SlideShare a Scribd company logo
1 of 20
Download to read offline
Cybersecurity in Germany:
Research Trends and Industrial Hubs
Dr. Gerd Meier zu Köcker, Dr. Mathias Künzel
Director
Institute for Innovation and Technology, Berlin
26 January 2016, Manila (Philippines)
18.01.2016
ICT Security Moves from R&D to Industrial
Application
21.02.2016 2
It's now more important than ever that
we can—at all times—rely on secure
and stable ICT able to withstand cyber
attacks. Increasing digitalisation and
networking make today's vital
infrastructures—in business and in
public life—more open to attack than
ever. This is why we need IT security.
Rational for German R&D programme
on ICT Security
German ICT Security Agenda
The German Government's research
framework program on IT security
(Federal Ministry of Research and
Education)
Self-determined and secure in
the digital world 2015-2020
21.02.2016 3
Main Application Fields for New ICT Security
Solutions
Advanced Manufacturing
Sustainable Business and Energy
Healthy Living
Intelligent Mobility
Civil Security
Innovating Working Conditions
21.02.2016 4
Main Programme Features in Brief
 Framework Programme
 Well aligned with other German R&D programmes
 Research topics will be reviewed over time
 Also fucussing on improving framework conditions, like education,
working conditions, entrepreneurship etc.
 Focus given on applied R&D
 Focus given on R&D consortia, dominated by SMEs
 180 Mio EUR public funding over 5 years
 Funding rate for industry up to 50 %
21.02.2016 5
Core Objectives - Motivation
21.02.2016 6
IT security is a
public service
IT security
safeguards the
operation of critical
infrastructures
IT security creates
trust
IT security is
targeted at the
needs of users
IT security protects
the privacy of our
citizens
IT security is
measurable
IT security
strengthens
Germany as an
industrial location
IT security is
interdisciplinary
Research Focus I
Technologies & Systems
• Hardware-based trusted platform modules
• Digital identity management
• Long-term secure and efficient cryptography
• Quantum communication
• New security technologies
Enabling
Technologies
• Transparency and user-friendliness
• Protection against Internet attacks
• Demonstrable IT security
• IT security in heterogeneous system structures
• Protection of knowledge and product
Secure and
trustworthy
ICT systems
21.02.2016 7
Research Focus II
Privacy & Application
• Privacy and self-determined living in the
digital world
• Internet culture - life and value shift in the
Internet age
• Privacy and big data
Privacy and
data
protection
• IT security for Industry 4.0
• IT security in critical infrastructures
• Applications in medicine
• Transport and logistics
IT security in
application
21.02.2016 8
Improving Framework Conditions
Centres of
competence
for IT security
Forum
Privacy
Promoting of
small and
medium-sized
enterprises
(SMEs)
European &
international
Collaboration
21.02.2016 9
Developing Competences in Germany
Centres of Competences for IT security
21.02.2016 10
CISPA—Centre for IT Security, Privacy and
Accountability
in Saarbrücken;
EC SPRIDE—European Centre for Security and Privacy
by Design in Darmstadt;
KASTEL—Centre of Competence for Applied
Security
Technology in Karlsruhe.
Autonomics for Industry 4.0
Autonomics for Industry 4.0
is a technology programme by the
Federal Ministry for Economic
Affairs and Energy (BMWi).
The "AUTONOMICS for Industry 4.0"
technology programme is designed to
merge state-of-the-art I&C technology
with industrial production by exploiting
the potential offered by innovation in
order to accelerate the development of
innovative products.
21.02.2016 11
ICT security for Industry 4.0
 With the cyber-physical systems in Industry 4.0, the degree of networking
and the "intelligence" of the components continue to rise
 Vision: the workpiece makes its own way to the machine which reports to it
that it has free processing capacity.
 Example: Through self-diagnosis, the milling machine detects that its cutting
tool is worn and informs the production technician who finds out about the
status of the machine through remote access and can then plan tool
replacement.
21.02.2016 12
Cyber-physical systems in production:
Safety + Security!
Classical
operating
safety is well
established
Demand for
real time
Large number
of players
security and
safety are
becoming
increasingly
interlocked
21.02.2016 13
Use of ICT: more than technology
21.02.2016 14
Legal reference architecture
for Industry 4.0 (JU-RAMI 4.0)
ICT Security Hub
Bavarian ICT Security Cluster
21.02.2016 15
Focus: Security & Safety
More than 120 leading cluster actors gathered
 Services offered for SMEs
21.02.2016 16
ICT Security Hub
Bavarian ICT Security Cluster
NetworkingRoadshows
Experience
exchange
Training
Thematic
events
Entrepre-
neurial
support
Advice on
implemen
ting ICT
security
systems
Public
awareness
21.02.2016 17
Development of
guidelines
Motiviation of
staff
Setting up ICT
Security team
Defintion of
document
structres
Introduction of
ICT Security
management
process
Identification of
critical
application areas
Analysis of ICT
structure
Mobilisation of
ICT security
actions
Comparison plan
- reality
Definition of
corrective
actions
Implementation
of corrective
actions
Review
Supporting the Implementation of ICT Security
in SMEs
Working Groups
Industrial ICT
Security
Solutions
Data
Protection
Business
Generation
Data encrypt
New ICT
Products
21.02.2016 18
Cyberforum Karlsruhe
21.02.2016
More than
1000 members
Hottest ICT Security Companies in Germany
21.02.2016 20
Source: CyberSecurity
Ventures, 2015

