Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Christodoulos Keratidis Atlantis Consulting S.A. Workshop in Information Security Theory and Practices ’07 8-11 May 2007, Heraklion, Greece
  2. 2. Atlantis Consulting S.A. <ul><li>Business Consultancy based in Greece (Thessaloniki, Athens)‏ </li></ul><ul><li>Subsidiary: Atlantis Consulting Cyprus </li></ul><ul><li>Services </li></ul><ul><ul><li>Subsidies related services (EU & National)‏ </li></ul></ul><ul><ul><li>Management Consulting (Management Systems, Business Plans)‏ </li></ul></ul><ul><ul><li>Public Administration Support (Strategic Planning, Management, Evaluation of development programmes)‏ </li></ul></ul><ul><ul><li>Science & Technology Policy Studies (Impact Assessment, Policy Studies, Technology Foresight, Innovation Management)‏ </li></ul></ul><ul><li>Further information: </li></ul>
  3. 3. SECURE –FORCE Project <ul><li>An ETI project (FP 6) focused on SECURITY research </li></ul><ul><li>Network of European partners promoting the participation of small and medium sized companies in the Seventh Framework Programme (FP7) in the field of security </li></ul><ul><li>23 Organisations from 14 countries: France, Greece, Belgium, Italy, Spain, Hungary, Luxembourg, Germany, Israel, UK, Austria, the Netherlands, Poland, and Cyprus </li></ul><ul><li>Coordinator: ALMA CONSULTING GROUP </li></ul><ul><li>Duration: 36 months (January 2006 – December 2008)‏ </li></ul>
  4. 4. Who should be involved? <ul><li>Small and medium sized companies with an interest in SECURITY-research-related sectors, such as: </li></ul><ul><ul><li>Secure communication systems and services </li></ul></ul><ul><ul><li>Networked infrastructure security </li></ul></ul><ul><ul><li>Transportation facility security (including aeronautics)‏ </li></ul></ul><ul><ul><li>Privacy and data protection </li></ul></ul><ul><ul><li>Protection against terrorism & bio-terrorism </li></ul></ul><ul><ul><li>Crisis prevention and management </li></ul></ul><ul><li>Universities, public research centres and large companies in the security field with a view to integrating small companies with appropriate technologies and expertise in their security related R & D projects, funded through FP7 </li></ul>
  5. 5. What benefits can SECURE FORCE offer? <ul><li>Access to advance notification of forthcoming FP7 projects and calls for proposals in security related areas </li></ul><ul><li>Active contact between small and medium sized companies, project coordinators or potential investors </li></ul><ul><li>Assistance and support for small and medium sized companies to ensure their successful integration into large scale R&D partnerships </li></ul><ul><li>A project web site with an online partner search facility </li></ul><ul><li>Access to an online searchable database of up to 3.000 SMEs in the security field </li></ul><ul><li>Audits of small and medium companies to classify their expertise and identify areas to develop </li></ul><ul><li>Training sessions and workshops concerning FP7 </li></ul>
  6. 6. Workshops <ul><li>7 workshops </li></ul><ul><ul><li>Italy </li></ul></ul><ul><ul><li>Austria </li></ul></ul><ul><ul><li>Spain </li></ul></ul><ul><ul><li>Poland </li></ul></ul><ul><ul><li>Hungary </li></ul></ul><ul><ul><li>Cyprus </li></ul></ul><ul><ul><li>Luxembourg </li></ul></ul><ul><li>Training on: </li></ul><ul><ul><li>Financial and administrative aspects </li></ul></ul><ul><ul><li>Patents and IPR management </li></ul></ul><ul><ul><li>Trans-national technology transfer </li></ul></ul><ul><ul><li>Innovation financing activities </li></ul></ul>
  7. 7. Areas of interest <ul><li>FP7, Cooperation: 9 thematic priorities </li></ul><ul><ul><li>Health </li></ul></ul><ul><ul><li>Food, Agriculture & Biotechnology </li></ul></ul><ul><ul><li>Information and Communication Technologies </li></ul></ul><ul><ul><li>Nanosciences, nanotechnologies, materials and new production technologies </li></ul></ul><ul><ul><li>Energy </li></ul></ul><ul><ul><li>Environment (including Climate Change)‏ </li></ul></ul><ul><ul><li>Transport (including Aeronautics)‏ </li></ul></ul><ul><ul><li>Socio-economic Sciences & Humanities </li></ul></ul><ul><ul><li>Security & Space </li></ul></ul>
