How To Be A Successful Member Of The European Agency For Security And Safety

Size: px
Start display at page:

Download "How To Be A Successful Member Of The European Agency For Security And Safety"

Transcription

1 CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn 19 November 2014

2 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on the cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 2 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

3 Definition of Cyber-Security Security: protection of valuable assets Crime: human action convicted by the criminal law Defense: measures taken to protect against a potential or existing offense Cyber: electronic space Cyber-security: protection of valuable assets in the electronic space 19/11/2014 Slide 3 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

4 Who and Where are we European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice We are located in Tallinn Estonia (Headquarters) Strasbourg France (Operations) SJP Austria (Backup Operations) Liaison Office in Brussels 19/11/2014 Slide 4 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

5 What do we do Operational management of SIS II Schengen Information System VIS visa Information System EURODAC European dactyloscopic system Communications infrastructure 19/11/2014 Slide 5 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

6 Why we do Legal bases Regulations are the foundation of our activities High focus on security, data protection and business continuity aspects of the three large IT systems Security is a legal obligation 19/11/2014 Slide 6 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

7 How and when are we secure eu-lisa makes use of common frameworks to organise security, which is divided in to the following domains: Physical security Information security INFOSEC - CIA triad Organisational security Personnel security Industrial security 19/11/2014 Slide 7 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

8 Role of eu-lisa in the Cybersecurity Broad view, per large scale IT systems nature Actively contribute in the implementation of the cybersecurity strategy at EU level Operational cooperation with MS Security Officers Network - SON 19/11/2014 Slide 8 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

9 Agenda Definition of cybersecurity Who are we What do we do Why we do How and when we are secure eu-lisa s role on cybersecurity eu-lisa in the European cybersecurity context Ambition Research Cooperation Thoughts for the future 19/11/2014 Slide 9 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

10 eu-lisa Strategy Strategic Goals of the Agency 1: Continue to grow as a contributor to and facilitator for freedom, security and justice policies in the EU 2: Become an acknowledged EU ICT centre of excellence and service provider 3: Grow as the principal EU ICT technology centre and expertise hub 4: Develop a modern efficient and agile organisation 19/11/2014 Slide 10 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

11 eu-lisa Strategy Strategic Goal 3: Grow as the principal EU ICT technology centre and expertise hub Continue to grow its internal expertise in relevant technical areas Exchange ICT best practices, experiences and knowledge with identified partners Deepening and strengthening partnerships 19/11/2014 Slide 11 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

12 Research as a driver for success Technology monitoring Desk study and media monitoring Liaison with MS, academic and industry experts Participation in project panels (e.g. security theme of H2020) Attendance at meetings, conferences and courses 19/11/2014 Slide 12 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

13 Operationally implementing outcomes of research Small-scale proofs of concept Possible upcoming projects in the cyber security realm Testing in dedicated environments Roll-out, future-proofing, lessons learned, dissemination to partners PKI systems Identity and Access management in distributed systems Advanced cryptography Automated tools for internal security assurance 19/11/2014 Slide 13 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

14 Strengthening partnerships SON WAs with Europol, EASO, Frontex signed, others planned. The parties may assist each other with know-how, expertise, best practices, lessons learned and advice in technical, operational and IT security related matters 19/11/2014 Slide 14 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

15 A look to the (near) future eu-lisa and beyond System consolidation will be key for reasons of efficiency and future-proofing and protection from cyber threats. Identity management will become more crucial and lessons from eu-lisa may be adapted to scale. Knowledge sharing within the EU and with the private sector will need to be more efficient. Technologies and procedures for incident detection and response will require advancement. eu-lisa will play an increasingly key role in EU internal security, including cybersecurity. 19/11/2014 Slide 15 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

16 19/11/2014 Slide 16 of 16 Role of eu-lisa on the Cybersecurity: Present and Future Perspectives

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011.

