1 FOCUS Foresight Security Scenarios

Size: px
Start display at page:

Download "1 FOCUS Foresight Security Scenarios"

Transcription

1 New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military tools of the nationstate, and security and insecurity are no longer considered as dependent only upon geopolitics and military strength, but rather are also seen to depend upon social, economic, environmental, ethical models of analysis and tools of action From a review on J. Peter Burgess (Editor) The Routledge Handbook of New Security Studies Routledge Handbook, FOCUS Foresight Security Scenarios

2 Introductory discussion New Security studies as Shifts in Four Key Areas (Based on J. Peter Burgess (Editor) The Routledge Handbook of New Security Studies Routledge Handbooks, 2010) New security concepts Hybrid Threats, civilizational security, Comprehensive Security Approach etc. New security subjects Biopolitics of security, Financial Security, Security as Ethics etc. New security objects - Environmental Security,Food Security, Cyber-Security, Pandemic Security etc. New security practices Migration and Insecurity, Security Technologies, Commercial Security Practices etc. FOCUS PROJECT elaborates all these shifts in critical new security studies against backdrop of EU Global role in new security challenges raised in Scenarios for FOCUS Foresight Security Scenarios

3 Introductory discussion (cont.) The status of new security studies as an epistemological process:a Traditional Process versus Scenarios Process New security Studies can develop as a positivist, interpretivist or critical processes that share four standard criteria to disciplined inquiry: internal validity, external validity, reliability, and objectivity. New Security Studies emerge from Scenarios within constructivist interpretive paradigm with different research criteria such as: Plausibility: The selected scenarios must fall within the limits of what might conceivably happen. Differentiation: Each scenario constructed should be sufficiently different for it not to be construed as variations of a base case. Consistency: The logical reasoning contained in a scenario must not have any in-built inconsistency that would undermine its credibility. Decision-making utility: Each scenario should contribute sufficient insights into the future to bear on the decision focus selected. Decisionmaking utility is an important criterion: Even though the precise visions or scenarios do not come to pass, the very fact of constructing them can influence individual behavior and collective decision and policy making. Challenge: The scenarios should challenge the organization s conventional wisdom about the future. 3 FOCUS Foresight Security Scenarios

4 Scenarios as stimulating new security studies A simulation of "real document First Annual Report on the implementation of the EU Internal Security Strategy (ISS) Communication from the Commission to the European Parliament and the Council, Released in Brussels, m 4 FOCUS Foresight Security Scenarios

5 A simulation of "real document (cont.) PRIORITIES and A New Security Concept Disruption of international criminal networks Prevention of terrorism and addressing radicalization and recruitment Raising the levels of security for citizens and business in cyberspace Strengthening security through border management Increasing Europe s resilienceto crises and disasters New security concept: Supra-National Society Resilience instead of National Resilience the sum of 27 MS national resilience is not Europe's resilience 5 FOCUS Foresight Security Scenarios

6 A simulation of "real document (cont.) THREAT AND RISK ASSESSMENT and A New Security Practice Europol Eurojust Frontex EU Joint Situation Center(SitCen) others New security practice - Security technologies as an indicator to intelligence communities absolute and relative advantage: how security technologies practices affect tensions between EU and Member State intelligence agendas; tensions between EU, NATO, UN, etc. intelligence agencies; tensions between the principles of "need to know" and "need to share" information; challenges to the concept of pooling and sharing of intelligence capabilities following the complex picture of external and internal threats and related responsibilities. 6 FOCUS Foresight Security Scenarios

7 A simulation of "real document (cont.) EMERGING THREATS and a New security Object Increasing reliance on internet technology, with increasing vulnerability Reduced resources to combat internal security threats due to the ongoing economic crisis Impact of the external dimension of security New security Object Cyber-Security Interdependence and deterrence in cyberwarfare "soft - "hard" power in managing cyber as an emerging threat? 7 FOCUS Foresight Security Scenarios

