SECURED SECurity at the network EDge

Size: px
Start display at page:

Download "SECURED SECurity at the network EDge"

Transcription

1 SECURED SECurity at the network EDge Antonio Lioy Politecnico di Torino < polito.it > TENACE meeting Sestriere (Italy) January 22 nd, 2015

2 The SECURED FP7 project FP7 call 10 Collaborative Project (FP7-ICT ) grant agreement no duration: 3 years (1/10/ /9/2016) EC contribution: 2.7 M Euro web: fp7.eu mail: coordinator@secured fp7.eu 2

3 The Consortium (I) Politecnico di Torino Italy coordinator = Prof. Antonio Lioy ( antonio.lioy@polito.it ) networking, trusted computing, security policies HP Laboratory Bristol United Kingdom networking, trusted computing Primetel PLC Cyprus telco, network and content provider (regional) Telefonica Investigacion y Desarrollo Spain telco and network provider (worldwide) 3

4 The Consortium (II) United Nations Interregional Crime and Justice Research Institute Italy social and policy aspects of security Universitat Politecnica de Catalunya Spain networking, mobility (Barcelona Supercomputing Center Spain) computational architectures VTT Technical Research Centre of Finland cybersecurity 4

5 Main idea users have many "terminals" laptop, desktop, tablet, smartphone, Internet-connected TV, car infosystem, with very different security level (because it's difficult to develop security controls for so many platforms with so different characteristics) and different network connection (hence we can't consistently rely on network border protection) IDEA: offload security controls from the user terminals to a (trusted and secure) network node 5

6 From heterogeneous to uniform security security applications independent from user terminals security protection independent from user location 6

7 Use cases home home gateway, protection of family (and visitors') devices enterprise wired/wireless access, protection of hosts (including servers?) public hotspot WiFi access, protection of visitors mobile 3G/4G access, protection of subscriber's device IoT wireless access point, protection of IoT node NOTE: first hop not "SECURED"? then create a secure connection to a SECURED-node somewhere in the network 7

8 Main components NED (Network Edge Device) trusted node (with TC techniques) VMM for multi-tenancy (one VM per user) e.g. home gateway, corporate router, wireless AP, GGSN security applications specific tasks (packet filter, parental control, anti-phishing, content inspection, ) executed at the NED security policies simplify configuration of applications share "best practice" policies flexibility (users care about policy, not implementation) 8

9 SECURED architecture authn application repository 2. authenticate 1. trust 3. get apps 4. get policies policy repository user terminal NED 5. protect! personal execution environment 9

10 Trust and security NED (Network Edge Device user terminal policy app(s) TPM secure & trusted channel measures verifier 10

11 Monolithic vs split NED end-user device end-user device network SEC edge device (SECURED) network edge device (SECURED) OF SEC computing device (SECURED) network network 11

12 Hierarchical security policies the same connection may be subject to constraints from different tenants (depending on the network environment) policies are applied in a hierarchical way user is informed of the overall policy applied to her connection (and may refuse connecting to the network) government government ISP parent user (child) ISP corporation department user (employee) 12

13 Security policy: levels high-level block access to malware distribution hosts medium-level use service MalwareLookup to verify if a host is a known malware distribution point low-level if ( lookup( host, dns.malware.org) == 1) then deny; else permit 13

14 Cooperative and uncooperative policies cooperative policies disclose their content (to the end-user) and hence permit policy reconciliation display of the final policy implementation on a single PSA uncooperative policies do not disclose their content to anybody (but the policy owner) policy reconciliation impossible policy display impossible require a dedicated PSA (chained to the others of the user) 14

15 Components and issues in SECURED components PSC = Personal Security Controller PSA = Personal Security Application TVD = Trusted Virtual Domain (PSC + PSA 1 PSA N ) the "split" model implies personalized network path (SDN?) access to network-hosted computational capabilities (NFV?) these points have issues with security trust "personal" 15

