Progetti di ricerca internazionali

Size: px
Start display at page:

Download "Progetti di ricerca internazionali"

Transcription

1 Progetti di ricerca internazionali 2014 URANIUM - Unified Risk Assessment Negotiation via Interoperability Using Multi-sensor data Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2013 (HOME/2013/CIPS/AG 2013) In this project we propose to study a new Situation Assesment approach in which interdependency model of Critical Infrastructures, whose output is the computation of the risk level for, is fed by several different sources of data, such as alarms directly collected by SCADA systems (e.g., faults), alarms generated by low-level sensor fusion on continous systems able to estimate the state of a system, alarms generated by single sensors (e.g. video cameras), and software agents able to generate alarms using Complex Event Processing (CEP) on multisensor data able to recognize complex sequences of events. The objectives of URANIUM project are: 1. Stimulating, promoting and supporting the development of methodologies for the protection of CI, in particular risk assessment methodologies; 2. Stimulating, promoting and supporting risk assessment on Critical Infrastructure (CI), in order to upgrade security. Risk assessment, Interdependencies modelling. 18 mesi Stefano Panzieri Grant agreement n HOME/2011/CIPS/AG/ Stefano Panzieri, Federica Pascucci prof. Stefano Panzieri Partners Theorematica (Italia), ARPIC (Romania), Secant Security (Romania)

2 2012 LEONE - From global measurements to local management EU FP7-ICT The Leone project is an FP7 STREP targeting Future Networks, which addresses Novel Internet architectures, management and operation frameworks. The main goal is to research and develop an innovative network management framework that has two major novelties: (i) it is focused on Quality of Experience: probes sited alongside end users measure performance and functionality to websites and test servers, both local and distant; (ii) it integrates multi-dimensional information: it combines measurements made by probes in the local ISP, probes in other ISPs, control plane information etc. These two novelties enable network management to focus on improving the user s experience of the Internet in a world of highly distributed and increasingly meshed applications. Network management, distributed systems, visualization, probe, Quality of Experience, Future Networks. 30 mesi Grant agreement n Maurizio Pizzonia Maurizio Pizzonia, Giuseppe Di Battista Philip Eardley - British Telecom (UK) Partners BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY - Project Coordinator - United Kingdom, MG-SOFT PODJETJE ZA RACUNALNISKI INZENIRING DOO Slovenia, SAMKNOWS LIMITED United Kingdom, TELECOM ITALIA S.p.A Italy, AALTO- KORKEAKOULUSAATIO Finland, JACOBS UNIVERSITY BREMEN GGMBH Germany, UNIVERSITA DEGLI STUDI ROMA TRE Italy, UNIVERSIDAD CARLOS III DE MADRID Spain, UNIVERSITE CATHOLIQUE DE LOUVAIN Belgium, MARTEL GMBH Switzerland.

3 FACIES - online identification of Failure and Attack on interdependent Critical InfrastructurES Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2011 The interdependence among critical infrastructure is now a reality. Interdependency becomes evident when a loss or a failure in an infrastructure generates repercussions and cascade effects on other infrastructures, and not always links are obvious and well-known. Since 90s infrastructures make use of SCADA systems, enabling the control and supervision of large plants and buildings. These SCADA systems are vulnerable to possible deliberate and malicious intrusions, known in literature as cyber attacks. The FACIES project aims both at identifying methodologies and metrics for the protection of infrastructure from cyber attacks, and determining possible countermeasures to these vulnerabilities. Cybersecurity, CIP, Risk Prediciton, Early Warning, Interdependencies modelling. 24 mesi Stefano Panzieri (RADIOLABS) Grant agreement n HOME/2011/CIPS/AG/ Partners Stefano Panzieri, Giovanni Ulivi, Federica Pascucci prof. Roberto Setola CAMPUS Bio-Medico CAMPUS Bio-Medico Roma (coordinatore); Universidad de Malaga (ES); University of Cyprus (GR); RADIOLABS (IT) CockpitCI - Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures EU FP7-SEC Cyber attacks against critical infrastructures Capability Project CockpitCI project aims to improve the resilience and the dependability of CIs through the design and the implementation of the CockpitCI Alerting System that improves the MICIE alerting system developed within the MICIE Project, providing to CI operators an efficient tool to support them: (i) in the prevention of cyber attacks, and (ii) in the implementation of consequence containment strategies in case of attack. Cybersecurity, RTU, CIIP, Risk Prediciton, Early Warning, Interdependencies modelling. 36 mesi Grant agreement n Stefano Panzieri Stefano Panzieri, Giovanni Ulivi, Giuseppe Di Battista, Federica Pascucci, Maurizio Pizzonia, Andrea Gasparri ing. Antonio Graziano - SELEX-SI

