H2020 "Secure Societies" Work Programme Digital Security 2015

Similar documents
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Horizon 2020 Secure Societies

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Internet of Things Value Proposition for Europe

Horizon 2020 Secure Societies

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Géraud Guilloud Horizon-2020 appels Atelier Big Data Technologies & Application

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Horizon 2020 Secure Societies

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

Horizon 2020 Information and Communication Technologies in Work Programme

2. Cyber security research in the Netherlands

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN ICT statistical report for annual monitoring (StReAM)

Internet Governance and Cybersecurity Patrick Curry MACCSA

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

INTERNET OF THINGS FOCUS AREA

On the European experience in critical infrastructure protection

Achieving Global Cyber Security Through Collaboration

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

SEC-19-BES-2016: Data fusion for maritime security applications

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

OUTCOME OF PROCEEDINGS

Overview of DG INFSO R&D on Trust & Security

Cooperation in Securing National Critical Infrastructure

Pan European Fire Strategy 2020 A safer Europe for all

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

G7 Opportunities for Collaboration

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Scoping Paper for. Horizon 2020 Societal Challenge 'Secure Societies - protecting freedom and security of Europe and its citizens'

Sofware Engineering, Services and Cloud Computing

H2020-EUJ-2016: EU-Japan Joint Call. EUJ : IoT/Cloud/Big Data platforms in social application contexts

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Preventing fraud and corruption in public procurement

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Towards closer EU-ASEAN collaboration in cybersecurity

Head of Unit Network Technologies DG CONNECT European Commission

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division

ehealth, mhealth and Big Data

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

A guide to ICT-related activities in WP

Litsa Kountouridou National Contact Point for ICT and FET. Tel:

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

National Cyber Security Strategies

How To Help The European Single Market With Data And Information Technology

SC2 BIOECONOMY in Horizon 2020

CYSPA - EC projects supporting NIS

EU policy on Network and Information Security and Critical Information Infrastructure Protection

STW Open Technology Programme. H2020 Future & Emerging Technology. and. GRANTS WEEK 2015 October 9 th

WORK PROGRAMME Topic ICT 9: Tools and Methods for Software Development

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

National Cyber Security Policy -2013

Electricity, Gas and Water: The European Market Report 2014

OECD Council Recommendation on Principles for Internet Policy Making. 13 December 2011

ICT : Internet of Things and Platforms for Connected Smart Objects

8970/15 FMA/AFG/cb 1 DG G 3 C

H2020-LEIT-ICT WP Big Data PPP

Diskussion. Digital Security/Critical infrastructure protection.

The internet and digital technologies play an integral part

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

THE WORLD IS MOVING FAST, SECURITY FASTER.

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region

Horizon 2020 Call "Automated Road Transport"

Agenda. Company Platform Customers Partners Competitive Analysis

ICT 6: Cloud computing

Electronic Citizen Identities and Strong Authentication

Opportunities for the Automotive Sector in Horizon Cliff Funnell UK FP7/H2020 Surface Transport NCP FP7UK

9360/15 FMA/AFG/cb 1 DG G 3 C

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

IoT Week 2015 Lisbon June 16th 18th

Digital Entrepreneurship Monitor. EC, Dana Eleftheriadou EY, Alessandro Cenderello Brussels, 26 September 2014

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

HORIZON ENERGY context and Calls 2014/15. Ljubljana, 23 January 2014 THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION

OECD review of the secondary school modernisation programme in Portugal

Matthijs SOEDE Research Programme Officer Unit G3 Renewable Energy Sources DG Research and Innovation

An Open and Safe Europe What s next?

The European Alliance for IoT Innovation

H2020-LEIT-ICT WP ICT 14, 15, 17,18. Big Data PPP

COOPERATION IN EUROPE

Ownership transfer Critical Tax Issues. Johan Fall, Anders Ydstedt March, 2010

Transcription:

H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu

Agenda The role of research to innovation (RTI) in the EU cybersecurity strategy. Past developments in cybersecurity RTI co-funded by the EU. Calls for proposals within H2020 in Digital Security What next? 2

The role of research to innovation (RTI) in the EU cybersecurity strategy. Recent developments in RTI on cybersecurity. Calls for proposals under H2020. What next? 3

Cybersecurity Trends - Cyber security still a young and immature field - Attackers more innovative than defenders - Defenders need to share information and cooperate Digital Security is a focus area for Horizon 2020 Cyber security will never be solved but will be managed User centric perspective 4 of cybersecurity

Proposal for a directive on Network and Information Security (NIS)

EU Cybersecurity Strategy Promoting a single market for cybersecurity products Developing industrial and technological resources for cybersecurity Foster R&D investments Use H2020 to address ICT privacy and security Better coordination of research agendas Member States invited to develop good practices to leverage public procurement 6