16 Cloud / SDN / NFV for Secured 1. attestation 2. config( α ) cloud controller NED PSC PSA 1 PSA 2 PSA 3 α / 1 α / 2 α / 3 ext Mr. α 16

17 THANK YOU!

18 Disclaimer and confidentiality note EU disclaimer SECURED (project no ) is co-funded by the European Union (EU) via the European Commission (EC), under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the EC and the EC is not responsible for any use that might be made of its content. SECURED disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability Confidentiality The information in this document is confidential and restricted only to the members of the SECURED consortium (including the Commission Services). 18

Uniform IoT security using NFV based policy enforcement gateways

Uniform IoT security using NFV based policy enforcement gateways Uniform IoT security using NFV based policy enforcement gateways Adrian L. Shaw Hewlett Packard Labs (Bristol, UK) SICS Security Day 2016 # whoami Senior Researcher, Hewlett Packard Labs HPE s advanced

More information

Exploiting the network for securing personal devices

Exploiting the network for securing personal devices Exploiting the for securing personal devices Chris Dalton ( ), Antonio Lioy (+), Diego Lopez ($), Fulvio Risso (+), and Roberto Sassu (+) (*) HP Laboratories, Bristol, United Kingdom (+) Politecnico di

More information

Security Enhancements

Security Enhancements https://www.shield-h2020.eu/ Security Enhancements By means of NFV and Cognitive Security Managed Security Services (MSS) and NFV NFV becomes a key enabler for security services Security VNFs are emerging

More information

Electronic ID at work: issues and perspective

Electronic ID at work: issues and perspective Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":

More information

EU funded research is keeping up trust in digital society

EU funded research is keeping up trust in digital society EU funded research is keeping up trust in digital society Rafael Tesoro Trust and Security Unit DG Communica5ons Networks, Content and Technology European Commission Cybersecurity Strategy of the EU: An

More information

Deliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation

Deliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation Deliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562

More information

Virtualized Security at the Network Edge: A User-centric Approach

Virtualized Security at the Network Edge: A User-centric Approach Virtualized Security at the Network Edge: A User-centric Approach D. Montero, M. Yannuzzi, A. Shaw, L. Jacquin, A. Pastor, R. Serral-Gracià, A. Lioy, F. Risso, C. Basile, R. Sassu, M. Nemirovsky, F. Ciaccia,

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

SPLIT INTERFACES (SPIN) Jordi Domingo-Pascual Universitat Politècnica de Catalunya BarcelonaTECH (UPC) VFCS17. ISCTE. Lisboa.

SPLIT INTERFACES (SPIN) Jordi Domingo-Pascual Universitat Politècnica de Catalunya BarcelonaTECH (UPC) VFCS17. ISCTE. Lisboa. SPLIT INTERFACES (SPIN) Jordi Domingo-Pascual Universitat Politècnica de Catalunya BarcelonaTECH (UPC) VFCS17. ISCTE. Lisboa. October 24, 2017 SPLIT INTERFACES (SPIN) The main goal is to decouple the devices

More information

Towards the roll-out of highly customizable Future 5G Networks

Towards the roll-out of highly customizable Future 5G Networks Towards the roll-out of highly customizable Future 5G Networks Sergios Soursos, Ph.D. Master Research Engineer souse@intracom-telecom.com ITU Forum, Towards 5G Enabled Gigabit Society, Athens, 11 Oct 2018

More information

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security

More information

Security analysis and configuration of large networks

Security analysis and configuration of large networks Security analysis and configuration of large networks Antonio Lioy Politecnico di Torino Dip. Automatica e Informatica lioy@polito.it Abstract Providing and managing for large networked systems is difficult

More information

IoT privacy risk management in ANASTACIA project

IoT privacy risk management in ANASTACIA project ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.

