Download presentation
Presentation is loading. Please wait.
Published byJacoby Holeman Modified over 9 years ago
1
Cybersecurity, Trustworthy ICT Rodrigo MENDES – DG CONNECT Rodrigo.Mendes@ec.europa.eu Privacy and Cybersecurity Research in Industrial Leadership (LEIT-ICT) and Societal Challenges (SC7).
2
Cybersecurity, Trustworthy ICT Security and privacy related research actions appear in Leadership in Enabling and Industrial Technologies (LEIT) and Societal Challenges (SC). The calls in LEIT-ICT and SC7 are complimentary – they do not overlap.
3
Cybersecurity, Trustworthy ICT In SC7, the focus will be on innovation (closer to market) and is strongly linked with the Cybersecurity Strategy and proposed NIS Directive. In LEIT-ICT, the focus will be longer term research concerning technological building blocks (e.g. cryptography) and concepts (e.g. security by design).
4
Cybersecurity, Trustworthy ICT The Privacy and Cybersecurity actions (for 2014) can be found in the following calls: SC: Societal Challenge 7 – Secure Societies – Digital Security ( Privacy, Access Control, Risk management and assurance models ) LEIT: ICT Information and Communication Technologies, Objective 32: Cybersecurity, Trustworthy ICT
5
LEIT- ICT 32: Cybersecurity, Trustworthy ICT Looking for solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities. a.Research & Innovation Actions Security-by-design for end-to-end security Cryptography 36 M €: small and large projects b.Activities supporting the Cryptography Community 1 M€: Coordination and Support Actions
6
Thanks for your attention! DG CONNECT – H.4 Trust & Security Who is who: http://cordis.europa.eu/fp7/ict/security/contacts_en.html LEIT- ICT 32: Cybersecurity, Trustworthy ICT For more information please contact: Dr. Gustav Kalbe Deputy Head of Unit Gustav.Kalbe@ec.europa.eu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.