More Related Content

What's hot

Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
GlobalForum
 
Oecd digital innovation project outcomes
Oecd digital innovation project outcomesOecd digital innovation project outcomes
Oecd digital innovation project outcomes
slideshow19
 
Oecd digital innovation_summaryreport_ch3_website
Oecd digital innovation_summaryreport_ch3_websiteOecd digital innovation_summaryreport_ch3_website
Oecd digital innovation_summaryreport_ch3_website
slideshow19
 

What's hot (20)

Key insights from ICTFOOTPRINT.eu Policy Action Plan & Sustainability Roadmap
Key insights from ICTFOOTPRINT.eu Policy Action Plan & Sustainability RoadmapKey insights from ICTFOOTPRINT.eu Policy Action Plan & Sustainability Roadmap
Key insights from ICTFOOTPRINT.eu Policy Action Plan & Sustainability Roadmap
 
BDE SC2 Workshop 3: DG AGRI R&I activities contributing to the DSM strategy
BDE SC2 Workshop 3: DG AGRI R&I activities contributing to the DSM strategyBDE SC2 Workshop 3: DG AGRI R&I activities contributing to the DSM strategy
BDE SC2 Workshop 3: DG AGRI R&I activities contributing to the DSM strategy
 
The Value of EU Big Data Value Coordination & Support Actions for Industrial ...
The Value of EU Big Data Value Coordination & Support Actions for Industrial ...The Value of EU Big Data Value Coordination & Support Actions for Industrial ...
The Value of EU Big Data Value Coordination & Support Actions for Industrial ...
 
SC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy ContextSC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
 
BDE SC2 Workshop 3: AgGate: the French Agricultural Data Platform
BDE SC2 Workshop 3: AgGate: the French Agricultural Data PlatformBDE SC2 Workshop 3: AgGate: the French Agricultural Data Platform
BDE SC2 Workshop 3: AgGate: the French Agricultural Data Platform
 
BDE SC2 Workshop 3: e-ROSA: infrastructures and stakeholders
BDE SC2 Workshop 3: e-ROSA: infrastructures and stakeholdersBDE SC2 Workshop 3: e-ROSA: infrastructures and stakeholders
BDE SC2 Workshop 3: e-ROSA: infrastructures and stakeholders
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
 
BDE SC2 Workshop 3: IoF: project overview
BDE SC2 Workshop 3: IoF: project overviewBDE SC2 Workshop 3: IoF: project overview
BDE SC2 Workshop 3: IoF: project overview
 
MECATECH, building the Future
MECATECH, building the FutureMECATECH, building the Future
MECATECH, building the Future
 
SC7 Workshop 1: Towards a data-driven economy in Europe
SC7 Workshop 1: Towards a data-driven economy in EuropeSC7 Workshop 1: Towards a data-driven economy in Europe
SC7 Workshop 1: Towards a data-driven economy in Europe
 
Oecd digital innovation project outcomes
Oecd digital innovation project outcomesOecd digital innovation project outcomes
Oecd digital innovation project outcomes
 
NETWORK OF EUROPEAN DIGITAL INNOVATION HUBS BEYOND 2020
NETWORK OF EUROPEAN DIGITAL INNOVATION HUBS BEYOND 2020NETWORK OF EUROPEAN DIGITAL INNOVATION HUBS BEYOND 2020
NETWORK OF EUROPEAN DIGITAL INNOVATION HUBS BEYOND 2020
 
