SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
ABOUT IMG – S
Email: scg@imgs-eu.org
Online resources: http://www.imgs-eu.org
IMG-S is an open forum bringing together technology experts
from Industry, SMEs, Research and Technology Organisations
(RTOs) and Academia. With more than one hundred entities from
24 countries, it covers the entire security RTD domain and is able
to bring an answer to European and global security needs.
IMG-S is a two level organization consisting of (i) a set of
technology areas - 6 technical areas (TA) and 1 cross technical
group (cTA) - providing consensual view on research priorities in
their own domain.(ii) a Synthesis and Coordination Group
(SCG) consisting of policy experts and representatives from
the TAs to orient the work and develop a holistic security
research view translating the technology viewpoints in to
research priorities for the security domain at all levels, from
fundamental research to mission capabilities and system
integration, IMG-S contributes to ensure that short, mid-term and
long-term security needs are addressed.
POSITION PAPER
FOR HORIZON 2020
The IMG-S Position Paper is intended to be a source of
information for stakeholders in European Security Research,
specifically those engaged in research orientation and
management (namely within the European Commission
H2020 management), national security research
representatives and directors, as well as end-users and
regulators.
This Position Paper results from a bottom-up collection of
about 188 topics suggested by the IMG-S members and
discussed by the IMG-S Technical Areas. Topics are
included in a data base with the entries: H2020 strategic
area; Keywords; sub-keywords; research theme; research
topic; time frame (two-year period); funding instrument,
performance indicators; impact on EC objectives; link with
previous projects; related IMG-S experts
The IMG-S Synthesis and Coordination Group further
selected a global oversight of the Security research priorities
that best match the main security strategic areas for H2020.
Criteria for prioritization of topics included:
• Contribution to specific capability gaps identified by
end users
• Perceived trends in terms of emerging threats and
technologies
• Consensus among IMG-S members out of diverse
member States
• European added value
• Relevance to EU policies such as the EU Internal
Security Strategy and its Action Plan, the EU Security
Industrial Policy, the EU Climate Adaptation Strategy,
the EU's Civil Protection Mechanism, the European
Programme for Critical Infrastructure Protection, EU
2020 Flagship Initiative on a Digital Agenda for Europe
and the upcoming EU Cybersecurity Strategy. the EU
Approach to Food Security
NEW STRATEGIC AREA
“CYBER SECURITY”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Improving Cyber Security
Technologies
Cyber security and resilience of Next
Generation Infrastructures
Enhancing Secure Design of
Future Cyber Systems
Trust management in federated networks
Anomaly detection in networks
Efficient Cyber Events Audit Trail
Attribution
Standardisation
Societal impact of Cyber Security
Security and trust of e-government services
Ethical, legal and societal aspects of cyber
defense
Protecting personal information
Smart Communities (cyber) protection
Cultural and practical techniques to enable
cyber security
NEW STRATEGIC AREA
“SUPPORT THE UNION'S
EXTERNAL SECURITY POLICIES”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Enabling rapid external
assistance
Low Cost and innovative energy supplies for humanitarian
relief
Improved humanitarian relief response and operational
effectiveness
Improved crisis management effectiveness between civil
and military forces
Effective use of remote tele-presence for diagnostics and
treatment outside EU
Demonstration Project on Humanitarian Aid and Civil
Protection
Efficient CBRE
detection in support for
trade
Technologies for rapid disease identification and mapping
in imported/exported agriculture products
THz systems for threat detection in containers
Tracking technologies for security and integrity control of
traded goods from source to ultimate user
Non-destructive techniques of high volume
decontamination
High throughput and high sensitivity CBRE detection
systems for container screening
“FIGHT CRIME
AND TERRORISM”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Surveillance
Adaptive wide area surveillance and monitoring System
Situation awareness sharing
Performance metrics for surveillance systems
Food integrity
CBR agent detection in food products
Built-in CBR security in food facilities
New technologies for decontamination and safe disposal of
contaminated food products
Integrated food protection against contamination in
production processing and retail settings
Stand-off CBRE detection and
