Policy and Organizational Challenges for Vehicular Communications Security
|
|
- Alice Wade
- 5 years ago
- Views:
Transcription
1 Policy and Organizational Challenges for Vehicular Communications Security Secure Vehicular Communications Workshop. EPFL, Emilio Davila Gonzalez EC DG INFSO.G4
2 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 2
3 The Framework Information Society (r)evolution has caused massive amounts of personal data generated, processed, exchanged and stored i2010 Initiative identifies security (trust and privacy) as one of the main challenges posed by digital convergence Personalised, dynamic open services need trust and security PETs can allow deployment of services while respecting personal privacy User centric - empowerment approach, data protection and proportionality are key issues Security in VC, EPFL, , 3
4 Relevant EC regulation Directive 95/46/EC: Protection of individuals with regard to the processing of personal data and on the free movement of such data. Directive 2002/58/EC: The processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) COM(2006) 251: A strategy for a Secure Information Society Dialogue, partnership and empowerment COM(2007) 96: Radio Frequency Identification (RFID) in Europe: steps towards a policy framework COM(2007) 228: Promoting Data Protection by Privacy Enhancing Technologies (PETs) Security in VC, EPFL, , 4
5 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 5
6 ICT WP , Objective 1.4: Secure, dependable & trusted infrastructures 90 M Car/Railway Mobile Office/Factory DVC PC TV Personal Information STB Game Machine Audio SIM SD MMC Map Information SD MMC Intranet Information Enabling Technologies Web Technologies Crypto, trusted computing, secure software (virtual environments, collaborative communities ) Digital contents IC Card Public expectation E-Tower SD MMC DVD Telephone Security in VC, EPFL, , 6 Home Coordination Outdoor Actions Street/Shop
7 ICT Objective 1.4: Secure, dependable & trusted infrastructures 90 M Network infrastructures Identity management, Service privacy, trust policies infrastructures 4 Projects 11 m 2 Projects 1 Project 5.8 m 9.4 m Enabling Technologies Crypto, trusted 3 computing, Projects secure software 4 Projects 20.5 m 18 m Enabling technologies for trustworthy infrastructures Biometrics, trusted computing, cryptography, secure SW 6 Projects: 22 m Coordination Actions Research roadmaps, metrics and benchmarks, Security in VC, EPFL, , 7 Coordination Actions international cooperation, coordination activities 4 Projects: 3.3 m
8 7 th EU Research Framework Programme ( ) Secure, dependable & trusted infrastructures Type of projects 90 M Coordination Actions STREPs NoEs IP projects PICOS privacy PRIMELIFE TURBINE biometry MOBIO ACTIBIO INTERSECTION network WOMBAT PRISM SWIFT AWISSENET GEMOM FORWARD ECRYPT II networking & coordination THINK TRUST INCO-TRUST TAS3 AMBER CONSEQUENCE MASTER services SecureSCM AVANTSSAR trusted computing TECOM CACE SHIELDS secure implementation
9 Security in network infrastructures: 4 projects, 11 m EC funding Main R&D project priorities An integrated security framework and tools for the security and resilience of heterogeneous networks (INTERSECTION) A networking protocol stack for security and resilience across ad-hoc PANs & WSNs (Awissenet) A message-oriented MW platform for increasing resilience of information systems (GEMOM) Data gathering and analysis for understanding and preventing cyber Security in VC, EPFL, , 9 threats (WOMBAT)
10 Security enabling Technologies 6 projects, 22 m EC funding Main R&D project priorities Trusted Computing IP TECOMT trusted embedded systems: HW platforms with integrated trust components Cryptography NoE ecrypt II Multi-modal Biometrics multi-biometric authentication (based on face and voice) for mobile devices (MOBIO) activity related and soft biometrics technologies for supporting continuous authentication and monitoring of users in ambient environments (ACTIBIO) Secure SW implementation providing SW developers with the means to prevent occurrences of known vulnerabilities Security in VC, EPFL, when , building 10 software (SHIELDS) A toolbox for cryptographic software engineering (CACE)
11 Contents The Framework: Trust and Security in electronic communications EC research activities on Trust and Security The special case of vehicular communications The ecall case 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection esecurity Working Group Research activities Security in VC, EPFL, , 11
12 ecall: Data Protection issues (1) Legitimate processing of MSD: Solution: Unambiguous consent -7(a) => Possibility of easy deactivation Adequate processing by data controllers: Publicly appointed organisations to act as PSAPs Adequate storage periods Security of the communications and of data stored IVS, MNOs, PSAPs Security in VC, EPFL, , 12
13 ecall: Data Protection issues (2) Citizen Trust Fair, adequate and not excessive processing No secondary use of information MSD => Minimum information for effective handling of the emergency call System not permanently tracked User awareness Security in VC, EPFL, , 13
14 ecall: Data Protection issues (3) Service providers (contract) Specific rules for FSD: Service providers should respect the data protection and privacy regulation: Clear definition of the use of data Proportionality Transparency Freely given consent Security in VC, EPFL, , 14
