BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)



Similar documents
Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech

Strategy for Coordination of the Cross Domain Activities & Multi-Lateral Approach in International Cooperation

INCO for Cyber Security. PTCIF: 21st Feb 2014

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

The European Platform in Network and Information Security (NIS) Fabio Martinelli

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

Track 14. Networking and Coordination Cluster of CSAs / NoEs in Trust and Security

EU policy on Network and Information Security and Critical Information Infrastructure Protection

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

How To Understand And Understand The European Priorities In Information Security

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

How To Write An Article On The European Cyberspace Policy And Security Strategy

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

CYSPA - EC projects supporting NIS

Cyber Security in Europe

African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

Cyber crime risk management protecting your business 4 November 2015

Prof. Udo Helmbrecht

Cyber security in education in Greece

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Cloud and Critical Information Infrastructures

Cyber ITU. By Tomas Lamanauskas, ITU

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

Cyber Security in EU: ENISA approach


Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

EU Cybersecurity: Ensuring Trust in the European Digital Economy

2. Cyber legislation harmonization process in Central Africa

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.

Cyber Security in EU: ENISA approach

Cooperation in Securing National Critical Infrastructure

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

National Cyber Security Policy -2013

Making our Cyber Space Safe

INTERNATIONAL TELECOMMUNICATION UNION

Trust Management in Emerging countries: International cooperation research challenges for Horizon 2020

Cyber Security in Austria

Deliverable 6.4 Future Internet Initiatives Year 1

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Internet of Things Value Proposition for Europe

H2020-LEIT-ICT WP ICT 14, 15, 17,18. Big Data PPP

Cyber Security and Digital Forensics Training Platform

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Specific comments on Communication

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA

Cyber Diplomacy A New Component of Foreign Policy 6

SECRETARIAT REPORT TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname

5 th Infosec Week & Cyber Bootcamp. 12 th to 16 th October ISEG Lisbon School of Economics & Management

Introduction of the GCCD. (Global Cybersecurity Center for Development)

ENISA workshop on Security Certification of ICT products in Europe

Cyber security Indian perspective & Collaboration With EU

Business Continuity for Cyber Threat

ENERGY MARKET REFORM

SUN Donor Network. I. Introduction

How To Write A Cybersecurity Framework

How To Discuss Cybersecurity In European Parliament

ICT 6: Cloud computing

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

Big Data for Patients (BD4P) Program Overview

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Procurement Innovation for Cloud Services in Europe - PICSE

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

2015 Information Security Awareness Catalogue

Cloud Sourcing G-Cloud 5 Framework

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Update on ISO TC 265 Transportation and

PROBE-I(O)T PROBING EU-AFRICA COOPERATION ON INTERNET OF THINGS

FAQ to ENISA s report on technologies to improve the resilience of communication networks

ISO ASSET MANAGEMENT FOR POWER

Social Media Sessions. Social Media Strategy Lucio Ribeiro Digital Strategist

Implementing Practical Information Security Programs

H2020-LEIT-ICT WP Big Data PPP

Cybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Advancing cyber security. Cyber Security Academy

North Texas ISSA CISO Roundtable

Objectives for today. Cloud Computing i det offentlige UK Public Sector G-Cloud, Applications Store & Data Centre Strategy

Cybersecurity in the Commonwealth: Setting the Stage

Volker Jacumeit, DIN e. V. ILNAS Workshop CSCG Presentation June 4, 2015

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC ) ) ) ) )

PICTURE Project Final Event. 21 May 2014 Minsk, Belarus

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

WORK PROGRAMME NOVEMBER 2012

National Initiative for Cyber Security Education

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.

The fast moving telecommunications industry driven mainly by rapidly changing technologies, evolving services and increasingly complex consumer

Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework: Current Status and Next Steps

Transcription:

Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical Coordinator for Africa South Africa BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs) The EuroAfrica-ICT/P8 Forum; Session 2D. Cyber Security & Trustworthy ICT

BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries

BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries

BIC: Building International Co-operation for Trustworthy ICT Original BIC Objective: To build international cooperation between the EU and the programme agencies and researchers in India, Brazil and South Africa within the focus areas of Trustworthy ICT, including trust, privacy and security. Coordinator European Commission DG-CNECT Unit H.4, Trust and Security Jan 2011-Dec. 2013 http://www.bic-trust.eu/

BIC: Building International Co-operation for Trustworthy ICT Coordinator Revised BIC Objective: To build international cooperation between the EU and the programme agencies and researchers in India, Brazil and Entire Africa within the focus areas of Trustworthy ICT, including trust, privacy and security. European Commission DG-CNECT Unit H.4, Trust and Security Jan 2011-Dec. 2013 http://www.bic-trust.eu/

Project overall structure BIC countries & programmes European Commission International Advisory Group (IAG) communication via BIC secretariat function External relations e.g., ENISA, W3C, WG1. Humanoriented trust and security WG2. Network info & cyber-security WG3. Programme and funding focus