4 Grant agreement n Partners REFIRE - REFerence implementation of interoperable Indoor location and communication system for first REsponders Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2010 REFIRE wants to integrate the results of previous R&D projects on deep indoor localization and industrial solutions to offer a solution ready to the market, which will pave the way for a day-to-day use of effective location and communication services for indoor and deep-indoor emergencies. In a nutshell, REFIRE is project aimed at tailoring exiting capabilities to a specific package and at integrating them in a reference implementation. Such reference implementation will be developed around a nonproprietary standard for data and equipment interfaces, so that future interoperability of devices manufactured by any vendor across Europe is ensured. The proof-ofconcept implementation will be validated as living validation of the standards and concepts in real trials. In parallel, a first industrial set of prototypes will be developed and tests, so that the validity of the protocols set out by the project will be demonstrated. The validation of both the reference implementation and the preindustrial prototypes in complex trials will further demonstrate such points, eventually boosting an early adoption of integrated tools and devices at European level. Indoor localization, rescue localization, localization protcol 36 mesi Roberto Setola (Campus Biomedico) Roberto Setola (Campus Biomedico), Stefano Panzieri, Federica Pascucci Uberto del Prato - IES Solutions INTELLIGENCE FOR ENVIRONMENT & SECURITY - IES SOLUTIONS (coordinatore); Dipartimento dei Vigili del Fuoco - Ministero dell'interno (IT); CAMPUS Bio-Medico Roma (IT); BECAR (IT); INDICOD- ECR SERVIZI (IT); RADIOLABS (IT) 2011 GraDR - Graph Drawings and Representations European Science Foundation ESF EuroGIGA Programme 36 mesi Grant agreement n Giuseppe Di Battista Patrizio Angelini (RM3), Giuseppe Di Battista (RM3), Fabrizio Frati (RM3), Anna Galluccio (IASI-CNR), Maurizio Patrignani (RM3) Professor Jan Kratochvil Faculty of Mathematics and Physics Charles University Praha, Czech Republic

5 2009 ECHORD- European Clearing House for Open Robotics Development EU VII PQ FP7-ICT INFORMATION AND COMMUNICATION TECHNOLOGY ICT Cognitive Systems, Interaction and Robotics Large-scale integrating project (IP) Federica Pascucci Grant agreement n Federica Pascucci, Lorenzo Sciavicco Università di Napoli Federico II 2008 MICIE - Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures. EU VII PQ Grant agreement n FP7-ICT-SEC INFORMATION AND COMMUNICATION TECHNOLOGIES The MICIE project, being in line with EU initiative to establish a Critical Infrastructure Warning Information Network (CIWIN), aimed to design and implement a so-called "MICIE alerting system" able to identify, in real time, the level of possible threats induced on a given CI by "undesired" events happened in such CI and/or other interdependent CIs. In particular, whenever such events occur, the MICIE alerting system supports the CI operators providing them with a real time risk level. CIP, Risk Prediciton, Early Warning, Interdependencies modelling. Stefano Panzieri Stefano Panzieri, Federica Pascucci, Giovanni Ulivi, Lorenzo Sciavicco SELEX-COM

6 Agreement Num. SECURSPACE Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks Analysis of the use of satellite technologies in the overall economy structure and in Emergency Operations. Risk assessment of the disruption of Communication and Navigation satellite functionalities for the various economy sectors. Risk assessment of the disruption of Communication and Navigation satellite functionalities for the Emergency Operations. CIP, Satellite services Stefano Panzieri JLS/2007/CIPS/009 Stefano Panzieri, Federica Pascucci, Giovanni Ulivi TELESPAZIO

