HSD Corporate presentation

Size: px
Start display at page:

Download "HSD Corporate presentation"

Transcription

1 HSD Corporate presentation Ida Haisma Director HSD ETTIS Project 20 november 2014

2 Europe s largest security cluster Gateway to Europe and connected with the North American market Dutch security cluster with its core in The Hague, including: o Businesses, Knowledge institutions, Ministry of Security & Justice o Flagship initiative Dutch top sector High Tech Systems & Materials Strong ties with other (international) security regions & European Institutions Aim to enhance security & stimulate economic growth 2

3 Enhance security & stimulate economic development Facts & Figures of Security Industry in The Netherlands (2012) Businesses Revenue ( ) 3,100 security companies (400 in region of The Hague) The Hague in particular strong in non-traditional, innovative security jobs & revenue 6 billion euros (1,7 billion euros in region of The Hague) 4.1% yearly growth ( ) despite economic downturn 50% growth expected by 2020 Forensics and cyber security main areas of growth Jobs 61,500 jobs (13,400 in region of The Hague) 25% job-growth expected by 2020

4 New risks demand new answers Business, government and academic world need to tackle complexity together Supply and demand more closely aligned Use of technology driven security solutions Enhance radical innovation Economies of scale aligned innovation budgets Availability of skilled and qualified personnel and graduates

5 Integrated Approach to Security Triple Helix Cooperation Knowledge Development in Security (International) Promotion High Profile Innovation Projects Attract Leader Firms (Role Models) Access to Capital Attractive Business Climate Human Capital Development Breeding Ground for Security Cluster 5

6 Integrated Approach to Security National Innovation Agenda Security National investment agenda and Program Innovation Procurement Urgent national government Cooperation between security partners: connecting local, regional, national, and European 6

7 Request Dutch Ministry of Security and Justice develop an National Innovation Agenda for Security, based on available material and knowledge, originated from: Needs and demands from public and private actors with a vested interest and position in maintaining, enforcing and enhancing societal/public security; Suppliers of technological, innovative developments, trends, developments, products services; wildcards, serendipidy. In order to constitute a roadmap consisting of national priorities for the innovation of the public security in the Netherlands. 7

8 Purpose Bringing together demand, supply and knowledge to create societal/social and economic value

9 Function (1) Collective agenda For public and private actors towards innovation in the field of security in the Netherlands; To stimulate, arrange and manage a mindset for and a view on collective innovation ( together, co-working) Tuning of innovation needs and innovation supply In order to select priorities for public partners including knowledge institutes ( triplehelix ); Create a individual and collective leverage, to realize societal/social (public) and economic value (private)

10 Function (2) Coupling of innovationprocesses and (innovative) procurement-, tender-, contratingprocesses In order to create predictability in a solid, robust market for innovators, private actors, and (public and private) customers/demand organisations; Adopting the innovation theme s ( chapters ) and javelins ( spearpoints ); By coalitions of willing and able (ownership) Consortia (e.g. with regard to Horizon 2020/secure societies). In order to create true economic value

11 Actors Ministry of Security and Justice (principle) Ministries of Defense, Economic Affairs, Municipalities, private actors (corporates, SME s, knowledge institutes (contribuants) Regional Development Organisations and private capital (funding, subsidize, grants) The Hague Security Delta (agent, custodian)

12 The making of (1) January 2014 Take off by ministry of Security and Justice and HSD February- August Development of a primary edition/longlist and a variety of concepts based on multiple interviews (50 plus) and desk research September Oktober Version 0.9: consecutive approval in Executive Committee HSD, Advisory Council HSD, Board HSD Enhancing, completing the agenda, producing the agenda Book/report (dutch) Book/report (English in on-line format) Website (tbd)

13 The making of (2) November Ratification/confirmation by secretary-general Ministry Security and Justice, secretarygeneral Ministry of Defense, director-general Ministry of Economic Affairs, Chairman of the Board Dutch National Police, Chairman SafetyCouncil, Chairman Dutch Institute Physical Security, Chairman Technical University of Eindhoven, Chairman Tilburg University, Chairman of Delft Technical University, Chaiman of Twente University, Dean of Leiden University, campus The Hague 2015 Development of the Innovation Agenda 2016 Measuring the effects an revenues of the 2015 version

