SlideShare a Scribd company logo
1 of 19
The Voice of the Digital Security industry
is an association gathering technological experts
in the field of the Digital security
Members are Companies: manufacturers of secure element,
semiconductors, smart cards, secure software, High Security Hardware and
terminals, biometric technology providers, system integrators, application
developers and issuers; Laboratories, Research organisations
and Associations.
2
Companies
Laboratories Research organisations
Associations
OBJECTIVESCOMMITTESOBJECTIVES OBJECTIVESCOMMITTESCOMMITEES
Actions are operated around 3 Pillars
Market and Technology Analysis Advocacy Technical contribution
Actions are operated around 3 Pillars
Market and Technology Analysis Advocacy Technical contribution
OBJECTIVES
COMMITEES
OBJECTIVES
COMMITTEES
OBJECTIVES
COMMITTEES
5
Market and Technology Analysis Advocacy Technical contribution
OBJECTIVES
COMMITEES
OBJECTIVES
COMMITTEES
OBJECTIVES
COMMITTEES
OBJECTIVES
6
Market and Technology Analysis Advocacy Technical contribution
COMMITEES
OBJECTIVES
COMMITTEES
OBJECTIVES
COMMITTEES
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
COMMITEES
7
Market and Technology Analysis Advocacy Technical contribution
OBJECTIVES
COMMITTEES
OBJECTIVES
COMMITTEES
Market and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
OBJECTIVES
8
Market and Technology Analysis Advocacy Technical contribution
OBJECTIVES
COMMITTEES
COMMITTEESMarket and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Promote Security and Privacy by design and by
default approaches in the legislation.
Answer to Public Consultation
• Better regulation approach, EU and national
agencies
Regulatory Monitoring and Analysis
• Impact Assessment
• Legislation
• Funding programs/projects
Contribution to the debate
• EU Commission / Parliament / Member
States / Digital Security ecosystem
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
COMMITTES
9
Market and Technology Analysis Advocacy Technical contribution
OBJECTIVES
COMMITTEES
Market and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Promote Security and Privacy by design and by
default approaches in the legislation.
Answer to Public Consultation
• Better regulation approach, EU and national
agencies
Regulatory Monitoring and Analysis
• Impact Assessment
• Legislation
• Funding programs/projects
Contribution to the debate
• EU Commission / Parliament / Member
States / Digital Security ecosystem
Corporate social Responsibility
Cybersecurity and Digital Identities
IoT and Mobile
• Monitor and analysis related policies,
standards, technical and use cases.
Legal Affairs
• identify legal fragmentation and obstacles in
the DSM
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
OBJECTIVES
10
Market and Technology Analysis Advocacy Technical contribution
COMMITTEESMarket and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Promote Security and Privacy by design and by
default approaches in the legislation.
Answer to Public Consultation
• Better regulation approach, EU and national
agencies
Regulatory Monitoring and Analysis
• Impact Assessment
• Legislation
• Funding programs/projects
Contribution to the debate
• EU Commission / Parliament / Member
States / Digital Security ecosystem
Corporate social Responsibility
Cybersecurity and Digital Identities
IoT and Mobile
• Monitor and analysis related policies,
standards, technical and use cases.
Legal Affairs
• identify legal fragmentation and obstacles in
the DSM
Contribution to SOG-IS MRA:
• ISCI and JHAS
Enhance collaboration with ENISA:
• IT and Security
Technical contributions:
• ESOs (CEN, CENELEC, ETSI) and MSP for
