SlideShare a Scribd company logo
WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK”
www.cyberwiser.eu @cyberwiser
Co-funded by the European Commission
Horizon 2020 – Grant # 653321
WISER: the European innovative
framework on cybersecurity
March 2016
1
Summary
What is WISER?
WISER is a European collaborative Innovation Action that puts
cyber-risk management at the very heart of good business practice.
Started on June 1st 2015, by 2017 WISER will provide a cyber-risk
management framework able to assess, monitor and mitigate the
risks in real-time, in multiple industries.
Who stands to benefit?
SMEs
Financial insurance
Critical Infrastructure organisations or highly complex cyber systems
Cyber secure, innovative smart energy providers
Who is involved? Six European Partners collaborating
2WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cybersecurity: A raising concern
1,673 reported data breaches in 2015, which resulted in more
than 707.5 million records being compromised worldwide.
The British insurance company Lloyd’s estimates that cyber
attacks cost businesses as much as $400 billion a year
Malware attacks in 2015 nearly doubled to reach up to 8.19
billion, from 4.2 billion in 2014
41% of IT personnel admitted to not following the same
security protocols they are expected to enforce
1 in 8 legitimate websites have a critical vulnerability
Some figures on cybercrime
Despite the relevance of the threat, awareness on cybersecurity is still low.
Affordable solutions, especially for SMEs, are yet to be seen on the market.
3WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
The WISER perimeter & positioning
The goal of WISER is to deliver solutions that require less consultancy to perform
cybersecurity assessment & improvements, through innovative methodologies
WISER has a high level innovation potential and commits its resources also
to create awareness & a global cybersecurity culture
Combining risk
management (in real-time!)
with security techniques
Interesting services
Attention to SMEs
The online component
The RPS delivery model
Sustainability
4WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Innovation elements brought in by WISER
It is not simply about monitoring cyber incidents, it is about
assessing the risks present within a company
The risk assessment considers the potential damage to the ICT
infrastructure and the damage to the business of the company,
including various aspects, such as reputational implications – a
multi-level assessment
This risk evaluation evolves with the rapid dynamics that are
inherent with the cyber “climate”
This evaluation is performed by means of a novel methodology, to
be elaborated in the project
Modelling cyber risk, using patterns
Definition of mitigation measures according to the threats and
attacks and ranking based on different criteria
Ultimate goal: Make cyber risk assessment affordable, especially to
SMEs
Going beyond the state of art
5WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
How does it work?
Cyber risk assessment
follow-up
Monitoring: events and
alarms detection and
follow-up
Testing: vulnerabilities
scanning and follow-up
Modelling
Decision Support
The WISER framework delivers capabilities that are unparalleled with
respect to current offering. SMEs are enticed by means of “freemium”
services (i.e. the “CyberWISER-Light”)
Innovative capabilities and features
Basic and detailed visualization of reports
Graphic dashboard with analytical features
Configurable alerts
Periodical execution of vulnerability scans
Basic and detailed information of
vulnerabilities found
Assistance to derive model rules from risk
models
Assistance to decide the most suitable risk
model according to the business and ICT
profile of the company
Cost-benefit analysis of mitigation measures
Quality Criteria Assessment of risks
6WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER’s workplan
Main services that will be delivered
Milestone Description Date Beneficiaries
First concrete WISER
tool Includes user-
friendly approach to
increase awareness
through self assessment
Online from
March 2016
SMEs, General public
Pre-packaged solution
for real time risk
assessment
Delivered by
December 2016
SMEs and ICT systems in
general
On-demand services for
real time and cross-
system assessment of
vulnerabilities and
threats
Delivered by
December 2016
Critical infrastructure or
highly complex cyber
systems
7WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER will come in a 3-level service range, to
impact on the broadest audience possible
 Registration and basic data
required to Clients
 WISER tests
vulnerabilities from
the outside
 Provides basic
benchmarking
 Detailed business and IT
infrastructure data required
 Model selection based on
WISER suggestion or tailored
 Sensors installation at the
network layer level
 Real time exposure
calculation
 Monitoring
 Mitigation options
considered
 WISER team limited support
 Detailed business and IT
infrastructure data required
 Possibility to implement Client’s
models
 Possibility to perform cost/benefit
analysis on the base of Client’s
indications
 Sensors installation at the
application layer level
Required
Interaction
 Real time exposure calculation
 Monitoring
 Mitigation cost benefit
calculations
 WISER team full involvement
Complexity of WISER
Operating Model
8WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cyberwiser-light: A self assessment tool for SMEs
It’s the first and most “democratic” tool produced by WISER
Goals:
Provide a very first approach to the cybersecurity problem to a large
variety of companies with no experience or awareness in the field
Provide a very crude, and yet relevant, picture of the company
situation with respect to cyber climate
Minimum time investment by the end-user
Report generated from two different domains:
Business and ICT profile of the company
Vulnerabilities detected
Algorithm producing reports reflecting
How the company profile influences its cyber risk situation
How the vulnerabilities detected impact the business of the company.
Online from March 2016, accessible for free on
www.cyberwiser.eu
9WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER’s Early Assessment Pilots (EAPs)
Our “early customers” are from different backgrounds
SMEs IT Providers
Verticals
Public Authority
10WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Design: WISER Framework schema
The WISER framework manages to combine risk assessment with
cybersecurity best practice techniques, and it does so in real-time
The logical blocks of the framework include a risk
assessment engine and a decision support system
11WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cyber risk assessment @ WISER & the
iterative process with the end-user
Cyber Risk
Assessment
ReportAlgorithm
Interpreter
(mapping)
Target
infrastructure
Vulnerabilities
(testing)
Events/Alarms
(monitoring)
Business and ICT
profile information
Inputs
Risk model
(model rules)
Model
(R1,R2,…,Rn)
RA 1, M1
RA 2, M2
RA n, Mn
Decision-
maker
assistant
Comparison and ranking of mitigation measures
12WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Mitigation measures are provided to the end-user, who can repeat
the analysis to verify effectiveness of measures implemented.
Conclusions & next steps proposed for ENISA
WISER is building on some of the indications of NIS and is
already benefiting from having received clarifications from
ENISA in a first conference call
WISER would like to maintain a continuously “open line”
with ENISA, to benefit from ENISA’s strategic indications
along the lines of cybersecurity
WISER would like propose to schedule a conference call with
ENISA next May to comment on the early feedback from the
European end-users of the new online service proposed by
WISER to SMEs (“cyberwiser-light”)
13WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
www.cyberwiser.eu
@cyberwiser
Thank you for your attention! Questions?
Contact
Antonio Álvarez Romero
Technical Coordinator
Atos Spain SA
antonio.alvarez@atos.net
Contact
Stephanie Parker
Communication Manager
Trust-IT Services Ltd
s.parker@trust-itservices.com