identification
New laser sources for stand-off detection systems:
Application of QCL lasers for stand-off detection systems
Development of multispectral data analysis tool
New algorithms for classification and identification of CBE
agents
Stand-off detection of C, B and E material surface
contamination
Autonomous robots for CBR intervention
Nano-security
Identification of industrial sources of Nanos in the EU
Collection and concentration of nanos for measurements
Method assessments for nanos characterisation after
accidental release
Development of an on-field system
“RESILIENCE TO
CRISES AND DISASTERS”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Reducing the societal cost
of restoration
Improved Recovery Logistics
Improved service Restoration after a crisis
Financial Recovery and restoration of economic and
transactional societal infrastructure
Innovative energy sources for service restoration
Water and hygiene solutions for large scale humanitarian
disasters
Improving crisis
management response
Mobile platform technologies for crisis and disaster
management:
Rapid deployable multidisciplinary systems for disaster
management
Rapidly deployable autonomous systems for emergency
response and relief in absence of Critical Infrastructures
Rapidly deployable autonomous systems for emergency
response and relief in absence of Critical Infrastructures
Improved decision support and situational awareness
Improving security cross border interoperability
Large Heterogeneous
sensors networks for wide
area surveillance
Enabling awareness on crisis using heterogeneous sensor
networks
Real time wide area surveillance for current monitoring, early
warning, Alerting systems and quick damages assessments.
Safety and security in smart cities.
New satellite and airborne techniques
Citizen as a sensor
“BORDER MANAGEMENT AND
MARITIME SECURITY”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Future border surveillance
Wireless sensor networks for optimised border
event coverage
Automated detection and classification of
objects
Swarm of sensors smart management
Techniques, systems and protocols for mobile
border control
Underwater communications and
security
Hybrid Communications Systems for
Underwater Communications
“PROTECT AND IMPROVE
RESILIENCE OF CRITICAL
INFRASTRUCTURES”
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Physical protection of
infrastructure, new processes
Mitigation planning and countermeasures for combined
physical and cyber attacks
Aviation security incident reporting and identification of
emerging hazards
Physical protection of
infrastructure, new technologies
Huge virtual sensors for monitoring and detecting early
failures of critical infrastructures
Protection of Critical Infrastructures from combined
Cyber and Physical-Layer attacks
Societally acceptable information based pre-flight
screening
Enhancing Smart Building capabilities for a Secure and
Safe structure
Detect CBRN attack utility
distribution infrastructure
Vulnerability assessment
Rapid response biosensing capabilities
Multisensor fusion and systems for CBRE detection
Early detection, limitation diagnosis and response to a
CBR distribution infrastructure attack
Assessment of prevention options
Integrated sensing and intelligence to mitigate the
effects of a CBR attack
Technologies for preventing intrusion into the
distribution infrastructure
Smart environment to reduce CBRNE
"SOCIETAL DIMENSION
OF SECURITY;
PRIVACY AND FREEDOM
IN THE INTERNET"
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Engaging the population in crisis
management
More effective engagement of the populace
during a crisis
How to empower the citizen during a crisis
Inclusive technologies for
security
Inclusive technologies for security
"ENHANCE
STANDARDISATION AND
INTEROPERABILITY "
Research theme Research topic
2014-
2016
2016-
2018
2018-
2020
Secure vehicle communications
for security applications
Enhancing secure localisation and
communications performance in high-density
environments
Harmonizing detection and
identification of bio agents
Develop a CBRN training and testing agenda
for detection and identification of CBRN agents
Development of pan –European database of
whole genome sequences, proteomics and
other information of relevant threat agents
Improve European ability to distiguishing
intentional biological events from natural
Develope a statistical framework for genetic
comparison of microbial strains and samples
Develop capability to verify the use of
Biological agents in a forensic context
Improving crisis management
response
Improved European Multi-disciplinary team
response through more efficient interoperability
Improving security cross border
interoperability
Next generation PPDR
communication
Adaptive and Robust PPDR Communications
based on the Flexible Use of the Spectrum

