SlideShare a Scribd company logo
The European Watch on
Cybersecurity & Privacy
Nicholas Ferguson, Trust-IT Services
Risk Management from an SME Point of View | 17 October 2018 | Webinar
The European watch on
Cybersecurity and Privacy
Consortium
May 2017 - April 2021
and beyond
Risk Management from an SME Point of View | 17 October 2018 | Webinar
High public investment in Cybersecurity and
privacy but….
Who are these projects?
R&I Observatory of cybersecurity & privacy
• EC-funded
• Regionally-funded
• Nationally-funded
Now 200
Target -> 500!
www.cyberwatching.eu/observatory
OBSERVATORY
Risk Management from an SME Point of View | 17 October 2018 | Webinar
Cybersecurity and Privacy
Home-grown in Europe
4
Supporting Cyberinsurance from a Behavioural Choice Perspective
• Modelling decision making on cyber threats for better risk management
Cyber Range & capacity building in cybersecurity
• Independent cyber range platform for professional training
A lightweight Cybersecurity framework for thorough protection
• High-quality cybersecurity solutions for SMEs with restricted budgets
South Wales Cyber Security Cluster
• Building cyber security knowledge, skills, capabilities and resilience
www.cyberwatching.eu/services/catalogue-of-services
Intangible risk management via economic models & cyber attack simulation
• Holistic risk assessment model to support investment descisions
Risk Management from an SME Point of View | 17 October 2018 | Webinar
https://www.cyberwatching.eu/clusters
Launched October 2018
www.cyberwatching.eu/end-user-club
END-USER CLUB
Risk Management from an SME Point of View | 17 October 2018 | Webinar
Launched October 2018
www.cyberwatching.eu/marketplace
MARKETPLACE
Risk Management from an SME Point of View | 17 October 2018 | Webinar
Thank-you
Contact
info@cyberwatching.com
Nicholas Ferguson (Coordinator) -
n.ferguson@trust-itservices.com

More Related Content

What's hot

FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
FinTech Belgium
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
IISPEastMids
 
K. Balucka Debska - eSangathan International Conference
K. Balucka Debska - eSangathan International ConferenceK. Balucka Debska - eSangathan International Conference
K. Balucka Debska - eSangathan International Conference
esangathan
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
IISPEastMids
 
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
Stephan Karpischek
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
IISPEastMids
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
Trilateral Research
 
Horizon introduction
Horizon introductionHorizon introduction
Horizon introduction
IISPEastMids
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
ATMOSPHERE .
 
The Big Policy Canvas project: Transforming policy making through Big Data an...
The Big Policy Canvas project: Transforming policy making through Big Data an...The Big Policy Canvas project: Transforming policy making through Big Data an...
The Big Policy Canvas project: Transforming policy making through Big Data an...
samossummit
 
IISP Sept 2014 presentation
IISP Sept 2014 presentationIISP Sept 2014 presentation
IISP Sept 2014 presentation
IISPEastMids
 
Startup Europe: achievements and outsight
Startup Europe: achievements and outsightStartup Europe: achievements and outsight
Startup Europe: achievements and outsight
Isidro Laso
 
WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016
Elsa Prieto
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and Challenges
Amgad Magdy
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
Gerd Meier zu Koecker
 
Introducing the Collections Trust's 'Going Digital' programme 2014/15
Introducing the Collections Trust's 'Going Digital' programme 2014/15Introducing the Collections Trust's 'Going Digital' programme 2014/15
Introducing the Collections Trust's 'Going Digital' programme 2014/15
Collections Trust
 
Etherisc at EDCON 2017
Etherisc at EDCON 2017Etherisc at EDCON 2017
Etherisc at EDCON 2017
Stephan Karpischek
 
Smartie - Project overview
Smartie - Project overview Smartie - Project overview
Smartie - Project overview
DunavNET
 
The Open Data Incubator
The Open Data IncubatorThe Open Data Incubator
The Open Data Incubator
Elena Simperl
 
SMARTIE
SMARTIESMARTIE
SMARTIE
DunavNET
 

What's hot (20)

FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
FinTech Belgium -3rd Anniversary - Fintech Belgium Presentation - 04-04-19
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
K. Balucka Debska - eSangathan International Conference
K. Balucka Debska - eSangathan International ConferenceK. Balucka Debska - eSangathan International Conference
K. Balucka Debska - eSangathan International Conference
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
Etherisc at the Ethereum Meetup Vienna 20 March 2017 (Part 1)
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
Horizon introduction
Horizon introductionHorizon introduction
Horizon introduction
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
 
The Big Policy Canvas project: Transforming policy making through Big Data an...
The Big Policy Canvas project: Transforming policy making through Big Data an...The Big Policy Canvas project: Transforming policy making through Big Data an...
The Big Policy Canvas project: Transforming policy making through Big Data an...
 
