EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
|
|
|
- Eugenia Primrose Jones
- 9 years ago
- Views:
Transcription
1 EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU 5, Michele BEZZI 6, Pedro SORIA RODRIGUEZ 7 1,2 Waterford Institute of Technology - TSSG, Carriganore, Cork Rd, Waterford Tel: , [email protected], [email protected] 3 Universita Degli Studi Di Trento, Italy [email protected] 4,5 HP Labs, Bristol, UK [email protected], [email protected] 6 SAP AG, Germany [email protected] 7 ATOS, Spain [email protected] 1. Introduction Abstract: Structured and coordinated clustering increases the effectiveness of R&D project work helping to raise awareness, align approaches and create synergies. The project EFFECTS+ coordinates such clustering and trust and security research project potential impact analysis activities. This provides the wider community with an interest in the trust and security research space the opportunity to participate, contribute to and gain an overall view of current state of the art and active research projects ongoing within the Europe in this domain. This paper will provide you with an overview of the activities completed by EFFECTS+ to date, highlighting the clustering structure and the research project impact analysis completed so far. EFFECTS+ also focuses on the development of a trust and security strategic research agenda for future work. This paper will address the process and structure adopted by EFFECTS+ for the identification and consolidation of such future roadmapping content. Dissemination, networking and striving to create synergies and collaborations is a key element for any current research project. EFFECTS+ [1] an FP7 funded coordination and support action operates with this main objective in mind by working to support clustering amongst FP7 ICT trust and security projects, highlighting research achievements coming from such ongoing innovative research, landscaping their results and identifying future research roadmap for this trust and security domain. Project clustering provides passive awareness of parallel activities, enabling active collaboration and cross-stimulation at the programme, project and personal levels as well as providing for improved dissemination of research results in this field, and input into the agenda and roadmaps for future research. There is a growing community of researchers and developers involved in addressing what needs to happen to the Internet and its dependants with respect to the wide range of R&D challenges concerning Trustworthy ICT, including security, trust, privacy, dependability. Questions arise about the resultant trustworthiness of the system as a whole: in particular, how do we ensure and validate that when the basic technical challenges are met and
2 products and services become available, that the various elements work together as expected; that they conform to specification; and that they comply at the design and operational stages with the architectural and regulatory standards and requirements. Framework Programme (FP) projects are seeking solutions to many of the identified concerns. EFFECTS+ helps to provide an overview of the current research ongoing in this area, highlighting the main topics being addressed currently, the potential impact of such results and future research roadmap in this domain. This paper will address the following main topics, expanding on the clustering, analysis and roadmapping activities completed within the EFFECTS+ project, highlighting various recommendations coming from each activity: It provides an overview of the EFFECTS+ clustering activities, highlighting the methodology used to identify the specific clusters. Discussing the individual cluster groups, and the main topics prioritised in such clusters. It summarises and details the main topical achievements of security, trust and identity projects from EU FP Call 1 and Call 5. It provides a summary of recommendations from the EFFECTS+ analysis of trust and security research projects in the current Framework Programme. It identifies the main research gaps, issues and topics identified in the EFFECTS+ trust and security research roadmap. 1. Trust and Security Research Project Clustering Supporting project collaboration via content-related technically focused clustering works to enhance interoperability and leverage synergies between projects. Benefits for involvement in clustering activities vary and include: 1. Promotion of achievements of current trust and security projects amongst the clusters; 2. Improved networking amongst experienced researchers in this domain; 3. Positioning that allows monitoring of research projects within the Future Internet Assembly working to articulate their inputs. 4. Limiting the duplication of work at European and national level via dissemination of ongoing research to a wider audience. 1.1 Landscape of FP7 project results - Methodology A suitable structure and methodology to identify such relevant cluster themes completed by EFFECTS+ [2] and involved ethnographic studies of current projects with the outcome being a first proposal for a cluster structure, with further refinement of this structure following an initial feedback session and meeting with the project representatives. Two main dimensions for FP7 project classification were identified to support the methodology and process, these included Abstraction level of the target research for example a distinction between IP networks and web services. Table 1 highlights the various abstraction levels considered. This level represents an appropriate clustering dimension, and most projects can position themselves in one or two classes. Result Type (Provisioning v s Assessment distinction) was the second dimension taken into account. This dimension looks towards the expected outcome of the project for example results of a provisioning project could be a new security service (e.g. new authentication method) or the results of an assessment project could be a tool that establishes the security level of a service e.g. verification mechanism for authentication, as per table 2.