14 Content; chapters (1) Comprehensive security; integrated data, networks and (eco-) systems, capabilities Innovation with regard to social and societal security; whole of society, security by design, societal and civic resilience Critical infrastructure (resilience, cybersecurity internet of things, integration, interdependencies) 14

15 Content; chapters (2) Netcentric working, information disseminiation/validation/life-cycle in networked environments (social media, web 2.0, 3.0, social network analysis, interoperability, identity warranty, authentication) Surveillance and unmanned systems (concept development UAVoperations, civil-military cooperation, sensing, operational autonomy UAV operation) Proces innovation within and between professional organisations (operational decision making vs. norms and regulation for street-level bureaucrats, human factors, performance enhancing teams, serious gaming, functioning of heterogeneous teams 15

16 Criteria for admission innovations in the agenda Innovation addresses vital/essential shortcoming or need (social/societal value) Must be widely usable on systemlevel (demands technical, social, processual combination) Requires collective approach, development (customers, innovators, suppliers, funders) Result is significant, substantial turn over/trade volume There s commitment and support in a coalition of the willing and the able Result in implementation in a period of 3-5 years ( looking towards 10 years )

17 Dutch police is a resident at HSD, why? Mark Wiebes, Chief of Police and Innovationmanager National Police National police is contractor for innovative security solutions Innovation is of key importance as an integral part of the police s work Close and intensive contacts between science, market, government an operational policework are required It s important to meet in informal way s, especially at the stage the ideas are formed HSD-campus is perfectly adapted to that end and helps cross-over understanding The National Police is easily accessible and approachable for innovation partners

18 Building track record Start of The Hague Security Delta Start of HSD Development Fund -co-financing innovation The Hague Security Delta Foundation established NFI contracted to build CSI Capetown (forensic innovation) European Cyber Crime Center established in The Hague Dutch Cyber Security Center established in The Hague 2014 HSD Campus - national innovation center for security Cyber Security Academy established in The Hague World Nuclear Security Summit in The Hague ASIS Europe 2014 conference in The Hague Start of 8+ security innovation programs & projects 2015 NATO to establish all ICT & cyber services in The Hague 4th International Conference on Cyberspace in NL

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

NETH-ER AND THE EU KNOWLEDGE AND INNOVATION AGENDA TO 2020

NETH-ER AND THE EU KNOWLEDGE AND INNOVATION AGENDA TO 2020 POSITION PAPER NETH-ER AND THE EU KNOWLEDGE AND INNOVATION AGENDA TO 2020 CONTINUE TO INVEST IN KNOWLEDGE AND SCIENCE KNOWLEDGE AND INNOVATION ESSENTIAL FOR RENEWED GROWTH IN EUROPE Through constant innovation,

More information

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Forensics in Nuclear Security. by the Netherlands Forensic Institute Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than

More information

August 2013. Horizon 2020 Aligning your innovation strategy to increase competitiveness

August 2013. Horizon 2020 Aligning your innovation strategy to increase competitiveness August 2013 Horizon 2020 Aligning your innovation strategy to increase competitiveness From the authors The Horizon 2020 programme is the major funding body for research and innovation initiatives across

More information

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation The importance of public-private partnership Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation Cybersecurity, safety and trust 1) Strategic documents: National Cybersecurity Strategy

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

Your customers protected against cybercrime. New commercial opportunities for you

Your customers protected against cybercrime. New commercial opportunities for you Your customers protected against cybercrime New commercial opportunities for you The vulnerability management solution for SMEs Through ThreadScan ThreadStone offers SMEs optimal security control of systems

More information

Your company protected against cybercrime

Your company protected against cybercrime Your company protected against cybercrime SMEs are easy prey for cyber criminals Which entrepreneur doesn t sometimes become aware of the trouble a burglary in his company would cause? Solid locks on doors

More information

Brainport : a career gateway to Europe

Brainport : a career gateway to Europe 1 The power of cooperation Brainport Development, 2012 Brainport : a career gateway to Europe Mr. Marc Jacobs Project Manager Brainport Development 2 The power of cooperation Brainport Development, 2012