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011. OPEN CALL AGENCY S INTERNSHIP Internship No: eu-lisa/14/int/hr/5.1 Unit/Department: Location: Human Resources and Training Unit Tallinn, Estonia Starting date: 16 September 2014 Level of Security Clearance:

More information

eu-lisa Annual Activity Report

eu-lisa Annual Activity Report eu-lisa Annual Activity Report 2013 Annual Activity Report 2013 February 2014 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

TESTA NG. Testa new generation Pieter.wellens@ec.europa.eu

TESTA NG. Testa new generation Pieter.wellens@ec.europa.eu TESTA NG Testa new generation Pieter.wellens@ec.europa.eu 2 nd International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sept 2013, Athens, Greece Agenda Mission Challenges Experiences

More information

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development

More information

Security Audit VIS Central System. Summary Report

Security Audit VIS Central System. Summary Report Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

More information

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners Eurojust s Multi-annual Strategic Plan 2012-2014 Operational work Centre of expertise Partners Organisational developments Introduction Eurojust is entering a crucial phase of development as it approaches

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

Council of the European Union Brussels, 2 March 2015 (OR. en)

Council of the European Union Brussels, 2 March 2015 (OR. en) Council of the European Union Brussels, 2 March 2015 (OR. en) 6606/15 LIMITE JAI 114 PESC 213 COSI 28 COPS 55 ENFOPOL 52 COTER 41 SIRIS 13 FRONT 48 COPEN 63 DROIPEN 21 NOTE From: To: Subject: Presidency

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex. Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

OUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S

OUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S Council of the European Union 13870/15 (OR. en) PROVISIONAL VERSION PRESSE 66 PR CO 58 OUTCOME OF THE COUNCIL MEETING 3422nd Council meeting Justice and Home Affairs Brussels, 9 November 2015 President

More information

Network Operations Officer (2 posts) Strasbourg, France

Network Operations Officer (2 posts) Strasbourg, France VACANCY NOTICE Ref. : eu-lisa/15/ca/fgiv/7.1 Network Operations Officer Post: Sector/Unit/Department: Function Group/Grade: Location: Starting date: Network Operations Officer (2 posts) Operations and

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol

Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Europol Unclassified - Basic Protection Level Aspects of Information

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

Council of the European Union Brussels, 5 June 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 5 June 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 5 June (OR. en) 6183/2/15 REV 2 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development POLGEN

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

eulisa.europa.eu ISBN 978-92-95203-92-1 ISSN 2443-8294 doi:10.2857/567010 Catalogue number: EL-AE-15-001-EN-N

eulisa.europa.eu ISBN 978-92-95203-92-1 ISSN 2443-8294 doi:10.2857/567010 Catalogue number: EL-AE-15-001-EN-N Report on the technical functioning of Central SIS II and the Communication Infrastructure, including the security thereof and the bilateral and multilateral exchange of supplementary information between

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 27.3.2013 COM(2013) 172 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Pan European Fire Strategy 2020 A safer Europe for all

Pan European Fire Strategy 2020 A safer Europe for all Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7

More information

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations

More information

J O I N T D E C L A R A T I O N

J O I N T D E C L A R A T I O N REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting

More information

Eurojust. The European Union s Judicial Cooperation Unit

Eurojust. The European Union s Judicial Cooperation Unit Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES

More information

PUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 8 July 2005 11037/05 LIMITE CRIMORG 67 ENFOPOL 88

PUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 8 July 2005 11037/05 LIMITE CRIMORG 67 ENFOPOL 88 Conseil UE COUNCIL OF THE EUROPEAN UNION Brussels, 8 July 2005 PUBLIC 11037/05 LIMITE CRIMORG 67 FOPOL 88 OUTCOME OF PROCEEDINGS of: Article 36 Committee on: 7 and 8 July 2005 No. prev. doc. : 8255/05

More information

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper Council of the European Union Brussels, 24 November 2014 (OR. en) 15715/14 LIMITE JAI 902 PESC 1201 COSI 117 COPS 308 ENFOPOL 373 COTER 82 SIRIS 79 FRONT 242 NOTE From: To: Subject: EU Counter-Terrorism

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 11.3.2014 COM(2014) 154 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 678 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Progress Report on the Implementation of the hotspots in Greece

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

The EU approach to Cybersecurity and Cybercrime

The EU approach to Cybersecurity and Cybercrime The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th STW Open Technology Programme and H2020 Future & Emerging Technology GRANTS WEEK 2015 October 9 th 9/12/2010 INDIVIDUAL FUNDING OPPORTUNITIES IN EUROPE 1 SUPPORT FOR RESEARCH FUNDING ACQUISITION AT THE

More information

Council of the European Union Brussels, 11 March 2016 (OR. en)

Council of the European Union Brussels, 11 March 2016 (OR. en) Council of the European Union Brussels, 11 March 2016 (OR. en) 5175/1/16 REV 1 NOTE From: To: Presidency JAI 18 CATS 1 DAPI 4 ASIM 3 JURINFO 1 Working Party on Information Exchange and Data Protecttion

More information

Delegations will find attached the draft statement of the European Council.