standardization
• Contribution to Fora and consortia Global
Platform, FIDO, TCG and GSMA.
PPP and Industry associations:
• Funding member of ECSO, Member of
AIOTI, SIA, ESIA, ECIL, NBN.
European Expert groups:
• Product Liability, eCall.
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
11
Market and Technology Analysis Advocacy Technical contribution
COMMITTES
Market and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Promote Security and Privacy by design and by
default approaches in the legislation.
Answer to Public Consultation
• Better regulation approach, EU and national
agencies
Regulatory Monitoring and Analysis
• Impact Assessment
• Legislation
• Funding programs/projects
Contribution to the debate
• EU Commission / Parliament / Member
States / Digital Security ecosystem
Corporate social Responsibility
Cybersecurity and Digital Identities
IoT and Mobile
• Monitor and analysis related policies,
standards, technical and use cases.
Legal Affairs
• identify legal fragmentation and obstacles in
the DSM
IT & Security
• All standards, technical and use cases
related to security certification schemes.
Security Management Committee
• Scheme providers methodologies and
requirements.
• Collaborates with major scheme providers,
e.g. MasterCard, VISA, the GSM Association,
Cartes Bancaires, etc.
Security Communication
• Communicate on potential security
vulnerabilities and provide QnA.
Contribution to SOG-IS MRA:
• ISCI and JHAS
Enhance collaboration with ENISA:
• IT and Security
Technical contributions:
• ESOs (CEN, CENELEC, ETSI) and MSP for
standardization
• Contribution to Fora and consortia Global
Platform, FIDO, TCG and GSMA.
PPP and Industry associations:
• Funding member of ECSO, Member of
AIOTI, SIA, ESIA, ECIL, NBN.
European Expert groups:
• Product Liability, eCall.
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
12
Market and Technology Analysis Advocacy Technical contribution
Market and technology:
• Provides forecasts for WW secure element
market
Biometrics:
• Mapping Biometrics Standards
• Biometrics market analysis
Promote Security and Privacy by design and by
default approaches in the legislation.
Answer to Public Consultation
• Better regulation approach, EU and national
agencies
Regulatory Monitoring and Analysis
• Impact Assessment
• Legislation
• Funding programs/projects
Contribution to the debate
• EU Commission / Parliament / Member
States / Digital Security ecosystem
Corporate social Responsibility
Cybersecurity and Digital Identities
IoT and Mobile
• Monitor and analysis related policies,
standards, technical and use cases.
Legal Affairs
• identify legal fragmentation and obstacles in
the DSM
IT & Security
• All standards, technical and use cases
related to security certification schemes.
Security Management Committee
• Scheme providers methodologies and
requirements.
Contribution to SOG-IS MRA:
• ISCI and JHAS
Enhance collaboration with ENISA:
• IT and Security
Technical contributions:
• ESOs (CEN, CENELEC, ETSI) and MSP for
standardization
• Contribution to Fora and consortia Global
Platform, FIDO, TCG and GSMA.
PPP and Industry associations:
• Funding member of ECSO, Member of
AIOTI, SIA, ESIA, ECIL, NBN.
European Expert groups:
• Product Liability, eCall.
ISCI
• On the evaluation of technologies using CC
standards.
Digital security market analysis for
• Secure elements
• Secure Mobile applications
• Biometrics
Technology analysis
• Opinion leader: Eurosmart experts try to
anticipate technological evolutions and their
regulatory impact;
• Technical Insights: Ad hoc analysis of a given
technology.
JHAS – JIL Hardware-related Attacks Group
