Digital Security. Rafael Tesoro Carretero DG CNECT, Unit H1 - Cybersecurity & Digital Privacy

Similar documents
H2020 WP Cybersecurity PPP topics

Cybersecurity & Digital Privacy in the Energy sector

Security and resilience in Information Society: the European approach

13967/16 MK/mj 1 DG D 2B

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ENISA EU Threat Landscape

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Horizon 2020 Security

European Union Agency for Network and Information Security

European Cybersecurity PPP European Cyber Security Organisation - ECSO

Package of initiatives on Cybersecurity

Societal Challenge

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Commonwealth Cyber Declaration

EU funded research is keeping up trust in digital society

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

H2020 & THE FRENCH SECURITY RESEARCH

Birgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT)

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

ehealth action in the EU

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

NIS Standardisation ENISA view

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Secure Societies in 2015

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Research Infrastructures and Horizon 2020

EU LEIT-ICT program and SE position on FP9

Securing Europe's Information Society

Khoen LIEM. Industrial Policy. A systematic approach for Civil Security: From EU Security- Research Policy

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

Recommendations on the Future of Security Research Towards Framework Programme 9

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Big Data Value cppp Big Data Value Association Big Data Value ecosystem

EISAS Enhanced Roadmap 2012

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Digital Platforms for 'Interoperable and smart homes and grids'

Joint Declaration by G7 ICT Ministers

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

ehealth and DSM, Digital Single Market

The Future of Solid State Lighting in Europe

Horizon 2020 Info Days

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

ehealth in Europe: at the convergence of technology, medicine, law and society

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

Secure Societies Work Programme Call

Valérie Andrianavaly European Commission DG INFSO-A3

ENISA s Position on the NIS Directive

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

DG GROW meeting with Member States in preparation of Space Strategy 8 th July Working document#1: Vision and Goals

Identify adequate calls and analyze the call text

PATHWAYS TO INNOVATION IN DISASTER RISK MANAGEMENT. Paolo Venturoni CEO European Organisation For Security 4 th June 2018

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Opportunities in H2020 Secure Societies. Michael Murphy PhD. 12 th Dec 2016

Discussion on MS contribution to the WP2018

HORIZON 2020 WORK PROGRAMME I: INFORMATION AND COMMUNICATION TECHNOLOGIES

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

Call for Expressions of Interest

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Directive on security of network and information systems (NIS): State of Play

Provisional Translation

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

Cybersecurity Package

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Cyber Security in Europe

ICT in the Societal Challenges of HORIZON 2020

Horizon 2020 Information and Communication Technologies in WP

R&D to shape the networks and services of the future

***I DRAFT REPORT. EN United in diversity EN. European Parliament 2018/0328(COD)

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

CHAPTER 13 ELECTRONIC COMMERCE

Innovation in Horizon 2020: From ehealth Policy Strategy to funding instrument

Accelerating data-driven innovation in Europe

Towards a European Cloud Computing Strategy

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Cyber security: a building block of the Digital Single Market

GDPR Update and ENISA guidelines

CYBER RESILIENCE & INCIDENT RESPONSE

The University of Queensland

H Work programme SC7 Secure Societies. October 2017, Trondheim

Horisont 2020 IKT tööprogramm Aavo Kaine

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Summary. Strategy at EU Level: Digital Agenda for Europe (DAE) What; Why; How ehealth and Digital Agenda. What s next. Key actions

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

RESOLUTION 130 (REV. BUSAN, 2014)

Striving for efficiency

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

THE CONNECTING EUROPE FACILITY

Transcription:

Digital Security Rafael Tesoro Carretero DG CNECT, Unit H1 - Cybersecurity & Digital Privacy

Introduction Contents Grants - Call for proposals in Digital Security Horizon Prize - Online seamless authentication Other related topics 2

Introduction 3

Cyberspace: a backbone of digital society & economic growth 4

Cybersecurity incidents are increasing at an alarming pace with potentially profound effect on daily functioning of society & economy, both online and offline 5 as well as financial theft, loss of intellectual property, data breaches, etc.