IISP Sept 2014 presentation
IISP Sept 2014 presentationIISP Sept 2014 presentation
IISP Sept 2014 presentation
 
Startup Europe: achievements and outsight
Startup Europe: achievements and outsightStartup Europe: achievements and outsight
Startup Europe: achievements and outsight
 
WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and Challenges
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
 
Introducing the Collections Trust's 'Going Digital' programme 2014/15
Introducing the Collections Trust's 'Going Digital' programme 2014/15Introducing the Collections Trust's 'Going Digital' programme 2014/15
Introducing the Collections Trust's 'Going Digital' programme 2014/15
 
Etherisc at EDCON 2017
Etherisc at EDCON 2017Etherisc at EDCON 2017
Etherisc at EDCON 2017
 
Smartie - Project overview
Smartie - Project overview Smartie - Project overview
Smartie - Project overview
 
The Open Data Incubator
The Open Data IncubatorThe Open Data Incubator
The Open Data Incubator
 
SMARTIE
SMARTIESMARTIE
SMARTIE
 

Similar to Cyberwatching.eu - The European Watch on Cybersecurity & privacy

Patronus - NOAH16 London
Patronus - NOAH16 LondonPatronus - NOAH16 London
Patronus - NOAH16 London
NOAH Advisors
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
CYBERWISER .eu
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
Dale Butler
 
IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013
Annie Hoang
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
Janne Järvinen
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
FinTech Belgium
 
CYBERWISER.eu overview presentation
CYBERWISER.eu overview presentationCYBERWISER.eu overview presentation
CYBERWISER.eu overview presentation
CYBERWISER .eu
 
Concordia presentation
Concordia presentationConcordia presentation
Concordia presentation
TuanTrinh53
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
Marie-Astrid Heyde
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's future
Big Data Value Association
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Nine23Ltd
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
Dale Butler
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
Lucy Nicholas
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Dale Butler
 
Fresh Energy - NOAH18 Berlin
Fresh Energy - NOAH18 BerlinFresh Energy - NOAH18 Berlin
Fresh Energy - NOAH18 Berlin
NOAH Advisors
 
Kreditech - NOAH17 London
Kreditech - NOAH17 LondonKreditech - NOAH17 London
Kreditech - NOAH17 London
NOAH Advisors
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
Dale Butler
 
INZMO - NOAH18 Berlin
INZMO - NOAH18 BerlinINZMO - NOAH18 Berlin
INZMO - NOAH18 Berlin
NOAH Advisors
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project Presentation
Nicolás Notario
 

Similar to Cyberwatching.eu - The European Watch on Cybersecurity & privacy (20)

Patronus - NOAH16 London
Patronus - NOAH16 LondonPatronus - NOAH16 London
Patronus - NOAH16 London
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
European Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdfEuropean Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdf
 
CYBERWISER.eu overview presentation
CYBERWISER.eu overview presentationCYBERWISER.eu overview presentation
CYBERWISER.eu overview presentation
 
Concordia presentation
Concordia presentationConcordia presentation
Concordia presentation
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's future
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Fresh Energy - NOAH18 Berlin
Fresh Energy - NOAH18 BerlinFresh Energy - NOAH18 Berlin
Fresh Energy - NOAH18 Berlin
 
Kreditech - NOAH17 London
Kreditech - NOAH17 LondonKreditech - NOAH17 London
Kreditech - NOAH17 London
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
INZMO - NOAH18 Berlin
INZMO - NOAH18 BerlinINZMO - NOAH18 Berlin
INZMO - NOAH18 Berlin
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project Presentation
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Cyberwatching.eu - The European Watch on Cybersecurity & privacy

  • 1. The European Watch on Cybersecurity & Privacy Nicholas Ferguson, Trust-IT Services Risk Management from an SME Point of View | 17 October 2018 | Webinar
  • 2. The European watch on Cybersecurity and Privacy Consortium May 2017 - April 2021 and beyond Risk Management from an SME Point of View | 17 October 2018 | Webinar
  • 3. High public investment in Cybersecurity and privacy but…. Who are these projects? R&I Observatory of cybersecurity & privacy • EC-funded • Regionally-funded • Nationally-funded Now 200 Target -> 500! www.cyberwatching.eu/observatory OBSERVATORY Risk Management from an SME Point of View | 17 October 2018 | Webinar
  • 4. Cybersecurity and Privacy Home-grown in Europe 4 Supporting Cyberinsurance from a Behavioural Choice Perspective • Modelling decision making on cyber threats for better risk management Cyber Range & capacity building in cybersecurity • Independent cyber range platform for professional training A lightweight Cybersecurity framework for thorough protection • High-quality cybersecurity solutions for SMEs with restricted budgets South Wales Cyber Security Cluster • Building cyber security knowledge, skills, capabilities and resilience www.cyberwatching.eu/services/catalogue-of-services Intangible risk management via economic models & cyber attack simulation • Holistic risk assessment model to support investment descisions Risk Management from an SME Point of View | 17 October 2018 | Webinar https://www.cyberwatching.eu/clusters
  • 5. Launched October 2018 www.cyberwatching.eu/end-user-club END-USER CLUB Risk Management from an SME Point of View | 17 October 2018 | Webinar
  • 6. Launched October 2018 www.cyberwatching.eu/marketplace MARKETPLACE Risk Management from an SME Point of View | 17 October 2018 | Webinar