Big Data Europe at eHealth Week 2017: Linking Big Data in HealthBigData_Europe
Of the four V's of big data – Volume, Velocity, Variety and Veracity – the most challenging for the health sector is Variety. Health data comes from many sources, formats and standards – how can we bring these together to reap the benefits of big data technologies?
Big Data Europe is tackling this challenge head-on, building a big data infrastructure flexible enough to tackle all seven Societal Challenges identified by Horizon 2020. Here we demonstrate our pilot implementation of Open PHACTS, which integrates life science data for drug discovery.
12 May 2017
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...BigData_Europe
BIG DATA EUROPE WEBINAR: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFLECTIVE SOCIETIES: NEW GENERAL DATA PROTECTION REGULATION ADOPTED. 25.05.2016, 15.00PM CEST –16.00PM CEST by VIGDIS KVALHEIM (CESSDA, DEPUTY DIRECTOR, NSD).
Big Data Europe Introduction Ivana IlijasicVersic (CESSDA) and Martin Kaltenböck (SWC).
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
Presentation by Fabio Martinelli, CNR, National Research Council of Italy, representing the NECS project (European Network for Cybersecurity) at Cloudscape Brazil 2017
Big Data Europe at eHealth Week 2017: Linking Big Data in HealthBigData_Europe
Of the four V's of big data – Volume, Velocity, Variety and Veracity – the most challenging for the health sector is Variety. Health data comes from many sources, formats and standards – how can we bring these together to reap the benefits of big data technologies?
Big Data Europe is tackling this challenge head-on, building a big data infrastructure flexible enough to tackle all seven Societal Challenges identified by Horizon 2020. Here we demonstrate our pilot implementation of Open PHACTS, which integrates life science data for drug discovery.
12 May 2017
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...BigData_Europe
BIG DATA EUROPE WEBINAR: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFLECTIVE SOCIETIES: NEW GENERAL DATA PROTECTION REGULATION ADOPTED. 25.05.2016, 15.00PM CEST –16.00PM CEST by VIGDIS KVALHEIM (CESSDA, DEPUTY DIRECTOR, NSD).
Big Data Europe Introduction Ivana IlijasicVersic (CESSDA) and Martin Kaltenböck (SWC).
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
Presentation by Fabio Martinelli, CNR, National Research Council of Italy, representing the NECS project (European Network for Cybersecurity) at Cloudscape Brazil 2017
ENISA - EU strategies for cyber incident responseKevin Duffey
ENISA is the EU Agency for Network & Information Security. In this presentation, the Head of Stakeholder Relations shares lessons for CEOs from over 200 cyber simulations and other research conducted by ENISA.
The International Association of Risk and Compliance Professionals (IARCP) today announced a major revision of the Certified Information Systems Risk and Compliance Professional (CISRCP) certification program.
This primary focus of study was to investigate how cyber risks in ICT infrastructures of supply chains are managed. As its theoretical base, the study used the Adaptive Security Architecture framework that has been employed by most IT security specialists. Five experienced IT experts participated in a semi-structured interview to provide practical insights on the state of cybersecurity in supply chains operations from various industries. Their responses were analyzed based on the four stages of prediction, prevention, detection and response.
This study offers a new framework that suggests cybersecurity requires anticipatory vigilance, profiling malevolence, instantaneous response and uncompromised recovery to dealing with the cyber threats posing disruptions to supply chains.
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
Security|5
Security|5 is an entry level certifi cation for
anyone interested in learning computer
networking and security basics. Security|5
means 5 components of IT security: fi rewalls,
anti-virus, IDS, networking, and web security.
Wireless|5
Wireless|5 introduces learners to the basics
of wireless technologies and their practical
adaptation. Learners are exposed to various
wireless technologies; current and emerging
standards; and a variety of devices.
Network|5
Network|5 covers the ‘Alphabet Soup of
Networking’ – the basic core knowledge
to know how infrastructure enables a work
environment, to help students and employees
succeed in an integrated work environment.
The
Solution
: EC-Council Press
The EC-Council | Press marks an innovation in academic text books and courses of
study in information security, computer forensics, disaster recovery, and end-user
security. By repurposing the essential content of EC-Council’s world class professional
certifi cation programs to fi t academic programs, the EC-Council | Press was formed.
With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to
revolutionize global information security programs and ultimately create a new breed
of practitioners capable of combating this growing epidemic of cybercrime and the
rising threat of cyber war.