More information

A Leading Internet Business Enabler

A Leading Internet Business Enabler A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My hotel guests are bringing too many devices into my network. How do I manage them? I allow

More information

A European Perspective on Smart Grids

A European Perspective on Smart Grids A European Perspective on Smart Grids Patricia Arsene Unit Smart Cities and Sustainability CONNECT/H Sustainable & Secure Society DG Communication Networks, Content and Technology European Commission European

More information

Dynamic spectrum allocation and energy efficiency in 5G systems. The SPEED-5G perspective

Dynamic spectrum allocation and energy efficiency in 5G systems. The SPEED-5G perspective Dynamic spectrum allocation and energy efficiency in 5G systems The SPEED-5G perspective CLEEN2016 Workshop @CROWNCOM 2016, 31.05.2016, Grenoble Benoit MISCOPEIN CEA-Leti www.speed-5g.eu on behalf of the

More information

Application Deployment in Future Global Multi-Cloud Environment

Application Deployment in Future Global Multi-Cloud Environment Application Deployment in Future Global Multi-Cloud Environment Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu OIN Workshop, Saint Louis, MO October 20, 2015 These slides

More information

Project Presentation v2

Project Presentation v2 Project Presentation v2 EPES Project Eco-Process Engineering System For Composition of Services to Optimize Product Life-cycle FoF-ICT-2011.7.3-285093 Public Project Report Project Facts: Duration: 36

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

UCD Centre for Cybersecurity & Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

D6.1. Project Portal and Communication Channels

D6.1. Project Portal and Communication Channels H2020 5G-Coral Project Grant No. 761586 D6.1. Project Portal and Communication Channels Abstract This deliverable (D6.1) reports the set-up of project portal and communication channels such as social media

More information

TEDS BEE TEST OF DIGITAL SERVICES FOR BUILDING ENERGY EFFICIENCY A PROJECT TOWARDS THE ENERGY SAVING AND SUSTAINABILITY OF PUBLIC BUILDINGS

TEDS BEE TEST OF DIGITAL SERVICES FOR BUILDING ENERGY EFFICIENCY A PROJECT TOWARDS THE ENERGY SAVING AND SUSTAINABILITY OF PUBLIC BUILDINGS 4 TEDS BEE TEST OF DIGITAL SERVICES FOR BUILDING ENERGY EFFICIENCY A PROJECT TOWARDS THE ENERGY SAVING AND SUSTAINABILITY OF PUBLIC BUILDINGS 4 TEDS BEE A project led by Ferrovial Servicios towards the

More information

5G-PICTURE. 5G Programmable Infrastructure Converging disaggregated network and compute Resources

5G-PICTURE. 5G Programmable Infrastructure Converging disaggregated network and compute Resources 5G-PICTURE 5G Programmable Infrastructure Converging disaggregated network and compute s Anna Tzanakaki (University of Bristol, UK, NKUA, Greece) Consortium IHP GmbH (Coordinator) University of Bristol

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

Cloud-based Rapid Elastic MAnufacturing

Cloud-based Rapid Elastic MAnufacturing Cloud-based Rapid Elastic MAnufacturing WP9 Impact D9.2.1 Promotion and Promotional Material Deliverable Lead: TANet Contributing Partners: ASC Delivery 03/2015 Dissemination Level: Public Version 1.0

More information

AIMS Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things

AIMS Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things AIMS 2017 Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things Dr Jim Martin School of Computing Clemson University (jmarty@clemson.edu) Talk Overview Setting the

More information

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com

More information

High Performance Computing from an EU perspective

High Performance Computing from an EU perspective High Performance Computing from an EU perspective DEISA PRACE Symposium 2010 Barcelona, 10 May 2010 Kostas Glinos European Commission - DG INFSO Head of Unit GÉANT & e-infrastructures 1 "The views expressed

More information

M2M in the Real World: Security Best Practices and Lessons Learned

M2M in the Real World: Security Best Practices and Lessons Learned M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013 Agenda and Topics M2M compliance and regulatory

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Network Function Virtualization (NFV)

Network Function Virtualization (NFV) Network Function Virtualization (NFV) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Mijumbi et al., Network Function Virtualization:

More information

SCOTT Methodology for Building Blocks and Use Cases

SCOTT Methodology for Building Blocks and Use Cases SCOTT - Jan2018 SCOTT Methodology for Building Blocks and Use Cases Josef Noll, Maghsoud Morshedi, Toktam Ramezani secure connected trustable things SCOTT has received funding from the Electronic Component

More information

Revolutionising mobile networks with SDN and NFV

Revolutionising mobile networks with SDN and NFV Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated

More information

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017 EU Cloud Computing Policy Luis C. Busquets Pérez 26 September 2017 The digital revolution is built on data Most economic activity will depend on data within a decade Potential of the data-driven economy

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

Klaus-Michael KOCH TECHNIKON Forschungsgesellschaft mbh DRS-workshop Vienna

Klaus-Michael KOCH TECHNIKON Forschungsgesellschaft mbh DRS-workshop Vienna This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 607577. Presented by: Klaus-Michael

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

Dr. Kontantinos Psannis, Assis. Prof. UOM Tel: Dr. Georgios Kokkonis, Scientific Staff TEIWM

Dr. Kontantinos Psannis, Assis. Prof. UOM Tel: Dr. Georgios Kokkonis, Scientific Staff TEIWM Dr. Kontantinos Psannis, Assis. Prof. UOM Tel: +302310891737 - http://users.uom.gr/~kpsannis/ Dr. Georgios Kokkonis, Scientific Staff TEIWM Department of Applied Informatics University of Macedonia Greece

More information

AAI in EGI Current status

AAI in EGI Current status AAI in EGI Current status Peter Solagna EGI.eu Operations Manager www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 User authentication

More information

Enabler Manual Security Indicator

Enabler Manual Security Indicator Enabler Manual Security Indicator Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562 Call H2020-ICT-2014-2 Authors UOXF: Ravishankar Borgaonkar

More information

The EUCISE2020 project

The EUCISE2020 project The EUCISE2020 project (EUropean test bed for the maritime Common Information Sharing Environment in the 2020 perspective) P. Sacco, 16/01/2018 CISE Roadmap Cross Sectorial interoperability for better

More information

Procedure: Bring your own device

Procedure: Bring your own device Procedure: Bring your own device Purpose This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University s network or who use their personal

More information

Towards new avenues in EU-US ICT collaboration:

Towards new avenues in EU-US ICT collaboration: Towards new avenues in EU-US ICT collaboration: 5G, Big Data, Internet of Things and Cyber Physical Systems for smart cities, smart transport and smart energy Project overview ICT Policy, Research and

More information

HORIZON2020 FRAMEWORK PROGRAMME TOPIC EUK Federated Cloud resource brokerage for mobile cloud services. D7.1 Initial publication package

HORIZON2020 FRAMEWORK PROGRAMME TOPIC EUK Federated Cloud resource brokerage for mobile cloud services. D7.1 Initial publication package HORIZON2020 FRAMEWORK PROGRAMME TOPIC EUK-03-2016 Federated Cloud resource brokerage for mobile cloud services D7.1 Initial publication package Project acronym: BASMATI Project full title: Cloud Brokerage

More information

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013 R E F E R E N C E Trusted Multi-Tenant Infrastructure Work Group Use Cases Version 1.1 November 15, 2013 Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2011-2013 Disclaimers, Notices, and License

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

A novel approach to ICN: POINT ip Over IcN the better ip. Dr. Dmitrij Lagutin, Aalto University, Finland

A novel approach to ICN: POINT ip Over IcN the better ip. Dr. Dmitrij Lagutin, Aalto University, Finland A novel approach to ICN: POINT ip Over IcN the better ip Dr. Dmitrij Lagutin, dmitrij.lagutin@aalto.fi, Aalto University, Finland Information Centric Networking (ICN) Information Centric Networking (ICN)

More information

VNC Connect security whitepaper. Cloud versus direct with VNC Connect

VNC Connect security whitepaper. Cloud versus direct with VNC Connect VNC Connect security whitepaper Cloud versus direct with VNC Connect November 2017 Contents Introduction... 3 Key terminology... 3 Direct connectivity... 4 Cloud connectivity... 5 Summary... 6 Appendix:

More information

Building digital competences in national and regional clusters

Building digital competences in national and regional clusters Building digital competences in national and regional clusters FIIF event on "Digital Trust and Security 14.2.2019 Jarno Salonen 14.2.2019 VTT beyond the obvious 1 Agenda Background Building competences

More information

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

TESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017

TESTA-ng. TESTA 20 years of history October TESTA-ng Brief Presentation. October 2017 TESTA-ng TESTA 20 years of history TESTA-ng Brief Presentation 1 Agenda Introduction on TESTA Objectives Mission A brief history Who is connected today? Multiple communities of interests Applications using

More information

EU-TW Partnership. l l

EU-TW Partnership. l l l l EU-TW Partnership To establish formal 5G cooperation between Taiwan and Europe To enable Taiwan s participation in H2020 projects as a strategic partner Eco-system Global Linkage Agreement with EC,

More information

EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)

EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) Manuela Cabral Directorate General for Taxation and Customs Union Head of Risk management and Security, Unit B 2 Brussels,

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation

EC Perspective on Connectivity and Smart Mobility and the Role of Digital Co-production/Co-creation in Transportation EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation Francisco García Morán Chief IT Advisor European Commission Roadmap to a Single European

More information

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT Policy UT Health San Antonio shall adopt and document Standards and Procedures to define and manage a secured operating configuration for all

More information

Media (NEM) Initiative

Media (NEM) Initiative Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom

More information

ASERCOM cyber-security guideline for connected HVAC/R equipment

ASERCOM cyber-security guideline for connected HVAC/R equipment ASERCOM cyber-security guideline for connected HVAC/R equipment Preface Many HVAC/R components like compressors, fans or controllers have connectivity features today. This includes Bluetooth, Wi-Fi or

More information

Energy Management of Microgrids in a Smart City Environment

Energy Management of Microgrids in a Smart City Environment Energy Management of Microgrids in a Smart City Environment Meeting: M2M Forum 2013 Date: May 14 th 2013 Presenter: Maurizio Spirito Project Coordinator of EU GreenCom project, ISMB Istituto Superiore

More information

We are innovating in security

We are innovating in security We are innovating in security Security Network Network Innovation Day Day 2018 2018 We are We in are in threat and defense Complex mix of multiple vendors without effective orchestration IoT connected

More information

Multi-RATs Convergence: A New Spin Through the Edge

Multi-RATs Convergence: A New Spin Through the Edge Multi-RATs Convergence: A New Spin Through the Edge Ping-Heng (Wallace) Kuo and Alain Mourad InterDigital, London, UK Cambridge Wireless, 14 December 2017 2016 InterDigital, Inc. All Rights Reserved. Outline

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information

Towards Multitechnology

Towards Multitechnology Towards Multitechnology seamless access for 5G: a first approach with very tight coupling IMT 5G Workshop, 7 sep 2015 X. Lagrange, Y. Khadraoui, A. Gravey Outline Introduction : Fixed Mobile Convergence

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet Elements of Modern Networking ACK: content taken from Foundations

More information

Intel s Architecture for NFV

Intel s Architecture for NFV Intel s Architecture for NFV Evolution from specialized technology to mainstream programming Net Futures 2015 Network applications Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

SEC-04-DRS-2017: Broadband communication systems

SEC-04-DRS-2017: Broadband communication systems SEC-04-DRS-2017: Broadband communication systems Policy background Strong interest from Member States, both on ministerial level as well as on end-user level. Cross-border communication issues between

More information

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017 1 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017 2 THE FACTS ON

More information

UNIVERSITAT POLITÈCNICA DE CATALUNYA

UNIVERSITAT POLITÈCNICA DE CATALUNYA Department of Signal Theory and Communications UNIVERSITAT POLITÈCNICA DE CATALUNYA RESOURCE MANAGEMENT STRATEGIES FOR SDR CLOUDS Vuk Marojevic Ismael Gomez Gabriel Montoro Antoni Gelonch Pere Gilabert