The role of research to innovation (RTI) in the EU cybersecurity strategy. Past developments in cybersecurity RTI cofunded by the EU. Calls for proposals under H2020. What next? 7

The big picture Calls in FP7 & CIP (I) FP7-ICT-2007-1 (90M ) : Identity management and privacy enhancing tools Security and resilience in network infrastructures Security and trust in dynamic and reconfigurable service architectures Trusted computing infrastructures FP7-ICT-SEC-2007-1 (20 M ) - Critical Infrastructure Protection CIP-ICT-PSP-2008-2 (2,5 M ) - Biometrics + Identity Management FP7-ICT-2009-5 (90M ) Technology & Tools, Mobile Devices and Smartphones Trustworthy Network Infrastructures, Cloud Security Trustworthy Service infrastructures, Privacy Management FP7-ICT-2011-8 (80 M ) Data policy, governance and socio-economic ecosystems Heterogeneous networked, service and computing environments Trust, e-identity and privacy management infrastructure

The big picture Calls in FP7 & CIP (II) CIP-ICT-PSP-2012-6 Fighting Botnets (7,8 M ) FP7-ICT-2013-10 (35,8 M ) Security and privacy in cloud computing Security and privacy in mobile services Development, demonstration and innovation in cyber security CIP-ICT-PSP-2013-7 Website Security and Biometrics (4 M ) Joint Calls with Brazil (2011), Japan (2013) and Australia (2013) (5,5 M ) In total: 101 R&D Projects for 334 M EU funding

Some statistical data (excluding FP7-ICT-SEC-2007-1 and FP7-ICT-2007-1)

Top recipients countries (above 1M ) 1. Germany 49.4 M 2. France 28.9 M 3. Italy 22.2 M 4. United Kingdom 18.2 M 5. Spain 18.1 M 6. Austria 12.4 M 7. Netherlands 12.0 M 8. Switzerland 11.8 M 9. Norway 9.9 M 10. Belgium 9.5 M 11. Greece 7.7 M 12. Denmark 5.6 M 13. Sweden - 4.5 M 14. Portugal 3.5 M 15. Estonia 3.2 M 16. Israel 3.1 M 17. Ireland 3.0 M 18. Hungary 1.7 M 19. Finland 1.6 M Total: 232 M

The top private sector recipients: 1. SAP (Germany/France) 9.8 M 2. IBM (Israel/Switzerland) 7.3 M 3. ATOS (Spain) 4.6 M 4. Infineon (Germany/Austria) 3.5 M 5. Technicon (Austria) 3.2 M 6. HP (UK/Italy) 2.7 M 7. THALES (France) 1.9 M 8. Bicore (Netherlands) - 1.5 M 9. Microsoft (France) 1.5 M 10. Siemens (Germany) 1.4 M 11. Gemalto (France) 1.4 M 12. NEC (UK) 1.3 M 13. Cybernetica (Estonia) 1.2 M 14. Cloud Security Alliance (CSA) - 1.1 M Ca. 19% of total EC funding (232 M )

The top academic/public recipients: 1. SINTEF (Norway) 6.0 M 2. Fraunhofer (Germany) 5.9 M 3. KU LEUVEN (Belgium) 3.4 M 4. TU Darmstadt (Germany) 2.8 M 5. TU Graz (Austria) 2.3 M 6. Frankfurt University (Germany) 2.2 M 7. Unabh. Landeszentr. für Datenschutz (Germany) 1.9 M 8. CNR (Italy) - 1.8 M 9. University Malaga (Spain) 1.8 M 10. Poli. Torino (Italy) 1.7 M 11. Eurecom (France) 1.5 M 12. Danmarks TU (Denmark) - 1.3 M 13. TU Eindhoven (Netherlands) 1.2 M 14. University Lisbon (Portugal) 1.2 M Ca 18% of total EC funding (232 M )

Structuring the Portfolio (one way of doing it) Resilience Secure Network Infrastructures Certification Critical Infrastructures Threat detection Trustworthy Service Infrastructures Secure Software Engineering Embedded Systems Biometrics Privacy Cryptography Mobile Security Identity Management Authentication Cloud Computing

Critical Infrastructure Protection (security for networked infrastructures) Efficiency gains Being "smart" (grid, city, transport) Legacy systems Complexity increases vulnerabilities Increased target surface

Critical Infrastructure Protection (enabling secure solutions for CIP using ICT) Identification of emerging threats: FORWARD SysSec ICT to increase resilience of CIP: Tclouds, OPTET, Euro- MILS Support networked-linked CIP: MICIE, SERSCIS Identifying attacks: Trespass Follow-up: DS-3-2015

