Progetti di ricerca internazionali
|
|
- Nathan Walters
- 8 years ago
- Views:
Transcription
1 Progetti di ricerca internazionali 2014 URANIUM - Unified Risk Assessment Negotiation via Interoperability Using Multi-sensor data Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2013 (HOME/2013/CIPS/AG 2013) In this project we propose to study a new Situation Assesment approach in which interdependency model of Critical Infrastructures, whose output is the computation of the risk level for, is fed by several different sources of data, such as alarms directly collected by SCADA systems (e.g., faults), alarms generated by low-level sensor fusion on continous systems able to estimate the state of a system, alarms generated by single sensors (e.g. video cameras), and software agents able to generate alarms using Complex Event Processing (CEP) on multisensor data able to recognize complex sequences of events. The objectives of URANIUM project are: 1. Stimulating, promoting and supporting the development of methodologies for the protection of CI, in particular risk assessment methodologies; 2. Stimulating, promoting and supporting risk assessment on Critical Infrastructure (CI), in order to upgrade security. Risk assessment, Interdependencies modelling. 18 mesi Stefano Panzieri Grant agreement n HOME/2011/CIPS/AG/ Stefano Panzieri, Federica Pascucci prof. Stefano Panzieri Partners Theorematica (Italia), ARPIC (Romania), Secant Security (Romania)
2 2012 LEONE - From global measurements to local management EU FP7-ICT The Leone project is an FP7 STREP targeting Future Networks, which addresses Novel Internet architectures, management and operation frameworks. The main goal is to research and develop an innovative network management framework that has two major novelties: (i) it is focused on Quality of Experience: probes sited alongside end users measure performance and functionality to websites and test servers, both local and distant; (ii) it integrates multi-dimensional information: it combines measurements made by probes in the local ISP, probes in other ISPs, control plane information etc. These two novelties enable network management to focus on improving the user s experience of the Internet in a world of highly distributed and increasingly meshed applications. Network management, distributed systems, visualization, probe, Quality of Experience, Future Networks. 30 mesi Grant agreement n Maurizio Pizzonia Maurizio Pizzonia, Giuseppe Di Battista Philip Eardley - British Telecom (UK) Partners BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY - Project Coordinator - United Kingdom, MG-SOFT PODJETJE ZA RACUNALNISKI INZENIRING DOO Slovenia, SAMKNOWS LIMITED United Kingdom, TELECOM ITALIA S.p.A Italy, AALTO- KORKEAKOULUSAATIO Finland, JACOBS UNIVERSITY BREMEN GGMBH Germany, UNIVERSITA DEGLI STUDI ROMA TRE Italy, UNIVERSIDAD CARLOS III DE MADRID Spain, UNIVERSITE CATHOLIQUE DE LOUVAIN Belgium, MARTEL GMBH Switzerland.
3 FACIES - online identification of Failure and Attack on interdependent Critical InfrastructurES Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2011 The interdependence among critical infrastructure is now a reality. Interdependency becomes evident when a loss or a failure in an infrastructure generates repercussions and cascade effects on other infrastructures, and not always links are obvious and well-known. Since 90s infrastructures make use of SCADA systems, enabling the control and supervision of large plants and buildings. These SCADA systems are vulnerable to possible deliberate and malicious intrusions, known in literature as cyber attacks. The FACIES project aims both at identifying methodologies and metrics for the protection of infrastructure from cyber attacks, and determining possible countermeasures to these vulnerabilities. Cybersecurity, CIP, Risk Prediciton, Early Warning, Interdependencies modelling. 24 mesi Stefano Panzieri (RADIOLABS) Grant agreement n HOME/2011/CIPS/AG/ Partners Stefano Panzieri, Giovanni Ulivi, Federica Pascucci prof. Roberto Setola CAMPUS Bio-Medico CAMPUS Bio-Medico Roma (coordinatore); Universidad de Malaga (ES); University of Cyprus (GR); RADIOLABS (IT) CockpitCI - Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures EU FP7-SEC Cyber attacks against critical infrastructures Capability Project CockpitCI project aims to improve the resilience and the dependability of CIs through the design and the implementation of the CockpitCI Alerting System that improves the MICIE alerting system developed within the MICIE Project, providing to CI operators an efficient tool to support them: (i) in the prevention of cyber attacks, and (ii) in the implementation of consequence containment strategies in case of attack. Cybersecurity, RTU, CIIP, Risk Prediciton, Early Warning, Interdependencies modelling. 36 mesi Grant agreement n Stefano Panzieri Stefano Panzieri, Giovanni Ulivi, Giuseppe Di Battista, Federica Pascucci, Maurizio Pizzonia, Andrea Gasparri ing. Antonio Graziano - SELEX-SI