15 1 st Workshop in-vehicle telematics and cooperative systems Privacy and data protection Privacy may be a barrier for the deployment of services Objective: bring together ITS & DPO experts to discuss common guidelines for the design of applications in this area 1 st WS: 13/02/ participants, including 8 DPO Security in VC, EPFL, , 15
16 1 st WS: Conclusions Privacy/data protection issues should be integrated from the early design. Liaison with Data Protection Authorities to clarify concepts/provide guidelines Data protection/limits depend on the type of applications Use the personal data for the sole purpose is collected. Anonymous data can be used for other purposes PETs are important tools to allow services deployment while improving privacy protection Inspire public confidence: user awareness about protection of their privacy is a plus Transparency and right of choice to the user Cost effectiveness should be taken into consideration Security in VC, EPFL, , 16
17 1 st WS: Way forward: Next steps Continue collaboration with art. 29 WP Creation of a CIRCA repository for exchanging of information esafety Forum to elaborate code of practice in collaboration with art. 29 WP (ITF) Security and Data protection by better design Security in VC, EPFL, , 17
18 esecurity Working Group (1) Objectives Two focus: Data protection Intrusion avoidance Support the reliability of esafety Protection of esafety functions Prevention of critical road safety effects which result from electronic vehicle systems Preventing of misuse or malpractice, including privacy infringement Establishment of new R&D fields Providing of recommendations, code of practice, standardisation Security in VC, EPFL, , 18
19 esecurity Working Group (2) Topics Protection against unauthorised mobile remote access and wired access on networked vehicles including the full electronic system and its components and data against manipulation and subsequent misuse (e.g. wired & tele- data / software transfer) Protection of electronic motor vehicle components against eassaults (e.g. viruses, trojans, spy-ware, spam, etc.) and of digital data stored in the motor vehicle and road infrastructure against unauthorised access and manipulation Protection of motor vehicles, fleets and road infrastructure by securing telematics and cooperative system applications Establishment of the legal requirement catalogue on necessities in MS and European legislation, certification, and inspection procedures next to the esecurity Standards survey Security in VC, EPFL, , 19
20 Research Activities in the ICT for mobility: The Potential of Co-operative Systems The potential benefits include: increased road network capacity reduced congestion and pollution shorter and more predictable journey times improved traffic safety for all road users lower vehicle operating costs more efficient logistics improved management and control of the road network (both urban and inter-urban) increased efficiency of the public transport systems better and more efficient response to hazards, incidents and accidents Car-to-Infrastructure Communication Security in VC, EPFL, , 20 Car-to-Car Communication
21 The EU Approach Actions: Not only RTD Co-operative Systems will enhance the support available to drivers and other road users RTD Coordination & support Policy Research & Development Wider Adoption Best Use Right Regulatory Environment Projects: GST CVIS Safespot Coopers Security in VC, EPFL, , 21 COMeSafety Sevecom Spectrum policy (CEPT) esafety WG on communications esafety WG on Security esafety WG on Service oriented architectures
22 Trust & Security on in-vehicle telematics: GST Goal: open and standardised framework architecture enabling end-to-end in-vehicle telematics services GST functionalities include service deployment, service provisioning, access to vehicle and handling of nomadic devices GST has developed and implemented telematics certification, security and payment services GST architecture and functionality has been tested with three services (Rescue/eCall, Safety Channel, Enhanced FCD) on six test sites GST results are already used by CVIS Security in VC, EPFL, , 22
23 Security in VC, EPFL, , 23 FP6 VC Projects: Collaboration and Synergies
24 On-going projects FP6: SEVECOM Mission: define a consistent and futureproof solution to the problem of V2V/V2I security Focus: Threats, such as bogus information, denial of service or identity cheating. Requirements: authentication, availability, and privacy. Operational Properties: network scale, privacy, cost and trust. Coordinator: Coordinator: TRIALOG TRIALOG Total costs: ± K Total costs: ± K EC contribution: K EC contribution: K Start date: 1/02/2006 Start date: 1/02/2006 Duration: 36 months Duration: 36 months Security in VC, EPFL, , 24 Research Topics: gspecify an architecture and security mechanisms iwhich provide the right level of protection. iwhich address issues such as liability versus privacy gfully addressed topics ikey and identity management, isecure communication protocols (including secure routing), itamper proof device and decision on crypto-system, iprivacy. ginvestigated topics iintrusion Detection, idata consistency, isecure positioning, isecure user interface.
