CYSPA launch event - Turkey

Size: px
Start display at page:

Download "CYSPA launch event - Turkey"

Transcription

1 CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination

2 CYSPA launch events 6 June UK: London 9 June 2014 IT: Rome 30 June 2014 NL: The Hague 23 September 2014 GE: Berlin 4 December FR: Paris

3 The cybersecurity landscape presents many challenges Fast paced nature of cyberspace every organisation should focus on cybersecurity in order to protect their assets. CYSPA is a significant milestone to support the implementation of the EU cybersecurity strategy. TECH TRENDS STATS MAJOR EVENTS COSTS Internet of things Over 63% of Europeans use the internet, with a growth rate of 393% from Heartbleed bug creates confusion on internet In 2012, only 26% of EU enterprises had formally defined an ICT security policy Mobile technologies 1,807m mobiles sold in 2013 ebay makes users change their passwords after hack 38% EU internet users concerned about online payment safety were less likely to buy goods online or use online banking as a result Cloud-based platforms 422m Europeans have a 3G or 4G mobile connection NatWest online services hit by cyber attack Victims of cyber crime lose an estimated 290bn every year globally BYOD Over 195.4m tablets sold in 2013 Global Internet slows after biggest attack in history Estimated annual cost of cyber crime in the UK alone is 27bn The costs incurred by the private sector and the government to protect themselves are high: Gartner4 quantifies them at $55 billion in 2011, $60 billion in 2012 and an expected $86 billion in 2016

4 The cybersecurity landscape presents many challenges Fast paced nature of cyberspace every organisation should focus on cybersecurity in order to protect their assets. CYSPA isa significant milestone to support the implementation of the EU cybersecurity strategy. TECH TRENDS STATS MAJOR EVENTS COSTS Internet of things Over 63% of Europeans use the internet, with a growth rate of 393% from Heartbleed bug creates confusion on internet In 2012, only 26% of EU enterprises had formally defined an ICT security policy 38% EU internet users Mobile ebay makes users concerned about online 1,807m mobiles sold in 2013 technologies NEED to evaluate impact of cyber-attacks change their passwords payment safety were less after hack likely to buy goods online or use online banking as a result Cloud-based platforms at the specific level that is relevant to individual organisations 422m Europeans have a 3G or 4G mobile connection NatWest online services hit by cyber attack Victims of cyber crime lose an estimated 290bn every year globally BYOD Over 195.4m tablets sold in 2013 Global Internet slows after biggest attack in history Estimated annual cost of cyber crime in the UK alone is 27bn The costs incurred by the private sector and the government to protect themselves are high: Gartner4 quantifies them at $55 billion in 2011, $60 billion in 2012 and an expected $86 billion in 2016

5 What are YOUR cybersecurity needs? Do you KNOW: How exposed your organisation is to cyber threats? What your responsibilities are to your employees, partners, customers and wider society? What your most valuable assets are? Where you need to invest? The policies and legislations in the making, applicable to your sector?

6 CYSPA project CYSPA is the European Cyber Security Protection Alliance. Started in October 2012 As a European (EC)collaborative project By 17 organisations from industry and research Who value the importance of being able to protect their assets in cyberspace Moving to a self sustained Alliance by 2015 Open to users, providers and public authorities 6

7 CYSPA: 17 founding members EHusmann Solutions & Services Providers Users Research organisations 7

8 Project results: Public availability ( ) Impact reports (per sector)

9 Project results: Public availability ( ) Understanding and managing cyber-risks

10 Project results: Public availability ( ) Technology & solutions gap analysis

11 From the Project to the Alliance: the CYSPA Roadmap PROJECT SELF SUSTAINED ALLIANCE March 2015

12 From the EC Project to the Alliance Creation of a CYSPA Core Alliance (global approach) to better tackle cyber risks in critical infrastructures, gathering demand and supply, consolidating sectoral and national needs Improve awareness of decision makers, use common risk management methodologies, share best practices, build a common trust platform in each main sector (vertical approach) Define national positions /needs in National Chapters (transversal approach) and bring them at EU /international level Use as a tool for implementation of EU and national cybersecurity policies and platform for public /private cooperation (leveraging on the NIS Platform public - private dialogue) Use as a tool for implementation of R&D and capacity building in the suggested Cybersecurity Flagship approach

