SlideShare ist ein Scribd-Unternehmen logo
1 von 14
ECSO
European Cyber Security Organisation
contractual PPP on cybersecurity
Fabio Martinelli
National Research Council of Italy
Vice Chairman of ECSO Board and WG6 co chair
Cloudscape Brazil and Workshop on Cloud Networks 2017
Outline
• ECSO cPPP
• ECSO WG6 SRIA
AIM
1. Foster cooperation between public and private actors at early stages of the research and
innovation process in order to allow people in Europe to access innovative and trustworthy
European solutions (ICT products, services and software). These solutions take into
consideration fundamental rights, such as the right for privacy.
2. Stimulate cybersecurity industry, by helping align the demand and supply sectors to allow
industry to elicit future requirements from end-users, as well as sectors that are important
customers of cybersecurity solutions (e.g. energy, health, transport, finance).
3. Coordinate digital security industrial resources in Europe.
LINKING RESEARCH AND CYBERSECURITY INDUSTRIAL POLICY
1. The cPPP will focus on R&I, developing a SRIA ( Strategic Research and Innovation Agenda).
2. The ECSO Association will tackle other industry policy aspects.
3. ECSO supports the development of the European cybersecurity industry.
ABOUT THE CYBERSECURITY cPPP
BUDGET:
1. The EC will invest up to €450 million in this partnership, under its research and innovation
programme Horizon 2020 for the 2017-2020 calls (4 years).
2. Cybersecurity market players are expected to invest €1350 million three times more (€1350
million: leverage factor = 3) for a total of €1800 million
REFERENCE DOCUMENTS
1. Industry proposal
2. Strategic Research and Innovation Agenda (SRIA) proposal
ABOUT THE CYBERSECURITY cPPP
INDUSTRY PROPOSAL
Identifies industrial operational and strategic objectives
1. Protection of critical infrastructures from cyber threats.
2. Use of massive data collection to increase overall security.
3. Increased European digital autonomy.
4. Security and trust of the whole supply chain
5. Investments in areas where Europe has a clear leadership.
6. Leveraging upon the potential of SMEs.
7. Increase competitiveness.
ECSO MEMBERS
200 organisations having formally requested membership … from
27 countries and counting… divided in categories (each represented
at the Board of Directors).
• Associations : 18
• Large companies: 55
• Public Administrations: 14 (UK, ES, IT, FR, DE, SK, EE, FI, NO, CY,
PL, NL, CZ, AT)
• Regional clusters; 2
• RTO/Universities: 51
• SMEs: 40
• Users/Operators (users are also in large supplier companies): 8
AUSTRIA 6 ITALY 30
BELGIUM 4 LATVIA 1
BE - EU ASS 8 LUXEMBOURG 3
CYPRUS 4 NORWAY 4
CZECH REP. 1 POLAND 6
DENMARK 2 PORTUGAL 5
ESTONIA 4 ROMANIA 2
FINLAND 7 SLOVAKIA 2
FRANCE 21 SPAIN 29
GERMANY 16 SWEDEN 1
GREECE 2 SWITZERLAND 3
HUNGARY 1 THE NETHERLANDS 10
IRELAND 1 TURKEY 2
ISRAEL 2 UNITED KINGDOM 10
6
ECSO has been established during June 2016 and on July 5th 2016
the ECS-cPPP has been approved by the European Parliament.
ECSO: A UNIQUE PPP ASSOCIATION
20
Security is a national prerogative.
 Stronger participation in ECSO of representatives from the national administrations, also at
decision making level.
 Interest from national Public Administrations: Representatives to the two Programme
Committees + Ministries (Interior, Economy, etc.) + Regulatory Bodies + Public users.
 Participation in Working Groups & Task Forces to bring a governmental perspective and
operational needs from the public administrations.
NAPAC : A National Public Authority representatives Committee (NAPAC), instead of traditional
“mirror groups”.
WORKING GROUPS & TASK FORCES
WG 1
Standardisation
Certification /
Labelling / Supply Chain
Management
WG 2
Market development /
Investments
WG 3
Sectoral demand
(vertical market applications)
WG 4
Support SME, coordination
with countries (in particular
East EU) and regions