Delegations will find attached the draft statement of the European Council. European Council Brussels, 22 April 2015 (OR. en) EUCO 20/15 LIMITE CO EUR 6 COVER NOTE From: General Secretariat of the Council To: Delegations Subject: Special meeting of the European Council on 23 April

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan

More information

Smarter Borders 2015 Attendee List 18.02.15

Smarter Borders 2015 Attendee List 18.02.15 Job Title Account Country Customs Counselor New Zealand Embassy to the EU & NATO New Zealand Project Manager International Centre for Migration Policy Development (ICMPD) Austria Head of Aviation, Security

More information

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation

The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation The importance of public-private partnership Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation Cybersecurity, safety and trust 1) Strategic documents: National Cybersecurity Strategy

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Europol Work Programme 2015

Europol Work Programme 2015 Europol Work Programme 2015 Table of Contents Executive Summary... 2 List of Abbreviations... 4 1. Introduction... 5 2. Methodology... 5 3. Influencing Factors... 6 4. Work Programme Objectives... 10 Europol

More information

12002/15 PO/es 1 DG D 1B

12002/15 PO/es 1 DG D 1B Council of the European Union Brussels, 14 September 2015 (OR. en) 12002/15 JAI 659 ASIM 86 FRONT 187 RELEX 711 NOTE From: To: Subject: Presidency Delegations Conclusions After the discussions on migration

More information

Council of the European Union Brussels, 16 January 2015 (OR. en)

Council of the European Union Brussels, 16 January 2015 (OR. en) Council of the European Union Brussels, 16 January 2015 (OR. en) 5250/15 ENFOPOL 13 NOTE From: Europol To: Delegations Subject: Europol Work Programme 2015 1. Article 37(10) (b) of the Council Decision

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the

More information

Government data. collection. Are people at risk? European. Monograph SIS II - VIS - EURODAC - ECRIS

Government data. collection. Are people at risk? European. Monograph SIS II - VIS - EURODAC - ECRIS Government data collection Are people at risk? European Monograph SIS II - VIS - EURODAC - ECRIS Table of contents 1. Introduction... p. 05 1.1 Directive 95/46/EC... p. 05 1.2 European Data Protection

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Sweden 17 October 2007 INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Discussion paper on the essentials of a European information network in 2014 I. The

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Council of the European Union Brussels, 5 April 2016 (OR. en)

Council of the European Union Brussels, 5 April 2016 (OR. en) Council of the European Union Brussels, 5 April 2016 (OR. en) 7412/16 LIMITE JAI 241 SIRIS 55 ENFOPOL 83 COTER 31 COMIX 244 NOTE From: To: Subject: Presidency Delegations Observations of the Presidency

More information

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 671 final 2015/0310 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the European Border and Coast Guard and repealing

More information

Cybersecurity Competence Building Trends

Cybersecurity Competence Building Trends Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,

More information

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga BACKGROUND Riga, 27 January, 2015 Informal JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga The Informal Meeting of Ministers for JUSTICE and HOME AFFAIRS (JHA) will be chaired

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law School Centre for of something Criminal Justice Studies School of Law FACULTY OF OTHER The Changing Cyberthreat Landscape and the Challenge of Policing Cybercrimes in the EU EVIDENCE-BASED POLICING, 2015

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014 Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

DRAFT EUROPEAN COUNCIL STATEMENT

DRAFT EUROPEAN COUNCIL STATEMENT DRAFT EUROPEAN COUNCIL STATEMENT 1. The situation in the Mediterranean is a tragedy. The European Union will mobilise all efforts at its disposal to prevent further loss of life at sea and to tackle the

More information

Handbook for participants 2012

Handbook for participants 2012 Handbook for participants 2012 CEPOL European Police Exchange Programme 2012 (Inspired by Erasmus) Table of Content Table of Content... 2 Introduction...3 About CEPOL...4 About European Police Exchange

More information

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

1 FOCUS Foresight Security Scenarios

1 FOCUS Foresight Security Scenarios New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military

More information

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/ SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information