Towards a future European strategy for the Internet
Towards a future European strategy for the InternetTowards a future European strategy for the Internet
Towards a future European strategy for the Internet
 
SC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and ScenariosSC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and Scenarios
 
Meta forum 2012 - Presentation on big data
Meta forum 2012 - Presentation on big dataMeta forum 2012 - Presentation on big data
Meta forum 2012 - Presentation on big data
 
AGIT & White Paper for Digital Ecodesign
AGIT & White Paper for Digital EcodesignAGIT & White Paper for Digital Ecodesign
AGIT & White Paper for Digital Ecodesign
 
Oecd digital innovation_summaryreport_ch3_website
Oecd digital innovation_summaryreport_ch3_websiteOecd digital innovation_summaryreport_ch3_website
Oecd digital innovation_summaryreport_ch3_website
 
Big Data Value Association (BDVA) - Intro Slide Pack
Big Data Value Association (BDVA) - Intro Slide PackBig Data Value Association (BDVA) - Intro Slide Pack
Big Data Value Association (BDVA) - Intro Slide Pack
 
Distribuert og åpen datahåndtering for skip og land
Distribuert og åpen datahåndtering for skip og landDistribuert og åpen datahåndtering for skip og land
Distribuert og åpen datahåndtering for skip og land
 

Similar to CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters

Similar to CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters (20)

Cybergefahren in der digitalen Supply Chain - Roger Müller
Cybergefahren in der digitalen Supply Chain - Roger MüllerCybergefahren in der digitalen Supply Chain - Roger Müller
Cybergefahren in der digitalen Supply Chain - Roger Müller
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoT
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Upcoming Event: Wonderware Next Generation Conference
Upcoming Event: Wonderware Next Generation ConferenceUpcoming Event: Wonderware Next Generation Conference
Upcoming Event: Wonderware Next Generation Conference
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
 
ppt-Reiner-Anderl.pdf
ppt-Reiner-Anderl.pdfppt-Reiner-Anderl.pdf
ppt-Reiner-Anderl.pdf
 
Industry 4.0 Overview
Industry 4.0 OverviewIndustry 4.0 Overview
Industry 4.0 Overview
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech ExpoCurrent state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
Current state of industrial IoT / Industrie 4.0 markets - IoT Tech Expo
 
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
CyCron 2016
CyCron 2016CyCron 2016
CyCron 2016
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insights
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 

More from Gerd Meier zu Koecker

New Approaches to Predicting Cluster Emergence
New Approaches to Predicting Cluster EmergenceNew Approaches to Predicting Cluster Emergence
New Approaches to Predicting Cluster Emergence
Gerd Meier zu Koecker
 
Cluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
Cluster Initiativen als Schrittmacher regionaler InnovationsentwicklungenCluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
Cluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
Gerd Meier zu Koecker
 
Cluster and Entrepreneurship in Emerging Industries
Cluster and Entrepreneurship in Emerging IndustriesCluster and Entrepreneurship in Emerging Industries
Cluster and Entrepreneurship in Emerging Industries
Gerd Meier zu Koecker
 
Cluster Impact Analysis
Cluster Impact AnalysisCluster Impact Analysis
Cluster Impact Analysis
Gerd Meier zu Koecker
 
Key Determinants of the Mauritian Innovation System
Key Determinants of the Mauritian Innovation SystemKey Determinants of the Mauritian Innovation System
Key Determinants of the Mauritian Innovation System
Gerd Meier zu Koecker
 
Smart Diversification of enterprises through cluster organizations
Smart Diversification of enterprises through cluster organizationsSmart Diversification of enterprises through cluster organizations
Smart Diversification of enterprises through cluster organizations
Gerd Meier zu Koecker
 

More from Gerd Meier zu Koecker (20)

New Approaches to Predicting Cluster Emergence
New Approaches to Predicting Cluster EmergenceNew Approaches to Predicting Cluster Emergence
New Approaches to Predicting Cluster Emergence
 
Cluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
Cluster Initiativen als Schrittmacher regionaler InnovationsentwicklungenCluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
Cluster Initiativen als Schrittmacher regionaler Innovationsentwicklungen
 