3 Table 1. Abstraction Levels. Table 2. Security Provisioning vs. Security assessment. Supporting the cluster identification methodology a supporting process was also adopted and implemented this included, obtaining abstracts of projects from CORDIS and the completion of a preliminary analysis of the activities based on this source of information as well as referencing the individual project websites and publicly available deliverables. Completing interviews with project coordinators and technical and scientific directors. Then in turn interviewees reviewed the result of the interview and provided feedback. 1.2 Trust and Security Cluster Setup Coming from the initial landscape and ethnographic analysis phase, three trust and security clustering groups were set up (see Figure 1): Systems and networks (technical cluster) covering topics like Assurance, Policy, Trust, secure service composition, semantics/ontology, security metrics, privacy. Services and cloud (technical cluster) covering topics like Privacy in SIEM, attack models, trusted computing, security by design (H/W), critical infrastructures. Networking and coordination (non-technical cluster) covering topics like identify synergies, scoping activities together, calendar coordination/alignments, outreach to other units/initiatives. These clustering groups have been active, with dedicated cluster events, workshops and a specific Cyber security and privacy EU Forum 2012 conference (April 2012) [3]. Future clustering activities can be viewed at the EFFECTS+ website [1]. Figure 1. EFFECTS+ clustering structure.
4 2. Innovation Potential of FP7 Security and Trust Projects A comprehensive study on the innovation potential of FP7 T&S projects funded by ICT Call1 for trustworthy ICT and the joint ICT and security call was completed within EFFECTS+ [4]. Such a study was based on documental evidence (deliverables, publishable reports, etc.) and an ethnographic research (interviews and feedback from project coordinators). The security market represents a rapidly growing sector. The Impact of the current T&S research projects needs to be highlighted with the question being posed Do security and trust FP7 projects have some key results that could contribute to this market demand? The analysis of the industrial landscape showed a connected community (a scale-free network) with few major players, but without a clear market dominance: few general software producers and integrators act as bridges and hubs between different interests groups (such as privacy and critical infrastructure protection); specialized IT security companies are emerging as actors involved in two or more projects, but are still at SME stage. The cross-call analysis shows that the field is very dynamic as the priorities of the call can significantly change the type of partners and their collaborative relations. The study of the innovation potential identified many research results which can stimulate product, service and process innovation in Europe. In synthesis: some projects have produced research results that are directly usable by citizens (for example in the realms of biometrics and privacy); most projects have delivered significant innovations in tools and methods for ICT specialists (from consultants on IT governance to IT administrators) that are widely usable beyond the project s consortium. Such contribution is mostly in the area of command, control and compliance (of networks and IT systems). An interesting contribution by some research projects is represent by an improved community knowledge of the security echo-system. This knowledge can be used by decision makers to shape their agenda. The Security and Trust projects also contributed to the achievement of the objectives of the Digital Agenda, in particular on those focusing on instruments for self-regulation and for improving privacy and security of infrastructures and services. The analysis also showed that two major issues are only addressed partially and indirectly by the projects of Call 1, Call5 and the joint Security and ICT Security Call:: cyber-security and -preparedness to counter cyber-crime and cyber- attacks children protection on the internet Initiatives such as Joint Calls might be an option to pursue in these sectors. The analysis also identified gaps in the last mile to a product that could be addressed by a mixture of organizational, funding, and regulatory measures such as set-up of structured relations with product groups or users from the project s start, specific funding measures by the EC for experimenting in large scale trials with a simplified funding procedure, European regulatory initiatives on the controlled disclosure of security incidents. The adoption of these measures might ensure that ICT progress is rapidly transformed into products for the benefits for Europe's citizens, businesses, industry and governments.