25 FP7 New projects: PRECIOSA Mission: demonstrate that co-operative systems can comply with privacy regulations using an example application endowed with PET for location data Coordinator: Coordinator: TRIALOG TRIALOG Total costs: ± 2,465 K Total costs: ± 2,465 K EC contribution: 1,667 K EC contribution: 1,667 K Start date: 1/03/2008 Start date: 1/03/2008 Duration: 24 months Duration: 24 months Security in VC, EPFL, , 25 Under Negotiation Objectives: Picture: C2C consortium g Define an approach for evaluation of co-operative systems in terms of: icommunication privacy idata storage privacy g Define a privacy aware architecture for co-operative systems, involving: isuitable trust models and ontologies iv2v and V2I privacy verifiable architecture, including: iprotection iinfringement detection iauditing g Define and validate guidelines for privacy aware co-operative systems g Investigate specific challenges for privacy
26 FP7 New projects: EVITA Mission: avoid un-authorised manipulation of on-board systems to prevent intrusion into the in-vehicular systems and transmission of corrupted data outside Coordinator: Coordinator: Fraunhofer Fraunhofer (SIT) (SIT) Total costs: ± 6,000 K Total costs: ± 6,000 K EC contribution: 3,857 K EC contribution: 3,857 K Start date:??/??/2008 Start date:??/??/2008 Duration: 36 months Duration: 36 months Objective: g Develop open standard secure architecture and protocol specification Methodology: The project will: g g g g g Under Negotiation Identify idustrial use cases (assembly, field maintenance) Compile scenarios of possible threats Define of overall security requirements Compile secure trust model Specify, verify, validate and demonstrate a secure on-board architecture and protocol. Security in VC, EPFL, , 26
27 Thank you for your attention! Security in VC, EPFL, , 27
R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security
Overview of DG INFSO R&D on Trust & Security Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Setting the scene - The Digital Wave Sophia
More informationDigital Road Map Data :
Digital Road Map Data : The European Agenda European Commission DG MOVE 21 June 2011 Workshop Access to public data for digital road maps EU Policies on ITS Action Plan for the Deployment of Intelligent
More informationl Digital Road Map Data :
l Digital Road Map Data : The European Agenda Gilles Carabin European Commission DG MOVE 29 March 2011 Workshop Access to public data for digital road maps l EU Policies on ITS Action Plan for the Deployment
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationSecure Vehicle Communication. SEVECOM (SE-cure VE-hicle COM-munication) General Introduction SEVECOM General Introduction
Secure Vehicle Communication SEVECOM (SE-cure VE-hicle COM-munication) General Introduction 1 Outline Vehicle Communication Security and Privacy Threats Research topics Preliminary results 2 Vehicle Communication
More informationDr. Panos Papadimitratos
Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationSecurity and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy
Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and
More informationNew Services in Mobility: C-ITS
New Services in Mobility: C-ITS UNECE ITS Workshop, 07th of October 2015, Bordeaux Gerhard Menzel European Commission DG Mobility and Unit C3 - Intelligent Systems President Juncker: a target of at least
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationEuropean Activities towards Cooperative Mobility
European Activities towards Cooperative Mobility CARS 21 WG1 MEETING Brussels, 21 February 2011 Juhani Jääskeläinen Head of Unit, ICT for Transport European Commission Directorate General Information Society
More informationValérie Andrianavaly European Commission DG INFSO-A3
Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:
More informationCooperative Mobility and the importance of harmonised international standards
Cooperative Mobility and the importance of harmonised international standards 2 nd ETSI TC ITS Workshop Sophia Antipolis, 10-12/02/2010 Juhani Jääskeläinen Head of Unit, ICT or Transport European Commission
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationTowards a European Cloud Computing Strategy
Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationC-ITS in Europe. Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond. Transport
C-ITS in Europe Gerhard Menzel, DG MOVE 7th ETSI ITS Workshop 26 th of March 2015, Helmond Why C-ITS? Cooperative Systems understood as "connected mobility": More Connecting improving enhancing optimising
More informationEuropean Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU
European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU Hermann Meyer, CEO ERTICO IMPACTS, Barcelona, 31 March 2011 This presentation is mainly based on charts which were already
More informationVoertuigconstructeurs en data economie
Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context
More informationTrustworthy ICT. FP7-ICT Objective 1.5 WP 2013
Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationInformation sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3
Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and
