SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Security
Headlines from the group ”Security”

Key data on online engagement: platform
On platform: 77 members, 41 discussions, 194 comments

  Most discussed:                                                      Most active:

  Easy to use mechanisms enabling awareness & privacy
  control                                               12   Axel              Schultze
  Cloud-based Public Administration                     11
  Trade-offs and Security Challenges in the Cloud       9    Thierry           Nabeth
  economics of privacy                                  8
  Data Privacy and Security proposed EU regualtions     7
  Speaking of Privacy and Traceability                  7    Michele           Cimmino
  Strengths and Weaknesses of European ICT Security
  Industry                                              7    Stephan           Engberg
  Which security concern keeps you up at night?         7
Key data on online engagement: twitter




Most      RT @MSEurope: European e-identity plan to be
          unveiled this month http://t.co/4SngdLeu
                                                             Most active
RT        #da12trustsec
          RT @fidis: Question: European Investments in ICT
          security | Digital Agenda Assembly #da12trustsec
          http://t.co/JdH3MS2H
          RT @mariocampolargo: #Web2.0 a tool to control
          citizens? Interesting discussion on
          http://t.co/ipcwH3vc #da12 #da12trustsec
          @PDrogkaris
Wordcloud overall discussion
Headlines from the group ”Security”


Purpose of this Group “Securing Europe’s Information Society”

Challenges
i. Enabling Awareness and Privacy Control
ii.Legal and Strategic - Administrative Regulations
iii.Stimulating Investments to develop a Secure and Trustworthy
   European ICT




Highlighted quotes
Stephan Engberg @Engbrg
 Security is perhaps a methodology, a principle of risk minimization, a process such as a negotiation and
 validated resolution againt a set of security tools, technologies, procedures, solutions etc. But what is the
                                           "ICT Security Industry"?
Challenge: Enabling Awareness and Privacy Control


Actions recommended
• Communicate security’s importance to citizens and preserve awareness campaigns

• Empowering citizens to retain control over their personal data and digital identities

• Promote technology to assist the end users in assessing the information they diffuse

• Educate SME's on the importance of their data, potential threats and how to act
  proactively

• Elevate that industry can expect more annuities from promoting privacy rather than
  invading it



Highlighted quotes
Thierry Nabeth @ThierryNabeth
       One of the problem with privacy on the Internet is that people had a false sense of security
Challenge: Legal and Strategic - Administrative Regulations


Actions recommended
• Assess and review Data Privacy Regulations

• Address emerging technologies’ (cloud) security and privacy issues

• Increase accountability of ICT providers and users regarding their behavior in the cyber-
 sphere

• Put into practice truly interoperable security / identity models

• Promote security standardization

• Institute - authorize European agencies in charge of operational coordination and
 redefine their scope as a backbone of Internet Strategy deployments
Highlighted quotes
Hagai Bar-El
   Legislation shall protect users also from harm caused by data they willingly contributed to the public
                                                  domain
Challenge: Stimulating Investments to develop a Secure and Trustworthy
           European ICT



                   Improve Marketing Skills

                        Increase Awareness

        Clarify Allocation of Responsibilities

                    Higher Level of Security

              Pre-commercial procurement

               Integrated Security Solutions
                                                                                                        Votes
                            Improve Liability

                     Improve Accountability

                    Promote Best Practises

    Improve User-Friendliness of Technolog

                Lower Market Entry Barriers

                Harmonize Security Policies

                                                 0   1        2        3        4        5      6   7

                                           Number of votes per incentives is indicative.
                                   Actual numbers will be updated shortly before the workshop

Weitere ähnliche Inhalte

Was ist angesagt?