8 A simulation of "real document (cont.) Coherence between the internal and external dimensions of security and a New Security Subject Joint meetings of the Standing Committee on operational cooperation on internal security (COSI) and the Political and Security Committee (PSC) Enhancing ties between the Common Security and Defence Policy (CSDP) and Justice and Home Affairs (JHA), with a focus on closer cooperation between CSDP civilian missions and JHA Cooperation between CSDP police missions and Europol New security subject Security as Ethics Justice and Home Affairs special tasks in harmonising between the internal and external dimensions of security (confidence building, political interests and values balance etc., demilitarization of Petersberg tasks etc.) 8 FOCUS Foresight Security Scenarios

9 FOCUS ( Foresight Security Scenarios - Mapping Research to a Comprehensive Approach to Exogenous EU Roles ) FOCUS New Security Studies Roadmap FOCUS New Security Studies Roadmap is: Beyond the agenda required in the First Annual Report on the implementation of the EU Internal Security Strategy (ISS) Based on the Comprehensive Approach that: - Reflects the cross-border and cross-sector nature of current security threats and challenges as well as the complexity of instruments and objectives in security policy along the internal-external continuum. - Focuses on the holistic nature and broad tradeoffs involving societal goals to increase the security of the EU and its citizenry as a whole. - Civil-military interaction plays an important role. Because FOCUS is a civil security research project that primarily addresses exogenous (not external) roles of the EU as a comprehensive security provider to its citizens, the project does not investigate the defence of strategic EU or Member States interests outside their borders. However, FOCUS explores civil-military interaction to meet challenges and threats abroad before they reach the Union. 9 FOCUS Foresight Security Scenarios

10 Coherence and Consistency of the Internal Framework of the EU as a Comprehensive Security Provider (based on FOCUS D7.1-PAGE 50) EU Capabilities A Multidisciplinary Theme Sociology Citizen Resilience, Societal Acceptance ECONOMICS Coherence of Policies & Resources; Asymmetric capabilities MS & the EU EU CAPABILITIES TECHNOLOGY Increase of critical (inter-)dependencies between technologies; Dependency on information & communication technology; Psychology Politics of fear, POLICY STUDIES Cultural Preparedness Political Planning Tools for Civil Security Sciences Decision making, 10 Processes FOCUS & Foresight Security Scenarios Institutions

11 A Holistic Vulnerability Assessment Interdisciplinary Practice Discipline View(s) of Vulnerability Recommendation(s) Geography Meteorology Engineering Anthropology Economics Sociology Psychology Epidemiology Environmental Science Political Science Vulnerability is determined by the use of hazardprone areas Vulnerability is due to a lack of advanced warning of severe weather Vulnerability occurs when structures and infrastructure cannot withstand the forces of hazards Vulnerability emanates from constraining values, attitudes and practices Vulnerability is related to poverty and results in an inability to prevent, prepare for or recover from a disaster Vulnerability is a product of inaccurate assumptions about disaster behavior and is related to race, gender, age, disability, etc. Vulnerability is a function of overlooking or minimizing risk and not being able to cope emotionally with stress and/or loss Vulnerability is susceptibility to disease or injury and is related to malnutrition and other health factors Vulnerability is proneness to environmental degradation, which may change weather patterns and produce long-term disasters Vulnerability is produced by the political structure and incorrect decision making Land-use planning that takes into account hazards to reduce risk Acquisition, creation and effective use of warning systems Design and construction of buildings and infrastructure that promotes disaster resistance Alter attitudes to discourage risk-taking practices and susceptibility Improve the distribution of wealth and purchase insurance to minimize losses and promote resilience Understand behavioral patterns in disasters and pay attention to needs of special populations Help people to recognize risk and provide crisis counseling to enable resilience Improve provision of public health/emergency medical care before, during and after disasters Conserve natural resources, protect green space areas, and ensure that debris management is performed in an environmentally conscious manner Alter structure of political system and educate politicians and legislators about disasters Public Administration 11 FOCUS Foresight Security Scenarios Disciplines and Vulnerability (from Mcentire Disciplines, Disasters and Emergency management 2006) Vulnerability results from misguided laws, the failure to implement policies Strengthen response and recovery capabilities through preparedness measures, improved