More Related Content

What's hot

The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Rahul Neel Mani
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Cloud Security Alliance Lviv Chapter
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @Britopian
Michael Brito | Zeno Group
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
TI Safe
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
CloudMask inc.
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
Rahul Neel Mani
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
Arjan Cornelissen
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
Stephanie Brannan
 
Ijnsa
IjnsaIjnsa
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
Bee_Ware
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terror
PacSecJP
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
 
Ijnsa
IjnsaIjnsa
Ijnsa
IjnsaIjnsa
Ijnsa
IjnsaIjnsa
Ijnsa
IjnsaIjnsa
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
IBM Security
 

What's hot (20)

The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @Britopian
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terror
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 

Viewers also liked

Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Brasil oportunidades
Brasil oportunidadesBrasil oportunidades
Brasil oportunidades
AaronDeejay Montoya Paiva
 
Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.
Mario Arturo Cervantes Miranda
 
Pie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaledaPie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaleda
Mª Isabel Pérez Ortega
 
American revolution
American revolutionAmerican revolution
American revolution
leed60218
 
Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016
Victor M. Gonzalez
 
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
Mail Box Production
 
Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3
rjsernaque
 
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
FIA2010
 
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
CulturAmbiente AC
 
Beneficios del aula invertida
Beneficios del aula invertidaBeneficios del aula invertida
Beneficios del aula invertida
Reduca
 
Migracion demografica
Migracion demograficaMigracion demografica
Migracion demografica
Lc Danny
 
Aerogenerador
AerogeneradorAerogenerador
Aerogenerador
WeDgUnI
 
Recetas del mundo
Recetas del  mundoRecetas del  mundo
Recetas del mundo
xiscaenglish
 