5 3. Trust and Security Research Roadmap EFFECTS+ has worked with the Trust and Security research community to develop a research roadmap with the intention of identifying key topics and approaches that require further research in the timeframe of Framework 8, i.e. for research in the timeframe with potential for impact in the mid-long term. 3.1 Research Roadmap Structure and Process Key questions were asked to leading experts in this field and to the participants of the T&S clustering groups as an initial source of information and contribution to such a research roadmap. Such questions were as follows: What are significant changes between now and that impact this topic area? What are the drivers of this change? What is your vision for in this topic/area? How will we make a difference? What are the hard challenges, big gaps, what will be difficult, what are the significant barriers to achieving this vision? What radical approaches, disruptive technologies, new ideas might be solutions to these challenges? The output 1 st draft report titled "Trust and Security in the Future Internet: Setting the Context identified challenges and potential solutions, societal shifts and changes of relevance, and a vision for the future of the trust and security field. Various challenges that were perceived as having an impact on the field were grouped under the following rubrics (see Figure 2): Changes in the way end users (citizens) perceive the role of the Internet in their lives and use it on a day-to-day basis, Changes in the way business is conducted, and how different sectors are being affected by developments in technology, and Changes in the broader socio-economic landscape. Figure 2. Research challenges identified for three target groups. 4. Potential Solutions for Trust and Security in the Future Internet Following the identification of challenges (figure 2), this section will highlight some of the approaches that may be considered in order to tackle such future internet issues and challenges.
6 3.1 Solutions for Users of the Future Internet End users strive to gain more control over their active digital lives. The digital wave has brought more devices and applications and the need to customize and have control over your digital experience, is an increasing requirement from end users. To help address this issue potential solutions could include Development of universally acceptable digital identifiers Education of Citizens ( raise awareness of security and privacy risks) 3.2 Solutions for the Enterprise Many tools and techniques could potentially be used more effectively, enabling businesses to be more success in their future ventures. Examples of such solutions to challenges addressed in figure 2 could be for example Better Languages and Tools for specifying secure software Improve assurance methods Privacy-aware software development Development of rich and expressive security models Development of tools for tracking data 3.3 A Vision for Society and the Wider Economy More international collaboration is required to address the main challenges that exist. Such collaboration is essential when dealing with security related matters, as much cybercrime transcends national barriers. Cooperation on issues of national security Enhancement of legislation to accommodate technological development Research and investment in security tools and technology Consideration of novel, radical approaches. 5. Conclusions EFFECTS+ continues with its clustering, analysis and roadmapping activities, maturing the content and outputs coming from the projects objectives over time. Clustering remains a core objective and activity of the EFFECTS+ project, with an endless quest to work to increase collaboration and dissemination of project results and strive to create synergies amongst projects, experts, industry and policy makers in the trust and security domain, maximising the impact of the research activities active within this space. From the initial landscape and project innovation potential analysis a number of recommendations have been drawn up, in an attempt to highlight recommendations that can be used to strive to improve the impact coming from active research projects. Such recommendations [4] include the following: Recommendation 1. Projects should report in more effective and consistent way the methodology and actual dimension of pilots and trials with end users or product groups. Recommendation 2. use and promote the existing instrument of pre-commercial procurement to create long term pilots supported by public administrations. Recommendation 3. Push projects to establish a structured and visible relations with products group of the companies within the consortium from the very start. Results of product groups trials should then be reported appropriately in the same way user trials (if any) are reported. Obviously, some results of the pilots would not be public for IPR