12 FOCUS Transversal Drivers (D7.1-page 53) Intra-disciplinary Subject Cross-cutting nature of pan- European threats (terrorism, serious and organized crime, cybercrime and cybersecurity) and natural and man-made disasters and transversal challenges as drivers for cross-cutting EUcollaboration and strategies INFORMATION as an intra-disciplinary concept: 12 FOCUS Foresight Security Scenarios

13 New Security Studies are not always about Innovation Revisiting classical and traditional studies to post-modern challenges. For example: Understanding virtual threats such as Cyberwarfare with classical Clausewitz Strategic Concepts (Center of Gravity), IR Deterrence, Conflict Management A. Classical deterrence is optional between state actors when involved in cyber threats, especially under interconnectedness and interdependencies in a globalised era. B. Classical deterrence is relevant to state Center of Gravity C. In state and non state actor cyber threats, a center of gravity evolves within the conflict transformation. From deterrence of denial to classical deterrence, from an evasive, virtual opponent to a territorialized actor with a defined center of gravity 13 FOCUS Foresight Security Scenarios

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension

Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension National Homeland Security Conference 2014, Philadelphia,

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

EU Security Research Project F O C U S Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles

EU Security Research Project F O C U S Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles EU Security Research Project F O C U S Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles Prof. Dr. Alexander Siedschlag MMag. Andrea Jerković, MPA CEUSS Center

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 11.12.2013 JOIN(2013) 30 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

More information

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Paolo Salieri Principal Policy Officer Innovation and Industry for Security DG Migration and Home Affairs Bruxelles May 29th 2015i 2013 Content EU Security Research H-2020

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension

More information

The Defence Strategy of the Slovak Republic

The Defence Strategy of the Slovak Republic The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 27.3.2013 COM(2013) 172 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS Taught Masters programmes What s special about studying in the Department of International Relations at Sussex? With a history that spans

More information

Disaster Risk Reduction and Building Resilience to Climate Change Impacts

Disaster Risk Reduction and Building Resilience to Climate Change Impacts Disaster Risk Reduction and Building Resilience to Climate Change Impacts Luna Abu-Swaireh (abu-swaireh@un.org) May 2015 United Nations Office for Disaster Risk Reduction (UNISDR) Droughts Floods Storms

More information

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Conclusions 26/27 June 2014 EUROPEA COUCIL 26/27 JUE 2014

Conclusions 26/27 June 2014 EUROPEA COUCIL 26/27 JUE 2014 UROPA COUCIL 26/27 JU 2014 STRATGIC AGDA FOR TH UIO I TIMS OF CHAG The May 2014 uropean elections open a new legislative cycle. This moment of political renewal comes precisely as our countries emerge

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

College of Arts and Sciences: Social Science and Humanities Outcomes

College of Arts and Sciences: Social Science and Humanities Outcomes College of Arts and Sciences: Social Science and Humanities Outcomes Communication Information Mgt/ Quantitative Skills Valuing/Ethics/ Integrity Critical Thinking Content Knowledge Application/ Internship

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 22.11.2010 COM(2010) 673 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL The EU Internal Security Strategy in Action: Five steps towards

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Joint UN Statement 1 st Preparatory Committee Meeting (PREPCOM) for the Third UN World Conference on Disaster Risk Reduction, 14-15 July 2014, Geneva

Joint UN Statement 1 st Preparatory Committee Meeting (PREPCOM) for the Third UN World Conference on Disaster Risk Reduction, 14-15 July 2014, Geneva FINAL VERSION Joint UN Statement 1 st Preparatory Committee Meeting (PREPCOM) for the Third UN World Conference on Disaster Risk Reduction, 14-15 July 2014, Geneva PLEASE CHECK AGAINST DELIVERY Excellencies,