More information

Mobility First How Tomorrow Moves for Education

Mobility First How Tomorrow Moves for Education Mobility First How Tomorrow Moves for Education Presented by: Sponsored by: CONFIDENTIAL Copyright 2016. Aruba Networks, an HP Company. All rights reserved GENMOBILE IS AT THE HEART OF OUR TECHNOLOGY STRATEGY

More information

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security Updates and Trends Affecting the Real Estate Industry Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways

More information

Evolving FIRE into a 5G-Oriented Experimental Playground for Vertical Industries

Evolving FIRE into a 5G-Oriented Experimental Playground for Vertical Industries Evolving FIRE into a 5G-Oriented Experimental Playground for Vertical Industries Spyros Denazis University of Patras, Greece 5GinFIRE.eu contact@5ginfire.eu 5GinFIRE 5GINFIRE is a three years Research

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Automotive Industry: Why the ITS B usinesses Need to C are about IPv6?

Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? Automotive Industry: Why the ITS B usinesses Need to C are about IPv6? i.e. a presentation on IPv6 and C ooperative ITS Thierry.Ernst@inria.fr JRU LARA (INR IA & M ines ParisTech) http://www.lara.prd.fr/ipv6-its

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY Plains Communication Services ( PCS ), LLC and Plainstel.com provides its subscribers with access to the Internet only on the terms and conditions

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS Susanne Bieller, EUnited Robotics EC Workshop in the area of autonomous systems / robots / IoT Brussels, 13 July 2017 Different needs according to classification

More information

PRIVACY POLICY QUICK GUIDE TO CONTENTS

PRIVACY POLICY QUICK GUIDE TO CONTENTS PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Instruction For Use Laptop Internet On Mobile Via Wifi Hotspot

Instruction For Use Laptop Internet On Mobile Via Wifi Hotspot Instruction For Use Laptop Internet On Mobile Via Wifi Hotspot Follow the instructions to create a Wi-Fi hotspot on Android 4.4 Kitkat to share You can share your own cellular data connection with your

More information

Deliverable Final Data Management Plan

Deliverable Final Data Management Plan EU H2020 Research and Innovation Project HOBBIT Holistic Benchmarking of Big Linked Data Project Number: 688227 Start Date of Project: 01/12/2015 Duration: 36 months Deliverable 8.5.3 Final Data Management

More information

Euro 5G Cooperation with other European R&D Programmes

Euro 5G Cooperation with other European R&D Programmes Euro 5G Cooperation with other European R&D Programmes In order to grow the 5G PPP initiative, its impact and relevance for the whole Digital Society, cooperation with other European R&D programmes is

More information

DISCERN Libraries User Guide

DISCERN Libraries User Guide Distributed Intelligence for Cost-Effective and Reliable Distribution Network Operation DISCERN Libraries User Guide Author: OFFIS Date: 22.04.2016 www.discern.eu The research leading to these results

More information

D5.2 FOODstars website WP5 Dissemination and networking

D5.2 FOODstars website WP5 Dissemination and networking D5.2 FOODstars website WP5 Dissemination and networking This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No 692276. DISCLAIMER

More information

Talenom Plc. Description of Data Protection and Descriptions of Registers

Talenom Plc. Description of Data Protection and Descriptions of Registers Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers

More information

Cloud versus direct with VNC Connect

Cloud versus direct with VNC Connect VNC Connect security whitepaper Cloud versus direct with VNC Connect This document discusses strategies for choosing the best connectivity method for your business: establishing direct connections between

More information

Enhancing Critical Infrastructure Protection with innovative SECurity framework

Enhancing Critical Infrastructure Protection with innovative SECurity framework Enhancing Critical Infrastructure Protection with innovative SECurity framework Manos Athanatos FORTH-ICS, Distributed Computing Lab H2020 SAINT Project Workshop 20/03/2018 The research leading to these

More information