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Final Workshop Rome, December 16th, 2014 Motivation and Background Power Grid Operating

More information

La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria

La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria La Gestione delle Infrastrutture Critiche Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria La Gestione delle Infrastrutture Critiche Modellazione Identificazione

More information

Hybrid Risk Management for Utility Networks

Hybrid Risk Management for Utility Networks Hybrid Risk Management for Utility Networks Hermann de Meer hermann.demeer@uni-passau.de Computer Networks and Computer Communications Lab (CNACC) University of Passau CNACC: Introduction People Prof.

More information

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

CIPS 2011 Awarded Grants. Project number Applicant's name Ctry Title Description Grant

CIPS 2011 Awarded Grants. Project number Applicant's name Ctry Title Description Grant CIPS 2011 Awarded Grants Project number Applicant's name Ctry Title Description Grant HOME/2011/CIPS/AG/2012 NATIONAL INSTUTE COMMUNICATION TECHNOLOGIES (INTECO) ES SCADA laboratory and testbed as a service

More information

How To Protect Critical Infrastructure From Attack

How To Protect Critical Infrastructure From Attack Trust and Reputation Management for Critical Infrastructure Protection Filipe Caldeira 12, Edmundo Monteiro 1, and Paulo Simões 1 1 Universidade de Coimbra - DEI/CISUC, Coimbra, 3030-290, Portugal {fmanuel,edmundo,psimoes}@dei.uc.pt

More information

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM)

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM) OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012 ICT statistical report for annual monitoring (StReAM) 12 June 2013 ACRONYMS AAL: ACC: ARTEMIS: ASS: BPN: CA: CIP: CP: CSA: EEA: EPO: FP: FET: GBAORD:

More information

ESCoRTS A European network for the Security of Control & Real Time Systems

ESCoRTS A European network for the Security of Control & Real Time Systems ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project Jianmin Jiang Department of Computing, University of Surrey, Guildford, GU2 7XH, United Kingdom.

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

on Security - Lessons l earned

on Security - Lessons l earned Tailoring information security to business requirements 08/06/2015 Research & Innovation on Security - Lessons l earned itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710

More information

H2020 "Secure Societies" Work Programme Digital Security 2015

H2020 Secure Societies Work Programme Digital Security 2015 H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of

More information

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION

More information

A Comprehensive Approach to Critical Information Infrastructure Assurance

A Comprehensive Approach to Critical Information Infrastructure Assurance A Comprehensive Approach to Critical Information Infrastructure Assurance Euro-Atlantic Symposium on Critical Information Infrastructure Assurance 23-24 24 March 2006 Riva San Vitale, Switzerland Professor

More information

Cyber Security nei prodotti di automazione

Cyber Security nei prodotti di automazione Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard

More information

ESKISP6064.03 Conducts vulnerability assessment under supervision

ESKISP6064.03 Conducts vulnerability assessment under supervision Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private

More information

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com)

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Theo Dimitrakos Chief Security Researcher, BT Research & Technology theo.dimitrakos@bt.com

More information

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE

More information

ECCE Standing Committee Education & Training

ECCE Standing Committee Education & Training ECCE Standing Committee Education & Training Impact of the Bologna Process on Civil engineering education in Europe Prof. Iacint Manoliu 45 th ECCE meeting Bucharest, 11 May 2007 SCD Civil Engineering

More information

Workshop on Collaborative Security and Privacy Technologies

Workshop on Collaborative Security and Privacy Technologies Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential

More information

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15

More information

Antonio Di Pietro. antonio.dipietro@enea.it Italian

Antonio Di Pietro. antonio.dipietro@enea.it Italian CURRICULUM VITAE PERSONAL INFORMATION First name / Surname City Rome Telephone 39-339 48 92 925 39-06 3048 3821 Fax 39-06 3048 6511 E-mails Nationality Date of birth 08.25.1978 Gender antonio.dipietro@enea.it

More information

Feature. SCADA Cybersecurity Framework

Feature. SCADA Cybersecurity Framework Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation

More information

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do.