7 reasons, but lessons learned should be visible. It is of course difficult for a product group to buy in advance a story line such as "we have this great, vague, idea that in a couple of years will be prototyped!" typically the real discussion starts when you have something to show..." The objective of an early and progressive engagement is to understand the actual needs which might later lead to a prototype that actually addresses some those need. Recommendation 4. A European-wide regulatory initiative is necessary to mandate the controlled disclosure of security incidents in the same fashion of what happens for safety in avionics. EFFECTS+ trust and security roadmapping activity is still currently ongoing and is working to mature and expand on the current input already in existence, going into further details on the challenges and potential solutions for the three main identified focus groups (i.e. end users, enterprise, society and the wider economy). This T&S research roadmap will also feed into the future internet Assembly Research Roadmap for the Future internet[5]. This is an important activity, to help promote the importance and need for research in this domain to continue, now more than ever in this digital era. References EFFECTS+ Deliverable D2.1: Results and Impacts of FP7 projects EFFECTS+ Deliverable D2.2: The innovation potential of FP7 security and trust projects (Draft Version 1)
Procurement Innovation for Cloud Services in Europe - PICSE
Procurement Innovation for Cloud Services in Europe - PICSE Sara Garavelli, Trust-IT Services [email protected] ICT Proposer s Day, 9 October 2014, Florence, Italy 1 The road to PICSE Cloud
HTA NETWORK MULTIANNUAL WORK PROGRAMME 2016-2020
EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HEALTH AND FOOD SAFETY Healthcare systems, medical products and innovation Medical products: quality, safety, innovation Brussels, 20 May 2016 HTA NETWORK MULTIANNUAL
Text Analytics and Big Data
Text Analytics and Big Data META-FORUM 2012 Brussels, 20 th June 2012 Atos Research & Innovation 1 Table of Contents 1. Atos and why we are here 2. Examples 3. BIG: Big Data Public Private Forum 2 2 Atos:
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud [email protected]
The Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
EUROTECH UNIVERSITIES ALLIANCE CONTRIBUTION TO THE PUBLIC CONSULTATION SCIENCE 2.0-SCIENCE IN TRANSITION
EUROTECH UNIVERSITIES ALLIANCE CONTRIBUTION TO THE PUBLIC CONSULTATION SCIENCE 2.0-SCIENCE IN TRANSITION A: INTRODUCTION TO THE ALLIANCE S CONTRIBUTION The EuroTech Universities Alliance is a strategic
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
Smart grid cyber security certification
Smart grid cyber security certification 1 Introduction On 30th September 2014 ENISA organised a workshop where the results of the report on Smart grid security certification (to be published by end of
Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation
Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation Contents List of Abbreviations 3 Executive Summary 4 Introduction 5 Aims of the Strategy 8 Objectives
<Business Case Name> <Responsible Entity> <Date>
(The entity Chief Information Officer, Chief Financial Officer and Business Area programme Lead must sign-off the completed business case) Signed: Date:
ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services ICT 9: Tools and Methods for Software Development Dan-Mihai
Frequently Asked Questions regarding European Innovation Partnerships
May 2012 Frequently Asked Questions regarding European Innovation Partnerships 6 December 2010 FAQs 1. What are the objectives behind European innovation partnerships? 2. What concrete benefits can be
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
A European Policy on Open Access and its implementation in Horizon 2020
A European Policy on Open Access and its implementation in Horizon 2020 José C. Cotta Head of Unit 'Digital Science' Directorate-General for Communications Networks, Content & Technology (DG CONNECT) 1
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Innovation policy Technology for innovation; ICT industries and E-business Brussels, 7 th December 2005 DG ENTR/D4 M 376 - EN STANDARDISATION
