Digital Security: Cybersecurity, Privacy, Trust Gustav Kalbe Unit H.4, Trust and Security, DG Communications Networks, Content and Technology European.

Slides:



Advertisements
Similar presentations
HOlistic Platform Design for Smart Buildings
Advertisements

A strategy for a Secure Information Society –
LEIT (ICT7 + ICT8): Cloud strategy - Cloud R&I: Heterogeneous cloud infrastructures, federated cloud networking; cloud innovation platforms; - PCP for.
Organisation: Botnia Living Lab hosted by Centre for Distance- spanning Technology ( Location: Luleå, Sweden Contact details:
1 ICT R&D&Innovation in Europe A market of more than 660 Billion Euro –Largest market world wide, (~34%) EU produces 23% of the world ICT value added –ICT,
Research and Innovation Research and Innovation Enabling & Industrial Technologies in Horizon 2020 Enabling & Industrial Technologies in Horizon 2020 Research.
EU-funded Digital Preservation Research APA 2014 Conference Brussels, 22 October 2014 Dr. Manuela Speiser European Commission DG CONNECT, unit "Creativity"
Annie Lalé of SQUARIS  FP7 Themes Relevant for Safety and Security  Focus of Research Projects in Emergency and Disaster Management  ICT Themes in FP7.
Future Internet Research & Experimentation (FIRE+) Integrating experiments & facilities in FIRE+ H2020-ICT/FET National Contact Points Training 23 October.
Cybersecurity, Trustworthy ICT Rodrigo MENDES – DG CONNECT Privacy and Cybersecurity Research in Industrial Leadership (LEIT-ICT)
European Network Technologies Connecting the Digital Society Future Networks EU Research for the ubiquitous ultrafast Internet of the future enabling every.
ICT 1 – Smart Cyber-Physical Systems in H2020
HORIZON 2020 ICT in societal challenges
Towards trustworthy ICT service infrastructures Yves PAINDAVEINE Directorate General Information Society and Media Unit F5 Security European Commission.
The New EU Framework Programme for Research and Innovation HORIZON 2020 Judit Fejes Executive Agency of Small and Medium Enterprises (EASME)
Provisional draft ICT for Independent Living and Inclusion European Commission, DG Information Society and Media E-Inclusion Unit (H3) Challenge 7.
Research and Innovation Research and Innovation Research and Innovation Research and Innovation Research Infrastructures and Horizon 2020 The EU Framework.
WORK PROGRAMME 2014 – 2015 Topic ICT 9: Tools and Methods for Software Development Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services,
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services Jorge GASOS.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Objective ICT Internet of Services, Software and Virtualisation Michel Lacroix European Commission Information Society and Media Directorate General.
Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate.
1 European policies for e- Infrastructures Belarus-Poland NREN cross-border link inauguration event Minsk, 9 November 2010 Jean-Luc Dorel European Commission.
The New EU Framework Programme for Research and Innovation ICT in HORIZON 2020 Carlos Oliveira DG CONNECT.
Work Programme for the specific programme for research, technological development and demonstration "Integrating and strengthening the European Research.
ICT-NCP Meeting 12 May 2009 Dr. Jorge Pereira DG INFSO G3 Embedded Systems and Control
ICT in HORIZON 2020 The New EU Framework Programme for Research and Innovation Morten Møller, Head of Programme Coordination Unit, DG CONNECT,
Information Society Technologies (IST) Programme 5th EU RTD Framework Programme.
ISPLC 2001 PLC in the IST Programme Thierry Devars DG INFSO/E1
"The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission“ Future Internet.
Participation in 7FP Anna Pikalova National Research University “Higher School of Economics” National Contact Points “Mobility” & “INCO”
1 Direction scientifique Networks of Excellence objectives  Reinforce or strengthen scientific and technological excellence on a given research topic.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Information Society and Media Directorate-General Unit Grid Technologies NCP Info Day Call5 - Brussels, 02 June – Advanced Grid Technologies,
EU Projects – FP7 Workshop 6: EU Funding –What’s Next? Carolina Fernandes Innovation & Funding Manager GLE Group.
MANISH GUPTA. Presentation Outline Introduction Motivation Content Expected Impact Funding Schemes & Budget.
The EU framework programme for research and innovation.
Lieve Bos European Commission DG CNECT Innovation Unit (F2) Parallel Session ICT-34 Pre-Commercial Procurement Open.
Introduction to our reality
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Accessible and Inclusive ICT European Commission, DG Information Society and Media ICT for Inclusion Unit (H3) Challenge 7 ICT Call 2 Information day Brussels,
Technology-enhanced Learning: EU research and its role in current and future ICT based learning environments Pat Manson Head of Unit Technology Enhanced.
Overview on European e-Infrastructure Augusto Burgueño DG CONNECT Porto, 18 June 2015 – GÉANT General Assembly.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI strategy and Grand Vision Ludek Matyska EGI Council Chair EGI InSPIRE.
1 Future Internet Research and Experimentation. 2  Mobility and pervasiveness  Security, trust, dependability  QoS for commercial video streaming applications.
DS Cyber Security for SMEs, local public administration and Individuals Dr. William Hynes Future Analytics Consulting (FAC)
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
ICT – SSI Smart System Integration Henri Rajbenbach European Commission DG CONNECT (Communications Networks, Content and Technology) ICT-03 -
Anne-Marie Sassen, Directorate General for Communication Networks, Content and Technology Factories of the Future Horizon.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
NCP Training Brussels, May 2016 European Commission, DG CONNECT Software & Services, Cloud Computing H2020 EU-Brazil Coordinated.
Connect A 3 Contact persons: Sandro D'Elia Anne-Marie Sassen Horizon 2020: LEIT – ICT WP
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Cybersecurity of Smart City Technologies Assessing the Security, Interoperability and Governance Issues Angelos Stavrou, J.P. Auffret, Dan Fleck and Constantinos.
EUB Brazil: IoT Pilots HORIZON 2020 WP EUB Brazil: IoT Pilots DG CONNECT European Commission.
Présentation de l’idée de projet
FP7 – ICT Theme a motor for growth, competiveness and social inclusion
FET Plans FET - Proactive 1.
ICT NCP Infoday Brussels, 23 June 2010
Horizon 2020: Key Enabling Technologies R&I for industrial leadership
How to approach a top-down call topic in Horizon 2020?
David Sayago EU Research Funding Team Valorisation Centre.
Presentation for information days Units involved:
Opportunities in Horizon2020 in Cybersecurity call for proposals
Cybersecurity, Trustworthy ICT
Juan Gonzalez eGovernment & CIP operations
ETSI Standardization Activities on Smart Grids
Présentation de l’idée de projet
Presentation transcript:

Digital Security: Cybersecurity, Privacy, Trust Gustav Kalbe Unit H.4, Trust and Security, DG Communications Networks, Content and Technology European Commission

H2020  FP7 R&D&I  R&D R&D Policy = Support to Policy 2

3 EU Cybersecurity Policy Cyber Security Strategy Technology / Industry R&DIndustrial strategy. trials, business cases edu. & train. International cybercrime Resilience R&D

4 LEIT Excellence Societal Challenges FET 1-6 7! x-cutting! embedded!

LEIT "Technology-driven approach to develop enabling technologies that can be used in multiple areas, industries and services" Scope: Experimentation with innovative research ideas Strategic Vision: Long term goal to replace the current business model to provide security as add-on by a security-by-design approach Outcome: Assist industry to adjust their business model to the strategic vision 5

Instrument: Research and Innovation Actions Coordination and Support Action (CSA) Technology readiness level: Next generation technology and generation thereafter Time to market introduction: 5-7 years (indicative) Research and Innovation Actions: Small contribution: between 2 and 4 MEuro (indicative) Large contribution: between 5 and 8 MEuro (indicative) 6 Specificities of LEIT

CALL: ICT Cybersecurity, Trustworthy ICT Cryptography (ICT32.a+b) Research & Innovation Actions (small and large) Coordination and Support Actions Security-by-design for end to end security (ICT32.a) Research & Innovation Actions (small and large) 7

Call Details Timeline: 11 Dec 2013Publication 23 Apr 2014Submission Deadline ( ) Jun 2014Evaluation Sep 2014Information on outcome of the scientific evaluation Dec 2014Signing grant agreements Budget: ICT32.a 37 Meuro (Security-by-Design & Cryptography R&I Actions) ICT32.b 1 Meuro (Cryptography CSA) 8

9 Cryptography – which results? Research projects have to address the key challenges to guarantee the security for the lifespan of the application it supports, to stay ahead of the evolution of the ICT environment and keep pace with the performance increase of ICT technology. net increase in performance reduction in energy or power consumption, validation in realistic application scenarios, Relevance to current trends (cloud, mobile, IoT,etc) methods for provable security against physical attacks security certification.