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityIntronis MSP Solutions by Barracuda
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Mark Skilton
 
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesInstituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesWill Kelly
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...XeniT Solutions nv
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesOlivier Busolini
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 

Was ist angesagt? (20)

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud Security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesInstituting_Wi-Fi_Policies
Instituting_Wi-Fi_Policies
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
brochure
brochurebrochure
brochure
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
 
IT compliance
IT complianceIT compliance
IT compliance
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 

Andere mochten auch

Aspartame equal de esta vida
Aspartame equal de esta vidaAspartame equal de esta vida
Aspartame equal de esta vidajose cruz
 
17 social-media-marketing-trends-for-2012
17 social-media-marketing-trends-for-201217 social-media-marketing-trends-for-2012
17 social-media-marketing-trends-for-2012dong euro
 
Spanish students' presentations
Spanish students' presentationsSpanish students' presentations
Spanish students' presentationsskillsforlife
 
00 welcome slide
00 welcome slide00 welcome slide
00 welcome slideLinnea Good
 
Wskaźnik Bezpieczeństwa Działalności Gospodarczej Maj 2012
Wskaźnik Bezpieczeństwa Działalności Gospodarczej  Maj 2012 Wskaźnik Bezpieczeństwa Działalności Gospodarczej  Maj 2012
Wskaźnik Bezpieczeństwa Działalności Gospodarczej Maj 2012 BIGInfoMonitor
 
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...Werf_en
 
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociauxMinter Dial
 
Session 8 d olga canto's disc
Session 8 d olga canto's discSession 8 d olga canto's disc
Session 8 d olga canto's discIARIW 2014
 
Maximising The Potential Of Social Media Marketing
Maximising The Potential Of Social Media MarketingMaximising The Potential Of Social Media Marketing
Maximising The Potential Of Social Media MarketingLCM
 
Reuters Times Square2v.1 2011.10 17
Reuters Times Square2v.1   2011.10 17Reuters Times Square2v.1   2011.10 17
Reuters Times Square2v.1 2011.10 17Brian Zimmerman
 

Andere mochten auch (19)

Aspartame equal de esta vida
Aspartame equal de esta vidaAspartame equal de esta vida
Aspartame equal de esta vida
 
17 social-media-marketing-trends-for-2012
17 social-media-marketing-trends-for-201217 social-media-marketing-trends-for-2012
17 social-media-marketing-trends-for-2012
 
Spanish students' presentations
Spanish students' presentationsSpanish students' presentations
Spanish students' presentations
 
00 welcome slide
00 welcome slide00 welcome slide
00 welcome slide
 
Wskaźnik Bezpieczeństwa Działalności Gospodarczej Maj 2012
Wskaźnik Bezpieczeństwa Działalności Gospodarczej  Maj 2012 Wskaźnik Bezpieczeństwa Działalności Gospodarczej  Maj 2012
Wskaźnik Bezpieczeństwa Działalności Gospodarczej Maj 2012
 
Samodyscyplina w 10 dni 4/13
Samodyscyplina w 10 dni 4/13Samodyscyplina w 10 dni 4/13
Samodyscyplina w 10 dni 4/13
 
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...
De Wereld Werft_workshop Zinvol social media inzetten voor arbeidsmarktcommun...
 
Presentación A.C.E.I.
Presentación A.C.E.I.Presentación A.C.E.I.
Presentación A.C.E.I.
 
Projects
ProjectsProjects
Projects
 
WEB 3.0
WEB 3.0WEB 3.0
WEB 3.0
 
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux
9 1/2 raisons pourquoi NE PAS aller sur les réseaux sociaux
 
Session 8 d olga canto's disc
Session 8 d olga canto's discSession 8 d olga canto's disc
Session 8 d olga canto's disc
 
Flamingo
Flamingo  Flamingo
Flamingo
 
Science
ScienceScience
Science
 
Camtasia
CamtasiaCamtasia
Camtasia
 
Maximising The Potential Of Social Media Marketing
Maximising The Potential Of Social Media MarketingMaximising The Potential Of Social Media Marketing
Maximising The Potential Of Social Media Marketing
 
Equipo3 pra#7
Equipo3 pra#7Equipo3 pra#7
Equipo3 pra#7
 
Soc. 101 rw ch. 3
Soc. 101 rw ch. 3Soc. 101 rw ch. 3
Soc. 101 rw ch. 3
 
Reuters Times Square2v.1 2011.10 17
Reuters Times Square2v.1   2011.10 17Reuters Times Square2v.1   2011.10 17
Reuters Times Square2v.1 2011.10 17
 