What does this mean in practice? The survival of strong European cybersecurity industry all together is at stake! 6

Cybersecurity is also an opportunity! TODAY TOMORROW 7

Cybersecurity contractual Public-Private Partnership (cppp) Stimulate the competitiveness and innovation capacities of the digital security and privacy industry in Europe Ensure a sustained supply of innovative cybersecurity products and services in Europe 8

H2020 = legal framework for the establishment of the cppp H2020 LEIT-ICT to focus on technology-driven digital security building blocks and horizontal requirements H2020 Societal Challenge 'Secure Societies' to deliver societal benefits for users of technologies (citizens, SMEs, critical infrastructures ). H2020 public funds to be matched by private sector investment 9

Call for proposals in Digital Security 10

Call Digital Security Focus Area Topics DS-06-2017: Cybersecurity PPP: Cryptography DS-07-2017: Cybersecurity PPP: Addressing Advanced Cyber Security Threats and Threat Actors DS-08-2017: Cybersecurity PPP: Privacy, Data Protection, Digital Identities 11

SW4gbGluZSB3aXRoIHRlY2hub2xvZ2ljYWwgZGV 2ZWxvcG1lbnRzIGFuZCBlbWVyZ2luZyB0aHJlYXR zlcb0agugaw1wcm92zw1lbnqgb2ygcgvyzm9y bwfuy2ugyw5kigvmzmljawvuy3kgb2ygy3j5ch RvZ3JhcGhpYyBzb2x1dGlvbnMgaXMgYSBwZXJza XN0ZW50IG5lZWQgYWNyb3NzIElDVC4= DS-06-2017: Cybersecurity PPP: Cryptography 12

DS-06-2017: Cybersecurity PPP: Cryptography (RIA) In line with technological developments and emerging threats, the improvement of performance and efficiency of cryptographic solutions is a persistent need across ICT. Nine thematic research challenges, including: Ultra-lightweight High speed Implementation Authenticated encrypted tokens Increase trust in ICT and online services Protect the European Fundamental Rights of Privacy, Data Protection 13

DS-07-2017: Cybersecurity PPP: Addressing Advanced Cyber Security Threats and Threat Actors 14

DS-07-2017: Cybersecurity PPP: Addressing Advanced Cyber Security Threats and Threat Actors Situational Awareness (RIA); Detect and quickly and effectively respond to sophisticated cyberattacks; Interdisciplinary research to counter threat actors and their methods; Assess and address the impact to fundamental rights, data protection and privacy in particular; Simulation Environments, Training (IA); Prepare those tasked with defending high-risk organisations; Realistic environments; Tools for producing both benign and malicious system events; May also address crisis management and decision making processes in relation to obligations stemming from applicable legal frameworks 15

CHARTER OF FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION TITLE II FREEDOMS Article 6 Right to liberty and security Everyone has the right to liberty and security of person. Article 7 Respect for private and family life Everyone has the right to respect for his or her private and family life, home and communications. Article 8 Protection of personal data 1. Everyone has the right to the protection of personal data concerning him or her. 2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified. 3. Compliance with these rules shall be subject to control by an independent authority. DS-08-2017: Cybersecurity PPP: Privacy, Data Protection, Digital Identities 16

DS-08-2017: Cybersecurity PPP: Privacy, Data Protection, Digital Identities (IA) Privacy-enhancing Technologies (PET) General Data Protection Regulation in practice Secure digital identities Support for Fundamental Rights in Digital Society. Increased Trust and Confidence in the Digital Single Market Increase in the use of privacy-by-design principles in ICT systems and services 17

Call - DS 2017 - Planning Two separate opening dates - deadlines for submission Topic(s) DS-06-2017 DS-07-2017 DS-08-2017 Opening 08 Dec 2016 01 Mar 2017 Deadline 25 Apr 2017 24 Aug 2017 Topic Instr. Funding (M) DS-06-2016 RIA 20.50 DS-07-2016 RIA IA 10.0 8.0 DS-08-2016 IA 17.6 18

Horizon Prize Online seamless authentication 19

What are inducement prizes? A novel funding instrument, different from e.g. grants (a usual way to co-fund research projects). Prize contests address technological and/or societal challenges. A target is specified through award criteria. The reward goes to the contestant who (first/best) reaches the target. 20

Why "Horizon prizes" matter? A way to induce and advance innovations for cutting-edge solutions to problems. Leverage research and innovation (R&I) investment from the private sector in a given direction. Simplification and outcome orientation, as only the outputs from the contestants are evaluated. Entrepreneurship: Reduce barriers to participation compared with traditional instruments. 21

Passwords are a daily burden for online users Password security can be compromised by Being guessed, brute force attack, or data breach. 22