13 What is the CYSPA Alliance? Vision statement: An Alliance of stakeholders working together to articulate, embody and deliver concrete actions needed to reduce cyber disruption. 13

14 CYSPA Alliance: What do we aim to achieve? Target benefits of Alliance activity include Increased level of awareness of cyber risk and benefits of good cybersecurity practices within companies Increased availability of solutions to manage cyber risk which meet the needs of companies Contribute to a culture and environmental framework within the EU to promote good cybersecurity practices Contribute to an improved EU legislative framework to promote good cybersecurity practices Leading to Reduced risk of cyber disruptions within companies

15 CYSPA Scope Improving the security of companies as opposed to individual citizens or Member States as a whole Complement - and not duplicate - ongoing activities at European level, for example the NIS platform Build on pre-existing standards and technologies wherever possible Targeted stakeholder community including: cybersecurity users with an initial focus on the energy, finance, transport and e-government sectors cybersecurity providers including commercial organisations, research establishments and academia public authorities with roles related to cybersecurity (for example policy development) 15

16 CYSPA is open to providers, users and public authorities Providers Cybersecurity industry: - SMEs, large scale suppliers - Research bodies Benefits Understand market requirements Reduce time to market Understand key assets Test the latest innovations and solutions - pre-production Increase corporate social responsibility Users Target sectors' operators: transport, finance, energy, e- government, Benefits Understand sector-specific cyber risk Learn how to address cyber risk (solutions) Learn how to be a role model and gain a competitive advantage with cyber Expand the sectors you operate in Increase corporate social responsibility Public authorities - European cyber security bodies: ENISA, DG CONNECT, Europol etc - National cyber security authorities: OCSIA, CERTs Benefits Understand how to increase awareness to sectors (input) Influence policy Get trusted partners for implementation Confidence that policies are applicable to all Member States Understand research needs across Member States

17 What are the initial steps to get there? Three initial "campaigns" of activity: 1) Help companies understand cyber risks 2) Shape EU policy and legislative environment to the needs of companies 3) Promote cybersecurity as a corporate social responsibility (awareness of CEO/ CIO on need for cybersecurity)

18 CYSPA Alliance: How to reach objectives? Deliver value-adding supporting services to members to promote CYSPA goals, support collaboration and incentivise membership Execute campaigns of activity to deliver CYSPA benefits in partnership with strategic sponsors (at national or international level) Build and maintain a scalable (possibility to tackle new infrastructure sectors), sector-based and national based structure for the CYSPA community and partner, with like-minded organisations, to support EUwide collaboration Create a culture of open and committed participation, encouraging members to actively contribute to campaigns, collaborate with fellow members, take up proposed risk approaches and cybersecurity protection policies Coordinate activities with broader EU initiatives and organisations to deliver maximum benefit to members and pursue common goals where appropriate 18

19 Policy Services based approach Collaboration with national initiatives and organisations Policy information relevant to sectors Follow up of EP and Council discussions Link to CERTs

20 Services based approach Capacity building Risk Assessment (CRISK tool) Personalised to an organisation Building on expert knowledge Evolving / dynamic Sector specific capability Online information (newsfeeds, recommendations, etc.) Matchmaking Conferences, workshops, and trainings

21 Services based approach Intelligence & communication Newsletter Policy briefs Market analysis (sector specific) Marketing of CYSPA activities (and of its members) Facilitating participation to events

22 Structure of the Alliance CYSPA ALLIANCE Secretariat (EOS) Board External advisors CYSPA services Strategic roadmap Alliance Management EU comms. Member approval Sector Sector Sector groups groups transport, groups e-government, finance, energy Sector Sector Task groups groups forces results oriented Members EOS is cybersecurity policy and research to market CYSPA Alliance is cybersecurity 22 awareness to market

23 Develop National Chapters! Easier development of national /local needs, build up trust, information and best practices sharing mechanisms; National leaders to coordinate national views; Better linked to national deployment of cybersecurity policies and investments; Implementation at national level of services developed at common (Core Alliance) level (e.g. CRISK tool); Added value of National Chapters: broker of innovation at MS level, bring its challenges, recommendations, needs and innovative solutions at EU level; Support for coordination of activities envisaged in the proposed Cybersecurity Flagship (from research to capacity building);