Project overall structure BIC countries & programmes European Commission International Advisory Group (IAG) communication via BIC secretariat function External relations e.g., ENISA, W3C, WG1. Humanoriented trust and security WG2. Network info & cyber-security WG3. Programme and funding focus

International Advisory Group (IAG) The role of IAG is to: Create a forum for bringing together country representatives from the INCO-Trust countries and the BIC countries Facilitate collaborations between in-country national constituencies on ICT Trust and Security and other country similar constituencies Review the International collaboration strategy in ICT trust and security on a regular basis Assist in the building of the working groups to enable BIC to structure relationships

BIC project overview Agenda The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries

Do we want this? BIC INCO-TRUST Tactical (bi-lateral) partnerships

Or this? Strategic (multi-lateral) partnerships MS Others MS MS MS X27 MS MS 27 EU Member States

BIC = Moving towards a strategic approach How do we achieve it?

How do we do it? IAG/WGs structural rework It was discussed in BIC s June 2012 workshop and with some refinements, it was ratified in the December 2012 BIC IAG forum at Lisbon and there it was decided that the supporting constituency of the IAG should be expanded as follows: Core Working Group (CWGs): Existing BIC WGs WG1, WG2, WG3 Extended Working Group (EWGs): Country Specific Experts Specialist Function Groups (SFGs): Specific Purpose/ Projects Specialist Groups, as needed. With support from local government/funding bodies

Structure: IAG & Key Mgt Working Groups IAG Extended WG EWG Core WGs EWG EWG [14]

Interface between In-Country Researchers Govt. Industry Other Country EWGs Build Knowledge Bank EWG Objectives Facilitate INCO at functional Level - make INCO effective Stronger and effective voice advocating priority areas for INCO research funding in future WPs/Calls.. [15]

Agenda BIC IAG Annual forum format The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries

Progress Progress & Pipeline EWG India Launch Meet on 21 st May 13 : Prof. M. P. Gupta, IIT Delhi has accepted the lead. > 10 members have joined. EWG South Africa concept launched by Prof. Marijke Coetzee of Univ. of Johannesburg at ISSA 2013, August 2013: Dr. Barend Taute, of CSIR Meraka Institute & BIC IAG has accepted the lead. 8 members have joined, and growing from today!! EWG Brazil launch workshop on 22nd October 13: Prof. Ricardo Dahab of the University of Campinas (UNICAMP) has accepted the challenge to lead the EWG Brazil. > 10 members have joined. Pipeline As one of first steps, the EWGs are planning to continue recruitment and hold a symposium / workshop on identified challenges - Planned for early 2014 with support from their governments. It is expected that the EU will also be hosting events in the BIC countries on INCO and the EWGs can plan sessions and contribute with a strong voice to these events. E.g. India in first half of 14 is already planning such an event and our EWG members are making contact with the Gov t of India to be included. BIC Final recommendations report taking on board the results of the Survey on Prioritized Trust and Security topics for international cooperation see http://www.bictrust.eu/priorities-survey/ It is great that BIC will live on in the EWGs in each country!

[18]

NIS PPP established Network Information Security Public private Platform has been established A key action of the EU Cyber security Strategy and aligned with the implementation of the NIS Directive. Including trusted information sharing and the need for WGs with clear objectives and well-defined themes. WG1 on risk management, including information assurance, risks metrics and awareness raising; WG2 on information exchange and incident coordination, including incident reporting and risks metrics for the purpose of information exchange; WG3 on secure ICT research and innovation. BIC is currently involved in WG2 and WG3 and strongly advocating the Building of International cooperation. One idea is to build a new BIC into these activities in H2020, including all out in-country EWGs. We need You!

Agenda BIC IAG Annual forum format The BIC strategic approach EWG Progress and Pipeline Priority topics for INCO in Trustworthy ICT across BIC countries

Trustworthy ICT themes across BIC countries** International data exchg. arch. for cyber security Fight against cyber crime Align policies and joint exercises Device security in the mobile security chain e.g. remote erasure of stolen device data Coop. of all stakeholders network operators, device manufs., security specialists Regulatory framework for business apps. Smart technologies and privacy Future internet techs. and privacy Social networking and privacy Increase uptake of Privacy by Design Risk model approaches Balancing uptake of cloud computing and not allowing security to fall behind Security of data centres / Security as a Service Cultural based models of TM Trust in data and info. provenance Recommendation/Reputation TM INCO needed for global TMs. **Preliminary results from our survey at http://www.bic-trust.eu/priorities-survey/ See full report at http://www.bic-trust.eu/files/2013/01/d24-rankedpriority-final-signed.pdf 7 November 2013 Michel Riguidel 21

suri@cs.tu-darmstadt.de michel.riguidel@telecom-paristech.fr aljosa.pasic@atosresearch.eu Barend Taute <BTaute@csir.co.za> FAQ @ http://www.bic-trust.eu/