WG 5
Education, training,
awareness, exercises
WG 6
SRIA
Technical areas
Products
Services areas
WG6 SRIA:
Technical areas, Products, Services areas
WG6 Chairs: Fabio Cocurullo (Leonardo), Volkmar Lotz (SAP), Fabio Martinelli (CNR)
Link to KPI (consistent with SRIA and Industry Proposal)
KPI 8 - PRIVACY & SECURITY BY DESIGN: Development and implementation of European approaches for
cybersecurity, trust and privacy by design.
KPI 12 - cPPP IMPLEMENTATION MONITORING: Efficiency, openness and transparency of the cybersecurity cPPP
implementation process.
Link to EU policies
Activities should be coordinated with the future activities envisaged by the E. Commission as announced in its
Communication “Strengthening Europe's Cyber Resilience System and Fostering a Competitive and Innovative
Cybersecurity Industry”
Objectives
O6.1: Coordination of results and expectations from EC R&I projects
O6.2: Coordination of cybersecurity activities across cPPPs and EIT
O6.3: Support cPPP implementation and H2020 cybersecurity projects
O6.4: Detailed suggestions for the WorkProgramme 2018 - 2020 using an updated and focussed SRIA
E
Vertical Application Domains
Transversal infrastructures
Basic technologies
Linking demand and supply
Ecosystem
Detailed structure: 7 main thematic priority areas
• 1 European Ecosystem for the Cybersecurity
• Cyber Range and simulation
• Education and training
• Certification and standardisation
• Dedicated support to SMEs
• 2 Demonstrations for the society, economy, industry and vital services
• Industry 4.0
• Energy
• Smart Buildings & Smart Cities
• Transportation
• Healthcare
• E-services for public sector, finance, and telco
• 3 Collaborative intelligence to manage cyber threats and risks
• GRC: Security Assessment and Risk Management
• PROTECT: High-assurance prevention and protection
• DETECT: Information Sharing, Security Analytics, and Cyber-threat Detection
• RESPONSE and RECOVERY: Cyber threat management: response and recovery
• 4 Remove trust barriers for data-driven applications and services
• Data security and privacy
• ID and Distributed trust management (including DLT)
• User centric security and privacy
• 5 Maintain a secure and trusted infrastructure in the long-term
• ICT protection
• Quantum resistant crypto
• 6 Intelligent approaches to eliminate security vulnerabilities in systems, services and applications
• Trusted supply chain for resilient systems
• Security and privacy by-design
• 7 From security components to security services
Remove trust barriers for
data-driven applications
and services
Data security and privacy
ID and Distributed trust management
(including DLT)
User centric security and privacy
Maintain a secure and
trusted ICT
infrastructure in the
long-term:
ICT protection
Quantum resistant crypto
Collaborative intelligence to manage cyber threats and risks”
GRC: Security Assessment and Risk Management
PROTECT: High-assurance prevention and protection
DETECT: Information Sharing, Security Analytics, and Cyber-threat Detection
RESPONSE and RECOVERY: Cyber threat management: response and recovery
ICSand
Industry4.0
Energy,inlc.smart
grids
Transport(smart
cars,rail,aero,…)
Smart&secure
cities
E-servicesfor
Public,finance,
telco(5G)
Healthcare
Demonstrations for the society, economy, industry and vital services
Educationandtraining(Cyber
Ranges)
Certification,standardisation,GoTo
Market,SMEssupport
Main thematic priority areas
Intelligent approaches
to eliminate security
vulnerabilities …
Trusted supply chain for
resilient systems
Security and privacy by-
design
From security
components
to security
services
Conclusion
• Public / private / partnership (PPPs) are great tools for cyber security
• ECSO cPPP is developing very well
• Europe is now working on revising the European Cyber Security Strategy
• Cooperation with others countries outside Europe as Brazil is very welcome
14