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

Procurement Innovation for Cloud Services in Europe - PICSE

Procurement Innovation for Cloud Services in Europe - PICSE Procurement Innovation for Cloud Services in Europe - PICSE Silvana Muscella, Trust-IT Services Ltd Founder and Managing Director s.muscella@trust-itservices.com Trust-ITServices.com @TrustITSiv Open standards

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

Delft Data Science Seminar January 26, 2015

Delft Data Science Seminar January 26, 2015 Delft Data Science Seminar January 26, 2015 Big Data Analytics for Cyber Situational Awareness 1 100 billions in economic and societal value Content Creation millions of new jobs and millions of new talent

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Cyber security guide for boardroom members

Cyber security guide for boardroom members Cyber security guide for boardroom members 2 Cyber security guide for boardroom members Cyber security at strategic level Our society is rapidly digitising, and we are all reaping the benefits. Our country

More information

E-governance development history in Georgia

E-governance development history in Georgia E-governance development history in Georgia In 2010 under the Ministry of Justice, LEPL Data Exchange Agency has been created. One of the main priorities of the agency is support of e-governance development

More information

and Horizon 2020 the future calls Brendan Hawdon Head of Unit Framework Programme European Commission DG Research & Innovation

and Horizon 2020 the future calls Brendan Hawdon Head of Unit Framework Programme European Commission DG Research & Innovation and Horizon 2020 the future calls Brendan Hawdon Head of Unit Framework Programme European Commission DG Research & Innovation Today's presentation 1. Why are these calls important? 2. FP7: Funding to

More information

Empowering IT Acquisitions

Empowering IT Acquisitions Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly

More information

ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services

ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services ICT 9: Tools and Methods for Software Development Dan-Mihai

More information

Filling gaps in e infrastructures libraries, datacentres, archives

Filling gaps in e infrastructures libraries, datacentres, archives Filling gaps in e infrastructures libraries, datacentres, archives Inge Angevaare, Netherlands Coalition for Digital Preservation LIBER APARSEN workshop Tartu, 27 June 2012 a bit of a devil s advocate

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

Implementing the Government ICT Strategy: six-month review of progress

Implementing the Government ICT Strategy: six-month review of progress The Cabinet Office Implementing the Government ICT Strategy: six-month review of progress Detailed methodology DECEMBER 2011 2 Implementing the Government ICT Strategy: six-month review of progress Detailed

More information

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying

More information

1 FOCUS Foresight Security Scenarios

1 FOCUS Foresight Security Scenarios New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

The National Cyber Security Strategy (NCSS) Success through cooperation

The National Cyber Security Strategy (NCSS) Success through cooperation The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.

More information

CYSPA launch event - Turkey

CYSPA launch event - Turkey CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Programme. 8.30am. 10.40am

Programme. 8.30am. 10.40am 8.30am 9.00am 9.15am 9.35am 9.40am 8.30am 10.10am 10.40am 11.10am 11.35am 12.00pm 12.25pm 1.40pm 2.05pm 2.30pm 2.55pm 3.25pm 3.50pm 4.15pm Programme Registration Welcome Address Mr Lau Thiam Beng Deputy

More information

www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence

www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence PwC firms provide Industry-focused Assurance, Tax and Advisory services to enhance value for their clients. More than 161.000

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

Procurement Innovation for Cloud Services in Europe

Procurement Innovation for Cloud Services in Europe Procurement Innovation for Cloud Services in Europe Author: Bob Jones (CERN) on behalf of the PICSE consortium www.picse.eu/ @PICSEPROCURE Focus: cloud service procurement and the Digital Single Market

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

How To Be Successful In The Netherlands

How To Be Successful In The Netherlands FLEXIBILITY AND BALANCE The Future of Higher Education, Research and Innovation [HERI] in the Netherlands and Finland JOENSUU SEMI NAR 1 0 DECEMBER 201 4 JACK SPAAPEN Topics 2 The context of Higher Education,

More information

PIANOo Dutch PublIc PrOcuremeNt expertise centre

PIANOo Dutch PublIc PrOcuremeNt expertise centre PIANOo Dutch Public Procurement Expertise Centre PIANOo, the Dutch Public Procurement Expertise Centre, was set up to professionalise procurement and tendering in all government departments, with a view

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Delivering Government Services through the Cloud. Ian Osborne, Intellect Director Cloud & Government IT ICT KTN

