Download presentation
Presentation is loading. Please wait.
Published byMartin Hoover Modified over 9 years ago
1
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY
2
ENISA brings together those who establish certification schemes and those who need them, promoting the use of information security certifications in Europe
3
About ENISA current and emerging risks of electronic communications networks authenticity, integrity and confidentiality of communications ‘common methodologies’ to prevent security issues current and emerging risks of electronic communications networks authenticity, integrity and confidentiality of communications ‘common methodologies’ to prevent security issues
4
ENISA
5
INFORMATION SECURITY KEY ELEMENTS raising awareness and building confidence of electronic communication users extend the dissemination capacities of best practices promote the security certification schemes INFORMATION SECURITY KEY ELEMENTS raising awareness and building confidence of electronic communication users extend the dissemination capacities of best practices promote the security certification schemes
6
ENISA Permanent Stakeholders’ Group mutual communication with the relevant stakeholders on all issues related to the Agency’s work programme leading experts in network and information security representing relevant stakeholders ----information and communication technologies industry ----consumer and user organizations ----academic and research institutions mutual communication with the relevant stakeholders on all issues related to the Agency’s work programme leading experts in network and information security representing relevant stakeholders ----information and communication technologies industry ----consumer and user organizations ----academic and research institutions s
7
P r o m o t i n g s e c u r i t y c e r t i f i c a t i o n s c h e m e s Certification is an important factor of the confidence that users may have in the electronic communication tools The use of such certificates is usually considered as one of the good indicators of the level of security achieved by a given entity Certification is an important factor of the confidence that users may have in the electronic communication tools The use of such certificates is usually considered as one of the good indicators of the level of security achieved by a given entity
8
ENISA organized an event on certification schemes for information security ICT systems, products IT security systems security expertise security management trust for e-commerce ENISA organized an event on certification schemes for information security ICT systems, products IT security systems security expertise security management trust for e-commerce
9
ENISA What can we achieve with information security certification? “Voice your opinion on information security certifications in Europe” ENISA Workshop on November 28th, 2006 Sofitel, Athens Airport, Greece What can we achieve with information security certification? “Voice your opinion on information security certifications in Europe” ENISA Workshop on November 28th, 2006 Sofitel, Athens Airport, Greece
10
2007 ENISA Work program ENISA intends to promote certification schemes to improve knowledge, skills and confidence of citizens (in particular non- experts ) to foster both technical and organisational interoperability on information security in Europe ENISA intends to promote certification schemes to improve knowledge, skills and confidence of citizens (in particular non- experts ) to foster both technical and organisational interoperability on information security in Europe
11
FACILITATING CO-OPERATION EXISTING CERTS/CSIRTS computer security incident response teams play a key role limiting the damage resulting from a breach recovering from a breach as quickly as possible assistance to victims of attacks, vulnerability assessments, awareness raising and promotion of best practises FACILITATING CO-OPERATION EXISTING CERTS/CSIRTS computer security incident response teams play a key role limiting the damage resulting from a breach recovering from a breach as quickly as possible assistance to victims of attacks, vulnerability assessments, awareness raising and promotion of best practises
12
ENISA wide recognition and an improved visibility of such schemes assistance to providers and users of certifications make the market more open and dynamic wide recognition and an improved visibility of such schemes assistance to providers and users of certifications make the market more open and dynamic
13
ICT Security Standards Roadmap to assist in the development of security standards by bringing together information about existing standards and standards in progress
14
The initiative is a collaborative action among ENISA, the Network and Information Security Steering Group (NISSG) and the ITU-T Study Group 17 ICT Security Standards Roadmap (Version 2.0, May 2007) The initiative is a collaborative action among ENISA, the Network and Information Security Steering Group (NISSG) and the ITU-T Study Group 17 ICT Security Standards Roadmap (Version 2.0, May 2007)
15
The Roadmap in five parts Part 1: ICT Standards Development Organizations and Their Work Part 2: Approved ICT Security StandardsPart 1: ICT Standards Development Organizations and Their Work Part 2: Approved ICT Security Standards Part 3: Security standards under development Part 4: Future needs and proposed new security standard Part 3: Security standards under development Part 5: Best practices The Roadmap in five parts Part 1: ICT Standards Development Organizations and Their Work Part 2: Approved ICT Security StandardsPart 1: ICT Standards Development Organizations and Their Work Part 2: Approved ICT Security Standards Part 3: Security standards under development Part 4: Future needs and proposed new security standard Part 3: Security standards under development Part 5: Best practices
16
the next generation of information technology systems: the "embedding of intelligence" ARTEMIS PROPOSAL 15.5.2007 COUNCIL REGULATION on the establishment of a Joint Undertaking to implement a Joint Technology Initiative in Embedded Computing Systems the next generation of information technology systems: the "embedding of intelligence" ARTEMIS PROPOSAL 15.5.2007 COUNCIL REGULATION on the establishment of a Joint Undertaking to implement a Joint Technology Initiative in Embedded Computing Systems
17
Europe's capability to engineer domain- specific solutions for embedded electronic in key areas such as the automotive, industrial and energy sectors, telecoms, or aerospace
18
more than 90% of computing devices embedded the share of embedded systems in the value of the final product key industrial sectors within the next 5 years 36% in automotive industry, 37% in telecommunications 41% in consumer electronics more than 90% of computing devices embedded the share of embedded systems in the value of the final product key industrial sectors within the next 5 years 36% in automotive industry, 37% in telecommunications 41% in consumer electronics.
19
the Specific Programme "Cooperation" of the European Community 7th FP (2007- 2013) for research, technological development and demonstration activities Joint Technology Initiatives (JTIs) a new way of realising public-private partnerships in research at European level the Specific Programme "Cooperation" of the European Community 7th FP (2007- 2013) for research, technological development and demonstration activities Joint Technology Initiatives (JTIs) a new way of realising public-private partnerships in research at European level
20
THE END
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.