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our people work with everyone from multi-nationals

More information

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1 Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about

More information

QUEST improving the quality of urban mobility policies

QUEST improving the quality of urban mobility policies QUEST improving the quality of urban mobility policies Daniela Stoycheva Polis EMW Interactive Workshops Our Streets, Our Choice 24-25 March 2014 What is QUEST? QUEST is a Quality Management tool developed

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

How To Create A Blended Learning Course In Sociology

How To Create A Blended Learning Course In Sociology Virtual Campus in Blended Learning: From the First Blended Learning Degree in Sociology to E-Urbs Giovanni Torrisi (Università di Urbino Carlo Bo ) Facoltà di Sociologia Università degli studi di Urbino

More information

Security Information & Event Management (SIEM) Sri Carlyle Country Manager

Security Information & Event Management (SIEM) Sri Carlyle Country Manager Security Information & Event Management (SIEM) Sri Carlyle Country Manager LogPoint Introduction Founded i 2001, Copenhagen, Denmark 100 % Danish ownership Yearly growth: 100 percent 70 employees: 20 Sales/admin

More information

CURRICULUM VITAE Pier Francesco Cortese

CURRICULUM VITAE Pier Francesco Cortese CURRICULUM VITAE Pier Francesco Cortese Personal Data Place and Date of Birth Roma, 10/03/1977 Address: Via dei Georgofili 148-00147 ROMA (Italy) Phone number: 06-55173215 Cell Phone: 328-6566054 E-mail:

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008

PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008 PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY May 2008 This report is published under the OECD Secretariat's responsibility and was prepared by

More information

Internet of Things Value Proposition for Europe

Internet of Things Value Proposition for Europe Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th

More information

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic

More information

Pre-Commercial Procurement (PCP)

Pre-Commercial Procurement (PCP) Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal

More information

Intelligent Network Management System. Comprehensive Network Visibility and Management for Wireless and Fixed Networks

Intelligent Network Management System. Comprehensive Network Visibility and Management for Wireless and Fixed Networks Intelligent System Comprehensive Visibility and for Wireless and Fixed s Performance Analysis Made Easy With the increase in wireless network sizes and network complexities and the inter-operation of diverse

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

The participation of romanian universities at the partnership PEGASUS - a chance for the aerospace higher education in Romania

The participation of romanian universities at the partnership PEGASUS - a chance for the aerospace higher education in Romania The participation of romanian universities at the partnership PEGASUS - a chance for the aerospace higher education in Romania Nicolae-Şerban TOMESCU* *Corresponding author Elie Carafoli Department of

More information

ENCS/NEC RESEARCH MEETING

ENCS/NEC RESEARCH MEETING ENCS/NEC RESEARCH MEETING Benessa Defend ベネッサ ディフェンド Benessa.Defend@encs.eu April 21, 2014 NEC, Kawasaki 1 PARTNERING FOR CYBER RESILIENCE We create and bring together knowledge and resources to secure

More information

Development of Technology for Detecting Advanced Persistent Threat Activities

Development of Technology for Detecting Advanced Persistent Threat Activities FOR IMMEDIATE RELEASE Development of Technology for Detecting Advanced Persistent Threat Activities Visualizing correlations among hosts having suspicious activities to detect attacks such as stealth malware

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Proceedings of the 13th European Conference on Cyber Warfare and Security

Proceedings of the 13th European Conference on Cyber Warfare and Security Proceedings of the 13th European Conference on Cyber Warfare and Security The University it of Piraeus Greece 3-4 July 2014 Edited by Andrew Liaropoulos and George Tsihrintzis A conference managed by ACPI,

More information

U.S. Cyber Security Readiness

U.S. Cyber Security Readiness U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National

More information

Critical Information Infrastructures Protection approaches in EU

Critical Information Infrastructures Protection approaches in EU Critical Information Infrastructures Protection approaches in EU Executive Summary An increasing number of countries in the European Union have developed a National Cyber Security Strategy (NCSS) a key

