12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

Philippine Cybercrime Efforts
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Technology Module: Technology Readiness Levels (TRLs) Space Systems Engineering, version 1.0 SOURCE INFORMATION: The material contained in this lecture.
CIRAS PROJECT OVERVIEW
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
PRESENTED BY ELIZABETH TAMALE ASSISTANT COMMISSIONER MINISTRY OF TRADE, INDUSTRY AND COOPERATIVES AID FOR TRADE, INTELLECTUAL PROPERTY AND DEVELOPMENT-
European Union Agency for Network and Information Security Follow ENISA: ENISA and standards Sławomir Górniak European Union Agency.
WP5 Digital Business Ecosystem Alessandra Benvenuti, INSIEL SpA (Friuli Venezia Giulia Region) ADC Final Conference Venice, March 13 th 2012.
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services Jorge GASOS.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
European Grid Initiative Technical Forum 21 September 2011, Lyon The Digital Agenda for Europe What about the Cloud? Carl-Christian Buhr European Commission.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Porvoo7 – Reykjavík 26. May 2005 – Hótel Loftleiðir European Network of National Test-beds for eBusiness, ETeB The Porvoo Group 7th Seminar on Interoperable.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
The Center for Space Research Programs CSRP Technology Readiness Level.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
THE REPUBLIC OF SLOVENIA MINISTRY OF HIGHER EDUCATION, SCIENCE AND TECHNOLOGY e: Kotnikova 38, 1000 Ljubljana p:
Risk and Crisis Management Building OECD Principles on Country Crisis Management.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The EU framework programme for research and innovation.
ESRIF European Security Research and Innovation Forum Giancarlo Grasso, Finmeccanica ESRIF DEPUTY CHAIRMAN.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Geneva, Switzerland, 14 November 2014 ENISA and Cloud Certification Dimitra Liveri Security and Resilience of Communication Networks Officer ENISA ITU.
Alun JONES EU Network Manager European Agency for Safety and Health at Work 6 th Framework Programme on Research.
SAS_08_Legacy_Safety_Hill Assurance and Recertification of Safety Critical Software In Legacy Systems Janie Hill NASA Kennedy Space Center, Florida
Horizon 2020 – 2016 Transport Call
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
ISACA Ireland Cyber Security Policy 9 February 2016.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
ANSI – ESOs meeting Washington February 2017
Cyber Security and Georgia. New Challenges
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
The Tripartite Working Arrangement (TWA) of EFCA, EMSA and Frontex
Crisis management related research at
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Critical Infrastructure Protection Policy Priorities
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
How to approach a top-down call topic in Horizon 2020?
David Sayago EU Research Funding Team Valorisation Centre.
The new European Consensus on Development
Forth International Forum
Trust and Security Unit
Opportunities for Cybersecurity and Privacy clusters
Susan Johnson CFOA Director Performance & Improvement
Cyber Security Ecosystem of Georgia. Experience and Challenges
Security for Safety: Enabling Digitalization of Railway Systems
The European Union response to cyber threats
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Community of Users.
Towards a Framework for Adaptation to Climate Change
The CYBERWISER.eu project
G. Technology Readiness Levels (TRL*)
UNODC and CYBERCRIME October 2009.
Presentation transcript:

12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects

Introduction Objective: build together a map of current projects along three dimensions: Cybersecurity objective (as extracted from EU Cybersecurity Strategy), Target sector/s Technology readiness

Cybersecurity dimension Map the project according concepts extract from Strategic Priorities and Actions of EU Cybersecurity Strategy Document. om/cf/dae/document.cfm?doc_id=1667 (see details in the appendix) 9/5/20153

CSP Forum Event: XXXXXX Project Information Sharing Risk Management Incident Reporting Public-Private Partnership Cyber-incidents simulation Raising Awareness NIS Education and Training Legal Framework Forensic tools Threat analysis Secure Internet for children Cyberdefence Transparency about security Security Labels (Certification) Security Economics Coordination ResearchAgendas Cryptography Confidence Building (trust) Data Protection Preventing mass- surveillance/censorship International Cooperation Other (security) tools.Specify in one-word ASSERT4SOA Secure service discovery SecCord PoSecCo ….. …

Sector dimension Map project to (primary) sectors impacted (use- cases, pilot, main target of the technology, partners,…) Provide one word description per sector If Sector not listed: add it under “Other” If “Cross-Cutting” provide one-word description of the technology 9/5/2015 CSP Forum Event: XXXXXX 5

Primary Target Sectors 9/5/20156 Project TransporteGovEnergyICTFinanceHealth Other (specify) Cross- Cutting ASSERT4SOA Certification for services Certified Marketplace Defense Secure service discovery PoSecCo ….

Technology readiness dimension Map project to Technology readiness, based on the levels (see next slide) Technology Readiness typically evolve during project lifetime Consider level per year Insert future years based on plan/estimation between brackets, (2014) Project finishing year in red 9/5/20157

Technology Readiness Level (adapted from NASA level) Description Technology Readiness Level Basic principles observed and reported 1 Technology concept and/or application formulated 2 Analytical and experimental critical function and/or proof of concept 3 Software component validation in testbed 4 Software component validation in a relevant environment (actual use case) 5 Software system/prototype validation in a relevant environment (pilot) 6 Software system/prototype validation in a real- world scenario (large scale pilot) 7 Actual software system completed & validation in a real-world scenario 8 Actual system ready for commercialization 9 Basic Technology Research Research to Prove Feasibility Technology Development Technology Demonstration System Development Production System

Technology Readiness 9/5/20159 Project ASSERT4SOA …. PoSecCo … Basic Technology Research Research to Prove Feasibility Technology Development Technology Demonstration System Development Production System

References NASA Technology Readiness Level, Mankins, John C. Technology Readiness Levels: A White Paper". NASA, Office of Space Access and Technology, Advanced Concepts Office. (also discussion in SecCord Deliverable D6.1)Technology Readiness Levels: A White Paper" Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace - JOIN(2013) 1 final - 7/2/ Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union - COM(2013) 48 final - 7/2/2013 – EN CSP Forum and SecCord 9/5/201510

Appendix Next slide provides the list of concepts extracted from EU Cybersecurity Strategy documents, and used in the map. 9/5/201511

EU Cybersecurity Strategies Priorities and concepts 1.Cyber resilience Information sharing & mutual assistance amongst NIS authorities Best practice for sharing Risk Management Incident Reporting Public-Private Partnership Cyber-incidents simulation Raising Awareness NIS Education and Training 2.Reducing cyber crime Legal framework Forensic Tools Threat Analysis Other tools NIS Training for law enforcement Better internet for children Information sharing & mutual assistance 3.Cyberdefence policy and capabilities related to the Common Security and Defense Policy (CSDP) Cyberdefence tools Cyberdefence policy 9/5/ Develop the industrial and technological resources for cybersecurity Transparency about security in ICT Products Security Labels (Certification) Security Economics Coordination Security Research Agendas Cryptography 5.Coherent international cyberspace policy for EU Confidence Building & transparency Data Protection Preventing mass-surveillance/censorship International cooperation