Delivering Government Services through the Cloud. Ian Osborne, Intellect Director Cloud & Government IT ICT KTN Delivering Government Services through the Cloud Ian Osborne, Intellect Director Cloud & Government IT ICT KTN Where are we heading? Old World Static Silo Physical Manual Application New World Dynamic

More information

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud odysseas.pyrovolakis@ec.europa.eu

More information

JOINT CONFERENCE. Justitia per Scientia

JOINT CONFERENCE. Justitia per Scientia JOINT CONFERENCE 2015 Justitia per Scientia X International Conference on Cyber Crime Investigation II International Conference on Multimedia Forensics, Surveillance and Security June 23rd - 25th, 2015

More information

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Véronique Pevtschin Engineering Ingegneria Informatica S.p.A CSP Innovation Forum 2015

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security

Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security Prof. dr. Wouter Stol NHL UoAS Police Academy Open University An Overview Why? Because going somewhere demands that

More information

Public Procurement - A Guide to Innovation

Public Procurement - A Guide to Innovation e-newsletter n 2 October 2010 New Developments on PUBLIC PROCUREMENT & INNOVATION European Commission -- DG ENTERPRISE & INDUSTRY - DG INFORMATION & COMMUNICATION Content: POLICY DEVELOPMENTS STUDIES/

More information

The Netherlands: ICT R&D and participation to FP7

The Netherlands: ICT R&D and participation to FP7 The Netherlands: ICT R&D and participation to FP7 Research & Development expenditure in ICT In 2011, public support for ICT R&D (ICT GBAORD) in the Netherlands was 6.6% of total public funding for R&D,

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

06.MEI.2015 KIVI 60: TELL ME WHY? CLICKNL DESIGN DAAN VAN EIJK

06.MEI.2015 KIVI 60: TELL ME WHY? CLICKNL DESIGN DAAN VAN EIJK 06.MEI.2015 KIVI 60: TELL ME WHY? CLICKNL DESIGN DAAN VAN EIJK WHY?! Vergroten van Impact van Design Versterken van Design Research & Innovation Verbinden van 'Triple Helix' Creative Industry Industry

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

2016 Outlook of the Global Security Industry

2016 Outlook of the Global Security Industry Brochure More information from http://www.researchandmarkets.com/reports/3623776/ 2016 Outlook of the Global Security Industry Description: Being aware of future cyber threats and trends at the national

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond

Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond 118 Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-118

More information

SME support under Horizon 2020 how to make it work

SME support under Horizon 2020 how to make it work SME support under Horizon 2020 how to make it work Olivier Brunet Unit Regional dimension of innovation Directorate General Research &Innovation European Commission The Multiannual Financial Framework

More information

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more Cybersecurity MORE THAN A GOOD HEADLINE Protect more Contents 2 Introduction 3 What is Cybersecurity? 4 Thought model 5 Social, Economic, Political, and IT Alignment 8 ICT Infrastructure 10 National Projects

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Northrop Grumman Corporation Trusted, Innovative, World-Class Supply Chain INTERVIEWS Kevin Engfer Director, Supplier Mission Assurance, Northrop Grumman

More information

Global Corporate Responsibility for Internet Freedom. Background paper

Global Corporate Responsibility for Internet Freedom. Background paper Global Corporate Responsibility for Internet Freedom Background paper Introduction The Internet, as a global network of networks, is not under the control of a single government or international entity.

More information

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016 CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital

More information

ScanBalt BioRegion Business Club: A sustainable triple helix shared and modular structure. for. marketing and promotion

ScanBalt BioRegion Business Club: A sustainable triple helix shared and modular structure. for. marketing and promotion Part-financed by the European Union (European Regional Development Fund) ScanBalt BioRegion Business Club: A sustainable triple helix shared and modular structure for marketing and promotion of Baltic

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Rio de Janeiro, Dec 10 th., 2015

Rio de Janeiro, Dec 10 th., 2015 Rio de Janeiro, Dec 10 th., 2015 Brazil & The Netherlands - 59% of Dutch import from Latin-America comes from Brazil; - 47% of Dutch total export to Latin-America goes to Brazil - The Netherlands 4 th