Multi-factor authentication Concerns: Can be convoluted for the user Need to have at hand another hardware gadget in addition to the main one used for the transaction 23

Biometrics are more convenient than passwords and multi-factor authentication methods. Concerns with biometrics: Lack of revocability after being spoofed. When reliable, they require costly hardware infrastructure Might be privacy intrusive 24

Expected results in seamless authentication prize An information and communication technologies (ICT) solution that enables citizens to seamless authenticate themselves across a wide range of applications and devices. The solution should be easy to use, reliable, robust against cyber-attacks, privacy-friendly and compatible as well as affordable and open. It should be ready to benefit a wide range of the EU population, from healthy to impaired citizens of all ages. 25

Essential award criteria (1 of 3) significant contribution by the contestant in development and/or integration. The solution is usable, convenient and easily accessible by a wide range of users hence requiring low effort to adopt it from both end-users and service providers. The solution is reliable, satisfying high rates of accuracy for correctly authenticating users. The solution is secure, robust and resilient against state-of-the-knowledge cyber-attacks. 26

Essential award criteria (2 of 3) The solution takes into account the privacy and data protection principles. The solution is applicable, working across a relevant collection of applications (including, but not limited to: social networks, email services, messaging services, online banking, ) compatible, working across a relevant set of hardware devices and of operating systems affordable for deployment in large scale and cost-effective, requiring low implementation and infrastructure costs for service provides and for end users. 27

Essential award criteria (3 of 3) The solution is open. The extent of open source software included in the solution should be maximum, in order to facilitate (a) its further tailor and development and (b) the assessment of its fulfilment of the award criteria (robustness, privacy and data protection principles). 28

Indicative timetable and budget Stages Indicative period Opening of the contest First quarter 2017 Deadline for submission of application Evaluation and solutions demonstration Third quarter 2018 Fourth quarter 2018 Award of the prize Fourth quarter 2018 Horizon Prize Funding (M ) Online Security- seamless authentication 4.0 29

Other related topics 30

Where else to find cybersecurity and privacy R&D&I in H2020? Everywhere! change of mindset 31

Examples of related topics CIP-01-2016-2017 : Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe. SMEinst-13-2016-2017 : Engaging SMEs in security research and development 32

33

Why? o There is vast potential in the mathematical world in Europe o There is relevance for our WP topics o Proposals will have better quality with mathematical participation o We recommend mathematicians to be active o We recommend partners to talk with mathematicians 34

References and support (1 of 2) Work programme 2016-2017: Secure societies Protecting freedom and security of Europe and its citizens http://europa.eu/!bg38bf National Contact Points (NCPs) http://europa.eu/!up97wv Guidance on choosing relevant H2020 topics and types of action Advice on administrative procedures and contractual issues Training and assistance on proposal writing Distribution of documentation (forms, guidelines, manuals etc.) Assistance in partner search 35

References and support (2 of 2) Work programme 2016-2017: 5.i. Information and Communication Technologies Inducement prize: Online security - Seamless personal authentication http://europa.eu/!rx49ux --------------------------------------------------------------- Follow us in Twitter @EU_TrustSec CNECT-H1@ec.europa.eu 36

EXTRA SLIDES BEYOND THIS POINT 37

Cyber Attacks - recent examples Bundestag: servers infected with malware -> rebuilding of nearly all IT systems TALKTALK: "significant cyberattack" -> 4+ million customers' data potentially accessed 38

Key EU Objectives and Actions Increase capabilities & cooperation NIS Directive - NIS platform ENISA - CEF Strengthen EU Cybersecurity industry Mainstream cybersecurity in EU policy Strengthening industrial capabilities cppp - 450M in H2020 Cooperation on new policy initiatives Sectorial cybersecurity strategies 39

Cyberspace is borderless by nature unlike heavily fragmented European market for ICT security products & services due to: Dependence on public procurement & government purchase Lack of interoperability solutions, practices and well-functioning mechanisms of certification Different NIS policies across MS (to be addressed by the NIS directive) Barriers of trust for cross-border purchase 40

Objectives of the cppp Gather industrial and public resources to deliver innovation against a jointly-agreed strategic research and innovation roadmap. Maximize available funds through better coordination with MS. Focus on a few technical priorities defined jointly with industry. Seek synergies to develop common, sector-neutral technological building blocks with maximum replication potential Obtain economies of scale through engagement with users/demand side industries and bringing together a critical mass of innovation capacities. Be a platform to discuss other supporting measures for the industry 41