This Certifi cation: C|EH – Certifi ed Ethical Hacker
Certifi ed Ethical Hacker is a certifi cation designed to immerse the learner in an
interactive environment where they will learn how to scan, test, hack and secure
information systems. Ideal candidates for the C|EH program are security professionals,
site administrators, security offi cers, auditors or anyone who is concerned with
the integrity of a network infrastructure. The goal of the Ethical Hacker is to help
the organization take preemptive measures against malicious attacks by attacking
the system himself; all the while staying within legal limits.
EC-Council | Press
Additional Certifi cations Covered By EC-Council Press:
E|NSA – EC-Council
Network Security Administrator
The E|NSA program is designed to provide
fundamental skills needed to analyze the internal
and external security threats against a network,
and to develop security policies that will protect
an organization’s information.
E|CSA - EC-Council Certifi ed Security Analyst
The objective of E|CSA is to add value to experienced
security professionals by helping them analyze
the outcomes of their tests. It is the only in-depth
Advanced Hacking and Penetration Testing
certifi cation available that covers testing in all
modern infrastructures, operating systems, and
application environments.
C|HFI - Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigation is the
process of detecting hacking attacks and properly
extracting evidence to report the crime and
conduct audits to prevent future attacks. The C|HFI
materials will give participants the necess.
Infrastructure Security by Sivamurthy HiremathClubHack
With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The National Information Infrastructure security concerns the nation’s stability and economic security. So far, the research in Internet security primarily focused on securing the information rather than securing the infrastructure itself.
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber attacks we need immediate solutions for securing the Internet infrastructure. Given the prevailing threat situation, there is a compelling need to develop Hardware redesign architectures, Algorithms, and Protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. These attempts to fulfil this important step by providing classification of Security attacks are classified into four main categories: DNS hacking, Routing table poisoning, Packet mistreatment, and Denial-of-Service attacks. We are generally discussing on the existing Infrastructure solutions for each of these categories, and also outline a methodology for developing secured Nation.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
Similar to SC7 Workshop 3: Enhancing cyber defence of cyber space systems (20)
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...BigData_Europe
Presentation at the Big Data Europe SC6 workshop #3 on 11.9.2017 in Amsterdam co-located with SEMANTiCS2017 conference: BDE PIlot Societal Challenge 6: CITIZEN BUDGET ON MUNICIPAL LEVEL by Martin Kaltenboeck (Semantic Web Company, SWC).
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...BigData_Europe
Talk at the Big Data Europe SC6 workshop number 3 taking place on 11.9.2017 in Amsterdam co-located with SEMANTiCS2017 conference: The Big Data Europe Platform: Apps, challenges, goals by Aad Versteden, TenForce.
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...BigData_Europe
Where we are and are going for Big Data in OpenScience
Keynote talk at the Big Data Europe SC6 Workshop on 11.9.2017 in Amsterdam co-located with SEMANTiCS2017: The perspective of European official statistics by Fernando Reis, Task-Force Big Data, European Commission (Eurostat).
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...BigData_Europe
Slides for keynote talk at the Big Data Europe workshop nr 3 on 11.9.2017 in Amsterdam co-located with SEMANTiCS2017 conference by Ron Dekker, Director CESSDA: European Open Science Agenda: where we are and where we are going?
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...BigData_Europe
Slides of the keynote at the 3rd Big Data Europe SC6 Workshop co-located at SEMANTiCS2018 in Amsterdam (NL) on: The European Research Data Landscape: Opportunities for CESSDA by Peter Doorn, Director DANS, Chair, Science Europe W.G. on Research Data. Chair, CESSDA ERIC General Assembly
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...BigData_Europe
Options for Wind Farm performance assessment and Power forecasting (Mr. A. Kyritsis, ALTSOL/TERNA) at the BigDataEurope Workshop, Amsterdam, Novermber 2017.
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...BigData_Europe
Big Data Europe: Workshop 3 SC6 Social Science - 11.09.2017 in Amsterdam, co-located with SEMANTiCS2017 titled: THE IMPORTANCE OF METADATA & BIG DATA IN OPEN SCIENCE. Slides by Ivana Versic (Cessda) and Martin Kaltenböck (SWC)
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
1. Enhancing cyber
defence of
cyber space systems
1
Dr. Nineta Polemi
Programme Manager- E.U. Policies
Directorate-General for Communications Networks,
Content and Technology
Cybersecurity and Digital Privacy Unit H.1
2. Topics
Introduction
Cyber-attacks in Space ecosystem
Security Management –Cyber Defence
Cybersecurity Package- Cyber Space Technologies
& Infrastructures
Conclusions and the way forward
2
4. In our days, most business and military activities
depend upon space technologies & space
infrastructures.