Construcción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelitaConstrucción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelita
ronnyranv
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
yuliana_mar
 
Distribucion De Poison
Distribucion De PoisonDistribucion De Poison
Distribucion De Poison
JessyMTT
 
¿Que es Multimedia?
¿Que es Multimedia?¿Que es Multimedia?
¿Que es Multimedia?
Hugo Santander
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
Motty Ben Atia
 
Hudson Energy- CPS
Hudson Energy- CPSHudson Energy- CPS
Hudson Energy- CPS
bostonmc
 

Viewers also liked (20)

Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Brasil oportunidades
Brasil oportunidadesBrasil oportunidades
Brasil oportunidades
 
Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.
 
Pie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaledaPie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaleda
 
American revolution
American revolutionAmerican revolution
American revolution
 
Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016
 
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
 
Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3
 
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
 
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
 
Beneficios del aula invertida
Beneficios del aula invertidaBeneficios del aula invertida
Beneficios del aula invertida
 
Migracion demografica
Migracion demograficaMigracion demografica
Migracion demografica
 
Aerogenerador
AerogeneradorAerogenerador
Aerogenerador
 
Recetas del mundo
Recetas del  mundoRecetas del  mundo
Recetas del mundo
 
Construcción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelitaConstrucción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelita
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
 
Distribucion De Poison
Distribucion De PoisonDistribucion De Poison
Distribucion De Poison
 
¿Que es Multimedia?
¿Que es Multimedia?¿Que es Multimedia?
¿Que es Multimedia?
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
 
Hudson Energy- CPS
Hudson Energy- CPSHudson Energy- CPS
Hudson Energy- CPS
 

Similar to WISER: the European innovative framework on cybersecurity

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
CYBERWISER .eu
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
Dave James
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Online Business
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
The Digital Insurer
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
Andrey Apuhtin
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
Maticmind
 
Ijisa
IjisaIjisa
Ijisa
IjisaIjisa

Similar to WISER: the European innovative framework on cybersecurity (20)

