WHAT S ABOUT CYBERSECURITY, WP 2016-2017 ERRIN-SOST CYBERSECURITY BROKERAGE 30-SEP-2015 Dr. Marina Martínez García Programme Officer H2020 Spanish Officer for Science and Technology, SOST-CDTI
80.000 M Programa Marco de Investigación e Innovación (2014-2020) Excellent Science European Research Council (ERC) Future and Emerging Technologies (FET) Marie Skłodowska-Curie actions on skills, training and career development European research infrastructures Industrial Leadership ICT Nanotechnology Biotechnology Advanced Materials Advanced Manufacturing & Processing Space Access to Risk Finance Innovation in SMEs Societal Challenges Health, demographic change and wellbeing Food security, sustainable agriculture and forestry, marine and maritime and inland water research and the bioeconomy; Secure, clean and efficient energy; Smart, green and integrated transport; Climate action, environment, resource efficiency and raw materials Europe in a changing world-inclusive, innovative and reflexive societies Secure Societies: Protecting freedom and security of Europe and its citizens 2
About the programme No project without end-user : Compolsory to include them in the consortia They are not only LEB but public administration (local, regional, national), private sector in general, the citizens as individuals, consumers associations, data protection entitites, infrastructure and utilities operators, etc. Actions of training, awareness, test, demo, validation, etc oriented to them! Ethical and social aspects of the developments, services applications to provide must be developed in detail Include real experts on the matter in the consortia! Not only Privacy and Data Protection, But also Information Communication aspects to the population, authoritites, etc 3
About the programme Attention: cyber-security is not cyber-defense Coordination, not cooperation... Take care about the potential dual use aspects of our developments. National security sensitive aspects Classified information scrutiny! If possible, issues related to standarisation and certification should be considered Include also the right expert partner in your consortia! All topics are 1-stage Full proposals only and results are given within 5 months after the call-deadline (max) & signature of the GA 8 months after the call-deadline (max). 4
Just a reminder RIA Prizes IA PCP / PPI FTI SMEs Instrument CSA Networks of users / networks of excellence; organizing meetings, events and conferences; studies and policy oriented activities, etc... NO RESEACH at all!!! 5
Cyber, in line with the EU Policies A connected digital single market A stronger global actor Towards a new policy on migration An area of justice and fundamental rights based on mutual trust 6
Call CIP - Critical Infrastructure Protection 7
CIP-01-2016-2017: Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe Objective: Providing security solutions to public & private operators facing hazards & cyber attacks. The solutions must include prevention, detection, response, and in case of failure, mitigation of consequences. Projects of about 8 M EC requested & TRL 7 It is expected than 3-4 projects approved per year! Critical infrastructures eligible are: Water Systems, Energy Infrastructure (power plants and distribution), Transport Infrastructure and means of transportation, Communication Infrastructure (including satellite communications), Health Services, Financial Services. 8
Pay attention to: Advanced testing, piloting & demo activities within the installations is mandatory No project without minimum 2 CIs on-board & do not repeat in 2017 the CIs already chosen in 2016 Not infrastructures isolated but work on the interdependencies, i.e., communitacions & transport, Solutions proposed must be in convergence with safety and security standards. If possible even to contribute to the pre-establishment of certification mechanisms. Mandatory at least 1 SMEs in the consortium Design and perform communication & training activities for the affected population. References: Check the EU Programme for Critical Infrastructure Protection DG-Home at 9
The Scope ATTENTION: Do not forget training activities with first aid teams!!! 10
Call DS Digital Security 11
12
3 CSA on: Collaboration / synergies among EU cyber-security clusters (5 years of activitites); Collaboration lines with Japan; Collaboration lines with USA. Analysis of societal, institutional & economical impact of cyber failures Recommediations for regulators, law enforcement bodies, market operators / insurances. Cost-effective solutions (TRL = 5-7) addressed to this 3 kinds of end-users. 13
Innovation actions on: PET (Privacity Enhancing Technologies); eid (Secure Digital Identities); General Data Protection Regulation in practice. This action would include: R&I actions on situational awareness in EU in front of cyber-attacks; Innovation actions on training and simulating environments to face cyber-attacks. 14
