ICT-C Meeting, 25 July 2007 Jacques Bus Head of Unit, INFSO-F5 “Security” ICT and Security FP7 Themes Joint Call on Critical Infrastructure Protection.

Slides:



Advertisements
Similar presentations
19 November 2004 PDS/1 6cp Workshop Programme of Work PASR-2005 Pieter De Smet.
Advertisements

ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
THE EUROPEAN GENERAL PRODUCT SAFETY NETWORK Erik Hansson DG Health and Consumer Protection European Commission.
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Information Day 16th September 2009 REA - Brussels Seventh Framework.
DG Joint Research Centre Institute for Energy and Transport
International S&T Cooperation in FP 7 The EU Research Framework Programme 2007 – 2013 Alessandro DAMIANI European Commission Directorate General for Research.
SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
Annie Lalé of SQUARIS  FP7 Themes Relevant for Safety and Security  Focus of Research Projects in Emergency and Disaster Management  ICT Themes in FP7.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Health & Consumer Protection Directorate General The EU Health Strategy and the new Health and Consumer Protection Programme Bernard Merkel Paula.
DR MACIEJ JUNKIERT PRACOWNIA BADAŃ NAD TRADYCJĄ EUROPEJSKĄ Guide for Applicants.
Identification of Critical Infrastructures in the Mediterranean Sea context and communications’ criticalities Irene Fiorucci Cesidio Bianchi Istituto Nazionale.
Y. PERREAL, THALES - Project leader SECUR-ED, FP7 – SRC’10, Ostende.
Re silience of C ritical I nfrastructure P rotection in E urope (RECIPE) PhD Robert Mikac, RECIPE Project Manager Head of Sector for Civil Protection,
Training & research for academic newcomers A project of the King Baudouin Foundation © 2013 Gabriella Calderari1.
FP7 Regler för deltagande 18 december 2006 Monica Hjertman, Enheten för Europaprogrammen, VINNOVA
Provisional draft The ICT Theme in FP7 Submission and Evaluation (preliminary information) ICT-NCP Information Day 19 th October 2006.
Cross-border Empowerment of Next Generation Access National Networks MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS REPUBLIC OF BULGARIA.
Session 3 – Information Security Policies
1 Science and Society: EU Strategy and actions Dr. Rainer GEROLD Director Science and Society Research DG European Commission.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Info Day on New Calls and Partner Café Brussels, 10 February 2011 How to apply: Legal Framework – Beneficiaries – Application and Selection Procedure.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
SECURE –FORCE Project Christodoulos Keratidis Atlantis Consulting S.A. 1 st SEE-INNOVATION Know How Event Skopje, December 2006.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 INFRA : INFRA : Scientific Information Repository supporting FP7 “The views expressed in this presentation are those of the author.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
A National approach to Cyber security/CIIP: Raising awareness.
EMTA European issues: PSO and Green Paper Progress report – April 2007 EMTA General meeting.
1 NOT LEGALLY BINDING Energy Info day FP7-ENERGY-2008-RUSSIA 13th December 2007 International Co-operation FP7 Energy Theme Energy EU-Russia Call European.
Dr. Marion Tobler, NCP Environment Evaluation Criteria and Procedure.
Hellenic Research Foundation1 31 March 2006 The 2006 Call of the Preparatory Action for Security Research Pieter De Smet European Commission DG ENTR-H4.
AIDA negotiation process AIDA NCP Meeting,
K. Lautso K. Lautso: Research and Development – effectiveness through international co-operation Financing for Research and Development EIB.
COMPARABLE EU STATISTICS ON CRIME, VICTIMISATION AND CRIMINAL JUSTICE Political Background Elements of an Action Plan European Commission Directorate-General.
Regional Policy EU Cohesion Policy 2014 – 2020 Proposals from the European Commission.
Presented by Dr. Kristóf Horváth Deputy Director General Hungarian Atomic Energy Authority Based on the Guideline developed by the WG on Computer Protection.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
1 European Commission Enterprise and Industry DG Entrepreneurship and Innovation Programme Management Committee, Brussels, 26 June 2008 Public Procurement.
The 4 th Railway Package: Impact for the keepers Clio Liégeois.
Slide 1 Recognition of Professional Qualifications in the European Single Market for Services Henri Olivier FEE Secretary General FEE (Fédération des Experts.
1 7 th Research Framework Programme Rules for the Participation.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Rafael Rodríguez Clemente. Coordinator* *Estación Biológica de Doñana, CSIC. Sevilla (Spain) MoCo Meeting, Casablanca (Morocco)
National INFOSEC Organisations and INFOSEC Management in Hungary.
Rules of Participation in Framework Programme 7 Brussels Office Helmholtz Association of German Research Centres Rue du Trône 98 B-1050 Brüssel
Third country participation in FP7 Place: Date. The Seventh Framework Programme Organisations or individuals from countries outside of the EU and Associated.
 the creation of an "internal market" in research (free movement of knowledge, researchers and technology)  the restructuring of the European research.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
The 7th Framework Programme for Research: Strategy of international cooperation activities Robert Burmanjer Head of Unit, “International Scientific Cooperation.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Richard Escritt, Director – Coordination of Community Actions DG Research, European Commission “The development of the ERA: Experiences from FP6 and reflections.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
DG Enterprise and Industry European Commission Standardisation Aspects of ICT and e-Business Antonio Conte Unit D4 - ICT for Competitiveness and Innovation.
Proprietary and confidential. Do not distribute.Deck Title1 May, 2016 DG CONNECT European Catalogue KEY RULES & DECISION MAKING Trilateral: Monica Lagazio,
A COMPREHENSIVE APPROACH
Public procurement of innovation
TRANSPORT SCIENCE: INNOVATIVE BUSINESS SOLUTIONS
Critical Infrastructure Protection Policy Priorities
Cyber Security coordination in Europe CERT-EU’s perspective
Project background In most of the European countries the knowledge regarding measures taken in self-help and -protection is very poor An effective and.
The European Union response to cyber threats
Proposal for setting up a RDG Task Force on Cooperation Models
SOCIAL DIALOGUE WITHIN THE SCOPE OF EUPAN
Security requirements
European Programme for Critical Infrastructure Protection (EPCIP)
Council of the European Union
Presentation transcript:

ICT-C Meeting, 25 July 2007 Jacques Bus Head of Unit, INFSO-F5 “Security” ICT and Security FP7 Themes Joint Call on Critical Infrastructure Protection Handling “Sensitive” Projects

Joint FP7 Call between Security and ICT Themes on Critical Infrastructure Protection (1) Call FP7-ICT-SEC  ICT Objective 1.7  Budget 40 m€ (ICT Theme 20m€, Security Theme 20m€)  Opening 30 AUG 2007 Closing 29 NOV 2007 at 17:00 (Brussels time)Aims  More secure and dependable Critical Infrastructures (CI’s)  Protect CI’s against deliberate acts of terrorism, natural disasters, negligence, mismanagements, accidents, computer hacking, criminal activity and malicious behaviour  New technical solutions that support and refine the policy options and legislative processes  ‘Coalition formation’ and ‘consensus building’

Focus of the FP7 ICT Theme a)Understand and Manage complex interconnected and interdependent CI’s; b)Build secure and resilient networked and distributed information and process control systems; Risk analysis, security configuration & management; security forensics; c)Develop research roadmaps, metrics, benchmarks, International-Cooperation Technology building blocks for creating secure, resilient, responsive and always available information infrastructures linking critical infrastructures (CI’s) Joint FP7 initiative between Security and ICT Themes on Critical Infrastructure Protection (2)