4 Grant agreement n Partners REFIRE - REFerence implementation of interoperable Indoor location and communication system for first REsponders Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks CIPS Grant Action 2010 REFIRE wants to integrate the results of previous R&D projects on deep indoor localization and industrial solutions to offer a solution ready to the market, which will pave the way for a day-to-day use of effective location and communication services for indoor and deep-indoor emergencies. In a nutshell, REFIRE is project aimed at tailoring exiting capabilities to a specific package and at integrating them in a reference implementation. Such reference implementation will be developed around a nonproprietary standard for data and equipment interfaces, so that future interoperability of devices manufactured by any vendor across Europe is ensured. The proof-ofconcept implementation will be validated as living validation of the standards and concepts in real trials. In parallel, a first industrial set of prototypes will be developed and tests, so that the validity of the protocols set out by the project will be demonstrated. The validation of both the reference implementation and the preindustrial prototypes in complex trials will further demonstrate such points, eventually boosting an early adoption of integrated tools and devices at European level. Indoor localization, rescue localization, localization protcol 36 mesi Roberto Setola (Campus Biomedico) Roberto Setola (Campus Biomedico), Stefano Panzieri, Federica Pascucci Uberto del Prato - IES Solutions INTELLIGENCE FOR ENVIRONMENT & SECURITY - IES SOLUTIONS (coordinatore); Dipartimento dei Vigili del Fuoco - Ministero dell'interno (IT); CAMPUS Bio-Medico Roma (IT); BECAR (IT); INDICOD- ECR SERVIZI (IT); RADIOLABS (IT) 2011 GraDR - Graph Drawings and Representations European Science Foundation ESF EuroGIGA Programme 36 mesi Grant agreement n Giuseppe Di Battista Patrizio Angelini (RM3), Giuseppe Di Battista (RM3), Fabrizio Frati (RM3), Anna Galluccio (IASI-CNR), Maurizio Patrignani (RM3) Professor Jan Kratochvil Faculty of Mathematics and Physics Charles University Praha, Czech Republic
5 2009 ECHORD- European Clearing House for Open Robotics Development EU VII PQ FP7-ICT INFORMATION AND COMMUNICATION TECHNOLOGY ICT Cognitive Systems, Interaction and Robotics Large-scale integrating project (IP) Federica Pascucci Grant agreement n Federica Pascucci, Lorenzo Sciavicco Università di Napoli Federico II 2008 MICIE - Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures. EU VII PQ Grant agreement n FP7-ICT-SEC INFORMATION AND COMMUNICATION TECHNOLOGIES The MICIE project, being in line with EU initiative to establish a Critical Infrastructure Warning Information Network (CIWIN), aimed to design and implement a so-called "MICIE alerting system" able to identify, in real time, the level of possible threats induced on a given CI by "undesired" events happened in such CI and/or other interdependent CIs. In particular, whenever such events occur, the MICIE alerting system supports the CI operators providing them with a real time risk level. CIP, Risk Prediciton, Early Warning, Interdependencies modelling. Stefano Panzieri Stefano Panzieri, Federica Pascucci, Giovanni Ulivi, Lorenzo Sciavicco SELEX-COM
6 Agreement Num. SECURSPACE Prevention Preparedness and Consequence Management of Terrorism and other Security related Risks Analysis of the use of satellite technologies in the overall economy structure and in Emergency Operations. Risk assessment of the disruption of Communication and Navigation satellite functionalities for the various economy sectors. Risk assessment of the disruption of Communication and Navigation satellite functionalities for the Emergency Operations. CIP, Satellite services Stefano Panzieri JLS/2007/CIPS/009 Stefano Panzieri, Federica Pascucci, Giovanni Ulivi TELESPAZIO
Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it
Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Final Workshop Rome, December 16th, 2014 Motivation and Background Power Grid Operating
More informationLa Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria
La Gestione delle Infrastrutture Critiche Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria La Gestione delle Infrastrutture Critiche Modellazione Identificazione
More informationHybrid Risk Management for Utility Networks
Hybrid Risk Management for Utility Networks Hermann de Meer hermann.demeer@uni-passau.de Computer Networks and Computer Communications Lab (CNACC) University of Passau CNACC: Introduction People Prof.