• Created by Eurosmart and now under the JIL
responsibility. The group is operated by
Eurosmart
• Gathers ethical hackers on hardware
devices.
13
Technical contribution
IT & Security
• All standards, technical and use cases
related to security certification schemes.
Security Management Committee
• Scheme providers methodologies and
requirements.
Contribution to SOG-IS MRA:
• ISCI and JHAS
Enhance collaboration with ENISA:
• IT and Security
Technical contributions:
• ESOs (CEN, CENELEC, ETSI) and MSP for
standardization
• Contribution to Fora and consortia Global
Platform, FIDO, TCG and GSMA.
PPP and Industry associations:
• Funding member of ECSO, Member of
AIOTI, SIA, ESIA, ECIL, NBN.
European Expert groups:
• Product Liability, eCall.
JHAS – JIL Hardware-related Attacks Group
• Created by Eurosmart and now under the JIL
responsibility. The group is operated by
Eurosmart
• Gathers ethical hackers on hardware
devices.
ISCI
• On the evaluation of technologies using CC standards.
14
Technical contribution
IT & Security
• All standards, technical and use cases
related to security certification schemes.
Security Management Committee
• Scheme providers methodologies and
requirements.
Contribution to SOG-IS MRA:
• ISCI and JHAS
Enhance collaboration with ENISA:
• IT and Security
Technical contributions:
• ESOs (CEN, CENELEC, ETSI) and MSP for
standardization
• Contribution to Fora and consortia Global
Platform, FIDO, TCG and GSMA.
PPP and Industry associations:
• Funding member of ECSO, Member of
AIOTI, SIA, ESIA, ECIL, NBN.
European Expert groups:
• Product Liability, eCall.
JHAS – JIL Hardware-related Attacks Group
• Created by Eurosmart and now under the JIL
responsibility. The group is operated by
Eurosmart
• Gathers ethical hackers on hardware
devices.
ISCI
• On the evaluation of technologies using CC standards.
Members
CBs
Companies
Labs
Organisation chart
Board, Council, Committees and Brussels office
16
Board Council
Stefane
MOUILLE
President
Gisela
MEISTER
Vice President
Detlef
HOUDEAUX
Vice President
Martin
SCHAFFER
Treasurer
Jonas ANDERSSON
Fingerprints
Claude BARRAL
Bactech
Gunther BOEHM
Samsung
Olivier CHAVRIER
SCS Innovation Cluster
Christophe CIANCHI
BCA
Eric DE BRUIJN
Nedcard
Gilles DE RENGERVÉ
NXP
Jean-Pierre DELESSE
Trusted Object
Olivier DUCHMANN
Serma
Alban FERAUD
Idemia
Remy FUGIER
IN Groupe
Franck GERMAIN
Linxens
Frans GEURTS
Nedcard
Detlef HOUDEAU
Infineon
Joël HULOUX
ST Microelectonics
Stefane JOBARD
Kolabs
Argo KARUSE
Plus ID
Ayumu KURU
Toshiba
Claire LOISEAUX
Internet of trust
Gisela MEISTER
G+D
Rachel MENDA-
SHABAT
Winbond
Alain MERLE
CEA Leti
Philippe PROUST
Gemalto
Alberto SANCHEZ
Real Casa de la Moneda
Martin SCHAFFER
SGS
Hervé SERVY
Sanoïa
Bernard VIAN
Wisekey
17
Committees
Detlef
HOUDEAUX
Director
CDI Committee
Witold
ORDOWSKI
Director
M&T Committee
François
Guerin
Director
IT & Security
Committee
Michael-John
TURK
Director
Security
Management
Committee
Alban FERAUD
Director
Security
Communication
Committee
Jonas
ANDERSSON
Director
Security
Communication
Committee
Céline
LIGBULL
Director
Corporate & social
responsibility
Committee
Jean-Pierre
DELESSE
Director
IoT Committee
John BOGGIE
Director
ISCI
Laurent di
Russo
Director
JHAS
Brussels Office
Pierre-Jean
VERRANDO
Director of
operations
Clarissa GITTO
Policy Officer
To be apointed
Policy Officer
MIFARE 3.0
ITC
Apple/NIAP
18
Eurosmart contributes to many certification
schemes
ITC
Private
schemes
Many other
private schemes
Global
Platform
SOG-IS
FIDO alliance
ITC
www.eurosmart.co
m
@Eurosmart_EU @Eurosmart
Eurosmart | Rue de la Science 14b | 1040 Brussels | Belgium
Tel. +32 2 880 36 35