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

WISER: the European innovative framework on cybersecurity

  • 1. WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK” www.cyberwiser.eu @cyberwiser Co-funded by the European Commission Horizon 2020 – Grant # 653321 WISER: the European innovative framework on cybersecurity March 2016 1
  • 2. Summary What is WISER? WISER is a European collaborative Innovation Action that puts cyber-risk management at the very heart of good business practice. Started on June 1st 2015, by 2017 WISER will provide a cyber-risk management framework able to assess, monitor and mitigate the risks in real-time, in multiple industries. Who stands to benefit? SMEs Financial insurance Critical Infrastructure organisations or highly complex cyber systems Cyber secure, innovative smart energy providers Who is involved? Six European Partners collaborating 2WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 3. Cybersecurity: A raising concern 1,673 reported data breaches in 2015, which resulted in more than 707.5 million records being compromised worldwide. The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year Malware attacks in 2015 nearly doubled to reach up to 8.19 billion, from 4.2 billion in 2014 41% of IT personnel admitted to not following the same security protocols they are expected to enforce 1 in 8 legitimate websites have a critical vulnerability Some figures on cybercrime Despite the relevance of the threat, awareness on cybersecurity is still low. Affordable solutions, especially for SMEs, are yet to be seen on the market. 3WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 4. The WISER perimeter & positioning The goal of WISER is to deliver solutions that require less consultancy to perform cybersecurity assessment & improvements, through innovative methodologies WISER has a high level innovation potential and commits its resources also to create awareness & a global cybersecurity culture Combining risk management (in real-time!) with security techniques Interesting services Attention to SMEs The online component The RPS delivery model Sustainability 4WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 5. Innovation elements brought in by WISER It is not simply about monitoring cyber incidents, it is about assessing the risks present within a company The risk assessment considers the potential damage to the ICT infrastructure and the damage to the business of the company, including various aspects, such as reputational implications – a multi-level assessment This risk evaluation evolves with the rapid dynamics that are inherent with the cyber “climate” This evaluation is performed by means of a novel methodology, to be elaborated in the project Modelling cyber risk, using patterns Definition of mitigation measures according to the threats and attacks and ranking based on different criteria Ultimate goal: Make cyber risk assessment affordable, especially to SMEs Going beyond the state of art 5WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 6. How does it work? Cyber risk assessment follow-up Monitoring: events and alarms detection and follow-up Testing: vulnerabilities scanning and follow-up Modelling Decision Support The WISER framework delivers capabilities that are unparalleled with respect to current offering. SMEs are enticed by means of “freemium” services (i.e. the “CyberWISER-Light”) Innovative capabilities and features Basic and detailed visualization of reports Graphic dashboard with analytical features Configurable alerts Periodical execution of vulnerability scans Basic and detailed information of vulnerabilities found Assistance to derive model rules from risk models Assistance to decide the most suitable risk model according to the business and ICT profile of the company Cost-benefit analysis of mitigation measures Quality Criteria Assessment of risks 6WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 7. WISER’s workplan Main services that will be delivered Milestone Description Date Beneficiaries First concrete WISER tool Includes user- friendly approach to increase awareness through self assessment Online from March 2016 SMEs, General public Pre-packaged solution for real time risk assessment Delivered by December 2016 SMEs and ICT systems in general On-demand services for real time and cross- system assessment of vulnerabilities and threats Delivered by December 2016 Critical infrastructure or highly complex cyber systems 7WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 8. WISER will come in a 3-level service range, to impact on the broadest audience possible  Registration and basic data required to Clients  WISER tests vulnerabilities from the outside  Provides basic benchmarking  Detailed business and IT infrastructure data required  Model selection based on WISER suggestion or tailored  Sensors installation at the network layer level  Real time exposure calculation  Monitoring  Mitigation options considered  WISER team limited support  Detailed business and IT infrastructure data required  Possibility to implement Client’s models  Possibility to perform cost/benefit analysis on the base of Client’s indications  Sensors installation at the application layer level Required Interaction  Real time exposure calculation  Monitoring  Mitigation cost benefit calculations  WISER team full involvement Complexity of WISER Operating Model 8WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 9. Cyberwiser-light: A self assessment tool for SMEs It’s the first and most “democratic” tool produced by WISER Goals: Provide a very first approach to the cybersecurity problem to a large variety of companies with no experience or awareness in the field Provide a very crude, and yet relevant, picture of the company situation with respect to cyber climate Minimum time investment by the end-user Report generated from two different domains: Business and ICT profile of the company Vulnerabilities detected Algorithm producing reports reflecting How the company profile influences its cyber risk situation How the vulnerabilities detected impact the business of the company. Online from March 2016, accessible for free on www.cyberwiser.eu 9WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 10. WISER’s Early Assessment Pilots (EAPs) Our “early customers” are from different backgrounds SMEs IT Providers Verticals Public Authority 10WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 11. Design: WISER Framework schema The WISER framework manages to combine risk assessment with cybersecurity best practice techniques, and it does so in real-time The logical blocks of the framework include a risk assessment engine and a decision support system 11WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 12. Cyber risk assessment @ WISER & the iterative process with the end-user Cyber Risk Assessment ReportAlgorithm Interpreter (mapping) Target infrastructure Vulnerabilities (testing) Events/Alarms (monitoring) Business and ICT profile information Inputs Risk model (model rules) Model (R1,R2,…,Rn) RA 1, M1 RA 2, M2 RA n, Mn Decision- maker assistant Comparison and ranking of mitigation measures 12WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser Mitigation measures are provided to the end-user, who can repeat the analysis to verify effectiveness of measures implemented.
  • 13. Conclusions & next steps proposed for ENISA WISER is building on some of the indications of NIS and is already benefiting from having received clarifications from ENISA in a first conference call WISER would like to maintain a continuously “open line” with ENISA, to benefit from ENISA’s strategic indications along the lines of cybersecurity WISER would like propose to schedule a conference call with ENISA next May to comment on the early feedback from the European end-users of the new online service proposed by WISER to SMEs (“cyberwiser-light”) 13WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 14. www.cyberwiser.eu @cyberwiser Thank you for your attention! Questions? Contact Antonio Álvarez Romero Technical Coordinator Atos Spain SA antonio.alvarez@atos.net Contact Stephanie Parker Communication Manager Trust-IT Services Ltd s.parker@trust-itservices.com