Weitere ähnliche Inhalte

Was ist angesagt?

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
segughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...
Associations Network
 

Was ist angesagt? (20)

CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Vodafone security priorities in Greece
Vodafone security priorities in GreeceVodafone security priorities in Greece
Vodafone security priorities in Greece
 
Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...
 
E Society Ict En
E Society Ict EnE Society Ict En
E Society Ict En
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon Stefanovski
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
FIWARE MEXICO WorkShop 2016 - 2. Mexico – European Union cooperation
FIWARE MEXICO WorkShop 2016 - 2. Mexico – European Union cooperationFIWARE MEXICO WorkShop 2016 - 2. Mexico – European Union cooperation
FIWARE MEXICO WorkShop 2016 - 2. Mexico – European Union cooperation
 
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
 

Ähnlich wie The European cyber security cPPP strategic research & innovation agenda

EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
Karlos Svoboda
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
manelmedina
 

Ähnlich wie The European cyber security cPPP strategic research & innovation agenda (20)

SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
1 ecso general_ext_sept2017_bari
1 ecso general_ext_sept2017_bari1 ecso general_ext_sept2017_bari
1 ecso general_ext_sept2017_bari
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
 
procent
procentprocent
procent
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunities
 
Brokerage and market Platform
Brokerage and market PlatformBrokerage and market Platform
Brokerage and market Platform
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
 

Mehr von EUBrasilCloudFORUM .

EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation MeetingEUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM .
 

Mehr von EUBrasilCloudFORUM . (20)

FUTEBOL - Concertation Meeting EUBrasilCloudFORUM
FUTEBOL - Concertation Meeting EUBrasilCloudFORUMFUTEBOL - Concertation Meeting EUBrasilCloudFORUM
FUTEBOL - Concertation Meeting EUBrasilCloudFORUM
 
SWAMP - Concertation Meeting EUBrasilCloudFORUM
SWAMP - Concertation Meeting EUBrasilCloudFORUMSWAMP - Concertation Meeting EUBrasilCloudFORUM
SWAMP - Concertation Meeting EUBrasilCloudFORUM
 
EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation MeetingEUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation Meeting
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUM
 
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUMOCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
 
FASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUMFASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUM
 
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
HPC4E - Concertation Meeting EUBrasilCloudFORUM
HPC4E - Concertation Meeting EUBrasilCloudFORUMHPC4E - Concertation Meeting EUBrasilCloudFORUM
HPC4E - Concertation Meeting EUBrasilCloudFORUM
 
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUMATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
 
PITCH - WisoApp at CloudscapeBrazil 2017
PITCH - WisoApp at CloudscapeBrazil 2017PITCH - WisoApp at CloudscapeBrazil 2017
PITCH - WisoApp at CloudscapeBrazil 2017
 
PITCH - Ustore at CloudscapeBrazil 2017
PITCH - Ustore at CloudscapeBrazil 2017PITCH - Ustore at CloudscapeBrazil 2017
PITCH - Ustore at CloudscapeBrazil 2017
 
PITCH - IN2 at CloudscapeBrazil 2017
PITCH - IN2 at CloudscapeBrazil 2017PITCH - IN2 at CloudscapeBrazil 2017
PITCH - IN2 at CloudscapeBrazil 2017
 
Melodic
Melodic Melodic
Melodic
 
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
 
SIG-Special Interest Group in Cloud Computing
SIG-Special Interest Group in Cloud Computing SIG-Special Interest Group in Cloud Computing
SIG-Special Interest Group in Cloud Computing
 
SBC Thematic Groups Organization
SBC Thematic Groups OrganizationSBC Thematic Groups Organization
SBC Thematic Groups Organization
 
Laying the foundation for a SIG (Special Interest Group) in Cloud Computing
Laying the foundation for a SIG (Special Interest Group) in Cloud ComputingLaying the foundation for a SIG (Special Interest Group) in Cloud Computing
Laying the foundation for a SIG (Special Interest Group) in Cloud Computing
 
