How To Be A Successful Member Of The European Agency For Security And Safety
|
|
- Myles Garrett
- 3 years ago
- Views:
Transcription
1 CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn 19 November 2014
2 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on the cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 2 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
3 Definition of Cyber-Security Security: protection of valuable assets Crime: human action convicted by the criminal law Defense: measures taken to protect against a potential or existing offense Cyber: electronic space Cyber-security: protection of valuable assets in the electronic space 19/11/2014 Slide 3 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
4 Who and Where are we European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice We are located in Tallinn Estonia (Headquarters) Strasbourg France (Operations) SJP Austria (Backup Operations) Liaison Office in Brussels 19/11/2014 Slide 4 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
5 What do we do Operational management of SIS II Schengen Information System VIS visa Information System EURODAC European dactyloscopic system Communications infrastructure 19/11/2014 Slide 5 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
6 Why we do Legal bases Regulations are the foundation of our activities High focus on security, data protection and business continuity aspects of the three large IT systems Security is a legal obligation 19/11/2014 Slide 6 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
7 How and when are we secure eu-lisa makes use of common frameworks to organise security, which is divided in to the following domains: Physical security Information security INFOSEC - CIA triad Organisational security Personnel security Industrial security 19/11/2014 Slide 7 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
8 Role of eu-lisa in the Cybersecurity Broad view, per large scale IT systems nature Actively contribute in the implementation of the cybersecurity strategy at EU level Operational cooperation with MS Security Officers Network - SON 19/11/2014 Slide 8 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
9 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 9 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
10 eu-lisa Strategy Strategic Goals of the Agency 1: Continue to grow as a contributor to and facilitator for freedom, security and justice policies in the EU 2: Become an acknowledged EU ICT centre of excellence and service provider 3: Grow as the principal EU ICT technology centre and expertise hub 4: Develop a modern efficient and agile organisation 19/11/2014 Slide 10 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
11 eu-lisa Strategy Strategic Goal 3: Grow as the principal EU ICT technology centre and expertise hub Continue to grow its internal expertise in relevant technical areas Exchange ICT best practices, experiences and knowledge with identified partners Deepening and strengthening partnerships 19/11/2014 Slide 11 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
12 Research as a driver for success Technology monitoring Desk study and media monitoring Liaison with MS, academic and industry experts Participation in project panels (e.g. security theme of H2020) Attendance at meetings, conferences and courses 19/11/2014 Slide 12 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
13 Operationally implementing outcomes of research Small-scale proofs of concept Possible upcoming projects in the cyber security realm Testing in dedicated environments Roll-out, future-proofing, lessons learned, dissemination to partners PKI systems Identity and Access management in distributed systems Advanced cryptography Automated tools for internal security assurance 19/11/2014 Slide 13 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
14 Strengthening partnerships SON WAs with Europol, EASO, Frontex signed, others planned. The parties may assist each other with know-how, expertise, best practices, lessons learned and advice in technical, operational and IT security related matters 19/11/2014 Slide 14 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
15 A look to the (near) future eu-lisa and beyond System consolidation will be key for reasons of efficiency and future-proofing and protection from cyber threats. Identity management will become more crucial and lessons from eu-lisa may be adapted to scale. Knowledge sharing within the EU and with the private sector will need to be more efficient. Technologies and procedures for incident detection and response will require advancement. eu-lisa will play an increasingly key role in EU internal security, including cybersecurity. 19/11/2014 Slide 15 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
16 19/11/2014 Slide 16 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives
Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011.
