Download presentation
Presentation is loading. Please wait.
1
Cybersecurity, Trustworthy ICT
Privacy and Cybersecurity Research in Industrial Leadership (LEIT-ICT) and Societal Challenges (SC7). Rodrigo MENDES – DG CONNECT
2
Cybersecurity, Trustworthy ICT
Security and privacy related research actions appear in Leadership in Enabling and Industrial Technologies (LEIT) and Societal Challenges (SC). The calls in LEIT-ICT and SC7 are complimentary – they do not overlap.
3
Cybersecurity, Trustworthy ICT
In SC7, the focus will be on innovation (closer to market) and is strongly linked with the Cybersecurity Strategy and proposed NIS Directive. In LEIT-ICT, the focus will be longer term research concerning technological building blocks (e.g. cryptography) and concepts (e.g. security by design).
4
Cybersecurity, Trustworthy ICT
The Privacy and Cybersecurity actions (for 2014) can be found in the following calls: SC: Societal Challenge 7 – Secure Societies – Digital Security (Privacy, Access Control, Risk management and assurance models) LEIT: ICT Information and Communication Technologies, Objective 32: Cybersecurity, Trustworthy ICT
5
LEIT- ICT 32: Cybersecurity, Trustworthy ICT
Looking for solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities. a. Research & Innovation Actions Security-by-design for end-to-end security Cryptography 36 M €: small and large projects Activities supporting the Cryptography Community 1 M€: Coordination and Support Actions
6
Thanks for your attention!
LEIT- ICT 32: Cybersecurity, Trustworthy ICT Thanks for your attention! DG CONNECT – H.4 Trust & Security Who is who: For more information please contact: Dr. Gustav Kalbe Deputy Head of Unit
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.