More information

Civilian Headline Goal 2010

Civilian Headline Goal 2010 Civilian Headline Goal 2010 (approved by the ministerial Civilian Capabilities Improvement Conference and noted by the General Affairs and External Relations Council on 19 November 2007 - doc. 14823/07)

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Freedom, Security, Privacy. European Home Affairs in an open world

Freedom, Security, Privacy. European Home Affairs in an open world Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group Good Governance. EU Work Plan for Sport EU Work Plan for Sport 2011-2014 Expert Group "Good Governance Deliverable 1 Input on the EU's role in fighting match-fixing J u n e 2012 2 1. INTRODUCTION The EU Work Plan for Sport identifies integrity

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

EN 1 EN COMMUNICATION FROM THE COMMISSION. to the European Parliament and the Council on a EU Drugs Action Plan (2005-2008) Introduction

EN 1 EN COMMUNICATION FROM THE COMMISSION. to the European Parliament and the Council on a EU Drugs Action Plan (2005-2008) Introduction MUNICATION FROM THE MISSION to the European Parliament and the Council on a EU Drugs Action Plan (2005-2008) Introduction The drugs phenomenon is one of the major concerns of the citizens of Europe and

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Danish Emergency Management Agency. Crisis Management in Denmark

Danish Emergency Management Agency. Crisis Management in Denmark Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

Online MPH Program Supplemental Application Handbook

Online MPH Program Supplemental Application Handbook Online MPH Program Supplemental Application Handbook Table of Contents Online MPH Supplemental Application Handbook Completing & Submitting the Supplemental Application 2 Eligible Previous Public Health

More information

Funding Security Research: a European Issue. ESRAB & ESRP initiatives

Funding Security Research: a European Issue. ESRAB & ESRP initiatives Funding Security Research: a European Issue. ESRAB & ESRP initiatives Alessandro ZANASI ESRAB Member Scientific Director of INTELLIGENCE & SECURITY STUDY CENTER Thanks to our network of professionals,

More information

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security 3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are

More information

CYBER SECURITY THREATS AND RESPONSES

CYBER SECURITY THREATS AND RESPONSES CYBER SECURITY THREATS AND RESPONSES AT GLOBAL, NATION-STATE, INDUSTRY AND INDIVIDUAL LEVELS Heli Tiirmaa-Klaar* Although cyber security has accompanied the ICT sector since the first computer systems

More information

Welcome Skåne September 18, 2013

Welcome Skåne September 18, 2013 Welcome Skåne September 18, 2013 Programme Welcome by Director Resilience Mr. Paul Gelton Presentation NL DCM-system + PPP + risk/crisis info by Mr. Corsmas Goemans Pause Presentation NL Strategy NS&S

More information

Analysis. Document. Abstract: Keywords: Receive our NEWSLETTER. Document Analysis 34/2013 1. 34/2013 3rd June 2013

Analysis. Document. Abstract: Keywords: Receive our NEWSLETTER. Document Analysis 34/2013 1. 34/2013 3rd June 2013 Document Analysis 34/2013 3rd June 2013 NATIONAL SECURITY STRATEGY (MAY 2013) Visita the WEBSITE Receive our NEWSLETTER This document has been translated by a Translation and Interpreting Degree student

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

The UNE Master of Public Health Program and Graduate Certificate in Public Health Programs Competencies

The UNE Master of Public Health Program and Graduate Certificate in Public Health Programs Competencies The UNE Master of Public Health Program and Graduate Certificate in Public Health Programs Competencies A. BIOSTATISTICS Biostatistics is the development and application of statistical reasoning and methods

More information

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting

More information

Opinion of the International Juvenile Justice Observatory

Opinion of the International Juvenile Justice Observatory The International Juvenile Justice Observatory promoting international development strategies of appropriate policies, and intervention methods within the context of a global juvenile justice without borders.

