Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. SECURE –FORCE Project Christodoulos Keratidis Atlantis Consulting S.A. 1 st SEE-INNOVATION Know How Event Skopje, 14-15 December 2006
  2. 2. Atlantis Consulting S.A. <ul><li>Business Consultancy based in Greece (Thessaloniki, Athens) </li></ul><ul><li>Subsidiary: Atlantis Consulting Cyprus </li></ul><ul><li>Services </li></ul><ul><ul><li>Subsidies related services (EU & National) </li></ul></ul><ul><ul><li>Management Consulting (Management Systems, Business Plans) </li></ul></ul><ul><ul><li>Public Administration Support (Strategic Planning, Management, Evaluation of development programmes) </li></ul></ul><ul><ul><li>Science & Technology Policy Studies (Impact Assessment, Policy Studies, Technology Foresight, Innovation Management) </li></ul></ul><ul><li>Further information: </li></ul>
  3. 3. SECURE –FORCE Project <ul><li>An ETI project focused on SECURITY research </li></ul><ul><li>N etwork of European partners promoting the participation of small and medium sized companies in the Seventh Framework Programme (FP7) in the field of security </li></ul><ul><li>23 Organisations from 14 countries: France, Greece, Belgium, Italy, Spain, Hungary, Luxembourg, Germany, Israel, UK, Austria, the Netherlands, Poland, and Cyprus </li></ul><ul><li>Coordinator: ALMA CONSULTING GROUP </li></ul><ul><li>Duration: 36 months (January 2006 – December 2008) </li></ul>
  4. 4. Who should be involved? <ul><li>Small and medium sized companies with an interest in SECURITY-research-related sectors, such as: </li></ul><ul><ul><li>Secure communication systems and services </li></ul></ul><ul><ul><li>Networked infrastructure security </li></ul></ul><ul><ul><li>Transportation facility security (including aeronautics) </li></ul></ul><ul><ul><li>Privacy and data protection </li></ul></ul><ul><ul><li>Protection against terrorism & bio-terrorism </li></ul></ul><ul><ul><li>Crisis prevention and management </li></ul></ul><ul><li>Also Universities, public research centres and large companies in the security field with a view to integrating small companies with appropriate technologies and expertise in their security related R & D projects, funded through FP7 </li></ul>
  5. 5. What benefits can SECURE FORCE offer? <ul><li>Access to advance notification of forthcoming FP7 projects and calls for proposals in security related areas </li></ul><ul><li>Active contact between small and medium sized companies, project coordinators or potential investors </li></ul><ul><li>Assistance and support for small and medium sized companies to ensure their successful integration into large scale R&D partnerships </li></ul><ul><li>A project web site with an online partner search facility </li></ul><ul><li>Access to an online searchable database of up to 3.000 SMEs in the security field </li></ul><ul><li>Audits of small and medium companies to classify their expertise and identify areas to develop </li></ul><ul><li>Training sessions and workshops concerning FP7 </li></ul>
  6. 6. Workshops <ul><li>7 workshops </li></ul><ul><ul><li>Italy </li></ul></ul><ul><ul><li>Austria </li></ul></ul><ul><ul><li>Spain </li></ul></ul><ul><ul><li>Poland </li></ul></ul><ul><ul><li>Hungary </li></ul></ul><ul><ul><li>Cyprus </li></ul></ul><ul><ul><li>Luxembourg </li></ul></ul><ul><li>Training on: </li></ul><ul><ul><li>Financial and administrative aspects </li></ul></ul><ul><ul><li>Patents and IPR management </li></ul></ul><ul><ul><li>Trans-national technology transfer </li></ul></ul><ul><ul><li>Innovation financing activities </li></ul></ul>
  7. 7. Areas of interest <ul><li>FP7, Cooperation: 9 thematic priorities </li></ul><ul><ul><li>Health </li></ul></ul><ul><ul><li>Food, Agriculture & Biotechnology </li></ul></ul><ul><ul><li>Information and Communication Technologies </li></ul></ul><ul><ul><li>Nanosciences, nanotechnologies, materials and new production technologies </li></ul></ul><ul><ul><li>Energy </li></ul></ul><ul><ul><li>Environment (including Climate Change) </li></ul></ul><ul><ul><li>Transport (including Aeronautics) </li></ul></ul><ul><ul><li>Socio-economic Sciences & Humanities </li></ul></ul><ul><ul><li>Security & Space </li></ul></ul>
  8. 8. Information and Communication Technologies <ul><li>Challenge 1: Pervasive and Trusted Network and Service Infrastructures </li></ul><ul><li>Objectives: </li></ul><ul><ul><li>The Network of the Future </li></ul></ul><ul><ul><li>Science and Software Architectures, Infrastructures and Engineering </li></ul></ul><ul><ul><li>ICT in support of the networked enterprise </li></ul></ul><ul><ul><li>Secure, dependable and trusted Infrastructures </li></ul></ul><ul><ul><li>Networked Media </li></ul></ul><ul><ul><li>New Paradigms and Experimental Facilities </li></ul></ul><ul><ul><li>Critical Infrastructure Protection (Joint call with Security Theme) </li></ul></ul>
  9. 9. Secure, dependable and trusted Infrastructures <ul><li>Security and resilience in network infrastructures </li></ul><ul><li>Security and trust in dynamic and reconfigurable se r vice architectures </li></ul><ul><li>Trusted computing infrastructures </li></ul><ul><li>Identity management and privacy enhancing tools </li></ul><ul><li>Coordination and support activities </li></ul>