OPEN CALL AGENCY S INTERNSHIP Internship No: eu-lisa/14/int/hr/5.1 Unit/Department: Location: Human Resources and Training Unit Tallinn, Estonia Starting date: 16 September 2014 Level of Security Clearance:
More informationeu-lisa Annual Activity Report
eu-lisa Annual Activity Report 2013 Annual Activity Report 2013 February 2014 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationTESTA NG. Testa new generation Pieter.wellens@ec.europa.eu
TESTA NG Testa new generation Pieter.wellens@ec.europa.eu 2 nd International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sept 2013, Athens, Greece Agenda Mission Challenges Experiences
More informationCouncil of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development
Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development
More informationSecurity Audit VIS Central System. Summary Report
Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among
More informationEurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners
Eurojust s Multi-annual Strategic Plan 2012-2014 Operational work Centre of expertise Partners Organisational developments Introduction Eurojust is entering a crucial phase of development as it approaches
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationCouncil of the European Union Brussels, 2 March 2015 (OR. en)
Council of the European Union Brussels, 2 March 2015 (OR. en) 6606/15 LIMITE JAI 114 PESC 213 COSI 28 COPS 55 ENFOPOL 52 COTER 41 SIRIS 13 FRONT 48 COPEN 63 DROIPEN 21 NOTE From: To: Subject: Presidency
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationThe Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.
Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationOUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S
Council of the European Union 13870/15 (OR. en) PROVISIONAL VERSION PRESSE 66 PR CO 58 OUTCOME OF THE COUNCIL MEETING 3422nd Council meeting Justice and Home Affairs Brussels, 9 November 2015 President
More informationNetwork Operations Officer (2 posts) Strasbourg, France
VACANCY NOTICE Ref. : eu-lisa/15/ca/fgiv/7.1 Network Operations Officer Post: Sector/Unit/Department: Function Group/Grade: Location: Starting date: Network Operations Officer (2 posts) Operations and
More informationTRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016
TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically
More informationLegal Aspects of the MonIKA-Project - Privacy meets Cybersecurity
Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:
More information2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?
The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationCyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationAndreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol
Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Europol Unclassified - Basic Protection Level Aspects of Information
More informationCyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationCouncil of the European Union Brussels, 5 June 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development
Council of the European Union Brussels, 5 June (OR. en) 6183/2/15 REV 2 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development POLGEN
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationeulisa.europa.eu ISBN 978-92-95203-92-1 ISSN 2443-8294 doi:10.2857/567010 Catalogue number: EL-AE-15-001-EN-N
Report on the technical functioning of Central SIS II and the Communication Infrastructure, including the security thereof and the bilateral and multilateral exchange of supplementary information between
More information5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationMinister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, 27.3.2013 COM(2013) 172 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationPan European Fire Strategy 2020 A safer Europe for all
Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7
More informationCouncil of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling
Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations
More informationJ O I N T D E C L A R A T I O N
REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting
More informationEurojust. The European Union s Judicial Cooperation Unit
Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES
More informationPUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 8 July 2005 11037/05 LIMITE CRIMORG 67 ENFOPOL 88
Conseil UE COUNCIL OF THE EUROPEAN UNION Brussels, 8 July 2005 PUBLIC 11037/05 LIMITE CRIMORG 67 FOPOL 88 OUTCOME OF PROCEEDINGS of: Article 36 Committee on: 7 and 8 July 2005 No. prev. doc. : 8255/05
More informationCouncil of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper
Council of the European Union Brussels, 24 November 2014 (OR. en) 15715/14 LIMITE JAI 902 PESC 1201 COSI 117 COPS 308 ENFOPOL 373 COTER 82 SIRIS 79 FRONT 242 NOTE From: To: Subject: EU Counter-Terrorism
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, 11.3.2014 COM(2014) 154 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE
More informationBuilding up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
More informationChanges in Schengen visa application process
Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece
EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 678 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Progress Report on the Implementation of the hotspots in Greece
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationThe EU approach to Cybersecurity and Cybercrime
The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security
More informationDelegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.
Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationSecond Cyber Security Summit, November 11, 2013 in Bonn Final communique
Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union
ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationCapacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
More informationJyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
More informationSTW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th
STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE
More informationCouncil of the European Union Brussels, 11 March 2016 (OR. en)
Council of the European Union Brussels, 11 March 2016 (OR. en) 5175/1/16 REV 1 NOTE From: To: Presidency JAI 18 CATS 1 DAPI 4 ASIM 3 JURINFO 1 Working Party on Information Exchange and Data Protecttion
More informationDelegations will find attached the draft statement of the European Council.
