Toward an EU strategy to defend our technological assets Second panel interview. Focus on defense against misappropriation of technogical assets Guillaume.

Slides:



Advertisements
Similar presentations
Bradford University School of Management Stimulating Employment and Growth : Do we need an Anglo- Saxon or a Nordic Model? Frank McDonald.
Advertisements

Western Balkans and Europe 2020 Western Balkans and Europe 2020 Towards Convergence and Growth – Draft Conclusions Brussels, March 2011.
From a Political Resolution… to a Work Programme
- 1 - RSPG on the Radio Spectrum Policy Program (RSPP) Brussels, 23 March 2010.
Global Information Systems
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Annual Conference of the European Commission's Humanitarian Aid Partners Funding Humanitarian Aid Basic figures - Draft Budget 2011 By Budget line.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
INTERNATIONAL COOPERATION PUBLIC CONSULTATION FIRST OVERVIEW EXPORTIC 27 March 2008 JF SOUPIZET HEAD OF INTERNATIONAL RELATIONS DG INFSO These view are.
An Introduction to regulation, it ’ s significance and rationale Kevin Hinde.
Comparison of New Laws in the Global Market: Does the SVLK fit? Rachel Butler Independent Technical Advisor to the European Timber Trade Federation.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
INTERNATIONAL BUSINESS
1 Building the Knowledge Base. 2 New Parameters In crossing international borders, a firm encounters parameters not found in domestic business. Examples.
Animal Welfare EU Strategy Introduction Community Action Plan The Commission's commitment to EU citizens, stakeholders, the EP and.
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
EPC EDUCATION AND TRAINING – Applications for Membership of the EU Turkey - April 1987 Cyprus - July 1990 Malta - July 1990 Hungary.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
│ 1│ 1 What are we talking about?… Culture: Visual Arts, Performing Arts, Heritage Literature Cultural Industries: Film and Video, Television and radio,
WP8– Governance Models Jurry de la Mar T-Systems – 26 June 2014.
“The Quality Infrastructure in Lebanon” Export Norms, Quality Control and Competitiveness FUTURE PROGRAMME Prepared By Ali Berro Director of Quality Programme.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
IT Controls Global Technology Auditing Guide 1.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
Unfair Trade Practices: Conceptualisation, Significance and Regional Perspectives March 11, 2011.
Integrating Innovation and Creativity into National Policies and Strategies: The International Perspectives By Getachew Mengistie, Intellectual property.
Border Security and Management Process in Transformation.
1 INTERNATIONALMANAGEMENT Chapter 1 Understanding International Business & Management.
© Copyright Allianz IIS Redefining the industry: Regulation, Risk & Global Strategy July 9, 2007 Berlin Helmut Perlet, Allianz SE The Emergence of Solvency.
The Role of Tax Policy in a functioning Economic and Monetary Union Panel discussion Giampaolo Arachi Università del Salento European Economic and Social.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Dutch presidency agenda on ensuring industrial competitiveness Erik Janssen, Ministry of Economic Affairs The Netherlands.
International Contracts Slide Set 1a The Legal Environment of International Markets Matti Rudanko.
A look into current and future trends in national policies for eHealth and Innovation in the WHO European Region Clayton Hamilton, eHealth and Innovation.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
LEB Slide Set 1 The Legal Environment of International Markets Matti Rudanko.
NORTHWEST ENERGY EFFICIENCY ALLIANCE Strategic Energy Management a plank in your Sustainability Platform John Wallner, Sector Manager October 2012.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Syria & Modern Banking in Light of Arab & International Practices Role of the Banking Sector in Developing Private Businesses Poul Gadegaard 2 nd - 3 rd.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
Privacy and ‘Big Data’: the European perspective Human Subjects’ Protections in the Digital Age: IRB, Privacy and Big Data Peter Elias, University of Warwick.
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$
MIT University Skopje Ass. Prof. Oliver Andonov, PhD
Cyber Security – An Existential Threat? (IIC, Singapore)
Cybercrime: Mitigation Challenges
TPMS OICA POSITION Informal document No. GRRF-64-29
Programme of the Government of the Republic of Bulgaria (draft)
National Capitalism and Competition
The ATTRACT initiative
I have many checklists: how do I get started with cyber security?
Cybersecurity: the consumer perspective
Feedback from ACEA truck manufacturers and next steps
Animal Welfare EU Strategy
Trade Secrets 2018: International
Security for Safety: Enabling Digitalization of Railway Systems
The European Union response to cyber threats
Development of IAS policy
Neil Kirton and Zoë Newman
Strategic threat assessment
GRC - A Strategic Approach
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MGT601 SME MANAGEMENT.
MICRO: Enhancing Competitiveness of Micro-enterprises in Rural Areas
Presentation transcript:

Toward an EU strategy to defend our technological assets Second panel interview. Focus on defense against misappropriation of technogical assets Guillaume Capois – CSO EADS 4 th September Brussels CS/SY

EU technological assets protection Page /09/04 Agenda 1 1 EADS specificities Espionage / Cybercrime becomes the highest threat on Technological assets Axes for protection (1): EU legal framework for technological asset protection Axes for protection (2): Trust circle for sharing information Axes for protection (3): European trusted tooling and providers for asset protection 6 6 Risks & Traps

Specificities of EADS reflect a large number of concerns of European Industries regarding the need to develop a EU harmonized strategy to protect technological assets –EADS is « a » European Company which technological assets are shared in 4 Core Countries (Fr; Ger; Spn; UK) EADS is in many domains the unique company in EU (Airbus planes; Ariane Launcher) –EADS advanced technologies are shared with numerous external providers which are for a large part spread in the EU. –EADS is acting in Aeronautic, Space, & defense sectors which are among the most important and sensitive development objectives for a large number of countries and competitors –EADS owns and develops very advanced technologies and processes which are the main key elements to be and stay a A player at world level. Those innovations and technologies are both tangible and intangible assets. That makes EADS a valuable target for technological asset thiefs EU technological assets protection Page /09/04 Source: Mendiant 2013 threat report

Espionage is the main vector of misappropriation of Technological assets Among many technics and processes the one dramatically increasing is the Cybercrime. Cyber attacks are already one of the biggest threat on companies patrimony and will surely and quickly increase Most of the attacks are generally delivered cross border, and are spread in systems jumping legal boundaries, using any flaw, non-harmonization, lack of collaboration, absence of information-sharing, unsafe tools, and non-alignment on legal consequences This leads to increase space for freedom and hidden actions of thief EU technological assets protection Page /09/04 Source: Ponemon Institute

Defense against misappropriation of technological assets includes various axes (1) Creation of a EU legal framework for technological asset protection –Harmonization of legal framework on punishment of penetration, disruption, and attempts on information systems The new EU directive on Cyber –Creation/ Harmonization of legal framework on protection of companies technological assets and trade environment (i.e. Loi sur le secret des affaires (Fr), trade secrets law (Sweden)..) including common understanding, protection liability and punishment, litigation. Does not exists at EU level –Specific protection of EU (multi-members) specifically owned innovations and sensitive technologies (i.e. Potentiel Scientifique et Technique (Fr)) Does not exists at EU level EU technological assets protection Page /09/04

UKDeSpFr Defense against misappropriation of technological assets includes various axes (2) Creation of a trust circle for sharing information, alerts and fostering support for incidents and reactions –There is a need for breaking the mold, the national borders within the EU so as to share alerting, responses and drill exercises, potentially to coordinate responses. A « Shengen zone » for such items NIS need to share within Europe what is impactful to others and prevent a « weakest link » syndrome Industry needs to be involved to benefit from the framework both in terms of sensor to alert and receiver to protect –EADS has historically felt the need to work closely with its 4 core NIS -due to the nature of its industrial business- to some extent with success EU technological assets protection Page /09/04

Defense against misappropriation of technological assets includes various axes (3) Support for development of a European trusted tooling and providers for asset protection –The lack of European-endorsed products, services or provider to support the protection of its technology asset is a hamper to better protection. Key players tend to be from outside borders, in potential conflict with the interest of the protection of the asset in some cases –Such European-endorsed products, services and providers could cover Physical protection of premises (through materials or standards) Digital protection of assets, through approved encryption, or detection of wrongdoers « Trusted European cloud » European trusted providers in the field of technological asset protection through a label EU technological assets protection Page /09/04

Risks and traps to avoid Defense and support solutions to protect technological assets, (i.e. legal, technics..) must be pragmatic and flexible enough and avoid any dogmatic approach which may disturb or endanger fair competitions and export, slow down or complexify business and innovation … The weight of the protection must not spoil agility and industrial speed. The political time of regulations and laws and the industrial time of innovation and business are traditionally far from aligned in pace, however while this unfolds, foreign parties interested in obtaining technological assets continue operating. Standstill means a loss of the assets. While working on a « European asset protection 2.0 », and by the time it is delivered, innovation and international competition might drive us into « 3.0 assets ». Any regulation must be ready to withstand the test of fast-paced innovation. EU technological assets protection Page /09/04

Questions ? EU technological assets protection Page /09/04