SMEs Percentage of overall funding: ca. 10-12 % Percentage of participating entities: below 20% Examples of success: 3 projects since 2012, 1.2 M funding CIP Project securing websites: 5 SMEs out 11 partners, 41% of budget FP7 IP Project: 5 SMEs out 15 partners, 41% of budget But still need to address obstacles for SMEs in H2020

What remains to be done challenges for H2020 From world-class research to market innovation Europe competing globally Industrial Policy User trust in ICT Linking the threads

The role of research to innovation (RTI) in the EU cybersecurity strategy. Recent developments in RTI on cybersecurity. Calls for proposals within H2020 in Digital Security What next? 19

Societal Challenges Three Pillars Industrial Leadership Excellent Science 70 bn

Coverage of the full innovation chain Excellent science Societal challenges Industrial leadership Basic Research Technology R&D Demonstration Prototyping Large scale validation Pilots Market uptake

Technology Driven Policy Driven Finance, Banking, Payment Smart Grids Smart Cities Intelligent Transport Systems Connected Cars ehealth mhealth 3. Mainstreaming Cybersecurity IoT Big Data Cloud 5G Embedded Systems Computing 22

ICT in the Societal Challenges

Key principles for ICT R&I in the Societal Challenges Interoperability and security-by-design Re-use and economies of scale Breakthroughs leveraging the transformative power of ICT Preparation for market deployment + Information for future digital policies

H2020 SC7 Secure societies - Four key concepts Secure societies Protecting freedom and security of Europe and its citizens. Address the economic and societal dimension of security and privacy in the digital ecosystem. Secure and increase trust in the digital society. Demonstrate the viability and maturity of state-of-the-art solutions. 25

Calls in 2014/15 LEIT (40 M ) Technology Building blocks in Security - 2014: - Cryptography - Security-by-Design Societal Challenge 7: Digital Security (97M ): 2014: - Privacy - Access Control - Risk management and assurance models 2015: - The role of ICT in Critical Infrastructure Protection - Information driven Cyber Security Management - Trust eservices - Value-sensitive technological innovation in Cybersecurity 26

Four Topics in 2015 DS-03-2015: The role of ICT in Critical Infrastructure Protection (IA) DS-04-2015: Information driven Cyber Security Management (IA) DS-05-2015: Trust eservices (IA) DS-07-2015: Value-sensitive technological innovation in Cybersecurity (CSA) 27

DRS: Disaster-resilience Other Topics in SC7 Crisis Management Disaster Resilience & Climate Change Critical Infrastructure Protection Communication technologies and interoperability FCT: Fight against Crime and Terrorism Forensics Urban Security Ethical / Societal Dimension BES: Border Security and External Security Supply Chain Security External Security Border Security 28

The role of ICT in Critical Infrastructure Protection DS-3-2015

The role of ICT in Critical Infrastructure Protection Challenge: Despite strong connection between ICT systems and Operational Technology (OT) environment running critical infrastructures, there is only little awareness regarding IT risks that can affect OT control systems. ICT systems are deployed in an environment or for an application that was not designed with security in mind. [ ] Scope: Investigate dependencies [ ], monitor cascading effects of incidents, [ ] develop self-healing mechanisms. Plans of how to retrofit state-of-the-art security into networks can also be addressed. The investigated concepts have to be tested in a field trial. 30

The role of ICT in Critical Infrastructure Protection Scope (cont.): ICT should be protected or re-designed at the software level, but also at the physical level [ ] ICT operators experience [ ] can be applied to [ ] smart grids In relation to the protection of legacy IACS, SMEs are particularly encouraged to provide specific and very focused security solutions adapting current ICT security technology to IACS environments on topics such as [ ]: [ ] Impact: Resilient networks [ ], increased preparedness, reduced response time and coordinated response in case of a cyberincident. Reduced possibilities to misuse ICT as a vehicle to commit cybercrime or cyber-terrorism. [ ] 31

Budget and schedule Call identifier: H2020-DS-2015-1 Topic: DS-3-2015 Instrument: Innovation Action (TRL 7) Indicative budget: 17,50 million EURO Indicative project size: 3-8 million EURO Opening date: 25/03/2015 Deadline: 27 August 2015, 17.00.00 CET 32

Information driven Cyber Security Management DS-4-2015

Information driven Cyber Security Management Challenge: Effective defence against [ ] threats requires the addition of a balancing, outward focused approach, on understanding the adversary s behaviour, capability, and intent. Those [ ] responsible for managing cyber security programmes are often faced with an overwhelming amount of information, often raw and unstructured [ ] SMEs face a particular challenge [ ] they often do not have the capacity [ ] or the [ ] expertise [ ] in order to address the cyber security threats they face. [ ] Scope: [ ] tools and techniques that enable organisations to efficiently process the flow of information from both internal and external sources, through improved information processing, analysis and, where necessary, exchange. 34