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

IT Service Continuity Management

IT Service Continuity Management Service Continuity Management Service Continuity Components and Approach to the Activities Roberto Giaffreda, Service Continuity Manager CISA, CISM, CISSP, ISO27001LA, BS25999LA, ILv2 Pisa, 22 Maggio 2009

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

How To Become A Computer Scientist

How To Become A Computer Scientist EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

Keeping European Consumers safe Rapid Alert System for dangerous non-food products 2014

Keeping European Consumers safe Rapid Alert System for dangerous non-food products 2014 Keeping European Consumers safe Rapid Alert System for dangerous non-food products 2014 COMPLETE STATISTICS Justice and Consumers Directorate-General for Justice and Consumers Directorate Consumers Unit

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

Good practice of dissemination and exploitation results in Latvia

Good practice of dissemination and exploitation results in Latvia Good practice of dissemination and exploitation results in Latvia Dr.phys. Gunta Šlihta Vice-director, Institute of Physical Energetics Rīga, / 03 / 03 Methods of transfer of project results in the Baltic

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Methodologies for the identification of Critical Information Infrastructure assets and services

Methodologies for the identification of Critical Information Infrastructure assets and services Methodologies for the identification of Critical Information Infrastructure assets and services Guidelines for charting electronic data communication networks European Union Agency for Network and Information

More information

Fostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship

Fostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit Entrepreneurship Definition of Entrepreneurship Entrepreneurship refers to an individual s ability

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

Flexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar

Flexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar Flexible Plug & Play Smart grid cyber security design and framework Tim Manandhar Agenda Cyber security for smart grids Smart Grid cyber security framework FPP project approach on Cyber security Conclusions

More information

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt

More information

Cyber security. Ideal logo position here

Cyber security. Ideal logo position here Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and

More information

D 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive

D 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

Guidelines for Establishment of Contract Areas Computer Science Department

Guidelines for Establishment of Contract Areas Computer Science Department Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science

More information

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates

More information

The Community Innovation Survey 2010 (CIS 2010)

The Community Innovation Survey 2010 (CIS 2010) The Community Innovation Survey 2010 (CIS 2010) THE HARMONISED SURVEY QUESTIONNAIRE The Community Innovation Survey 2010 FINAL VERSION July 9, 2010 This survey collects information on your enterprise s

More information

Test di sicurezza in ambienti Smart Grid e SCADA

Test di sicurezza in ambienti Smart Grid e SCADA Test di sicurezza in ambienti Smart Grid e SCADA Simone Riccetti, IBM Italy simone.riccetti@it.ibm.com Agenda SCADA/Smart Grid overview SCADA/Smart Grid security issues Security test challenges Testing

More information

Implementing the cooperation mechanisms of the RES directive current status and open questions

Implementing the cooperation mechanisms of the RES directive current status and open questions Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy

More information

Cyber Security Training for Journalists, 25 27 May Leuven

Cyber Security Training for Journalists, 25 27 May Leuven Cyber Security Training for Journalists, 25 27 May Leuven The European Federation of Journalists (EFJ) and the European Trade Union Institute (ETUI) are organising a two-day Cyber Security Training for

More information

ANALYSIS OF THE STAKEHOLDER CONSULTATION ON

ANALYSIS OF THE STAKEHOLDER CONSULTATION ON ANALYSIS OF THE STAKEHOLDER CONSULTATION ON Science and Technology, the key to Europe s future: guidelines for future European policy to support research COM(353)2004 DG Research, European Commission,

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

The PhD Programme in Mechanical Engineering

The PhD Programme in Mechanical Engineering pm1lb.e PhD The PhD Programme in Mechanical Engineering ADOBE ILL WHY US Academic Excellence Founded in 1863, today Politecnico di Milano is ranked 1 st for its engineering programmes in Italy and 28 th

More information

SEC-19-BES-2016: Data fusion for maritime security applications

SEC-19-BES-2016: Data fusion for maritime security applications SEC-19-BES-2016: Data fusion for maritime security applications Research at EXUS 19 on-going projects 12 as coordinator Security Group Current projects / Key people SECURITY OF INFRASTRUCTURES AND UTILITIES