More informationH2020 & THE FRENCH SECURITY RESEARCH
H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for
More informationEC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation
EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation Francisco García Morán Chief IT Advisor European Commission Roadmap to a Single European
More informationHow the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015
How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationCOMeSafety Specific Support Action
COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationEUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT
EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction C-ITS Platform GEAR2030 Digital Transport & Logistics Forum (DTLF) EC Directive
More informationThird public workshop of the Amsterdam Group and CODECS European Framework for C-ITS Deployment
Third public workshop of the Amsterdam Group and CODECS European Framework for C-ITS Deployment 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE EU Policy Tools Large-scale deployment
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationCOMPANION FINAL EVENT 14 TH & 15 TH September 2016
COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content
More informationThe European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3
The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum
More informationThe emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18
The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Dr. Christian Weiß Daimler AG Group Research
More informationRecommendations on residual issues relevant to ecall
Recommendations on residual issues relevant to ecall Robert MacDougall Vodafone Group Public Policy ECC Public Workshop on numbering for ecall Copenhagen 31 January 2017 Vodafone Connected car services
More informationWhere are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016
Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016 C-ITS - background Substantial effort to develop and deploy C-ITS 200+ million of EU money on projects National-funded
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationEISAS Enhanced Roadmap 2012
[Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationehealth action in the EU
ehealth action in the EU ehealth for smart and inclusive growth 13 February 2014 Jerome Boehm DG SANCO ehealth and Health Technology Assessment General Health Objectives of the EU cooperation on ehealth
More informationecall Introduction, deployment and life cycle Freddie McBride, European Communications Office
ecall Introduction, deployment and life cycle Freddie McBride, European Communications Office FICORA Workshop ecall International and National Implementation Helsinki, Wednesday 08 February 2017 Agenda
More informationNIS-Directive and Smart Grids
NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements
More informationA regulatory framework for connected and automated driving Towards a strengthened cooperation
A regulatory framework for connected and automated driving Towards a strengthened cooperation 3 rd SIP-adus WS TOKYO, JAPAN Friedemann Bruehl JAIA, on behalf of ACEA 2016 年 11 月 15 日 ( 火 ) ACEA MEMBERS
More informationStatus of the ecall initiative
Status of the ecall initiative IMCO Committee Brussels, 24/01/12 Thierry Van der Pyl Director European Commission. DG Information Society and Media Background Current status and next steps 2 The pan-european
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationSecure automotive on-board networks
Secure automotive on-board networks Basis for secure vehicle-to-x communication Dr.-Ing. Olaf Henniger Fraunhofer SIT / Darmstadt 2 December 2010 Presentation overview EVITA project overview Security challenges
More informationFirst Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry
First Science-Policy- Industry meeting on CBRN-E Introductory words Brussels, 30 th January 2014 Philippe Quevauviller Security and Industry DG Enterprise and Industry FP7 CBRN- Where do we stand? Around
More informationStrategic Transport Research and Innovation Agenda - STRIA
Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationCar2Car Communication Consortium C2C-CC
Car2Car Communication Consortium C2C-CC Secure Vehicular Communication: Results and Challenges Ahead February 20th/21st 2008, Lausanne Benjamin Weyl BMW Group Research and Technology Chair C2C-CC Security
More informationTransport Network ITS Spatial Data Deployment Platform
Transport Network ITS Spatial Data Deployment Platform TN-ITS and JRS meeting 18 June 2014 The core concept (1/2) TN-ITS is about the exchange of static map information from the Road Sector, it is not
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationInternet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA
Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things IoT represents the next step towards the digitalisation of our society and economy, where objects and people
More informationThe international CETECOM Group. ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM
The international CETECOM Group ETSI ITS Workshop 2013 Session 4 Testing and Certification CETECOM ITS Service Partner Ulrich Keuling, CETECOM Wireless Car Connectivity 2 Driving factors behind Car Connectivity