Information driven Cyber Security Management Scope (cont.): [ ] should leverage the state-of-the-art in areas such as SIEM, data analytics (including Big Data) and visualisation, threat intelligence, malware analysis and cyber security information exchange. [ ] promote interoperability through [ ] open standards Several pilots [ ] for different application areas [ ] Proposals are encouraged to include security end-users. [ ] address the needs of those entities whose mission it is to assist others such as [ ] Cyber Security Centres or similar. [ ] Impact: [ ] effective vulnerability remediation, enhanced prevention and detection capabilities and faster response to incidents. [ ] increase the level of awareness and preparedness. 35

Budget and schedule Call identifier: H2020-DS-2015-1 Topic: DS-5-2015 Instrument: Innovation Action (TRL 6+) Indicative budget: 14,31 million EURO Indicative project size: 3-5 million EURO Opening date: 25/03/2015 Deadline: 27 August 2015, 17.00.00 CET 36

Trust eservices DS-5-2015

Challenge: Trust eservices The [ ] adoption of [ ] eservices is hampered by the lack of globally interoperable solutions, mutually recognized or compatible trust models and the absence of solid business cases for the reliance on electronic signatures, e-seals, timestamps or certified electronic delivery. [ ] assessing the security assurance and trustworthiness of [ ] eservices, in particularly when coming from third countries Scope: Comparison and interoperability of electronic trust services covering aspects such as security assurance levels, operational security audits, state supervision systems, data protection regimes or liability of trust service providers. [ ] assessment of technical and organisational standards for trust services, [ ] development of a framework for 'global trust lists'. 38

Scope (cont.): Trust eservices Validation platforms able to handle the specificities of various jurisdictional or national systems could be created [ ] Proposals are encouraged to include security end-users. [ ] Impact: Demonstrate a positive business case and the economic value for the use of and reliance upon trust eservices. [ ] empower and protect users in their digital experiences like e-contracting, e-bidding, e-invoicing, accessing social networks, or accessing the services of local or national administrations. [ ] ease the dematerialisation of processes, reduce administrative overhead for citizens and businesses and [ ] facilitate higher availability of egov services. 39

Budget and schedule Call identifier: H2020-DS-2015-1 Topic: DS-5-2015 Instrument: Innovation Action (TRL 7) Indicative budget: 17,40 million EURO Indicative project size: 3-8 million EURO Opening date: 25/03/2015 Deadline: 27 August 2015, 17.00.00 CET 40

Value-sensitive technological innovation in Cybersecurity DS-7-2014

Value-sensitive technological innovation in Cybersecurity Challenge: [ ] to ensure a flourishing information society which offers safety and security and at the same time respects Europe's fundamental values and rights. cybersecurity technologies [ ] incorporate European values and fundamental rights, [ ] autonomy, equality, privacy, [ ] fairness and accountability and ensure the 'right' level of control individuals can exercise over their actions [ ]. The role of public and private sectors [ ] to allow citizens to make informed and responsible choices regarding innovative products and services leading to a strong European market for [ ] effective cybersecurity technology. Scope: facilitate community building and [ ] understanding involving relevant stakeholders from civil society, research, industry and 42 public bodies

Value-sensitive technological innovation in Cybersecurity Scope (cont.): Drafting standards and guidelines for industry and the public sector to enable consumers to exert a high level of control over devices and services [ ] Identifying the key factors for promoting a secure and innovative ecosystem [ ] in line with European values [ ] Impact: [ ] insight into how networked ICT, autonomous system [ ] devices [ ] services influence the perception of citizens with respect to security and [ ] values [e.g.] freedom and autonomy New approaches for users to exercise control over their data and maintain the desired autonomy of their actions in the digital domain [ ] [ ] 43

Budget and schedule Call identifier: H2020-DS-2015-1 Topic: DS-7-2015 Instrument: Coordination & Support Action Indicative budget: 1 million EURO Opening date: 25/03/2015 Deadline: 27 August 2015, 17.00.00 CET 44

The role of research to innovation (RTI) in the EU cybersecurity strategy. Recent developments in RTI on cybersecurity. Calls for proposals under H2020. What next? 45

Cybersecurity & Privacy Innovation Forum 2015 28-29 th April 2015 Venue: MCE, Brussels This event will include DG CNECT informational sessions relating to 'Digital Security: Cybersecurity, Privacy & Trust' calls in 2015 DS-03-2015,DS-04-2015,DS-05-2015, DS-07-2015. https://www.cspforum.eu/2015 46

H2020 SC7 Digital Security 2015 calls: http://europa.eu/!fy78nu Network of National Contact Points (NCPs) http://europa.eu/!up97wv Digital Agenda for Europe - Cybersecurity http://ec.europa.eu/digital-agenda/en/cybersecurity Follow us on Twitter https://twitter.com/eu_trustsec