Space attracts new companies and the "New
Space" will enhance the DSM.
Space and cyberspace share common critical
assets e.g. networks, software, ICT components,
protocols
The Space Strategy for Europe (2016) recognizes
the importance of cyber security threats to critical
European space infrastructure
4
5. Security
Confidentiality
Making asset accessible only to
those authorized to use it
Integrity, Authenticity
Safeguarding accuracy,
identity, completeness of
asset + processing methods
Availability, Non-repudiation
Ensuring that asset is
available when required
and it is not denied
5
6. Loss of Availability
DoS , wiretapping, key stealth, insertion, session hijacking,
network routing, hidden channel
Loss of Integrity
Key guessing, cryptanalytic attacks
Loss of Authenticity
unauthorized access, site impersonation
client-system intrusion (viral infection, backdoor
installation, infor-mation stealing, forged/unvoluntary user
actions, command execution)
Loss of Confidentiality
Espionage, data & information breach
Loss of Non-repudiation
key guessing, cryptanalytic attacks
Cyber threats Cyber attacks
7. Cyber Threats in Space
7
""Protecting satellites from cyber-attacks
isn’t getting any easier"
SpaceNews— March 9, 2017
8. Cyber- Attacks on
Satellites
Signals jamming, monitoring (between
satellites and receivers or between transmitting
ground stations and satellites)
• Spoofing manipulates the information and thus
reduces its integrity
• DoS by interrupting electrical power to the space
ground nodes
• .......
• Impacts of Attacks: take control of the satellite,
shut it down, alter its orbit 8
9. Cyber-attacks in space infrastructures
• Space Critical Information Infrastructures
(CII) can face physical and cyber-attacks at all
levels (networks, ICT systems/equipment,
services, processes)
• Impact of Attacks: destroy space control,
operations, missions, services
9
10. Cyber-attacks in space software
Back doors for espionage or sabotage
Unencrypted data
Insecure protocols
Exploitable software flaws
…..
Space operations and services are global supply
chain services and the propagation rate of a cyber-
attack may catastrophically impact the whole
world!!!!
10
18. 18
• CIIP Directive (2012) Critical information infrastructure
protection: towards global cyber-security
• The Cybersecurity Strategy for the European Union (2013)
and the European Agenda on Security (2015) provide the
overall strategic framework for the EU initiatives on
cybersecurity/cybercrime.
• eIDAS Regulation (2014) on electronic identification and
trust services for e-transactions in the internal market.
• cPPP Initiative 2015 ensures that Europe will have a
dynamic, efficient market in cybersecurity products /
services.
• Directive (EU) 2016/1148 (NIS) sets obligations: national
strategies, CSIRT, requirements for operators, national
competent authorities.
EU Cyber Security policies
19. Cyber security standards
ISO/IEC 27001:2005 followed by draft ISO/IEC 27001:2013
(building a SM system)
ISO/IEC 27005:2011 (provides guidelines for information
security risk management)
ISO 31000:2009 - Principles and Guidelines on
Implementation
ISO/IEC 31010:2009 - Risk Management - Risk Assessment
Techniques
ISO/IEC 27002:2005 (best practice recommendations)
AS/NZS 4360:2004 (Australian/New Zeland standard for RM)
• Supported by a variety of methodologies (see ENISA
repository) and guidelines (ENISA report 2017 "Technical Guidelines for
the implementation of minimum security measures for Digital Service
Providers").
19
20. 1. ISO 28000:2007 on Specification for security management systems
for the SC;
2. ISO 28001:2007 on Security management systems for SC– Best
practices for implementing SC security);
3. ISO 28003:2007 on Security management systems for the SC-
Requirements for auditors of SC security management systems;
4. ISO 28004:2007 on Security management systems for the SC–
Guidelines for the implementation of ISO 28000.
