BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)
|
|
|
- Joseph Wilkins
- 10 years ago
- Views:
Transcription
1 Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical Coordinator for Africa South Africa BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs) The EuroAfrica-ICT/P8 Forum; Session 2D. Cyber Security & Trustworthy ICT
2 BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries
3 BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries
4 BIC: Building International Co-operation for Trustworthy ICT Original BIC Objective: To build international cooperation between the EU and the programme agencies and researchers in India, Brazil and South Africa within the focus areas of Trustworthy ICT, including trust, privacy and security. Coordinator European Commission DG-CNECT Unit H.4, Trust and Security Jan 2011-Dec
5 BIC: Building International Co-operation for Trustworthy ICT Coordinator Revised BIC Objective: To build international cooperation between the EU and the programme agencies and researchers in India, Brazil and Entire Africa within the focus areas of Trustworthy ICT, including trust, privacy and security. European Commission DG-CNECT Unit H.4, Trust and Security Jan 2011-Dec
6 Project overall structure BIC countries & programmes European Commission International Advisory Group (IAG) communication via BIC secretariat function External relations e.g., ENISA, W3C, WG1. Humanoriented trust and security WG2. Network info & cyber-security WG3. Programme and funding focus
7 Project overall structure BIC countries & programmes European Commission International Advisory Group (IAG) communication via BIC secretariat function External relations e.g., ENISA, W3C, WG1. Humanoriented trust and security WG2. Network info & cyber-security WG3. Programme and funding focus
8 International Advisory Group (IAG) The role of IAG is to: Create a forum for bringing together country representatives from the INCO-Trust countries and the BIC countries Facilitate collaborations between in-country national constituencies on ICT Trust and Security and other country similar constituencies Review the International collaboration strategy in ICT trust and security on a regular basis Assist in the building of the working groups to enable BIC to structure relationships
9 BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries
10 Do we want this? BIC INCO-TRUST Tactical (bi-lateral) partnerships
11 Or this? Strategic (multi-lateral) partnerships MS Others MS MS MS X27 MS MS 27 EU Member States
12 BIC = Moving towards a strategic approach How do we achieve it?
13 How do we do it? IAG/WGs structural rework It was discussed in BIC s June 2012 workshop and with some refinements, it was ratified in the December 2012 BIC IAG forum at Lisbon and there it was decided that the supporting constituency of the IAG should be expanded as follows: Core Working Group (CWGs): Existing BIC WGs WG1, WG2, WG3 Extended Working Group (EWGs): Country Specific Experts Specialist Function Groups (SFGs): Specific Purpose/ Projects Specialist Groups, as needed. With support from local government/funding bodies
14 Structure: IAG & Key Mgt Working Groups IAG Extended WG EWG Core WGs EWG EWG [14]
15 Interface between In-Country Researchers Govt. Industry Other Country EWGs Build Knowledge Bank EWG Objectives Facilitate INCO at functional Level - make INCO effective Stronger and effective voice advocating priority areas for INCO research funding in future WPs/Calls.. [15]
16 Agenda BIC IAG Annual forum format The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries
17 Progress Progress & Pipeline EWG India Launch Meet on 21 st May 13 : Prof. M. P. Gupta, IIT Delhi has accepted the lead. > 10 members have joined. EWG South Africa concept launched by Prof. Marijke Coetzee of Univ. of Johannesburg at ISSA 2013, August 2013: Dr. Barend Taute, of CSIR Meraka Institute & BIC IAG has accepted the lead. 8 members have joined, and growing from today!! EWG Brazil launch workshop on 22nd October 13: Prof. Ricardo Dahab of the University of Campinas (UNICAMP) has accepted the challenge to lead the EWG Brazil. > 10 members have joined. Pipeline As one of first steps, the EWGs are planning to continue recruitment and hold a symposium / workshop on identified challenges - Planned for early 2014 with support from their governments. It is expected that the EU will also be hosting events in the BIC countries on INCO and the EWGs can plan sessions and contribute with a strong voice to these events. E.g. India in first half of 14 is already planning such an event and our EWG members are making contact with the Gov t of India to be included. BIC Final recommendations report taking on board the results of the Survey on Prioritized Trust and Security topics for international cooperation see It is great that BIC will live on in the EWGs in each country!