Weitere ähnliche Inhalte

Ähnlich wie Img s sumary-paper_for_march19_meeting

Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020Marco Manso
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 ISERD Israel
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...csijjournal
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...TelecomValley
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersGerd Meier zu Koecker
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorEuropean Services Institute
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
Cyberwatching - Niccolo Zazzeri
Cyberwatching - Niccolo Zazzeri Cyberwatching - Niccolo Zazzeri
Cyberwatching - Niccolo Zazzeri ATMOSPHERE .
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information SecurityRoberto Reale
 
Roberto Reale - Governing Information Security
Roberto Reale - Governing Information SecurityRoberto Reale - Governing Information Security
Roberto Reale - Governing Information SecurityLegal Hackers Roma
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesAmgad Magdy
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 

Ähnlich wie Img s sumary-paper_for_march19_meeting (20)

Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...
CALL FOR RESEARCH PAPERS-12th International Conference on Signal Image Proces...
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Cyberwatching - Niccolo Zazzeri
Cyberwatching - Niccolo Zazzeri Cyberwatching - Niccolo Zazzeri
Cyberwatching - Niccolo Zazzeri
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information Security
 
Roberto Reale - Governing Information Security
Roberto Reale - Governing Information SecurityRoberto Reale - Governing Information Security
Roberto Reale - Governing Information Security
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and Challenges
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 

Mehr von Marco Manso

Real-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationReal-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationMarco Manso
 
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...Marco Manso
 
NEXES Applications for Citizens
NEXES Applications for CitizensNEXES Applications for Citizens
NEXES Applications for CitizensMarco Manso
 
NEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewNEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewMarco Manso
 
NEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationNEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationMarco Manso
 
EMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSEMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSMarco Manso
 
Emergency Apps for First Responders
Emergency Apps for First RespondersEmergency Apps for First Responders
Emergency Apps for First RespondersMarco Manso
 
Public Alert in NEXES
Public Alert in NEXESPublic Alert in NEXES
Public Alert in NEXESMarco Manso
 
The Value of IMS for NGES
The Value of IMS for NGESThe Value of IMS for NGES
The Value of IMS for NGESMarco Manso
 
Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Marco Manso
 
Accessibility Aspects in NGES
Accessibility Aspects in NGESAccessibility Aspects in NGES
Accessibility Aspects in NGESMarco Manso
 
NEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESNEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESMarco Manso
 
Social Media in Crisis Presentation
Social Media in Crisis PresentationSocial Media in Crisis Presentation
Social Media in Crisis PresentationMarco Manso
 
Operationalizing and Measuring Agility
Operationalizing and Measuring AgilityOperationalizing and Measuring Agility
Operationalizing and Measuring AgilityMarco Manso
 
Cognitive Self-Synchronisation
Cognitive Self-SynchronisationCognitive Self-Synchronisation
Cognitive Self-SynchronisationMarco Manso
 
The Role of Social Media in Crisis
The Role of Social Media in CrisisThe Role of Social Media in Crisis
The Role of Social Media in CrisisMarco Manso
 
Rene Seguranca Ai Agents
Rene Seguranca Ai AgentsRene Seguranca Ai Agents
Rene Seguranca Ai AgentsMarco Manso
 

Mehr von Marco Manso (20)

Real-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationReal-time on-site forensic trace qualification
Real-time on-site forensic trace qualification
 
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
 
NEXES Applications for Citizens
NEXES Applications for CitizensNEXES Applications for Citizens
NEXES Applications for Citizens
 
NEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewNEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario Overview
 
AAHD Exercises
AAHD ExercisesAAHD Exercises
AAHD Exercises
 
NEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationNEXES Campaigns of Demonstration
NEXES Campaigns of Demonstration
 
EMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSEMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnS
 
Emergency Apps for First Responders
Emergency Apps for First RespondersEmergency Apps for First Responders
Emergency Apps for First Responders
 
Public Alert in NEXES
Public Alert in NEXESPublic Alert in NEXES
Public Alert in NEXES
 
The Value of IMS for NGES
The Value of IMS for NGESThe Value of IMS for NGES
The Value of IMS for NGES
 
Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.
 