European Council Brussels, 22 April 2015 (OR. en) EUCO 20/15 LIMITE CO EUR 6 COVER NOTE From: General Secretariat of the Council To: Delegations Subject: Special meeting of the European Council on 23 April
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationINTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS
INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan
More informationSmarter Borders 2015 Attendee List 18.02.15
Job Title Account Country Customs Counselor New Zealand Embassy to the EU & NATO New Zealand Project Manager International Centre for Migration Policy Development (ICMPD) Austria Head of Aviation, Security
More informationThe importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation
The importance of public-private partnership Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation Cybersecurity, safety and trust 1) Strategic documents: National Cybersecurity Strategy
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationEuropol Work Programme 2015
Europol Work Programme 2015 Table of Contents Executive Summary... 2 List of Abbreviations... 4 1. Introduction... 5 2. Methodology... 5 3. Influencing Factors... 6 4. Work Programme Objectives... 10 Europol
More information12002/15 PO/es 1 DG D 1B
Council of the European Union Brussels, 14 September 2015 (OR. en) 12002/15 JAI 659 ASIM 86 FRONT 187 RELEX 711 NOTE From: To: Subject: Presidency Delegations Conclusions After the discussions on migration
More informationCouncil of the European Union Brussels, 16 January 2015 (OR. en)
Council of the European Union Brussels, 16 January 2015 (OR. en) 5250/15 ENFOPOL 13 NOTE From: Europol To: Delegations Subject: Europol Work Programme 2015 1. Article 37(10) (b) of the Council Decision
More informationThe trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
More informationI. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED
SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the
More informationGovernment data. collection. Are people at risk? European. Monograph SIS II - VIS - EURODAC - ECRIS
Government data collection Are people at risk? European Monograph SIS II - VIS - EURODAC - ECRIS Table of contents 1. Introduction... p. 05 1.1 Directive 95/46/EC... p. 05 1.2 European Data Protection
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationINFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)
Sweden 17 October 2007 INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Discussion paper on the essentials of a European information network in 2014 I. The
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationCouncil of the European Union Brussels, 5 April 2016 (OR. en)
Council of the European Union Brussels, 5 April 2016 (OR. en) 7412/16 LIMITE JAI 241 SIRIS 55 ENFOPOL 83 COTER 31 COMIX 244 NOTE From: To: Subject: Presidency Delegations Observations of the Presidency
More informationPrivacy in the Digital Age of Encryption and Anonymity Online
The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationProposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 671 final 2015/0310 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the European Border and Coast Guard and repealing
More informationCybersecurity Competence Building Trends
Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,
More informationJUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga
BACKGROUND Riga, 27 January, 2015 Informal JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga The Informal Meeting of Ministers for JUSTICE and HOME AFFAIRS (JHA) will be chaired
More informationUSF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationHow To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationVirginia Joint Commission on Technology and Science. Cybersecurity Legislation
Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationThe Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law
School Centre for of something Criminal Justice Studies School of Law FACULTY OF OTHER The Changing Cyberthreat Landscape and the Challenge of Policing Cybercrimes in the EU EVIDENCE-BASED POLICING, 2015
More informationGlobal Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationAalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
More informationEuropean Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute
More informationDRAFT EUROPEAN COUNCIL STATEMENT
DRAFT EUROPEAN COUNCIL STATEMENT 1. The situation in the Mediterranean is a tragedy. The European Union will mobilise all efforts at its disposal to prevent further loss of life at sea and to tackle the
More informationHandbook for participants 2012
Handbook for participants 2012 CEPOL European Police Exchange Programme 2012 (Inspired by Erasmus) Table of Content Table of Content... 2 Introduction...3 About CEPOL...4 About European Police Exchange
More informationCourse Content Summary ITN 267 Legal Topics in Network Security (3 Credits)
Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationNational Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
More information10128/16 LB/dk 1 DGD 1C
Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:
More information1 FOCUS Foresight Security Scenarios
New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military
More informationUSF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More information