24 CYSPA National Chapters (tentative) SECTOR COUNTRY National chapter for national coordination & transposition of activities UK ITALY GERMANY SPAIN FRANCE NETHERLAND SMALL/MEDIUM COUNTRY A SMALL/MEDIUM COUNTRY B SMALL/MEDIUM COUNTRY C TURKEY egov Transport Energy Finance Telecom (to be created) Other SECTOR COORDINATION Coord by CYSPA member or National Chapter Coord by CYSPA member or National Chapter Coord by CYSPA member or National Chapter Coord by CYSPA member or National Chapter Coord by CYSPA Coord by CYSPA member or member or National Chapter National Chapter CORE ALLIANCE Consolidation (common positions) of the different sectors / support to their coordination Coordination & development common services / campaigns / experiments Consolidation of positions of National Chapters Link and coordination with EOS, EU Institutions and KICs

25 What can you do today? Join us through the CYSPA community portal ( "Who s who" service: check out the initiatives to understand how different organisations are working on cyber in Europe Develop National Chapters Come at the final Conference in Brussels on March 26 th

26 Map view of organisations and initiatives in Europe

27 Understanding risk campaign Enriching the four impact reports Creating the CYSPA risk self-assessment online tool -> 2015 Developing the tools & solutions observatory -> 2015

28 CYSPA Final Conference CYSPA Final Conference: The Opening of the CYSPA Alliance 26th March 2015, 10:00-18:30 MCE Conference Centre Rue de l'aqueduc 118, 1050 Ixelles Room B CYSPA is organising its Final conference on March 26th in Brussels to celebrate both the end of the project and the official opening of the Alliance to all stakeholders. This event will aim to gather high level experts and various EU stakeholders such as policy makers, industry representatives, research centres, universities, national and European associations to discuss the outcomes of the CYSPA Project and present the value added services of the Alliance to all participants. You can register at:

29 Join us! Full membership is open to stakeholders who wish to actively work with one or more of the CYSPA bodies (cyber security providers, users or public authorities concerned with cyber security). Associate membership is available to stakeholders who wish to participate in the CYSPA sector groups and kept up to date about CYSPA operations. Note: Full membership is free until at least March 2015.

30 Follow Join us! cyspa.eng.it Visit us!

CYSPA - EC projects supporting NIS

CYSPA - EC projects supporting NIS CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

Building up a European Cybersecurity

Building up a European Cybersecurity Milano 18/03/2014 Building up a European Cybersecurity Luigi REBUFFI EOS CEO CLUSIT Security Summit 2014 Cyber (cybersecurity; cybercrime; cyberdefence; cyberterrorism ) actors in Brussels European Commission

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

ehealth, mhealth and Big Data

ehealth, mhealth and Big Data HEALTH IT FORUM MEDICA November 12, 2014 ehealth, mhealth and Big Data Jaakko Aarnio, Dr Tech Research Programme and Policy Officer Health and Well-Being Unit (H1) DG CONNECT, European Commission Outline

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption Steven Frantzen Senior Vice President, EMEA Region January 2015 The New World Versus the Old World Incoming Airbus

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Insight Report Partnership for Cyber Resilience Newsletter December 2013 World Economic Forum 2013 - All rights reserved. The views expressed are those of various participants in the discussion and do

More information

ENISA s contribution to the development of Network and Information Security within the Community

ENISA s contribution to the development of Network and Information Security within the Community ENISA s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA WSIS Implementation Mechanism: Action Line C5. 15 May 2006 1

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

IaaS, PaaS and SaaS adoption in SEE Current status analysis. Efstathios Karanastasis

IaaS, PaaS and SaaS adoption in SEE Current status analysis. Efstathios Karanastasis IaaS, PaaS and SaaS adoption in SEE Current status analysis Efstathios Karanastasis DKMS ICCS/NTUA Distributed Knowledge and Media Systems Group Institute of Communications and Computer Systems National