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

Toward A Closer Digital Alliance

Toward A Closer Digital Alliance Toward A Closer Digital Alliance Presented at: GOVCERT.NL Symposium 2010 by: Melissa Hathaway HathawayGlobalStrategies@gmail.com 2020 Visions are Not Aligned NATO 2020: ASSURED SECURITY; DYNAMIC ENGAGEMENT

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

WP 2014-2015 Enhancing Innovation Capacity of SME Brussels, 25 November 2013. Enterprise and Industry

WP 2014-2015 Enhancing Innovation Capacity of SME Brussels, 25 November 2013. Enterprise and Industry WP 2014-2015 Enhancing Innovation Capacity of SME Brussels, 25 November 2013 Enterprise and Industry Activities formerly under CIP/EIP Structure and big themes Horizon2020 Excellent Science [~31.7%] Various

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Ladies and gentlemen, researchers, public administrators, members of the business community, Members of the Dutch and European Parliaments,

Ladies and gentlemen, researchers, public administrators, members of the business community, Members of the Dutch and European Parliaments, Speech given at the Innovation Lecture by Maxime Verhagen, Minister of Economic Affairs, Agriculture and Innovation, in the Ridderzaal, The Hague, on 26 March 2012. Commissioner Geoghegan-Quinn, researchers,

More information

Connecting Africa: under construction. Titia van der Werf Afrika-Studiecentrum Leiden, NL. Dakar 1-2 September 2004

Connecting Africa: under construction. Titia van der Werf Afrika-Studiecentrum Leiden, NL. Dakar 1-2 September 2004 Connecting Africa: under construction Titia van der Werf Afrika-Studiecentrum Leiden, NL Dakar 1-2 September 2004 1 PROJECT DARC Distributed Africana Repositories Community Funding: SURF Foundation 1 st

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE

More information

The Netherlands ICT R&D

The Netherlands ICT R&D The Netherlands ICT R&D In 2009, business expenditure on R&D (BERD) in the ICT sectors amounted to 672M, down from 674M the year before, resulting in a slightly increased R&D intensity of 2.7% of sectoral

More information

Welcome Skåne September 18, 2013

Welcome Skåne September 18, 2013 Welcome Skåne September 18, 2013 Programme Welcome by Director Resilience Mr. Paul Gelton Presentation NL DCM-system + PPP + risk/crisis info by Mr. Corsmas Goemans Pause Presentation NL Strategy NS&S

More information

Director of Asset Management and Repairs

Director of Asset Management and Repairs Job details Job title: Director of Asset Management Responsible to: Executive Director of Property Responsible for: Location: Overview of the role The overall purpose of the Director of Asset Management

More information

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges ALICE Working Groups Descriptions WG1: Sustainable Safe and Secure Supply Chains The vision of the WG is to do more with less and ensuring safety and security in the supply chains thereof contributing

More information

How To Be A Successful Member Of The European Agency For Security And Safety

How To Be A Successful Member Of The European Agency For Security And Safety CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Masterclass Cycle on Information Security Management

Masterclass Cycle on Information Security Management Masterclass Cycle on Information Security Management The Masterclass Cycle on Information Security Management is a truly European modular programme, co-created with the CIO community, that targets a high

More information

In the Cloud Risk Assessments in the Great Unknown

In the Cloud Risk Assessments in the Great Unknown In the Cloud Risk Assessments in the Great Unknown 1 1 Agenda Re-Define Cloud again Define the Risk Assessment Process Table Stakes Table Stakes Backed in Writing The norm vs. The cutting edge Success!

More information

The State Of The Netherlands IT Recruitment Market

The State Of The Netherlands IT Recruitment Market The State Of The Netherlands IT Recruitment Market www.itjobboard.nl T: + 31 (0)20 522 2304 Report Background The purpose of the report is to summarise the current state of the IT recruitment market in

More information

CONNECTIONS YOU NEED JOIN ADS

CONNECTIONS YOU NEED JOIN ADS ALL THE BUSINESS CONNECTIONS YOU NEED JOIN ADS WORKING WITH AND FOR OUR MEMBERS The industries represented by ADS are vital to the UK economy and are major drivers of growth and prosperity. The sector

More information

Summary. Remit and points of departure

Summary. Remit and points of departure Summary The digital society and the digital economy are already here. Digitalisation means that it is becoming natural for people, organisations and things to communicate digitally. This changes how we

More information