Accessibility Aspects in NGES
Accessibility Aspects in NGESAccessibility Aspects in NGES
Accessibility Aspects in NGES
 
NEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESNEXES: On the Path Towards NGES
NEXES: On the Path Towards NGES
 
EU-RESPOND
EU-RESPONDEU-RESPOND
EU-RESPOND
 
SensorSky
SensorSkySensorSky
SensorSky
 
Social Media in Crisis Presentation
Social Media in Crisis PresentationSocial Media in Crisis Presentation
Social Media in Crisis Presentation
 
Operationalizing and Measuring Agility
Operationalizing and Measuring AgilityOperationalizing and Measuring Agility
Operationalizing and Measuring Agility
 
Cognitive Self-Synchronisation
Cognitive Self-SynchronisationCognitive Self-Synchronisation
Cognitive Self-Synchronisation
 
The Role of Social Media in Crisis
The Role of Social Media in CrisisThe Role of Social Media in Crisis
The Role of Social Media in Crisis
 
Rene Seguranca Ai Agents
Rene Seguranca Ai AgentsRene Seguranca Ai Agents
Rene Seguranca Ai Agents
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Img s sumary-paper_for_march19_meeting

  • 1. ABOUT IMG – S Email: scg@imgs-eu.org Online resources: http://www.imgs-eu.org IMG-S is an open forum bringing together technology experts from Industry, SMEs, Research and Technology Organisations (RTOs) and Academia. With more than one hundred entities from 24 countries, it covers the entire security RTD domain and is able to bring an answer to European and global security needs. IMG-S is a two level organization consisting of (i) a set of technology areas - 6 technical areas (TA) and 1 cross technical group (cTA) - providing consensual view on research priorities in their own domain.(ii) a Synthesis and Coordination Group (SCG) consisting of policy experts and representatives from the TAs to orient the work and develop a holistic security research view translating the technology viewpoints in to research priorities for the security domain at all levels, from fundamental research to mission capabilities and system integration, IMG-S contributes to ensure that short, mid-term and long-term security needs are addressed.
  • 2. POSITION PAPER FOR HORIZON 2020 The IMG-S Position Paper is intended to be a source of information for stakeholders in European Security Research, specifically those engaged in research orientation and management (namely within the European Commission H2020 management), national security research representatives and directors, as well as end-users and regulators. This Position Paper results from a bottom-up collection of about 188 topics suggested by the IMG-S members and discussed by the IMG-S Technical Areas. Topics are included in a data base with the entries: H2020 strategic area; Keywords; sub-keywords; research theme; research topic; time frame (two-year period); funding instrument, performance indicators; impact on EC objectives; link with previous projects; related IMG-S experts The IMG-S Synthesis and Coordination Group further selected a global oversight of the Security research priorities that best match the main security strategic areas for H2020. Criteria for prioritization of topics included: • Contribution to specific capability gaps identified by end users • Perceived trends in terms of emerging threats and technologies • Consensus among IMG-S members out of diverse member States • European added value • Relevance to EU policies such as the EU Internal Security Strategy and its Action Plan, the EU Security Industrial Policy, the EU Climate Adaptation Strategy, the EU's Civil Protection Mechanism, the European Programme for Critical Infrastructure Protection, EU 2020 Flagship Initiative on a Digital Agenda for Europe and the upcoming EU Cybersecurity Strategy. the EU Approach to Food Security
  • 3. NEW STRATEGIC AREA “CYBER SECURITY” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Improving Cyber Security Technologies Cyber security and resilience of Next Generation Infrastructures Enhancing Secure Design of Future Cyber Systems Trust management in federated networks Anomaly detection in networks Efficient Cyber Events Audit Trail Attribution Standardisation Societal impact of Cyber Security Security and trust of e-government services Ethical, legal and societal aspects of cyber defense Protecting personal information Smart Communities (cyber) protection Cultural and practical techniques to enable cyber security
  • 4. NEW STRATEGIC AREA “SUPPORT THE UNION'S EXTERNAL SECURITY POLICIES” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Enabling rapid external assistance Low Cost and innovative energy supplies for humanitarian relief Improved humanitarian relief response and operational effectiveness Improved crisis management effectiveness between civil and military forces Effective use of remote tele-presence for diagnostics and treatment outside EU Demonstration Project on Humanitarian Aid and Civil Protection Efficient CBRE detection in support for trade Technologies for rapid disease identification and mapping in imported/exported agriculture products THz systems for threat detection in containers Tracking technologies for security and integrity control of traded goods from source to ultimate user Non-destructive techniques of high volume decontamination High throughput and high sensitivity CBRE detection systems for container screening