  10. 10. Secure, dependable and trusted Infrastructures <ul><li>Funding Schemes </li></ul><ul><ul><li>Collaborative projects, NoΕ, CSA </li></ul></ul><ul><li>ICT call 1 </li></ul><ul><ul><li>Publication: Jan/Feb 2007 (?) </li></ul></ul><ul><ul><li>Closure: end April 2007 (?) </li></ul></ul><ul><li>Indicative budget: 90m € </li></ul><ul><ul><li>CP 80m €, mini m um 28m € to IP and minimum 28m € to STREP </li></ul></ul><ul><ul><li>NoE 6m € </li></ul></ul><ul><ul><li>CSA 4m € </li></ul></ul>
  11. 11. New Paradigms and Experimental Facilities <ul><li>Advanced networking approaches to architectures and protocols (including security and resilience of the future internet) </li></ul><ul><li>Interconnected testbeds adressing (amongst others) </li></ul><ul><ul><li>Embedded or overlay security, trust and identity management architectures and technologies </li></ul></ul><ul><ul><li>Systems that provide trusted access to e-services with users requiring no administration and security skills </li></ul></ul><ul><li>Funding Schemes </li></ul><ul><ul><li>Collaborative projects, CSA </li></ul></ul><ul><li>ICT call 2 </li></ul><ul><ul><li>Publication: May /June 2007 (?) </li></ul></ul><ul><ul><li>Closure: Sep / Oct 2007 (?) </li></ul></ul><ul><li>Indicative budget: 40m € </li></ul><ul><ul><li>CP 36m €, mini m um 12m € to IP and minimum 15m € to STREP </li></ul></ul><ul><ul><li>NoE 3m € </li></ul></ul><ul><ul><li>CSA 1m € </li></ul></ul>
  12. 12. Critical Infrastructure Protection (joint ICT – Security themes) <ul><li>Focus of ICT theme </li></ul><ul><ul><li>Building secure, resilient and always available information infrastructures linking critical infrastructures </li></ul></ul><ul><ul><ul><li>Manage complex interconnected and interdependent Cis </li></ul></ul></ul><ul><ul><ul><li>Build secure and resilient networked and distributed information and process control systems; risk analysis and security configuration & management </li></ul></ul></ul><ul><li>Funding Schemes </li></ul><ul><ul><li>Collaborative projects, CSA </li></ul></ul><ul><li>ICT call 2 </li></ul><ul><ul><li>Publication: May /June 2007 (?) </li></ul></ul><ul><ul><li>Closure: Sep / Oct 2007 (?) </li></ul></ul><ul><li>Indicative budget: 20m € </li></ul>
  13. 13. Critical Infrastructure Protection (joint ICT – Security themes) <ul><li>Focus of Security theme </li></ul><ul><ul><li>Building secure, resilient and always available energy infrastructures that survive malicious attacks or accidental failures and guarantee contin u ous provision of services </li></ul></ul><ul><li>Funding Schemes </li></ul><ul><ul><li>Collaborative projects, CSA </li></ul></ul><ul><li>Joint call ICT & Security 1 </li></ul><ul><ul><li>Publication: September 2007 (?) </li></ul></ul><ul><ul><li>Closure: November 2007 (?) </li></ul></ul><ul><li>Indicative budget: 20m € </li></ul>
  14. 14. Security <ul><li>4 main missions </li></ul><ul><li>Protection against terrorism and crime </li></ul><ul><ul><li>Technology solutions for threat awareness (e.g. CBRN) </li></ul></ul><ul><ul><li>Detection, prevention, identification, protection, neutralisation and containment of effects of terrorism & crime </li></ul></ul><ul><li>Security of infrastructures and utilities </li></ul><ul><ul><li>Analysing & securing existing & future infrastructures, systems, and services </li></ul></ul><ul><li>Border security </li></ul><ul><ul><li>Technological & capabilities to enhance security of land & coastal borders, including border control </li></ul></ul><ul><ul><li>Surveillance issues </li></ul></ul><ul><li>Restoring security in case of crisis </li></ul><ul><ul><li>Technologies to support emergency management operations, interorganisational coordination & communication, distributed architectures & human factors </li></ul></ul>
  15. 15. Security <ul><li>3 cross-cutting areas </li></ul><ul><li>Security Systems Integration & Interoperability </li></ul><ul><ul><li>Technologies to enhance interoperability of systems, equipment, services & processes </li></ul></ul><ul><ul><li>Organisation, protection of confidentiality & integrity of information, traceability of transactions, processing </li></ul></ul><ul><li>Security and Society </li></ul><ul><ul><li>Socio economic aspects related to crime, perception of security, ethics, privacy, societal foresight </li></ul></ul><ul><ul><li>Safeguarding privacy & liberties, vulnerabilities, new threats, management & impact assessment of consequences </li></ul></ul><ul><li>Security Research Coordination & Structuring </li></ul><ul><ul><li>Coordination of security research efforts, development of synergies (civil/security/defence), legal conditions, use of infrastructures </li></ul></ul>
  16. 16. Security Research Call <ul><li>Security Research Call 1 </li></ul><ul><ul><li>Publication: January 2007 (?) </li></ul></ul><ul><ul><li>Closure: April 2007 (?) </li></ul></ul>
  17. 17. Further Information <ul><li> </li></ul><ul><li>Mr Mahary Ramasindraibe, [email_address] </li></ul><ul><li>Mr Christodoulos Keratidis, </li></ul>