18 [18]
19 NIS PPP established Network Information Security Public private Platform has been established A key action of the EU Cyber security Strategy and aligned with the implementation of the NIS Directive. Including trusted information sharing and the need for WGs with clear objectives and well-defined themes. WG1 on risk management, including information assurance, risks metrics and awareness raising; WG2 on information exchange and incident coordination, including incident reporting and risks metrics for the purpose of information exchange; WG3 on secure ICT research and innovation. BIC is currently involved in WG2 and WG3 and strongly advocating the Building of International cooperation. One idea is to build a new BIC into these activities in H2020, including all out in-country EWGs. We need You!
20 Agenda BIC IAG Annual forum format The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries
21 Trustworthy ICT themes across BIC countries** International data exchg. arch. for cyber security Fight against cyber crime Align policies and joint exercises Device security in the mobile security chain e.g. remote erasure of stolen device data Coop. of all stakeholders network operators, device manufs., security specialists Regulatory framework for business apps. Smart technologies and privacy Future internet techs. and privacy Social networking and privacy Increase uptake of Privacy by Design Risk model approaches Balancing uptake of cloud computing and not allowing security to fall behind Security of data centres / Security as a Service Cultural based models of TM Trust in data and info. provenance Recommendation/Reputation TM INCO needed for global TMs. **Preliminary results from our survey at See full report at 7 November 2013 Michel Riguidel 21
22 Barend Taute
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
CYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
Cyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat
African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat Outline About IGF IGF in Africa Launching of AfIGF AfIGF Secretariat AfIGF Bureau AfIGF Activities Upcoming AfIGF events About
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
Cyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
Cyber security in education in Greece
Cyber security in education in Greece Sokratis K. Katsikas [email protected] NIST SP800-50 NIS education in Europe EU Cyber security strategy and NIS directive http://eeas.europa.eu/policies/eu-cybersecurity/cybsec_comm_en.pdf
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
Cloud and Critical Information Infrastructures
Cloud and Critical Information Infrastructures Cloud computing in ENISA Dr. Evangelos Ouzounis Head of Infrastructure & Services Unit www.enisa.europa.eu About ENISA The European Union Network and Information
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.
INCO-TRUST: Intl Co-Operation in Trustworthy, Secure and Dependable ICT Infrastructures Neeraj Suri, TU Darmstadt, Germany James Clarke, Waterford Institute of Technology, Ireland INCO-TRUST Canada US
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
Cooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Making our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
Cyber Security in Austria
Cyber Security in Austria The Austrian Cyber Security Strategy Andreas Reichard 18 th May, 2015 Roadmap Austrian Cyber Security Strategy 1/2 MRV MRV 11/2011 03/2012 06/2012 09/2012 10/2012 03/2013 Fed.