More Related Content

What's hot

What's hot (9)

SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
Marc cumps, Agoria
Marc cumps, AgoriaMarc cumps, Agoria
Marc cumps, Agoria
 
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalSoldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 

Similar to Eurosmart - The Voice of the Digital Security Industry

IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
Cleber Gomes
 
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, ForecastVietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vipin Mishra
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 

Similar to Eurosmart - The Voice of the Digital Security Industry (20)

Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdf
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Io t security market
Io t security marketIo t security market
Io t security market
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
Private actors in regulation of Autonomous Intelligent Cars
Private actors in regulation of Autonomous Intelligent CarsPrivate actors in regulation of Autonomous Intelligent Cars
Private actors in regulation of Autonomous Intelligent Cars
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Hardware and Software for AI 2018 – Consumer focus
Hardware and Software for AI 2018 – Consumer focusHardware and Software for AI 2018 – Consumer focus
Hardware and Software for AI 2018 – Consumer focus
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Electronic Security Market Growth, Demand and Challenges of the Key Industry ...
Electronic Security Market Growth, Demand and Challenges of the Key Industry ...Electronic Security Market Growth, Demand and Challenges of the Key Industry ...
Electronic Security Market Growth, Demand and Challenges of the Key Industry ...
 
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, ForecastVietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
Vietnam Cyber Security Market 2018-2028 By Size, Share, Trends, Growth, Forecast
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Sfit1
Sfit1Sfit1
Sfit1
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
Blockchain and Distributed Ledger Technologies: An EU Policy Perspective
Blockchain and Distributed Ledger Technologies: An EU Policy PerspectiveBlockchain and Distributed Ledger Technologies: An EU Policy Perspective
Blockchain and Distributed Ledger Technologies: An EU Policy Perspective
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Eurosmart - The Voice of the Digital Security Industry