ISO Supply Chain (SC) security
standards
22. Building EU Resilience to
cyber attacks
Reformed ENISA
EU cybersecurity Certification
Framework
NIS Directive Implementation
Rapid emergency response –
Blueprint & Cybersecurity
Emergency Response Fund
Cybersecurity competence network
with a European Cybersecurity
Research and Competence Centre
Building strong EU cyber skills base,
improving cyber hygiene and
awareness
Creating effective
EU cyber deterrence
Identifying malicious actors
Stepping up the law
enforcement response
Stepping up public-private
cooperation against cybercrime
Stepping up political response
Building cybersecurity deterrence
through the Member States' defence
capability
Strengthening
international cooperation
on cybersecurity
Promoting global cyber stability and
contributing to Europe's strategic
autonomy in cyberspace
Strengthening cyber dialogues
Modernising export controls,
including for critical cyber-
surveillance technologies
Continue rights-based capacity
building model
Deepen EU-NATO cooperation on
cybersecurity, hybrid threats
and defence
22
Cybersecurity
Act
Communication
Recommendation
23. ENISA: towards a reformed EU
Cybersecurity Agency
23
Be an independent centre
of expertise
Promote cooperation
&coordination at Union level
Promote high level of
awareness of citizens
& businesses
Support
capacity building &
preparedness
Assist EU Institutions/
MSs in policy
development
& implementation
Increase
cybersecurity
capabilities at Union
level to complement
MSs action
Promote the use of certification &
contribute to the cybersecurity
certification framework
Contribute
to high
Cybersecurity
24. ICT cybersecurity certification
• The issue
• The digitalisation of our society generates greater need for cyber secure
products and services
• Cybersecurity certification plays an important role in increasing trust of
digital products and services
Current landscape
• emergence of separate national initiatives lacking mutual recognition
(e.g. France, UK, Germany, Netherlands, Italy)
• Current European mechanisms (SOG-IS MRA) have limited membership
(12 MSs), involve high costs and long duration
25. ENISA
Prepares
candidate
scheme
ECCG
Advises and
assists
preparation
ENISA
Consults Industry
& Standardization
Bodies
ENISA
Transmits
candidate
scheme to the
European
Commission
European
Commission
Adopts
Candidate
Scheme
A European
Cybersecurity
Certification
Scheme
European
Commission
Requests ENISA
to prepare a
Candidate
Scheme
European Cybersecurity
Certification Group (MSs)
Advices ENISA or may propose
the preparation of a scheme to
the Commission
How will the certification framework work in practice
In a nutshell: EC proposes & decides, Group advices (and may propose), ENISA prepares schemes
26. 1. Blueprint - Recommendation on Coordinated Response to Large Scale
Cybersecurity Incidents and Crises (COM(2017) 6100).
2. ENISA (COM(4776/2)) - Tasks relating to operational cooperation at
Union level
• The Agency shall contribute to develop a cooperative response, at
Union and Member States level, to large-scale cross-border incidents
or crises related to cybersecurity
3. Cybersecurity Emergency Response Fund - Joint Communication
"Resilience, Deterrence and Defence: Building strong cybersecurity for the
EU", JOIN(2017) 450/1
3 lines of actions for improving resilience:
27. A cybersecurity competence
network with a European
Cybersecurity Research and
Competence Centre
• Reinforcing EU's cybersecurity technologic
capabilities and skills
29. Making the Most of NIs
• Core elements of the Communication
Presenting key conclusions of the analysis of the issues covered in the
Annex, which are seen as important points of reference and potential
inspiration from the point of view of the transposition into national law.
Accompanied by an Annex with practical suggestions
• Based on good practices and recommendations issued by ENISA
• Examples from Member States
• Interpretation of Directive's provisions and of how they would work in
practice
30. Conclusions
• Space and cyber space ecosystems are merging
• Cyber secure space systems, technologies and
infrastructures can be regarded as a strategic
opportunity to:
enhance the DSM in connection to "New Space",
guarantee mission assurance for space assets ,
enhance cyber defence operations.
• The cyber security community & the space
community need to collaborate and get prepared to
defend all space assets against the growing
sophisticated cyber-attacks.
31. Next Steps
• Build (national, EU, international) synergies
between space and cyber security stakeholders.
• Develop mutually agreed mitigation
frameworks for space-cyber risks, compliant
with:
EU strategies/policies (e.g. Space Strategy for
Europe 2016/2325(INI), Common Security and
Defence Policy –CSDP-, Decision No
541/2014/EU),
directives (e.g. NIS, GDPR); COM(2017)294;
COM(2017)477
international standards (e.g. ISO27005).
31
32. • Thank you for your attention
• Nineta.POLEMI@ec.europa.eu
32