More information

İSTANBUL TİCARET ÜNİVERSİTESİ ERASMUS PROGRAMI ÇERÇEVESİNDE YAPILAN İKİLİ ANLAŞMALAR

İSTANBUL TİCARET ÜNİVERSİTESİ ERASMUS PROGRAMI ÇERÇEVESİNDE YAPILAN İKİLİ ANLAŞMALAR 1. University of Applied Technikum Wien Austria Electronic and Electrical 2. Josip Juraj Strossmayer University of Osijek Croatia 3. Palacký University In Olomouc Czech Republic Psychology Computer Science

More information

A Statistical Overview of the Erasmus Programme in 2012-13

A Statistical Overview of the Erasmus Programme in 2012-13 On the way to Erasmus+ A Statistical Overview of the Erasmus Programme in 2012-13 Education and Training TABLE OF CONTENTS 3 Table of contents Acronyms used in this report...14 Disclaimer...14 Preface...15

More information

EUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT

EUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT EUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT Research, development and innovation are key policy components of the EU strategy for economic growth: Europe 2020. By fostering market take-up of new, innovative

More information

IL NUCLEARE IN ITALIA: SI RIPARTE?

IL NUCLEARE IN ITALIA: SI RIPARTE? IL NUCLEARE IN ITALIA: SI RIPARTE? 27 maggio, Sala Sagittarius, Centro Congressi, Fieramilano - Rho Silvio Bosetti Energy Lab - Laboratorio dell Energia ENERGYLAB: SUPPORT RESEARCH, CREATE INNOVATION,

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Masters level

More information

Full professor and 6 assistant professors of IT A new school in IT Cameroon

Full professor and 6 assistant professors of IT A new school in IT Cameroon We are pleased to present our selection of the academic vacancies at Computeroxy.com - your academic website exclusively dedicated to careers in schools of computer, electrical and mathematical sciences

More information

Critical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis

Critical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis Critical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis 17 th INFOCOM World Conference 2015 Athens, Greece - November 24, 2015

More information

A Novel Solution on Alert Conflict Resolution Model in Network Management

A Novel Solution on Alert Conflict Resolution Model in Network Management A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom FrankChan2005@gmail.com Ramaswamy D.Thiyagu University of East London United

More information

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security

More information

European Field Operational Test on Safe, Intelligent and Sustainable Highway Operation

European Field Operational Test on Safe, Intelligent and Sustainable Highway Operation European Field Operational Test on Safe, Intelligent and Sustainable Highway Operation 27/09/2011 José Luis Pérez Iturriaga OHL CONCESIONES Project Coordination 1 PRESENTATION OUTLINE Overview Objectives

More information

THE ANALYSIS OF PRIVATE HEALTH INSURANCE PENETRATION DEGREE AND DENSITY IN EUROPE

THE ANALYSIS OF PRIVATE HEALTH INSURANCE PENETRATION DEGREE AND DENSITY IN EUROPE THE ANALYSIS OF PRIVATE HEALTH INSURANCE PENETRATION DEGREE AND DENSITY IN EUROPE Gheorghe Matei, Professor Ph.D University of Craiova Faculty of Economics and Business Administration Craiova, Romania

More information

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com

FlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project

More information

Assuring Telecom (Infrastructure and Services) An Operations Perspective

Assuring Telecom (Infrastructure and Services) An Operations Perspective Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and

More information

Data Driven Assessment of Cyber Risk:

Data Driven Assessment of Cyber Risk: Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute

More information

How To Prevent Cyber Crime

How To Prevent Cyber Crime , pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,

More information

CURRICULUM VITAE CECILIA ROSSIGNOLI

CURRICULUM VITAE CECILIA ROSSIGNOLI CURRICULUM VITAE CECILIA ROSSIGNOLI Cecilia Rossignoli is Full Professor of Organization Science at the University of Verona (Italy). Previously she served for 17 years as Assistant Professor at the Catholic

More information