Union and European Free Trade Association countries.
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationWORK PROGRAMME 2013 27 NOVEMBER 2012
WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3
More informationStandards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
More informationCybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
More informationH2020-LEIT-ICT WP2016-17. Big Data PPP
H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale
More informationHow To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
More informationCyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.
Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.ISP Click to edit cilli@di.uniroma1.it Master title style http://dsi.uniroma1.it/~cilli
More informationH2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu
More information(DRAFT)( 2 ) MOTION FOR A RESOLUTION
05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](
More informationAddress by Stefania Giannini Minister of Education, Universities and Research on the occasion of LET s 2014 " Bologna, October 1, 2014
Address by Stefania Giannini Minister of Education, Universities and Research on the occasion of LET s 2014 " Bologna, October 1, 2014 Dear Authorities, Dear Colleagues, Ladies and Gentlemen, The dense
More informationEnergy efficiency in communication networks in Horizon 2020 perspective
Energy efficiency in communication networks in Horizon 2020 perspective Pertti Jauhiainen Network Technologies European Commission DG CONNECT September 25, 2013 EU action to tackle climate change 20-20-20
More informationCouncil of the European Union Brussels, 5 March 2015 (OR. en)
Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:
More informationENISA workshop on Security Certification of ICT products in Europe
ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationEuropean GNSS Applications in Horizon 2020
European GNSS Applications in Horizon 2020 Official International Space Information Day 2015, Brussels 10 November 2015 Marta Krywanis-Brzostowska European GNSS Agency Integrated approach: understanding
More informationIcelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
More informationFrost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
More information26.3.2014 A7-0365/133
26.3.2014 A7-0365/133 Amendment 133 Amalia Sartori on behalf of the Committee on Industry, Research and Energy Report A7-0365/2013 Marita Ulvskog Electronic identification and trust services for electronic
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
More informationALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges
ALICE Working Groups Descriptions WG1: Sustainable Safe and Secure Supply Chains The vision of the WG is to do more with less and ensuring safety and security in the supply chains thereof contributing
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
More information5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
More informationPartnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
More informationBuilding International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech
Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies
More informationSpecific comments on Communication
Comments on Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Cybersecurity Strategy of the European Union: An Open,
More informationInfocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
More informationSOUTH EAST EUROPE TRANSNATIONAL CO-OPERATION PROGRAMME. Terms of reference
SOUTH EAST EUROPE TRANSNATIONAL CO-OPERATION PROGRAMME 3 rd Call for Proposals Terms of reference Efficient access to a SEE coordinated multimodal freight network between ports and landlocked countries
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationENISA and Cloud Security
ENISA and Cloud Security Dimitra Liveri NIS Expert EuroCloud Forum 2015 Barcelona 07-10-2015 European Union Agency for Network and Information Security Securing Europe s Information Society Operational
More informationWritten Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
More informationHORIZON 2020. Energy Efficiency and market uptake of energy innovations. Linn Johnsen DG ENER C3 Policy Officer
THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION HORIZON 2020 Energy Efficiency and market uptake of energy innovations Linn Johnsen DG ENER C3 Policy Officer EU 2020 Targets Energy Efficiency Energy
More informationEuropean Cloud Computing Strategy
European Cloud Computing Strategy Key actions and state of play Jorge GASOS DG Connect, European Commission Jorge.Gasos@ec.europa.eu Impact on providers and users Cloud services: market forecast Supply
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,
28.8.2014 Official Journal of the European Union L 257/73 REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic
More informationCyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document. Proposal for a COUNCIL REGULATION
EUROPEAN COMMISSION Brussels, 10.7.2013 SWD(2013) 258 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a COUNCIL REGULATION on the
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More information- 'Improving Cyber Security in Europe, the way forward
Report Breakfast Briefing: 'Improving Cyber Security in Europe, the way forward 24 April 2013, European Parliament, Brussels Disclaimer: This report is prepared by the rapporteur, Dr. Alea Fairchild, for
More information