Joint FP7 initiative between Security and ICT Themes on Critical Infrastructure Protection (3) Joint FP7 initiative between Security and ICT Themes on Critical Infrastructure Protection (3) Focus of the FP7 Security Theme a)Risk assessment and contingency planning for interconnected transport or energy networks b)Modelling and simulation for training c)Optimised situational awareness through intelligent surveillance of interconnected transport or energy infrastructures d)ICT support for first responders in crises occurring in critical Infrastructures Technology building blocks for secure, resilient and always available transport & energy infrastructures that survive malicious attacks or accidental failures and guarantee continuous provision of services

 Indicative Call Budget: 40 m€ – 20 m€ by ICT Theme and 20 m€ by Security Theme – Collaborative Projects: Up to 36 m€ Expected Project Proposals  Typical size of 2-5 m€ (total cost) and duration of 2-4 years – Coordination and Support Actions: Up to 4 m€ Expected Project Proposals of average size around 0.5 m€  Provisional: Information Day in Brussels on 27 SEP 2007 – further info will become available at the dedicated web site: Joint FP7 initiative between Security and ICT Themes on Critical Infrastructure Protection Budget Call and Information

Handling “Sensitive” Projects What is a sensitive project?  No “Sensitive” Proposals are allowed in the call (no classified information in a proposal)  BUT: a Proposal could lead to a “Sensitive” Project (project that could use classified/sensitive background and/or produce classified/sensitive foreground)  A “Sensitive” Project is handling: – Data or information requiring protection against unauthorised disclosure: classified information – Information or materials subject to security restrictions – Material subject to export- or transfer-control Some subjects are sensitive and have always been addressed nationally

Handling “Sensitive” Projects Classification of information  Each country has a national classification system  EU classification system established to allow exchange of sensitive information inside the EU  This EU classification is recognised by all Member States (MS)  In a European project, classified information may be exchanged between EU participants on the basis of EU classification procedures  Each MS has designated a National Security Authority (NSA)  The NSAs are managing the EU classification procedures for the entities located in their MS

 cause exceptionally grave prejudice to the essential interests of the EU or of one or more of its MS  no EU TOP SECRET classified information in an FP7 action  seriously harm the essential interests of the EU or of one or more of its MS  harm the essential interests of the EU or of one or more of its MS  be disadvantageous to the interests of the EU or of one or more of its MS Information and material the unauthorised disclosure of which could: TRES SECRET UE / EU TOP SECRET SECRET UE CONFIDENTIAL UE RESTREINT UE Handling “Sensitive” Projects Levels of classification of information

Handling “Sensitive” Projects Sensitive proposals with non-EU participants  EU classification is limited to EU Member States  Sensitive projects can include participants from associated or third countries  Countries having a security agreement with the EU (Council level) could refer to that security agreement for handling sensitive information and material  Special MoU (Memorandum of Understanding) could be agreed between the countries involved in the handling of sensitive information/material of a project limited to that project No restriction for the participation to sensitive projects for associated countries and from third countries if no access foreseen to sensitive information/material

“Sensitive” Project Proposals and the ICT-Committee  EC sends to the Programme Committees of the ICT Theme and the Security Theme the evaluation results of the joint Call  a ranked “selection” list of successful proposals (proposals for negotiation or on reserve list)  All sensitive project proposals are flagged  ICT-C will have the discretion of proposals selected under the budget of the ICT-Theme and is informed of the proposals to be selected under the budget of the Security Theme  ICT-C Members or ICT-C Observers could request that some additional proposals from the selection list are identified as sensitive

Handling “Sensitive” Projects Scrutiny Procedure  For each sensitive project proposal of the selection list:  The concerned ICT-C Members or ICT-C Observers will be requested (via their national security authority representative) to verify that all security aspects are properly addressed and to reach an agreement among themselves  the scrutiny procedure is done, in a 2 months period, following the evaluation and before the start of the negotiation of the flagged projects  The results of the scrutiny could be:  go ahead with negotiation;  recommendations for the negotiation;  Recommendation not to finance the proposal  Proposers receive report with the conclusions of the scrutiny procedure