Ähnlich wie Security

Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption surveyPaperjam_redaction
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 

Ähnlich wie Security (20)

Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
16231
1623116231
16231
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 

Mehr von digitalagenda2012 (9)

Data
DataData
Data
 
Convergence
ConvergenceConvergence
Convergence
 
Cloud
CloudCloud
Cloud
 
Social media
Social mediaSocial media
Social media
 
Public services
Public servicesPublic services
Public services
 
Job & skills
Job & skillsJob & skills
Job & skills
 
Innovation
InnovationInnovation
Innovation
 
High speed
High speed High speed
High speed
 
Ecommerce
EcommerceEcommerce
Ecommerce
 

Kürzlich hochgeladen

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Kürzlich hochgeladen (20)

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 

Security

  • 2. Headlines from the group ”Security” Key data on online engagement: platform On platform: 77 members, 41 discussions, 194 comments Most discussed: Most active: Easy to use mechanisms enabling awareness & privacy control 12 Axel Schultze Cloud-based Public Administration 11 Trade-offs and Security Challenges in the Cloud 9 Thierry Nabeth economics of privacy 8 Data Privacy and Security proposed EU regualtions 7 Speaking of Privacy and Traceability 7 Michele Cimmino Strengths and Weaknesses of European ICT Security Industry 7 Stephan Engberg Which security concern keeps you up at night? 7
  • 3. Key data on online engagement: twitter Most RT @MSEurope: European e-identity plan to be unveiled this month http://t.co/4SngdLeu Most active RT #da12trustsec RT @fidis: Question: European Investments in ICT security | Digital Agenda Assembly #da12trustsec http://t.co/JdH3MS2H RT @mariocampolargo: #Web2.0 a tool to control citizens? Interesting discussion on http://t.co/ipcwH3vc #da12 #da12trustsec @PDrogkaris
  • 5. Headlines from the group ”Security” Purpose of this Group “Securing Europe’s Information Society” Challenges i. Enabling Awareness and Privacy Control ii.Legal and Strategic - Administrative Regulations iii.Stimulating Investments to develop a Secure and Trustworthy European ICT Highlighted quotes Stephan Engberg @Engbrg Security is perhaps a methodology, a principle of risk minimization, a process such as a negotiation and validated resolution againt a set of security tools, technologies, procedures, solutions etc. But what is the "ICT Security Industry"?
  • 6. Challenge: Enabling Awareness and Privacy Control Actions recommended • Communicate security’s importance to citizens and preserve awareness campaigns • Empowering citizens to retain control over their personal data and digital identities • Promote technology to assist the end users in assessing the information they diffuse • Educate SME's on the importance of their data, potential threats and how to act proactively • Elevate that industry can expect more annuities from promoting privacy rather than invading it Highlighted quotes Thierry Nabeth @ThierryNabeth One of the problem with privacy on the Internet is that people had a false sense of security
  • 7. Challenge: Legal and Strategic - Administrative Regulations Actions recommended • Assess and review Data Privacy Regulations • Address emerging technologies’ (cloud) security and privacy issues • Increase accountability of ICT providers and users regarding their behavior in the cyber- sphere • Put into practice truly interoperable security / identity models • Promote security standardization • Institute - authorize European agencies in charge of operational coordination and redefine their scope as a backbone of Internet Strategy deployments Highlighted quotes Hagai Bar-El Legislation shall protect users also from harm caused by data they willingly contributed to the public domain
  • 8. Challenge: Stimulating Investments to develop a Secure and Trustworthy European ICT Improve Marketing Skills Increase Awareness Clarify Allocation of Responsibilities Higher Level of Security Pre-commercial procurement Integrated Security Solutions Votes Improve Liability Improve Accountability Promote Best Practises Improve User-Friendliness of Technolog Lower Market Entry Barriers Harmonize Security Policies 0 1 2 3 4 5 6 7 Number of votes per incentives is indicative. Actual numbers will be updated shortly before the workshop