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion sessionSession 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
 
Enabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the CloudEnabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the Cloud
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

The European cyber security cPPP strategic research & innovation agenda

  • 1. ECSO European Cyber Security Organisation contractual PPP on cybersecurity Fabio Martinelli National Research Council of Italy Vice Chairman of ECSO Board and WG6 co chair Cloudscape Brazil and Workshop on Cloud Networks 2017
  • 3. AIM 1. Foster cooperation between public and private actors at early stages of the research and innovation process in order to allow people in Europe to access innovative and trustworthy European solutions (ICT products, services and software). These solutions take into consideration fundamental rights, such as the right for privacy. 2. Stimulate cybersecurity industry, by helping align the demand and supply sectors to allow industry to elicit future requirements from end-users, as well as sectors that are important customers of cybersecurity solutions (e.g. energy, health, transport, finance). 3. Coordinate digital security industrial resources in Europe. LINKING RESEARCH AND CYBERSECURITY INDUSTRIAL POLICY 1. The cPPP will focus on R&I, developing a SRIA ( Strategic Research and Innovation Agenda). 2. The ECSO Association will tackle other industry policy aspects. 3. ECSO supports the development of the European cybersecurity industry. ABOUT THE CYBERSECURITY cPPP
  • 4. BUDGET: 1. The EC will invest up to €450 million in this partnership, under its research and innovation programme Horizon 2020 for the 2017-2020 calls (4 years). 2. Cybersecurity market players are expected to invest €1350 million three times more (€1350 million: leverage factor = 3) for a total of €1800 million REFERENCE DOCUMENTS 1. Industry proposal 2. Strategic Research and Innovation Agenda (SRIA) proposal ABOUT THE CYBERSECURITY cPPP
  • 5. INDUSTRY PROPOSAL Identifies industrial operational and strategic objectives 1. Protection of critical infrastructures from cyber threats. 2. Use of massive data collection to increase overall security. 3. Increased European digital autonomy. 4. Security and trust of the whole supply chain 5. Investments in areas where Europe has a clear leadership. 6. Leveraging upon the potential of SMEs. 7. Increase competitiveness.
  • 6. ECSO MEMBERS 200 organisations having formally requested membership … from 27 countries and counting… divided in categories (each represented at the Board of Directors). • Associations : 18 • Large companies: 55 • Public Administrations: 14 (UK, ES, IT, FR, DE, SK, EE, FI, NO, CY, PL, NL, CZ, AT) • Regional clusters; 2 • RTO/Universities: 51 • SMEs: 40 • Users/Operators (users are also in large supplier companies): 8 AUSTRIA 6 ITALY 30 BELGIUM 4 LATVIA 1 BE - EU ASS 8 LUXEMBOURG 3 CYPRUS 4 NORWAY 4 CZECH REP. 1 POLAND 6 DENMARK 2 PORTUGAL 5 ESTONIA 4 ROMANIA 2 FINLAND 7 SLOVAKIA 2 FRANCE 21 SPAIN 29 GERMANY 16 SWEDEN 1 GREECE 2 SWITZERLAND 3 HUNGARY 1 THE NETHERLANDS 10 IRELAND 1 TURKEY 2 ISRAEL 2 UNITED KINGDOM 10 6 ECSO has been established during June 2016 and on July 5th 2016 the ECS-cPPP has been approved by the European Parliament.
  • 7. ECSO: A UNIQUE PPP ASSOCIATION 20 Security is a national prerogative.  Stronger participation in ECSO of representatives from the national administrations, also at decision making level.  Interest from national Public Administrations: Representatives to the two Programme Committees + Ministries (Interior, Economy, etc.) + Regulatory Bodies + Public users.  Participation in Working Groups & Task Forces to bring a governmental perspective and operational needs from the public administrations. NAPAC : A National Public Authority representatives Committee (NAPAC), instead of traditional “mirror groups”.
  • 8.