  8. 8. Security <ul><li>4 main missions </li></ul><ul><li>Protection against terrorism and crime </li></ul><ul><ul><li>Technology solutions for threat awareness (e.g. CBRN)‏ </li></ul></ul><ul><ul><li>Detection, prevention, identification, protection, neutralisation and containment of effects of terrorism & crime </li></ul></ul><ul><li>Security of infrastructures and utilities </li></ul><ul><ul><li>Analysing & securing existing & future infrastructures, systems, and services </li></ul></ul><ul><li>Border security </li></ul><ul><ul><li>Technological & capabilities to enhance security of land & coastal borders, including border control </li></ul></ul><ul><ul><li>Surveillance issues </li></ul></ul><ul><li>Restoring security in case of crisis </li></ul><ul><ul><li>Technologies to support emergency management operations, interorganisational coordination & communication, distributed architectures & human factors </li></ul></ul>
  9. 9. Security <ul><li>3 cross-cutting areas </li></ul><ul><li>Security Systems Integration & Interoperability </li></ul><ul><ul><li>Technologies to enhance interoperability of systems, equipment, services & processes </li></ul></ul><ul><ul><li>Organisation, protection of confidentiality & integrity of information, traceability of transactions, processing </li></ul></ul><ul><li>Security and Society </li></ul><ul><ul><li>Socio economic aspects related to crime, perception of security, ethics, privacy, societal foresight </li></ul></ul><ul><ul><li>Safeguarding privacy & liberties, vulnerabilities, new threats, management & impact assessment of consequences </li></ul></ul><ul><li>Security Research Coordination & Structuring </li></ul><ul><ul><li>Coordination of security research efforts, development of synergies (civil/security/defence), legal conditions, use of infrastructures </li></ul></ul>
  10. 10. Security Research Call <ul><li>Security Research Call 1 </li></ul><ul><ul><li>Identifier: FP7-SEC-2007-1 </li></ul></ul><ul><ul><li>Deadline: 31 May 2007 </li></ul></ul><ul><ul><li>Indicative budget: 80,3 M€ from 2007 budget </li></ul></ul>
  11. 11. Register as SME or Enterprise
  12. 12. Submit your profile <ul><li>Profile of organisation </li></ul><ul><li>Field of interest </li></ul><ul><li>Contact details </li></ul>
  13. 13. View published projects
  14. 14. View published projects
  15. 15. Send message to coordinator
  16. 16. Current projects on website <ul><li>30 projects published </li></ul><ul><li>Examples: </li></ul><ul><ul><li>NCIP - Network Centric Interoperability Platform </li></ul></ul><ul><ul><li>Autonomic Container </li></ul></ul><ul><ul><li>Blue border surveillance: unmanned optronic self-organising surveillance network for coastal regions </li></ul></ul><ul><ul><li>AWENSIS - Advanced Wide Land Early Warning Self-Navigating Surveillance Information System </li></ul></ul><ul><ul><li>UDM - Uncertain Decision Making </li></ul></ul><ul><ul><li>BEHAVE - Behavioral Assessment and Unusual Event Detection </li></ul></ul><ul><ul><li>BADCAR - Behavioural Analysis and Detection of Vehicles in Communal Areas </li></ul></ul><ul><ul><li>Intelligent Decision Support Systems Optimization Tools for Multi Agent Cooperation </li></ul></ul><ul><ul><li>Unmanned Port Traffic Control System </li></ul></ul>
  17. 17. Further Information <ul><li> </li></ul><ul><li>Contact your closer partner </li></ul><ul><li>Contact the coordinator: </li></ul><ul><ul><li>Mr Mahary Ramasindraibe, mramasindraibe @ almacg .com </li></ul></ul><ul><li>Contact Atlantis Consulting S.A.: </li></ul><ul><ul><li>Mr Christodoulos Keratidis, </li></ul></ul>