Cryptography – Challenges (1) Resource efficient, real-time and highly secure technology for 1.hardware based cryptography; or 2.homomorphic cryptography. Distributed cryptography including functional cryptography; Cryptographic tools for securely binding applications to software, firmware and hardware environments, with or without adaptation of primitives which are used; 10

Cryptography – Challenges (2) Post-quantum cryptography for long-term security; Quantum key distribution (QKD) systems and networks for long-term security-by-design (etc.) addressing: 1.low-bit-rate QKD with low cost components for short- distance; 2.high-bit rate QKD systems, tolerant to noise and loss. 11

Cryptography - CSA 12 durable integration and structuring of the European cryptography community; strengthen European excellence in this domain; provide technology watch, joint research agendas and foresight studies; identify technology gaps, market and implementation opportunities; technical expertise to cybersecurity and privacy communities; development of European standards (incl. public sector) solve training needs and skill shortage evaluation and verification of cryptographic protocols and algorithms. open competitions with benchmarking. dissemination and outreach, strengthening the link with institutional stakeholders.

13 Security-by-design "Security-by-design paradigms have to be developed and tested, to provide end-to-end security, across all hardware and software layers of an ICT system and application and business services." Paradigms for complex environments: Highly connected, complex and interoperable networks. Multi-layer and multi-service systems, spanning multiple domains or jurisdictions

Security-by-design – what? (1) Aiming at: Platform-independent solutions for context-aware and self- adaptive security Automated security policy governance for run-time verification, customisation and enforcement between operators or virtual entities, Important Considerations: Interaction of Layers Holistic Approach 14

Security-by-design – what? (2) Special Attention to: Open and dynamically reconfigurable environments Reliance on other, potentially untrustworthy, providers Importance of Usability: Deployment and implementation with usability in mind against improper use or misconfiguration for higher degrees of trust by users. 15

Expected Impact of ICT-32 (1) 16 Macro: New paradigms for the design and implementation. European ICT with a higher level of security and/or privacy. Compliance with Europe's security and privacy legislation. Measurably higher level of security and/or privacy with marginal additional cost. Societal: More user trust in ICT and online services. Better ability of users to detect breaches of security and privacy. Better privacy protection and legal compliance with privacy rules More resilient critical infrastructures and services.

Expected Impact of ICT-32 (2) 17 Research: User empowerment in new generation of ICT Security and privacy as a built-in feature Easier understanding and management for users. Simpler implementation of cryptographic primitives. New ICT technology approaches more secure than traditional ones

Security and Privacy LEIT ICT Have a look! ICT 1 – 2014: Smart Cyber-Physical Systems (privacy/security by design) ICT 4 – 2015: Customised and low power computing (security) ICT 5 – 2014: Smart Networks and novel Internet Architectures (security, trust, privacy) ICT 7 – 2014: Advanced Cloud Infrastructures and Services (security, privacy) ICT 14 – 2014: Advanced 5G Network Infrastructure for the Future Internet ICT 22 – 2014: Multimodal and Natural computer interaction (Robotics, security) ICT 26 – 2014: Photonics KET ICT 30 – 2015: Internet of Things and Platforms for Connected Smart Objects (security) EUB 1 – 2015: Cloud Computing, including security aspects (Joint Call with Brazil) EUJ 4 – 2014: Experimentation and development on federated Japan – EU testbeds (Joint Call with Japan) 18

Societal Challenges 19 Focus on addressing the needs of end-users. The extent of end-user participation is an important factor when evaluating the proposal's impact. Activities directly aiming at producing plans and arrangements or designs for new, altered or improved products, processes or services. Prototyping, testing, demonstrating, piloting, large- scale product validation and market replication.

Secure Societies Calls (CP-2014/2015) 2014: DS 1 – Privacy DS 2 – Access Control DS 6 – Risk management & assurance models Call deadline: 28 August 2014 (pending approval) Budget: 47 M€ 2015: DS 3 – Role of ICT in Critical Infrastructure Protection DS 4 – Secure information sharing DS 5 – Trust eServices 20

Contacts Leadership in enabling and industrial technologies (LEIT) ICT Cybersecurity, Trustworthy ICT Societal Challenge 7 Secure societies – Protecting freedom and security of Europe and its citizens DS 1 – DS 6 DRS 1 – DRS 23, FCT 1 – FCT 17, BES 1 – BES 14 21

Thank you for your attention

In summary... R&I to address user needs R&I to support compliance R&I = incentive to increase security R&I complementary to legal instruments R&I for European competitiveness of ICT industries => H2020 Digital Security WPs 23