The European Platform in Network and Information Security (NIS) Fabio Martinelli

Similar documents
ENISA EU Threat Landscape

Security and resilience in Information Society: the European approach

Cybersecurity & Digital Privacy in the Energy sector

EU policy on Network and Information Security & Critical Information Infrastructures Protection

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Securing Europe's Information Society

Cyber Security in Europe

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Discussion on MS contribution to the WP2018

13967/16 MK/mj 1 DG D 2B

Research and Innovation Impact of Trust & Security Programme White Paper 2013

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Bringing EU Cybersecurity & privacy research results closer to the market

Bradford J. Willke. 19 September 2007

Package of initiatives on Cybersecurity

The UK s National Cyber Security Strategy

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

NIS Standardisation ENISA view

Achieving Global Cyber Security Through Collaboration

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

IPv6 Task Force - Phase II. Welcome

Cyber Security Beyond 2020

Cybersecurity Package

EU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe

Directive on Security of Network and Information Systems

Directive on security of network and information systems (NIS): State of Play

CALIFORNIA CYBERSECURITY TASK FORCE

Commonwealth Cyber Declaration

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Valérie Andrianavaly European Commission DG INFSO-A3

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Implementation Strategy for Cybersecurity Workshop ITU 2016

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Poland: Initiative for Polish Industry 4.0 The Future Industry Platform

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

European Cybersecurity PPP European Cyber Security Organisation - ECSO

HEALTH IN ECSO (European Cyber Security Organisation) 18 October 2017

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection

ENISA S WORK ON ICS AND SMART GRID SECURITY

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce

Cybersecurity Risk Management:

Innovation policy for Industry 4.0

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Joint Declaration by G7 ICT Ministers

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

The Network and Information Security Directive - ENISA's contribution

Cybersecurity for ALL

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

ACARE WG 4 Security Overview

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

INTERMEDIATE EVALUATION

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Opportunities for collaboration in Big Data between US and EU

WG 2 Chapter 3: Voluntary Information Sharing

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

EISAS Enhanced Roadmap 2012

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Deliverable D3.2 Knowledge Repository database

ISO/IEC JTC 1 N 13145

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

Secure Societies Work Programme Call

Strategic and operational threat analysis at Europol's EC3

Electronic payments in the Netherlands

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

Seventh Framework Programme Security Research. Health Security Committee CBRN Section. 30 September by Clément Williamson

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

JOINT MEDIA STATEMENT

NIS-Directive and Smart Grids

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Cyber Security Strategy

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Workshop on security of personal data processing

In Accountable IoT We Trust

Hannover Declaration

Manchester Metropolitan University Information Security Strategy

The NIS Directive and Cybersecurity in

EGM, 9-10 December A World that Counts: Mobilising the Data Revolution for Sustainable Development. 9 December 2014 BACKGROUND

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Technology Director Meeting

Joining forces to fight botnets. Dan Tofan Head of the Technical Division CERT-RO 17/02/2014

ENISA activities in ICT security certification Dr. Prokopios Drogkaris NIS Expert NLO Meeting Athens

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

KIC Added-value Manufacturing: Exploiting synergies and complementarities with EU policies and programmes

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

Transcription:

The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy

Institute of Informatics and Telematics The IIT-CNR Institute performs both research and service operation: On the one hand it is the Registro.it, i.e. the registry of the cctld.it On the other one, it coordinates the EU funded virtual centre of Excellence NESSoS engineering Secure Future Internet Services

Cyber security directive A new initiative launched by the Commission for member states and companies in order to support the adoption of the new Cyber Security Directive (launched on Jan 2013) The directive addresses the increased cyber security level of all the member states Consolidation and cooperation of national CERTS Creation of national preparedness plans for cyber security (including authorities etc) Increasing formation and education in the area of cyber security This initiative will spread further the cyber-security activities at national level 3

The NIS platform To support the EU cyber security directive EU decided to create a public/private/cooperation in the form of a EU platform on Network and Information Security (NIS) Unique opportunity to better understand NIS Challenges, Threats and Risks A platform for bringing together policy and technical experts to debate about the current and future challenges A platform for influencing future R&D in NIS issues An expression of interest to relevant stakeholders was sent in May and the first meeting was held in June 17 2013

Topics of the NIS platform 1. Organisational measures: practices to define, guide or evaluate an organisation s cybersecurity, specifically its capability to identify, assess and mitigate cybersecurity risks, and to deter and handle incidents; (Risk management for cyber security) 2. Secure products and services: practices to demonstrate the ability of products or services to provide a good level of cybersecurity performance as part of the ICT value chain; (Assurance) 3. Metrics, measurement and language / taxonomy for cyber risk: practices for measuring, describing and evaluating cyber risks, impacts, threats, controls, etc. (Metrics and measurements for cybersecurity) 4. Information exchange: practices for the exchange of cyber incident information, to allow cyber incident reports to be understood and acted upon in the framework of complex cooperation schemes; to facilitate a high level view of all cyber incidents which facilitates spotting trends and directing resources; (Information exchange) 5. Cybersecurity resources: practices to manage and develop cybersecurity knowledge, skills and resources within an organisation or a sector. (Cybersecurity best practices) 5

WGs structure Eventually 3 WGs have best established (two mainly operational and one mainly research oriented): WG1 on Risk Management WG2 on Information Sharing WG3 on Secure ICT Research and Innovation

WG3 deliverables WG3 identified the following deliverables (TBC the next couple of years): Secure ICT landscape Business cases and innovation paths Snapshot of Education & Training landscape for workforce development The Strategic Research Agenda (SRA).

WG3 first meeting WG3 met in Sept. 27 to: Get participants to know each other; Contribute to the terms of reference (TOR); Share knowledge and content related to the SRA; Draft a structure that facilitates this work. During the meeting, several security issues were tackled about: Citizen and people centric computing Interconnected society Privacy, security and civilisation Mobility and critical infrastructures Multi-disciplinary skills, knowledge and awareness

Contacts Fabio Martinelli (Fabio.Martinelli@iit.cnr.it) WG3 co-chair (with Raul Riesco Granadino, INTECO) Fabio Martinelli (CNR) 9