  • 1. The Voice of the Digital Security industry is an association gathering technological experts in the field of the Digital security Members are Companies: manufacturers of secure element, semiconductors, smart cards, secure software, High Security Hardware and terminals, biometric technology providers, system integrators, application developers and issuers; Laboratories, Research organisations and Associations.
  • 3. OBJECTIVESCOMMITTESOBJECTIVES OBJECTIVESCOMMITTESCOMMITEES Actions are operated around 3 Pillars Market and Technology Analysis Advocacy Technical contribution
  • 4. Actions are operated around 3 Pillars Market and Technology Analysis Advocacy Technical contribution OBJECTIVES COMMITEES OBJECTIVES COMMITTEES OBJECTIVES COMMITTEES
  • 5. 5 Market and Technology Analysis Advocacy Technical contribution OBJECTIVES COMMITEES OBJECTIVES COMMITTEES OBJECTIVES COMMITTEES
  • 6. OBJECTIVES 6 Market and Technology Analysis Advocacy Technical contribution COMMITEES OBJECTIVES COMMITTEES OBJECTIVES COMMITTEES Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 7. COMMITEES 7 Market and Technology Analysis Advocacy Technical contribution OBJECTIVES COMMITTEES OBJECTIVES COMMITTEES Market and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 8. OBJECTIVES 8 Market and Technology Analysis Advocacy Technical contribution OBJECTIVES COMMITTEES COMMITTEESMarket and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Promote Security and Privacy by design and by default approaches in the legislation. Answer to Public Consultation • Better regulation approach, EU and national agencies Regulatory Monitoring and Analysis • Impact Assessment • Legislation • Funding programs/projects Contribution to the debate • EU Commission / Parliament / Member States / Digital Security ecosystem Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 9. COMMITTES 9 Market and Technology Analysis Advocacy Technical contribution OBJECTIVES COMMITTEES Market and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Promote Security and Privacy by design and by default approaches in the legislation. Answer to Public Consultation • Better regulation approach, EU and national agencies Regulatory Monitoring and Analysis • Impact Assessment • Legislation • Funding programs/projects Contribution to the debate • EU Commission / Parliament / Member States / Digital Security ecosystem Corporate social Responsibility Cybersecurity and Digital Identities IoT and Mobile • Monitor and analysis related policies, standards, technical and use cases. Legal Affairs • identify legal fragmentation and obstacles in the DSM Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 10. OBJECTIVES 10 Market and Technology Analysis Advocacy Technical contribution COMMITTEESMarket and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Promote Security and Privacy by design and by default approaches in the legislation. Answer to Public Consultation • Better regulation approach, EU and national agencies Regulatory Monitoring and Analysis • Impact Assessment • Legislation • Funding programs/projects Contribution to the debate • EU Commission / Parliament / Member States / Digital Security ecosystem Corporate social Responsibility Cybersecurity and Digital Identities IoT and Mobile • Monitor and analysis related policies, standards, technical and use cases. Legal Affairs • identify legal fragmentation and obstacles in the DSM Contribution to SOG-IS MRA: • ISCI and JHAS Enhance collaboration with ENISA: • IT and Security Technical contributions: • ESOs (CEN, CENELEC, ETSI) and MSP for standardization • Contribution to Fora and consortia Global Platform, FIDO, TCG and GSMA. PPP and Industry associations: • Funding member of ECSO, Member of AIOTI, SIA, ESIA, ECIL, NBN. European Expert groups: • Product Liability, eCall. Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 11. 11 Market and Technology Analysis Advocacy Technical contribution COMMITTES Market and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Promote Security and Privacy by design and by default approaches in the legislation. Answer to Public Consultation • Better regulation approach, EU and national agencies Regulatory Monitoring and Analysis • Impact Assessment • Legislation • Funding programs/projects Contribution to the debate • EU Commission / Parliament / Member States / Digital Security ecosystem Corporate social Responsibility Cybersecurity and Digital Identities IoT and Mobile • Monitor and analysis related policies, standards, technical and use cases. Legal Affairs • identify legal fragmentation and obstacles in the DSM IT & Security • All standards, technical and use cases related to security certification schemes. Security Management Committee • Scheme providers methodologies and requirements. • Collaborates with major scheme providers, e.g. MasterCard, VISA, the GSM Association, Cartes Bancaires, etc. Security Communication • Communicate on potential security vulnerabilities and provide QnA. Contribution to SOG-IS MRA: • ISCI and JHAS Enhance collaboration with ENISA: • IT and Security Technical contributions: • ESOs (CEN, CENELEC, ETSI) and MSP for standardization • Contribution to Fora and consortia Global Platform, FIDO, TCG and GSMA. PPP and Industry associations: • Funding member of ECSO, Member of AIOTI, SIA, ESIA, ECIL, NBN. European Expert groups: • Product Liability, eCall. Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology.