Cluster Management Excellence in Europe
Cluster Management Excellence in EuropeCluster Management Excellence in Europe
Cluster Management Excellence in Europe
 
Cluster Mapping Bio-Packaging
Cluster Mapping Bio-PackagingCluster Mapping Bio-Packaging
Cluster Mapping Bio-Packaging
 
Cluster Mapping Eco-Construction
Cluster Mapping Eco-ConstructionCluster Mapping Eco-Construction
Cluster Mapping Eco-Construction
 
Cluster Mapping Phytopharmaceutical Industry
Cluster Mapping Phytopharmaceutical IndustryCluster Mapping Phytopharmaceutical Industry
Cluster Mapping Phytopharmaceutical Industry
 
Cluster and Entrepreneurship in Emerging Industries
Cluster and Entrepreneurship in Emerging IndustriesCluster and Entrepreneurship in Emerging Industries
Cluster and Entrepreneurship in Emerging Industries
 
Cluster and Workforce Development
Cluster and Workforce DevelopmentCluster and Workforce Development
Cluster and Workforce Development
 
StressTesting Regional Approaches Conducive to Implement S3 through Clusters
StressTesting Regional Approaches Conducive to Implement S3 through ClustersStressTesting Regional Approaches Conducive to Implement S3 through Clusters
StressTesting Regional Approaches Conducive to Implement S3 through Clusters
 
The Interplay between S3 and Clusters - StressTesting Regional Approaches Con...
The Interplay between S3 and Clusters - StressTesting Regional Approaches Con...The Interplay between S3 and Clusters - StressTesting Regional Approaches Con...
The Interplay between S3 and Clusters - StressTesting Regional Approaches Con...
 
Clusters in a Digitalized World
Clusters in a Digitalized WorldClusters in a Digitalized World
Clusters in a Digitalized World
 
Strategic Alpine Space Areas for Cross-regional Cooperation
Strategic Alpine Space Areas for Cross-regional CooperationStrategic Alpine Space Areas for Cross-regional Cooperation
Strategic Alpine Space Areas for Cross-regional Cooperation
 
Sustainable Financing of Clusters
Sustainable Financing of ClustersSustainable Financing of Clusters
Sustainable Financing of Clusters
 
Eco Innovation Hot Spots within Alpine Region
Eco Innovation Hot Spots within Alpine RegionEco Innovation Hot Spots within Alpine Region
Eco Innovation Hot Spots within Alpine Region
 
Upcoming Funding Opportunities for Clusters in Danube Region
Upcoming Funding Opportunities for Clusters in Danube RegionUpcoming Funding Opportunities for Clusters in Danube Region
Upcoming Funding Opportunities for Clusters in Danube Region
 
Cluster Impact Analysis
Cluster Impact AnalysisCluster Impact Analysis
Cluster Impact Analysis
 
Key Determinants of the Mauritian Innovation System
Key Determinants of the Mauritian Innovation SystemKey Determinants of the Mauritian Innovation System
Key Determinants of the Mauritian Innovation System
 
Forschungsatlas Elektromobilität - Prioritäre Forschungsthemen und regionale ...
Forschungsatlas Elektromobilität - Prioritäre Forschungsthemen und regionale ...Forschungsatlas Elektromobilität - Prioritäre Forschungsthemen und regionale ...
Forschungsatlas Elektromobilität - Prioritäre Forschungsthemen und regionale ...
 
Survey of Cluster Support Programmes in Germany
Survey of Cluster Support Programmes in GermanySurvey of Cluster Support Programmes in Germany
Survey of Cluster Support Programmes in Germany
 
Smart Diversification of enterprises through cluster organizations
Smart Diversification of enterprises through cluster organizationsSmart Diversification of enterprises through cluster organizations
Smart Diversification of enterprises through cluster organizations
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters

  • 1. Cybersecurity in Germany: Research Trends and Industrial Hubs Dr. Gerd Meier zu Köcker, Dr. Mathias Künzel Director Institute for Innovation and Technology, Berlin 26 January 2016, Manila (Philippines) 18.01.2016
  • 2. ICT Security Moves from R&D to Industrial Application 21.02.2016 2 It's now more important than ever that we can—at all times—rely on secure and stable ICT able to withstand cyber attacks. Increasing digitalisation and networking make today's vital infrastructures—in business and in public life—more open to attack than ever. This is why we need IT security. Rational for German R&D programme on ICT Security
  • 3. German ICT Security Agenda The German Government's research framework program on IT security (Federal Ministry of Research and Education) Self-determined and secure in the digital world 2015-2020 21.02.2016 3
  • 4. Main Application Fields for New ICT Security Solutions Advanced Manufacturing Sustainable Business and Energy Healthy Living Intelligent Mobility Civil Security Innovating Working Conditions 21.02.2016 4
  • 5. Main Programme Features in Brief  Framework Programme  Well aligned with other German R&D programmes  Research topics will be reviewed over time  Also fucussing on improving framework conditions, like education, working conditions, entrepreneurship etc.  Focus given on applied R&D  Focus given on R&D consortia, dominated by SMEs  180 Mio EUR public funding over 5 years  Funding rate for industry up to 50 % 21.02.2016 5
  • 6. Core Objectives - Motivation 21.02.2016 6 IT security is a public service IT security safeguards the operation of critical infrastructures IT security creates trust IT security is targeted at the needs of users IT security protects the privacy of our citizens IT security is measurable IT security strengthens Germany as an industrial location IT security is interdisciplinary
  • 7. Research Focus I Technologies & Systems • Hardware-based trusted platform modules • Digital identity management • Long-term secure and efficient cryptography • Quantum communication • New security technologies Enabling Technologies • Transparency and user-friendliness • Protection against Internet attacks • Demonstrable IT security • IT security in heterogeneous system structures • Protection of knowledge and product Secure and trustworthy ICT systems 21.02.2016 7
  • 8. Research Focus II Privacy & Application • Privacy and self-determined living in the digital world • Internet culture - life and value shift in the Internet age • Privacy and big data Privacy and data protection • IT security for Industry 4.0 • IT security in critical infrastructures • Applications in medicine • Transport and logistics IT security in application 21.02.2016 8
  • 9. Improving Framework Conditions Centres of competence for IT security Forum Privacy Promoting of small and medium-sized enterprises (SMEs) European & international Collaboration 21.02.2016 9
  • 10. Developing Competences in Germany Centres of Competences for IT security 21.02.2016 10 CISPA—Centre for IT Security, Privacy and Accountability in Saarbrücken; EC SPRIDE—European Centre for Security and Privacy by Design in Darmstadt; KASTEL—Centre of Competence for Applied Security Technology in Karlsruhe.
  • 11. Autonomics for Industry 4.0 Autonomics for Industry 4.0 is a technology programme by the Federal Ministry for Economic Affairs and Energy (BMWi). The "AUTONOMICS for Industry 4.0" technology programme is designed to merge state-of-the-art I&C technology with industrial production by exploiting the potential offered by innovation in order to accelerate the development of innovative products. 21.02.2016 11
  • 12. ICT security for Industry 4.0  With the cyber-physical systems in Industry 4.0, the degree of networking and the "intelligence" of the components continue to rise  Vision: the workpiece makes its own way to the machine which reports to it that it has free processing capacity.  Example: Through self-diagnosis, the milling machine detects that its cutting tool is worn and informs the production technician who finds out about the status of the machine through remote access and can then plan tool replacement. 21.02.2016 12
  • 13. Cyber-physical systems in production: Safety + Security! Classical operating safety is well established Demand for real time Large number of players security and safety are becoming increasingly interlocked 21.02.2016 13
  • 14. Use of ICT: more than technology 21.02.2016 14 Legal reference architecture for Industry 4.0 (JU-RAMI 4.0)
  • 15. ICT Security Hub Bavarian ICT Security Cluster 21.02.2016 15 Focus: Security & Safety More than 120 leading cluster actors gathered
  • 16.  Services offered for SMEs 21.02.2016 16 ICT Security Hub Bavarian ICT Security Cluster NetworkingRoadshows Experience exchange Training Thematic events Entrepre- neurial support Advice on implemen ting ICT security systems Public awareness
  • 17. 21.02.2016 17 Development of guidelines Motiviation of staff Setting up ICT Security team Defintion of document structres Introduction of ICT Security management process Identification of critical application areas Analysis of ICT structure Mobilisation of ICT security actions Comparison plan - reality Definition of corrective actions Implementation of corrective actions Review Supporting the Implementation of ICT Security in SMEs
  • 20. Hottest ICT Security Companies in Germany 21.02.2016 20 Source: CyberSecurity Ventures, 2015