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Internet of Things Value Proposition for Europe
Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th
H2020-LEIT-ICT WP2016-17 ICT 14, 15, 17,18. Big Data PPP
H2020-LEIT-ICT WP2016-17 ICT 14, 15, 17,18 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data
Cyber Security and Digital Forensics Training Platform
Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016
Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016 SLALOM is ready to use Cloud SLAs SLALOM will take theory to practice, providing a trusted verifiable starting point
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
5 th Infosec Week & Cyber Bootcamp. 12 th to 16 th October ISEG Lisbon School of Economics & Management
5 th Infosec Week & 5th Edition of Infosec Week & In order to innovate the annual activities of Cybersecurity month, ShadowSEC innovate this issue doing a Cyber Bootcamp, with the main objective of sharing
Introduction of the GCCD. (Global Cybersecurity Center for Development)
Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD
ENISA workshop on Security Certification of ICT products in Europe
ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification
Cyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
Business Continuity for Cyber Threat
Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between
ENERGY MARKET REFORM
C A S E S T U D Y O F A S U C C E S S F U L A U S T R A L I A N N A T I O N A L E N E R G Y P R O G R A M M E / S T R A T E G Y ENERGY MARKET REFORM 1. The problem or issue addressed: Efficient and effective
SUN Donor Network. I. Introduction
SUN Donor Network I. Introduction Donors are one of five key constituencies supporting the global movement to Scale Up Nutrition. At the country level SUN donors usually form a coordination group, if this
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
How To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
ICT 6: Cloud computing
computing Jorge GASÓS Software and Services, Cloud Unit DG Connect [email protected] Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
Procurement Innovation for Cloud Services in Europe - PICSE
Procurement Innovation for Cloud Services in Europe - PICSE Sara Garavelli, Trust-IT Services [email protected] ICT Proposer s Day, 9 October 2014, Florence, Italy 1 The road to PICSE Cloud
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
2015 Information Security Awareness Catalogue
Contents 2015 Catalogue Wolfpack Engagement Model 4 Campaign Drivers 6 Offerings 8 Approach 9 Engaging Content 10 Stakeholder Change Management 12 Bundles 13 Content 14 Grey Wolf -Track compliance with
Cloud Sourcing G-Cloud 5 Framework
Cloud Sourcing G-Cloud 5 Framework Cloud Sourcing Service Definition Document April 2014 Warnford Court, 29 Throgmorton Street, London, EC2N 2AT T: +44 20 7947 4176 Table of contents 1 Cloud Sourcing 3
Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning
Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan
Update on ISO TC 265 Transportation and
Update on ISO TC 265 Transportation and Tim Dixon IEA GHG R&D Programme CSLF Technical Group, 17 June 2015 Update on ISO TC 265 Transportation and 5th meeting was 26-30 January 2015 in Birmingham Alabama
PROBE-I(O)T PROBING EU-AFRICA COOPERATION ON INTERNET OF THINGS
PROBE-I(O)T PROBING EU-AFRICA COOPERATION ON INTERNET OF THINGS PROBE-I(o)T identity card! FP7 project:! FP7- ICT- 2011-7! Start Date:! 01/10/2011! Budget (EC contribuaon):! 1,131 k! DuraAon:! 24 months
FAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
ISO 55000 ASSET MANAGEMENT FOR POWER
ISO 55000 ASSET MANAGEMENT FOR POWER Applying new standards to the power industry for improved performance ADVANCING HIGH PERFORMERS DEVELOPING POWER EXECUTIVES PAN AFRICAN TRAINING FORUM FOCUSING ON ENHANCING
Social Media Sessions. Social Media Strategy Lucio Ribeiro Digital Strategist
Social Media Sessions Social Media Strategy Lucio Ribeiro Digital Strategist Social Media Sessions A Central piece Externally oriented concept with coordinated actions demonstrating how you will achieve
H2020-LEIT-ICT WP2016-17. Big Data PPP
H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale
Cybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.
Cybersecurity, Privacy and Data Protection Jay Taylor Director Global Standards, Code and Environment [email protected] Executive Summary ICT Enables Personal Productivity Telecom/ICT Is
Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 [email protected] SUMMARY Amit Garg brings over 17 years of information
National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide
National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide Taieb DEBBAGH, PhD, CISA Secretary General Ministry of Industry, Trade and New Technologies, Morocco ITU Regional
Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
Advancing cyber security. Cyber Security Academy
Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Objectives for today. Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy
Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy This is not just about technology. The main area of change, thus the major challenge, is how we as leaders
Cybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015
Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015 Cyber Security Coordination Group Who we are: Advisory body of the European Standards Organizations Composed of experts from CEN/CLC
PICTURE Project Final Event. 21 May 2014 Minsk, Belarus
PICTURE Project Final Event 21 May 2014 Minsk, Belarus NESSI recent activities on Big Data and S/W Engineering Yannis Kliafas, ATC NESSI & EC Software Engineering Workshop; 26 May 2014 2 NESSI is the European
WORK PROGRAMME 2013 27 NOVEMBER 2012
WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.
Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.ISP Click to edit [email protected] Master title style http://dsi.uniroma1.it/~cilli
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