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

Cloud for Europe lessons learned

Cloud for Europe lessons learned Cloud for Europe lessons learned Public sector challenges (European egovernment Action Plan 2011-2015) 2 Elevator Pitch Public sector cloud use as a collaboration between public authorities and industry

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud

More information

Shareholder newsletter

Shareholder newsletter JANUARY 2015 FLOWGROUP PLC AIM: FLOW.I Message from Tony Stiff, CEO It is with great pleasure that we can announce the launch of the Flow boiler. This is the world s first affordable electricity generating

More information

- 'Improving Cyber Security in Europe, the way forward

- 'Improving Cyber Security in Europe, the way forward Report Breakfast Briefing: 'Improving Cyber Security in Europe, the way forward 24 April 2013, European Parliament, Brussels Disclaimer: This report is prepared by the rapporteur, Dr. Alea Fairchild, for

More information

The European Platform in Network and Information Security (NIS) Fabio Martinelli

The European Platform in Network and Information Security (NIS) Fabio Martinelli The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy Cyber security directive -

More information

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Together towards an EU Urban Agenda

Together towards an EU Urban Agenda Together towards an EU Urban Agenda Nicolaas Beets Dutch Urban Envoy Briefing on the EU Urban Agenda for EU Ambassadors in The Hague, 15 February 2016 A warm welcome to the smallest city in Europe 2 EU

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

Losses from security breaches becoming significant for

Losses from security breaches becoming significant for Page 1 of 8 Search ZDNet Log In Join ZDNet White Papers Hot Topics Downloads Reviews Newsletters US Edition ZDNet.com is available in the following editions: Asia Australia Europe United Kingdom United

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

National-level Risk Assessments

National-level Risk Assessments European Union Agency for Network and Information Security www.enisa.europa.eu Executive summary This report is based on a study and analysis of approaches to national-level risk assessment and threat

More information

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

Cooperation in Securing National Critical Infrastructure

Cooperation in Securing National Critical Infrastructure Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information

More information

MALTA NATIONAL CYBER SECURITY STRATEGY GREEN PAPER

MALTA NATIONAL CYBER SECURITY STRATEGY GREEN PAPER MALTA NATIONAL CYBER SECURITY STRATEGY GREEN PAPER MALTA NATIONAL CYBER SECURITY STRATEGY GREEN PAPER CONTENTS Minister s Forward Executive Summary 1 Background 2 Purpose and Scope 9 The Consultation Process

More information

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com)

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Theo Dimitrakos Chief Security Researcher, BT Research & Technology theo.dimitrakos@bt.com

More information

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1 BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President

More information

STRATEGIC POLICY FORUM ON DIGITAL ENTREPRENEURSHIP. Fuelling Digital Entrepreneurship in Europe. Background paper

STRATEGIC POLICY FORUM ON DIGITAL ENTREPRENEURSHIP. Fuelling Digital Entrepreneurship in Europe. Background paper EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Service Industries Key Enabling Technologies and Digital Economy Introduction STRATEGIC POLICY FORUM ON DIGITAL ENTREPRENEURSHIP Fuelling

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

Tech deficit. June 2014

Tech deficit. June 2014 Tech deficit June 2014 Executive Summary Breaking into new markets, meeting customer requirements and increasing profitability are key objectives for all companies. Efficient and adaptable technology is

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

European Distribution System Operators for Smart Grids

European Distribution System Operators for Smart Grids European Distribution System Operators for Smart Grids Network and information security (NIS): Recommendations for information sharing and risk management September 2014 Executive summary Our modern society

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Urban Agenda for the EU

Urban Agenda for the EU Urban Agenda for the EU Pedro Campos Ponce NL Ministry of the Interior and Kingdom Relations ESPON Seminar Territory matters: Keeping Europe and its regions competitive Amsterdam 16 June 2016 What is the

More information

Cyber Europe 2012. Key Findings and Recommendations

Cyber Europe 2012. Key Findings and Recommendations Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,

More information

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development Council of the European Union Brussels, 4 March 2015 (OR. en) 6183/1/15 REV 1 LIMITE NOTE From: Presidency To: Delegations No. prev. doc.: 9298/5/14 Subject: EU Cybersecurity Strategy: Road map development