More informationINSPIRE: INcreasing Security and Protection through Infrastructure REsilience
INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationCIPS 2011 Awarded Grants. Project number Applicant's name Ctry Title Description Grant
CIPS 2011 Awarded Grants Project number Applicant's name Ctry Title Description Grant HOME/2011/CIPS/AG/2012 NATIONAL INSTUTE COMMUNICATION TECHNOLOGIES (INTECO) ES SCADA laboratory and testbed as a service
More informationHow To Protect Critical Infrastructure From Attack
Trust and Reputation Management for Critical Infrastructure Protection Filipe Caldeira 12, Edmundo Monteiro 1, and Paulo Simões 1 1 Universidade de Coimbra - DEI/CISUC, Coimbra, 3030-290, Portugal {fmanuel,edmundo,psimoes}@dei.uc.pt
More informationOVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012. ICT statistical report for annual monitoring (StReAM)
OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN 2012 ICT statistical report for annual monitoring (StReAM) 12 June 2013 ACRONYMS AAL: ACC: ARTEMIS: ASS: BPN: CA: CIP: CP: CSA: EEA: EPO: FP: FET: GBAORD:
More informationESCoRTS A European network for the Security of Control & Real Time Systems
ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in
More informationInnovative means to exchange telecom fraud and network security risks information
Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing
More informationIAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationGLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology
Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project Jianmin Jiang Department of Computing, University of Surrey, Guildford, GU2 7XH, United Kingdom.
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationon Security - Lessons l earned
Tailoring information security to business requirements 08/06/2015 Research & Innovation on Security - Lessons l earned itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710
More informationH2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu
More informationORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
More informationUsing MASSIF to Protect a Critical Infrastructure: Dam Use Case
Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu
More informationCYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
More informationCritical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
More informationA Comprehensive Approach to Critical Information Infrastructure Assurance
A Comprehensive Approach to Critical Information Infrastructure Assurance Euro-Atlantic Symposium on Critical Information Infrastructure Assurance 23-24 24 March 2006 Riva San Vitale, Switzerland Professor
More informationCyber Security nei prodotti di automazione
Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard
More informationESKISP6064.03 Conducts vulnerability assessment under supervision
Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationPublic consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
More informationIntelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com)
Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Theo Dimitrakos Chief Security Researcher, BT Research & Technology theo.dimitrakos@bt.com
More informationThe Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm
More informationRESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information
www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why
More informationTHE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
More informationSTW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th
STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE
More informationECCE Standing Committee Education & Training
ECCE Standing Committee Education & Training Impact of the Bologna Process on Civil engineering education in Europe Prof. Iacint Manoliu 45 th ECCE meeting Bucharest, 11 May 2007 SCD Civil Engineering
More informationWorkshop on Collaborative Security and Privacy Technologies
Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential
More informationENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15
More informationAntonio Di Pietro. antonio.dipietro@enea.it Italian
CURRICULUM VITAE PERSONAL INFORMATION First name / Surname City Rome Telephone 39-339 48 92 925 39-06 3048 3821 Fax 39-06 3048 6511 E-mails Nationality Date of birth 08.25.1978 Gender antonio.dipietro@enea.it
More informationFeature. SCADA Cybersecurity Framework
Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation
More informationOur patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do.
Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our people work with everyone from multi-nationals
More informationClaes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about
More informationQUEST improving the quality of urban mobility policies
QUEST improving the quality of urban mobility policies Daniela Stoycheva Polis EMW Interactive Workshops Our Streets, Our Choice 24-25 March 2014 What is QUEST? QUEST is a Quality Management tool developed
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationHow To Create A Blended Learning Course In Sociology
Virtual Campus in Blended Learning: From the First Blended Learning Degree in Sociology to E-Urbs Giovanni Torrisi (Università di Urbino Carlo Bo ) Facoltà di Sociologia Università degli studi di Urbino
More informationSecurity Information & Event Management (SIEM) Sri Carlyle Country Manager
Security Information & Event Management (SIEM) Sri Carlyle Country Manager LogPoint Introduction Founded i 2001, Copenhagen, Denmark 100 % Danish ownership Yearly growth: 100 percent 70 employees: 20 Sales/admin
More informationCURRICULUM VITAE Pier Francesco Cortese
CURRICULUM VITAE Pier Francesco Cortese Personal Data Place and Date of Birth Roma, 10/03/1977 Address: Via dei Georgofili 148-00147 ROMA (Italy) Phone number: 06-55173215 Cell Phone: 328-6566054 E-mail:
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationPROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008
PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY May 2008 This report is published under the OECD Secretariat's responsibility and was prepared by
More informationInternet of Things Value Proposition for Europe
Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th
More informationEUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator
EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic
More informationPre-Commercial Procurement (PCP)
Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal
More informationIntelligent Network Management System. Comprehensive Network Visibility and Management for Wireless and Fixed Networks
Intelligent System Comprehensive Visibility and for Wireless and Fixed s Performance Analysis Made Easy With the increase in wireless network sizes and network complexities and the inter-operation of diverse
More informationLegal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
More informationThe participation of romanian universities at the partnership PEGASUS - a chance for the aerospace higher education in Romania
The participation of romanian universities at the partnership PEGASUS - a chance for the aerospace higher education in Romania Nicolae-Şerban TOMESCU* *Corresponding author Elie Carafoli Department of
More informationENCS/NEC RESEARCH MEETING
ENCS/NEC RESEARCH MEETING Benessa Defend ベネッサ ディフェンド Benessa.Defend@encs.eu April 21, 2014 NEC, Kawasaki 1 PARTNERING FOR CYBER RESILIENCE We create and bring together knowledge and resources to secure
More informationDevelopment of Technology for Detecting Advanced Persistent Threat Activities
FOR IMMEDIATE RELEASE Development of Technology for Detecting Advanced Persistent Threat Activities Visualizing correlations among hosts having suspicious activities to detect attacks such as stealth malware
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationProceedings of the 13th European Conference on Cyber Warfare and Security
Proceedings of the 13th European Conference on Cyber Warfare and Security The University it of Piraeus Greece 3-4 July 2014 Edited by Andrew Liaropoulos and George Tsihrintzis A conference managed by ACPI,
More informationU.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
More informationCritical Information Infrastructures Protection approaches in EU
Critical Information Infrastructures Protection approaches in EU Executive Summary An increasing number of countries in the European Union have developed a National Cyber Security Strategy (NCSS) a key
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationIT Service Continuity Management
Service Continuity Management Service Continuity Components and Approach to the Activities Roberto Giaffreda, Service Continuity Manager CISA, CISM, CISSP, ISO27001LA, BS25999LA, ILv2 Pisa, 22 Maggio 2009
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationHow To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
More informationKeeping European Consumers safe Rapid Alert System for dangerous non-food products 2014
Keeping European Consumers safe Rapid Alert System for dangerous non-food products 2014 COMPLETE STATISTICS Justice and Consumers Directorate-General for Justice and Consumers Directorate Consumers Unit
More informationThe Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationGood practice of dissemination and exploitation results in Latvia
Good practice of dissemination and exploitation results in Latvia Dr.phys. Gunta Šlihta Vice-director, Institute of Physical Energetics Rīga, / 03 / 03 Methods of transfer of project results in the Baltic
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationMethodologies for the identification of Critical Information Infrastructure assets and services
Methodologies for the identification of Critical Information Infrastructure assets and services Guidelines for charting electronic data communication networks European Union Agency for Network and Information
More informationFostering Entrepreneurship among young people through education: a EU perspective. Simone Baldassarri Unit Entrepreneurship
Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit Entrepreneurship Definition of Entrepreneurship Entrepreneurship refers to an individual s ability
More informationCyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
More informationFlexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar
Flexible Plug & Play Smart grid cyber security design and framework Tim Manandhar Agenda Cyber security for smart grids Smart Grid cyber security framework FPP project approach on Cyber security Conclusions
More informationOn the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt
More informationCyber security. Ideal logo position here
Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and
More informationD 6.4 and D7.4 Draft topics of EEGI Implementation Plan 2016-2018 Revision: Definitive
Project no.: 282794 Project acronym GRID+ Project title: Supporting the Development of the European Electricity Grids Initiative (EEGI) Instrument: Coordination and support action Thematic priority: ENERGY.2011.7.3-1:
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationGuidelines for Establishment of Contract Areas Computer Science Department
Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science
More informationNow and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor
Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates
More informationThe Community Innovation Survey 2010 (CIS 2010)
The Community Innovation Survey 2010 (CIS 2010) THE HARMONISED SURVEY QUESTIONNAIRE The Community Innovation Survey 2010 FINAL VERSION July 9, 2010 This survey collects information on your enterprise s
More informationTest di sicurezza in ambienti Smart Grid e SCADA
Test di sicurezza in ambienti Smart Grid e SCADA Simone Riccetti, IBM Italy simone.riccetti@it.ibm.com Agenda SCADA/Smart Grid overview SCADA/Smart Grid security issues Security test challenges Testing
More informationImplementing the cooperation mechanisms of the RES directive current status and open questions
Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy
More informationCyber Security Training for Journalists, 25 27 May Leuven
Cyber Security Training for Journalists, 25 27 May Leuven The European Federation of Journalists (EFJ) and the European Trade Union Institute (ETUI) are organising a two-day Cyber Security Training for
More informationANALYSIS OF THE STAKEHOLDER CONSULTATION ON
ANALYSIS OF THE STAKEHOLDER CONSULTATION ON Science and Technology, the key to Europe s future: guidelines for future European policy to support research COM(353)2004 DG Research, European Commission,
More informationCyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
More informationThe PhD Programme in Mechanical Engineering
pm1lb.e PhD The PhD Programme in Mechanical Engineering ADOBE ILL WHY US Academic Excellence Founded in 1863, today Politecnico di Milano is ranked 1 st for its engineering programmes in Italy and 28 th
More informationSEC-19-BES-2016: Data fusion for maritime security applications
SEC-19-BES-2016: Data fusion for maritime security applications Research at EXUS 19 on-going projects 12 as coordinator Security Group Current projects / Key people SECURITY OF INFRASTRUCTURES AND UTILITIES
More informationİSTANBUL TİCARET ÜNİVERSİTESİ ERASMUS PROGRAMI ÇERÇEVESİNDE YAPILAN İKİLİ ANLAŞMALAR
1. University of Applied Technikum Wien Austria Electronic and Electrical 2. Josip Juraj Strossmayer University of Osijek Croatia 3. Palacký University In Olomouc Czech Republic Psychology Computer Science
More informationA Statistical Overview of the Erasmus Programme in 2012-13
On the way to Erasmus+ A Statistical Overview of the Erasmus Programme in 2012-13 Education and Training TABLE OF CONTENTS 3 Table of contents Acronyms used in this report...14 Disclaimer...14 Preface...15
More informationEUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT
EUROPE 2020 TARGETS: RESEARCH AND DEVELOPMENT Research, development and innovation are key policy components of the EU strategy for economic growth: Europe 2020. By fostering market take-up of new, innovative
More informationIL NUCLEARE IN ITALIA: SI RIPARTE?
IL NUCLEARE IN ITALIA: SI RIPARTE? 27 maggio, Sala Sagittarius, Centro Congressi, Fieramilano - Rho Silvio Bosetti Energy Lab - Laboratorio dell Energia ENERGYLAB: SUPPORT RESEARCH, CREATE INNOVATION,
More informationERASMUS+ MASTER LOANS
ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Masters level
More informationFull professor and 6 assistant professors of IT A new school in IT Cameroon
We are pleased to present our selection of the academic vacancies at Computeroxy.com - your academic website exclusively dedicated to careers in schools of computer, electrical and mathematical sciences
More informationCritical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis
Critical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis 17 th INFOCOM World Conference 2015 Athens, Greece - November 24, 2015
More informationA Novel Solution on Alert Conflict Resolution Model in Network Management
A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom FrankChan2005@gmail.com Ramaswamy D.Thiyagu University of East London United
More informationEuropean Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga
European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security
More informationEuropean Field Operational Test on Safe, Intelligent and Sustainable Highway Operation
European Field Operational Test on Safe, Intelligent and Sustainable Highway Operation 27/09/2011 José Luis Pérez Iturriaga OHL CONCESIONES Project Coordination 1 PRESENTATION OUTLINE Overview Objectives
More informationTHE ANALYSIS OF PRIVATE HEALTH INSURANCE PENETRATION DEGREE AND DENSITY IN EUROPE
THE ANALYSIS OF PRIVATE HEALTH INSURANCE PENETRATION DEGREE AND DENSITY IN EUROPE Gheorghe Matei, Professor Ph.D University of Craiova Faculty of Economics and Business Administration Craiova, Romania
More informationFlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com
FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project
More informationAssuring Telecom (Infrastructure and Services) An Operations Perspective
Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and
More informationData Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
More informationHow To Prevent Cyber Crime
, pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,
More informationCURRICULUM VITAE CECILIA ROSSIGNOLI
CURRICULUM VITAE CECILIA ROSSIGNOLI Cecilia Rossignoli is Full Professor of Organization Science at the University of Verona (Italy). Previously she served for 17 years as Assistant Professor at the Catholic
More information