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of
Background paper to the Lund Declaration 2015
Background paper to the Lund Declaration 2015 content Lund Declaration 2009...1 State of play and progress since 2009...1 A robust challenge-based approach for real solutions...2 Alignment...3 Frontier
CYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
Approaches to tackle the research-business gap Technology audit principles. Practical support mechanisms
Dragomir Mihai Minsk, 27-28 th May 2015 [email protected] Approaches to tackle the research-business gap Technology audit principles. Practical support mechanisms 1 Did you know? According
NIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
ESCoRTS A European network for the Security of Control & Real Time Systems
ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in
Horizon 2020 - ICT Call 2016 Topic Preview 5 th May 2015
Horizon 2020 - ICT Call 206 Topic Preview 5 th May 205 Call Identifier: H2020-ICT-206 Call Publication: late Q3 205 Call Deadline: Q-2 206 (except for the instrument) Estimated budget for this call: 970
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Future and Emerging Technologies (FET) in H2020. Ales Fiala Future and Emerging Technologies DG CONNECT European Commission
Future and Emerging Technologies (FET) in H2020 51214 Ales Fiala Future and Emerging Technologies DG CONNECT European Commission H2020, three pillars Societal challenges Excellent science FET Industrial
EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION
EUROPEAN COMMISSION DIRECTORATE GENERAL FOR RESEARCH & INNOVATION Brussels, 24 January 2013 CALL FOR EXPRESSIONS OF INTEREST FOR THE SELECTION OF EXPERTS FOR THE HORIZON 2020 ADVISORY GROUPS 1. Background
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
H2020-LEIT-ICT WP2016-17. Big Data PPP
H2020-LEIT-ICT WP2016-17 Big Data PPP H2020-LEIT-ICT-2016 ICT 14 Big Data PPP: cross-sectorial and cross-lingual data integration and experimentation (IA) - Budget 27 M ICT 15 Big Data PPP: large scale
Agenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability
IHE epsos Connectahon Pisa, 12 April 2011 The European Commission s s vision for ehealth interoperability Benoit Abeloos Research Program Officer, Interoperability - Standardization European Commission
CONNECTing to the Future
CONNECTing to the Future IoT Week Venice, 18 June 2012 Bernard Barani European Commission - DG INFSO Deputy Head of Unit, Networked Enterprise and RFID "The views expressed in this presentation are those
Grant Agreement N 215483. Updated Project Web Portal. Eric Schmieders (UniDue) Deliverable #PO-SoE-1.2.9. Version: 1.0.
Grant Agreement N 215483 Title: Authors: Editor: Reviewers: Identifier: Type: Updated Project Web Portal UniDue Eric Schmieders (UniDue) Neil Maiden (CITY) Deliverable #PO-SoE-1.2.9 Deliverable Version:
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
Strategic approach and programme design: the case of Denmark
This series of informative fiches aim to present, in summary, examples of practices and approaches that EU Member States and Regions have put in place in order to implement their rural development programmes
Public Sector Chief Information Officer Council
Report to Public Sector Chief Information Officer Council White Paper on a Pan Canadian Opportunities for Collaboration Project Goal Two Report: Outline and Approach Draft v1.0 Submitted by: Stuart Culbertson
Strengthening the Research Effort means Strengthening the Role of Universities
EUA Response to the EC Communication: Science and technology, the key to Europe s future Guidelines for future European Union policy to support research. I. The policy context 1. The 7 th Framework Programme
The internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
Call for Expression of Interest Consultant
Assessing the way forward for Eco-Industrial Parks The United Nations Environment Programme (UNEP) is looking for a consultant to carry out an analytical baseline study of past and existing technical approaches
COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34
D01.1 Project Management Plan
D01.1 Project Management Plan Document identification Related SP / WP SP0 / WP01 Reference SCR-WP01-D-THA-008 Related Deliverable D01.2 Dissemination Level CO Lead Participant THALES Lead Author Bruno
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION
National Standardization Strategic Framework OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE A PLATFORM FOR INNOVATION CREATE COMPETITIVE ADVANTAGE Foreword Standards influence everything we do.