  • 9. WORKING GROUPS & TASK FORCES WG 1 Standardisation Certification / Labelling / Supply Chain Management WG 2 Market development / Investments WG 3 Sectoral demand (vertical market applications) WG 4 Support SME, coordination with countries (in particular East EU) and regions WG 5 Education, training, awareness, exercises WG 6 SRIA Technical areas Products Services areas
  • 10. WG6 SRIA: Technical areas, Products, Services areas WG6 Chairs: Fabio Cocurullo (Leonardo), Volkmar Lotz (SAP), Fabio Martinelli (CNR) Link to KPI (consistent with SRIA and Industry Proposal) KPI 8 - PRIVACY & SECURITY BY DESIGN: Development and implementation of European approaches for cybersecurity, trust and privacy by design. KPI 12 - cPPP IMPLEMENTATION MONITORING: Efficiency, openness and transparency of the cybersecurity cPPP implementation process. Link to EU policies Activities should be coordinated with the future activities envisaged by the E. Commission as announced in its Communication “Strengthening Europe's Cyber Resilience System and Fostering a Competitive and Innovative Cybersecurity Industry” Objectives O6.1: Coordination of results and expectations from EC R&I projects O6.2: Coordination of cybersecurity activities across cPPPs and EIT O6.3: Support cPPP implementation and H2020 cybersecurity projects O6.4: Detailed suggestions for the WorkProgramme 2018 - 2020 using an updated and focussed SRIA
  • 11. E Vertical Application Domains Transversal infrastructures Basic technologies Linking demand and supply Ecosystem
  • 12. Detailed structure: 7 main thematic priority areas • 1 European Ecosystem for the Cybersecurity • Cyber Range and simulation • Education and training • Certification and standardisation • Dedicated support to SMEs • 2 Demonstrations for the society, economy, industry and vital services • Industry 4.0 • Energy • Smart Buildings & Smart Cities • Transportation • Healthcare • E-services for public sector, finance, and telco • 3 Collaborative intelligence to manage cyber threats and risks • GRC: Security Assessment and Risk Management • PROTECT: High-assurance prevention and protection • DETECT: Information Sharing, Security Analytics, and Cyber-threat Detection • RESPONSE and RECOVERY: Cyber threat management: response and recovery • 4 Remove trust barriers for data-driven applications and services • Data security and privacy • ID and Distributed trust management (including DLT) • User centric security and privacy • 5 Maintain a secure and trusted infrastructure in the long-term • ICT protection • Quantum resistant crypto • 6 Intelligent approaches to eliminate security vulnerabilities in systems, services and applications • Trusted supply chain for resilient systems • Security and privacy by-design • 7 From security components to security services
  • 13. Remove trust barriers for data-driven applications and services Data security and privacy ID and Distributed trust management (including DLT) User centric security and privacy Maintain a secure and trusted ICT infrastructure in the long-term: ICT protection Quantum resistant crypto Collaborative intelligence to manage cyber threats and risks” GRC: Security Assessment and Risk Management PROTECT: High-assurance prevention and protection DETECT: Information Sharing, Security Analytics, and Cyber-threat Detection RESPONSE and RECOVERY: Cyber threat management: response and recovery ICSand Industry4.0 Energy,inlc.smart grids Transport(smart cars,rail,aero,…) Smart&secure cities E-servicesfor Public,finance, telco(5G) Healthcare Demonstrations for the society, economy, industry and vital services Educationandtraining(Cyber Ranges) Certification,standardisation,GoTo Market,SMEssupport Main thematic priority areas Intelligent approaches to eliminate security vulnerabilities … Trusted supply chain for resilient systems Security and privacy by- design From security components to security services
  • 14. Conclusion • Public / private / partnership (PPPs) are great tools for cyber security • ECSO cPPP is developing very well • Europe is now working on revising the European Cyber Security Strategy • Cooperation with others countries outside Europe as Brazil is very welcome 14

Hinweis der Redaktion

  1. Updated membership.