More information

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development

More information

The MPH. ability to. areas. program. planning, the following. Competencies: research. 4. Distinguish. among the for selection

The MPH. ability to. areas. program. planning, the following. Competencies: research. 4. Distinguish. among the for selection MPH COMPETENCIES The MPH competencies are based on those approved by the Association of Schools of Public Health (ASPH) in 2006. By graduation, all MPH students must demonstrate the ability to apply public

More information

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

Presidency conclusions on establishing a strategy to combat the manipulation of sport results COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

«One Health»: From a Classical Concept to a Modern Dynamics for Global Co-operation

«One Health»: From a Classical Concept to a Modern Dynamics for Global Co-operation «One Health»: From a Classical Concept to a Modern Dynamics for Global Co-operation Alain VANDERSMISSEN, DVM Coordination Influenza - One Health - Emerging Diseases Directorate General for External Relations

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Council of the European Union Brussels, 24 November 2014 (OR. en)

Council of the European Union Brussels, 24 November 2014 (OR. en) Council of the European Union Brussels, 24 November 2014 (OR. en) 15701/1/14 REV 1 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11153/2/14 REV 2 Subject: JAI 897 DAPIX 175

More information

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit s terms

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

ASPH Education Committee Master s Degree in Public Health Core Competency Development Project

ASPH Education Committee Master s Degree in Public Health Core Competency Development Project ASPH Education Committee Master s Degree in Public Health Core Competency Development Project Version 2.3 Word Format Domains and Competencies Only May 2007 Discipline-specific Competencies A. BIOSTATISTICS

More information

Advancing Disaster Risk Reduction to Enhance Sustainable Development in a Changing World 20 June -1 July 2016, UN Campus, Bonn

Advancing Disaster Risk Reduction to Enhance Sustainable Development in a Changing World 20 June -1 July 2016, UN Campus, Bonn CALL FOR APPLICATIONS Announcement UNITED NATIONS UNIVERSITY Institute for Environment and Human Security Intensive Summer Course 2016 Advancing Disaster Risk Reduction to Enhance Sustainable Development

More information

EUROPEAN EXTERNAL ACTION SERVICE

EUROPEAN EXTERNAL ACTION SERVICE EUROPEAN EXTERNAL ACTION SERVICE Annex 1 European Union Integrated Border Management Assistance Mission in Libya (EUBAM Libya) 1-2016 Call for Contributions Organisation: Job Location: Employment Regime:

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? Petra Saskia Bayerl 1( ) and Babak Akhgar 2 1 Rotterdam School of Management, Erasmus University, Rotterdam, Netherlands

More information

OVERVIEW: HIGHER UNIVERSITY DIPLOMA AND MASTERS DEGREE IN DISASTER MANAGEMENT

OVERVIEW: HIGHER UNIVERSITY DIPLOMA AND MASTERS DEGREE IN DISASTER MANAGEMENT OVERVIEW: HIGHER UNIVERSITY DIPLOMA AND MASTERS DEGREE IN DISASTER MANAGEMENT 1. Introduction The African continent is faced with various environmental, economic ad social challenges. Efforts to overcome

More information

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper Council of the European Union Brussels, 24 November 2014 (OR. en) 15715/14 LIMITE JAI 902 PESC 1201 COSI 117 COPS 308 ENFOPOL 373 COTER 82 SIRIS 79 FRONT 242 NOTE From: To: Subject: EU Counter-Terrorism

More information

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex. Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

2015-2016 ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT

2015-2016 ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT KING GRADUATE SCHOOL MBA in BUSINESS MANAGEMENT MPH in PUBLIC HEALTH MS in CRIMINAL JUSTICE KING GRADUATE SCHOOL MBA in BUSINESS MANAGEMENT The MBA concentrations available to students are: FINANCE INFORMATION

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

TITLE III JUSTICE, FREEDOM AND SECURITY

TITLE III JUSTICE, FREEDOM AND SECURITY TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach

More information

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of

More information

DISASTER MANAGEMENT. Goals To instill an understanding of the disaster management process

DISASTER MANAGEMENT. Goals To instill an understanding of the disaster management process DISASTER MANAGEMENT Goals To instill an understanding of the disaster management process Learning outcomes After completing this session, you will be able to Affirm the usefulness of integrating management

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information