The IAs proposed whould propose novel designs, methods and tools to provide to the users of examples of services/activities in the network to enhance / ensure: a. Or well the control of their data (PET, Privacity Enhancing Technologies) b. Or well the General Data Protection Regulation Oriented to assist organisations (businesses, service providers, and government agencies) c. Or well the Secure use of the Digital Identity (eid, Secure Digital Identities) For private as well for public users Take care of societal & Ethical issues Projects of 2-3 M contribution and TRL = 6-7 Between 6-9 proposals approved in 2017!!!!! 15
16
4-6 RIAs of 3-5 M EC req & TRL=3-5 Assurance 3-4 RIAs of 3-4 M EC req & TRL=3-5 Security Certification 2-3 IAs of 3-4 M EC req & TRL=6-7 Economic, legal & social aspecs of securiy assurance & certification 1 CSA of 1 M 17
18
DS-03-2016: Increasing digital security of health related data on a systemic level Special care about "privacy by design" approach Secure storage & safe exchange and access, solutions against loss of data and cyber-attacks. ATTENTION to different Member States legislations reagarding health information (not only data protection). Build on existing solutions or developments OpenNCP, projects DECIPHER, EPSOS, STORK and others RIAs of 3-5 M contribution and TRL = 3-5 Between 2-4 proposals may be approved in 2016!!!!! 19
SMEs Intrument in Security 20
What are the topics to deal with in 2016-2017? Fighting crime, illegal trafficking and terrorism, including understanding and tackling terrorist ideas and beliefs Protecting and improving the resilience of critical infrastructures, supply chains and transport modes Strengthening security through border management Improving cyber security Increasing Europe's resilience to crises and disasters Ensuring privacy and freedom, including in the Internet, and enhancing the societal legal and ethical understanding of all areas of security, risk and management Enhancing standardisation and interoperability of systems, including for emergency purposes Supporting the Union's external security policies, including through conflict prevention and peace-building Part of the SMEs Instrument in Secure Societies Societal Challenge 15 M /year 21
Few words about the FTI 22
Fully bottom-up scheme Mature solutions & close to market From TRL 6 to TRL 9 in 36 months max. The solution has to create added value at EU level (and beyond de EU) Market in EU and abroad (but not only abroad). Consortia Between 3 5 partners (EU partners or associated country Min. 3 different eligible countries) & max. 3 M of EC requested (2-3 years of project). Any kind of partner Industry, SMEs, Univ., Research/Tech Centres, First-time applicants* Industry intensive: either 2 out of 3/4 partners = private-for-profit or 3 out of 5 partners = private-for-profit or 60% of the budget of the proposal (=total estimated eligible costs) to be allocated to private-for-profit entities Total of 100 M / year of EC requested On the order of 50 projects approved per year (3-calls) among all Societal Challenges and LEIT. So they are expecting projects of about 2M of EC requested, basically, duration around 1-2 years and 1-2 projects approved per Societal Challenge & LEIT!!!!! 23
24
6 months time-to-grant 06-Jan Open for submission 09-January Launch event in BRU 29-Apr First Deadline End-Agu Communicaction of first-call results from evaluation 01-Sep Second Deadline End-October First-call grants agreement signature 01-Dec Thrid Deadline & Communication of second-call results to the participants 25
Next comming events You may also find opportunities for cyber appliations at: SC-1 under the ehealth & security for data protection LEIT-ICT (8.1, 8.2 & 8.3) Future Security Research 2015, 14-17 Sep 2015, Berlin 9th ENISE conference, 20-21 Oct 2015, Leon (Spain) SICUR 2016, 23-26 Feb 2016, Madrid Infodays FEB-MAR 2016, BRU organized by REA Security Research conference 2016, Den Hague, 1-2 Jun 2016 26
Last but not least Become evaluator they are looking for different expert profiles! http://ec.europa.eu/research/participants/portal/desktop/en/experts/index.html Updating draft work-programmes and general documents on H2020 http://ec.europa.eu/research/participants/portal/desktop/en/funding/reference_ docs.html#h2020-work-programmes-2016-17 List of already funded projects in FP7 http://ec.europa.eu/dgs/homeaffairs/financing/fundings/pdf/research-forsecurity/security_research_catalogue_2014_e n.pdf List of projects from call-2014 on the Participant Portal website!!!! Future PPP-Cyber calls by 2017 onwards 27
Thanks for your attention marina.cdti@sost.be 28