Network Security Innovation Platform
Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation
Strategy 2012 2015. Providing resources for staff and students in higher and further education in the UK and beyond
Providing resources for staff and students in higher and further education in the UK and beyond Strategy 2012 2015 EDINA is a JISC National Datacentre Table of Contents Introduction... 1 Vision... 1 Mission
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document. Proposal for a COUNCIL REGULATION
EUROPEAN COMMISSION Brussels, 10.7.2013 SWD(2013) 258 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a COUNCIL REGULATION on the
CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
Future Internet Public-Private Partnership Call 3 (Objectives 1.8-1.9) European Commission Communications Networks, Content and Technology DG
Future Internet Public-Private Partnership Call 3 (Objectives 1.8-1.9) European Commission Communications Networks, Content and Technology DG FI-PPP Leadership beyond R&D ICT applications research Application
Cyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th
STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE
The Australian Public Service Big Data Strategy
The Australian Public Service Big Data Strategy Improved understanding through enhanced data-analytics capability AIIA response March 2014 Contact for this submission: Suzanne Roche 39 Torrens St Braddon
REGIONAL DIMENSION OF THE 7th FRAMEWORK PROGRAMME. The new Call and Work Programme. Regions of Knowledge 2012-13-1
1 REGIONAL DIMENSION OF THE 7th FRAMEWORK PROGRAMME The new Call and Work Programme Regions of Knowledge 2012-13-1 Dr. Salvatore La Rosa Policy and Project officer European Commission Directorate General
EIT: a new approach to innovation in European innovation or created by us to be solved by us
EIT: a new approach to innovation in European innovation or created by us to be solved by us Prof. Anders Flodström EIT Vice-Chairman WIPO EIT-Investing in the Grand Opportunities Geneva, July 11 and 12.
Digital Entrepreneurship Monitor. EC, Dana Eleftheriadou EY, Alessandro Cenderello Brussels, 26 September 2014
Digital Entrepreneurship Monitor EC, Dana Eleftheriadou EY, Alessandro Cenderello Brussels, 26 September 2014 Digital Entrepreneurship Monitor Agenda 1. Overview of national policy initiatives and business
Research Infrastructures in Horizon 2020
Research Infrastructures in Horizon 2020 Philippe Froissard Deputy Head of Unit - Research Infrastructures European Commission DG Research & Innovation Research Infrastructures Research infrastructures
Standards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
Horizon 2020 Secure Societies
Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):
Horizon 2020 Secure Societies
Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development Wm. Arthur Conklin University of Houston, College of Technology 312 Technology Bldg, Houston, TX
Grahame Mansell-Grace Business Development Manager
Grahame Mansell-Grace Business Development Manager Technology Solutions for Transport Priorities in the East Midlands De Montfort University, Leicester 14 December 2012 What am I going to talk about? Benefits
Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group
SAP Services Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group A Journey Toward Optimum Results The Three Layers of HR Transformation
CYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES
ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES Introduction The purpose of this paper is to give an overview of the conclusions and recommendations of the European Agency for
Michele Genovese DG Research and Innovation Specific International Cooperation Activities
Michele Genovese DG Research and Innovation Specific International Cooperation Activities 1 2 1. Innovation in a changing, challenging world New Priorities 3 Recent changes in the global economic system
EXPO MILANO 2015. Paolo Alli Deputy Commissioner General
EXPO MILANO 2015 Paolo Alli Deputy Commissioner General What s a World Expo? An event involving Governments of the countries around the world, International Organizations, Civil Society and private sector
Progress The EU programme for employment and social solidarity 2007-2013
Progress The EU programme for employment and social solidarity 2007-2013 Ensuring the Community can play its part to support Member States commitments to create more and better jobs and offer equal opportunities
JA to support the ehealth Network
JA to support the ehealth Network ehealth Network & ehgi Directive 2011/24/EU of the European Parliament and of the Council on the application of patients` rights in cross-border healtcare 08.05.2015 2
SESAR Studies & Demonstration Projects on RPAS & Cyber-Security
SESAR Studies & Demonstration Projects on RPAS & Cyber-Security Brussels, May 20 th 2014 2 Page 2 Rationale RPAS will generate the emergence of a new service sector RPAS limited by flight authorisations
Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
ehealth, mhealth and Big Data
HEALTH IT FORUM MEDICA November 12, 2014 ehealth, mhealth and Big Data Jaakko Aarnio, Dr Tech Research Programme and Policy Officer Health and Well-Being Unit (H1) DG CONNECT, European Commission Outline
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