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationSichere Intelligente Mobilität - Testfeld Deutschland. Safe Intelligent Mobility Field Test Germany
1 Sichere Intelligente Mobilität Testfeld Deutschland Safe Intelligent Mobility Field Test Germany The German Approach to Field Testing of Cooperative Systems Matthias Schulze Daimler AG Group Research
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationPATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT. Paolo Venturoni CEO European Organisation For Security 4 th June 2018
PATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT Paolo Venturoni CEO European Organisation For Security 4 th June 2018 1 What is EOS The European Organisation for Security (EOS) is the voice of the European
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationThe FP7 ITSSv6 Project
The FP7 ITSSv6 Project IPv6 ITS Station Stack for Cooperative ITS FOTs http://www.itssv6.eu Coordinated by INRIA (Thierry Ernst) thierry.ernst@mines-paristech.fr Mines ParisTech / INRIA 2012-05-25 ITSSv6:
More informationIPv6 Task Force - Phase II. Welcome
IPv6 Task Force - Phase II Welcome Joao da Silva European Commission Brussels 12 September 2002 Erkki Liikanen - Date 2002-1 Latest EU action on IPv6 IPv6 Task Force (Phase I) launched April 2001 Recommendations
More informationehealth in Europe: at the convergence of technology, medicine, law and society
ehealth in Europe: at the convergence of technology, medicine, law and society Pēteris Zilgalvis, J.D. Head of Unit, ICT for Health DG Information Society and Media, European Commission IPTS Spring Meeting,
More informationEUROPEAN COMMISSION Enterprise Directorate-General
EUROPEAN COMMISSION Enterprise Directorate-General Services, commerce, tourism, e-business & IDA E-business, ICT industries and services Brussels, 21 October 2003 DG ENTR-D4 M 338 - EN Standardisation
More informationETSI Security Standards Workshop January 2006
ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards
More informationECC Recommendation (17)04. Numbering for ecall
ECC Recommendation (17)04 Numbering for ecall Approved 22 November 2017 ECC/REC/(17)04 Page 2 INTRODUCTION ecall is a service designed for automotive vehicles to provide quick emergency response in case
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationHarmonised EU-wide interoperable ecall
Harmonised EU-wide interoperable ecall Cars21 WG on ITS Brussels 4/5/2012 Emilio Davila European Commission DG Information Society and Media ICT for transport 1 What is ecall? Triggered automatically by
More informationa view from emobility
European Technology Platforms Future Research Challenges in ICT Trust, Security, Privacy and Dependability a view from emobility Presented by Prof. Rahim Tafazolli University of Surrey Future Internet,
More informationThe European Union approach to Biometrics
The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationMassive M2M Communications: Challenges for NRAs
Communications Regulatory Agency Bosnia and Herzegovina GD-001/2018 (E) Massive M2M Communications: Challenges for NRAs Aleksandar Mastilovic Expert Advisor the Director-General at Communications Regulatory
More informationResearch and Innovation Impact of Trust & Security Programme White Paper 2013
Research and Innovation Impact of Trust & Security Programme White Paper 2013 Fabio Massacci, Olga Gadyatskaya (University of Trento) Frances Cleary (Waterford Institute of Technology) Version 1.1 October
More informationConferenza GARR Moving Forward to deliver an «EOSC in Practice» by 2018
Conferenza GARR 2017 Moving Forward to deliver an «EOSC in Practice» by 2018 Silvana Muscella Chair EOSC HLEG, CEO Trust-IT Services s.muscella@trust-itservices.com @silvanamuscella Mission profile Our
More informationHarmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT
Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationEuropean Cyber Security Certification: ECSO Meta-Scheme Approach
European Cyber Security Certification: ECSO Meta-Scheme Approach Sergio Lomban ECSO WG1 Chairman Conference on Cybersecurity Act Establishing the link between Standardisation and Certification 13 February
More informationAASHTO INTERNATIONAL DAY
AASHTO INTERNATIONAL DAY Session 1: Policy and Regulatory initiatives to support existing / legacy ITS technology deployments and their transition to accommodate and adapt emerging operations strategies
More informationENISA S WORK ON ICS AND SMART GRID SECURITY
AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and
More informationEUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity
EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationWhat our members see as being the value of TM 2.0
About TM 2.0 The TM 2.0 ERTICO Platform originated in 2011 by TomTom and Swarco-Mizar and was formally established on 17 June 2014 during the ITS Europe Congress in Helsinki. It now comprises more than
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationThe Arab ICT Organization
The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the
More informationMedia (NEM) Initiative
Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More information