  • 12. 12 Market and Technology Analysis Advocacy Technical contribution Market and technology: • Provides forecasts for WW secure element market Biometrics: • Mapping Biometrics Standards • Biometrics market analysis Promote Security and Privacy by design and by default approaches in the legislation. Answer to Public Consultation • Better regulation approach, EU and national agencies Regulatory Monitoring and Analysis • Impact Assessment • Legislation • Funding programs/projects Contribution to the debate • EU Commission / Parliament / Member States / Digital Security ecosystem Corporate social Responsibility Cybersecurity and Digital Identities IoT and Mobile • Monitor and analysis related policies, standards, technical and use cases. Legal Affairs • identify legal fragmentation and obstacles in the DSM IT & Security • All standards, technical and use cases related to security certification schemes. Security Management Committee • Scheme providers methodologies and requirements. Contribution to SOG-IS MRA: • ISCI and JHAS Enhance collaboration with ENISA: • IT and Security Technical contributions: • ESOs (CEN, CENELEC, ETSI) and MSP for standardization • Contribution to Fora and consortia Global Platform, FIDO, TCG and GSMA. PPP and Industry associations: • Funding member of ECSO, Member of AIOTI, SIA, ESIA, ECIL, NBN. European Expert groups: • Product Liability, eCall. ISCI • On the evaluation of technologies using CC standards. Digital security market analysis for • Secure elements • Secure Mobile applications • Biometrics Technology analysis • Opinion leader: Eurosmart experts try to anticipate technological evolutions and their regulatory impact; • Technical Insights: Ad hoc analysis of a given technology. JHAS – JIL Hardware-related Attacks Group • Created by Eurosmart and now under the JIL responsibility. The group is operated by Eurosmart • Gathers ethical hackers on hardware devices.
  • 13. 13 Technical contribution IT & Security • All standards, technical and use cases related to security certification schemes. Security Management Committee • Scheme providers methodologies and requirements. Contribution to SOG-IS MRA: • ISCI and JHAS Enhance collaboration with ENISA: • IT and Security Technical contributions: • ESOs (CEN, CENELEC, ETSI) and MSP for standardization • Contribution to Fora and consortia Global Platform, FIDO, TCG and GSMA. PPP and Industry associations: • Funding member of ECSO, Member of AIOTI, SIA, ESIA, ECIL, NBN. European Expert groups: • Product Liability, eCall. JHAS – JIL Hardware-related Attacks Group • Created by Eurosmart and now under the JIL responsibility. The group is operated by Eurosmart • Gathers ethical hackers on hardware devices. ISCI • On the evaluation of technologies using CC standards.
  • 14. 14 Technical contribution IT & Security • All standards, technical and use cases related to security certification schemes. Security Management Committee • Scheme providers methodologies and requirements. Contribution to SOG-IS MRA: • ISCI and JHAS Enhance collaboration with ENISA: • IT and Security Technical contributions: • ESOs (CEN, CENELEC, ETSI) and MSP for standardization • Contribution to Fora and consortia Global Platform, FIDO, TCG and GSMA. PPP and Industry associations: • Funding member of ECSO, Member of AIOTI, SIA, ESIA, ECIL, NBN. European Expert groups: • Product Liability, eCall. JHAS – JIL Hardware-related Attacks Group • Created by Eurosmart and now under the JIL responsibility. The group is operated by Eurosmart • Gathers ethical hackers on hardware devices. ISCI • On the evaluation of technologies using CC standards. Members CBs Companies Labs
  • 15. Organisation chart Board, Council, Committees and Brussels office
  • 16. 16 Board Council Stefane MOUILLE President Gisela MEISTER Vice President Detlef HOUDEAUX Vice President Martin SCHAFFER Treasurer Jonas ANDERSSON Fingerprints Claude BARRAL Bactech Gunther BOEHM Samsung Olivier CHAVRIER SCS Innovation Cluster Christophe CIANCHI BCA Eric DE BRUIJN Nedcard Gilles DE RENGERVÉ NXP Jean-Pierre DELESSE Trusted Object Olivier DUCHMANN Serma Alban FERAUD Idemia Remy FUGIER IN Groupe Franck GERMAIN Linxens Frans GEURTS Nedcard Detlef HOUDEAU Infineon Joël HULOUX ST Microelectonics Stefane JOBARD Kolabs Argo KARUSE Plus ID Ayumu KURU Toshiba Claire LOISEAUX Internet of trust Gisela MEISTER G+D Rachel MENDA- SHABAT Winbond Alain MERLE CEA Leti Philippe PROUST Gemalto Alberto SANCHEZ Real Casa de la Moneda Martin SCHAFFER SGS Hervé SERVY Sanoïa Bernard VIAN Wisekey
  • 17. 17 Committees Detlef HOUDEAUX Director CDI Committee Witold ORDOWSKI Director M&T Committee François Guerin Director IT & Security Committee Michael-John TURK Director Security Management Committee Alban FERAUD Director Security Communication Committee Jonas ANDERSSON Director Security Communication Committee Céline LIGBULL Director Corporate & social responsibility Committee Jean-Pierre DELESSE Director IoT Committee John BOGGIE Director ISCI Laurent di Russo Director JHAS Brussels Office Pierre-Jean VERRANDO Director of operations Clarissa GITTO Policy Officer To be apointed Policy Officer
  • 18. MIFARE 3.0 ITC Apple/NIAP 18 Eurosmart contributes to many certification schemes ITC Private schemes Many other private schemes Global Platform SOG-IS FIDO alliance ITC
  • 19. www.eurosmart.co m @Eurosmart_EU @Eurosmart Eurosmart | Rue de la Science 14b | 1040 Brussels | Belgium Tel. +32 2 880 36 35