More information

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15

More information

ISA Work Programme SECTION I

ISA Work Programme SECTION I ISA Work Programme SECTION I TABLE OF CONTENTS INTRODUCTION...4 1. THE CONTEXT...4 1.1. The need for the ISA programme...4 1.2. The political context...4 2. THE ISA PROGRAMME...5 3. THE EUROPEAN INTEROPERABILITY

More information

www.himss.eu Advancing Healthcare through Information Technology and Management Systems

www.himss.eu Advancing Healthcare through Information Technology and Management Systems www.himss.eu Advancing Healthcare through Information Technology and Management Systems HIMSS Worldwide HIMSS is a cause-based, not-for-profit organization exclusively focused on providing global leadership

More information

Fostering Information Security Awareness Among Responding Countries

Fostering Information Security Awareness Among Responding Countries Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005

More information

Parasitic copying is unfair play

Parasitic copying is unfair play Parasitic copying is unfair play Toy Industries of Europe (TIE) has developed this document following the European Commission s call for comments on its retail market monitoring report, Towards more efficient

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Cloud for Europe trusted Cloud Services for the European market for public administrations

Cloud for Europe trusted Cloud Services for the European market for public administrations Cloud for Europe trusted Cloud Services for the European market for public administrations Public sector challenges (European egovernment Action Plan 2011-2015) 2 Establishing a Trusted Cloud Europe A

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Council of the European Union Brussels, 5 March 2015 (OR. en)

Council of the European Union Brussels, 5 March 2015 (OR. en) Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:

More information

European Cluster Matchmaking Event Brussels, Belgium. Call for Expression of Interest

European Cluster Matchmaking Event Brussels, Belgium. Call for Expression of Interest European Cluster Matchmaking Event Brussels, Belgium organised in the context of the European Cluster Conference 2014 set up by the European Commission s Enterprise and Industry Directorate-General October

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

ETIP Wind Steering Committee meeting Monday 7th March 2016 11:00 16:45 EWEA office, Rue d Arlon 80 6th floor Bruxelles AGENDA

ETIP Wind Steering Committee meeting Monday 7th March 2016 11:00 16:45 EWEA office, Rue d Arlon 80 6th floor Bruxelles AGENDA ETIP Wind Steering Committee Meeting: ETIP Wind Steering Committee meeting Monday 7th March 2016 11:00 16:45 EWEA office, Rue d Arlon 80 6th floor Bruxelles AGENDA 11:00 11:30 11:30 12:00 12:00-12:45 12:45

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many

More information

National Cyber Security Strategies. Practical Guide on Development and Execution

National Cyber Security Strategies. Practical Guide on Development and Execution National Cyber Security Strategies December 2012 National Cyber Security Strategies National Cyber Security Strategies I About ENISA The European Network and Information Security Agency (ENISA) is a centre

More information

International Chamber of Commerce The world business organization

International Chamber of Commerce The world business organization International Chamber of Commerce The world business organization ICC Cyber Security Guide for Business World Bank Seminar on Cyber Preparedness Vienna. 18 19 May 2015 Gerard Hartsink Chair ICC Task Force

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees

Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees Speaking Notes Meeting of Chairpersons of EU Communications, Education and Transport Committees Thank you for the invitation to join you here today, on this important week in Ireland and Europe s digital

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information

04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information 1 BI STRATEGY 3 04 Executive Summary 08 What is a BI Strategy 10 BI Strategy Overview 24 Getting Started 28 How SAP Can Help 33 More Information 5 EXECUTIVE SUMMARY EXECUTIVE SUMMARY TOP 10 BUSINESS PRIORITIES

More information

Exposing the Cybersecurity Cracks: A Global Perspective

Exposing the Cybersecurity Cracks: A Global Perspective Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Sponsored by Websense, Inc. Independently conducted by Ponemon Institute LLC Publication Date: April

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 7.2.2013 JOIN(2013) 1 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL,

More information

The Receivables Finance Industry

The Receivables Finance Industry Want to take part? The International Factors Group is the trade association that fully represents and promotes the interests of the factoring, invoice financing and asset based lending industry on a global

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information