  • 5. “FIGHT CRIME AND TERRORISM” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Surveillance Adaptive wide area surveillance and monitoring System Situation awareness sharing Performance metrics for surveillance systems Food integrity CBR agent detection in food products Built-in CBR security in food facilities New technologies for decontamination and safe disposal of contaminated food products Integrated food protection against contamination in production processing and retail settings Stand-off CBRE detection and identification New laser sources for stand-off detection systems: Application of QCL lasers for stand-off detection systems Development of multispectral data analysis tool New algorithms for classification and identification of CBE agents Stand-off detection of C, B and E material surface contamination Autonomous robots for CBR intervention Nano-security Identification of industrial sources of Nanos in the EU Collection and concentration of nanos for measurements Method assessments for nanos characterisation after accidental release Development of an on-field system
  • 6. “RESILIENCE TO CRISES AND DISASTERS” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Reducing the societal cost of restoration Improved Recovery Logistics Improved service Restoration after a crisis Financial Recovery and restoration of economic and transactional societal infrastructure Innovative energy sources for service restoration Water and hygiene solutions for large scale humanitarian disasters Improving crisis management response Mobile platform technologies for crisis and disaster management: Rapid deployable multidisciplinary systems for disaster management Rapidly deployable autonomous systems for emergency response and relief in absence of Critical Infrastructures Rapidly deployable autonomous systems for emergency response and relief in absence of Critical Infrastructures Improved decision support and situational awareness Improving security cross border interoperability Large Heterogeneous sensors networks for wide area surveillance Enabling awareness on crisis using heterogeneous sensor networks Real time wide area surveillance for current monitoring, early warning, Alerting systems and quick damages assessments. Safety and security in smart cities. New satellite and airborne techniques Citizen as a sensor
  • 7. “BORDER MANAGEMENT AND MARITIME SECURITY” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Future border surveillance Wireless sensor networks for optimised border event coverage Automated detection and classification of objects Swarm of sensors smart management Techniques, systems and protocols for mobile border control Underwater communications and security Hybrid Communications Systems for Underwater Communications
  • 8. “PROTECT AND IMPROVE RESILIENCE OF CRITICAL INFRASTRUCTURES” Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Physical protection of infrastructure, new processes Mitigation planning and countermeasures for combined physical and cyber attacks Aviation security incident reporting and identification of emerging hazards Physical protection of infrastructure, new technologies Huge virtual sensors for monitoring and detecting early failures of critical infrastructures Protection of Critical Infrastructures from combined Cyber and Physical-Layer attacks Societally acceptable information based pre-flight screening Enhancing Smart Building capabilities for a Secure and Safe structure Detect CBRN attack utility distribution infrastructure Vulnerability assessment Rapid response biosensing capabilities Multisensor fusion and systems for CBRE detection Early detection, limitation diagnosis and response to a CBR distribution infrastructure attack Assessment of prevention options Integrated sensing and intelligence to mitigate the effects of a CBR attack Technologies for preventing intrusion into the distribution infrastructure Smart environment to reduce CBRNE
  • 9. "SOCIETAL DIMENSION OF SECURITY; PRIVACY AND FREEDOM IN THE INTERNET" Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Engaging the population in crisis management More effective engagement of the populace during a crisis How to empower the citizen during a crisis Inclusive technologies for security Inclusive technologies for security
  • 10. "ENHANCE STANDARDISATION AND INTEROPERABILITY " Research theme Research topic 2014- 2016 2016- 2018 2018- 2020 Secure vehicle communications for security applications Enhancing secure localisation and communications performance in high-density environments Harmonizing detection and identification of bio agents Develop a CBRN training and testing agenda for detection and identification of CBRN agents Development of pan –European database of whole genome sequences, proteomics and other information of relevant threat agents Improve European ability to distiguishing intentional biological events from natural Develope a statistical framework for genetic comparison of microbial strains and samples Develop capability to verify the use of Biological agents in a forensic context Improving crisis management response Improved European Multi-disciplinary team response through more efficient interoperability Improving security cross border interoperability Next generation PPDR communication Adaptive and Robust PPDR Communications based on the Flexible Use of the Spectrum