Clustering Cybersecurity and Privacy Excellence in Europe
An overarching goal of cyberwatching.eu is accelerating development and deployment of cybersecurity & privacy research results, thereby increasing Europe’s ability to design and deliver innovative solutions. Research and Innovation (R&I) projects have spearheaded across the EU & Associated Countries (ACs) on the development of novel architectures and technologies, which can protect our European Digital Society against cybersecurity & privacy threats, although they may not gain the necessary visibility to generate impact.
Who will be clustered?
cyberwatching.eu is performing a comprehensive observation of national and pan-European R&I initiatives, standards, policy & regulation, and market needs. cyberwatching.eu will provide a platform for fostering project collaboration, through a two-stage clustering of projects, thereby allowing cross pollination of both non-technical policy, experience and best practice findings as well as deeper technical specifics bringing expertise from across the top-level cluster together to concentrate on specific issues in smaller and more tightly focused groups.
How will projects be clustered
As a first meta-clustering to bring together those projects, three specific high-level cluster definitions have been created:
1. Foundational technical methods & risk management for trustworthy systems in cybersecurity & privacy
2. Applications and user-oriented services to support cybersecurity and privacy
3. Policy, governance, ethics, trust, and usability, human aspects of cybersecurity & privacy.
These clusters of projects will form the basis for identifying:
- Future collaboration and sharing of experience on common technical priorities;
- Re-use of project results with components, technical ideas, methodologies or best practices identified by a repeatable statistical analysis rather than qualitative methodologies;
- Identify market positioning and potential exploitation opportunities with other projects.
Our cluster criteria
Secure systems and technology
- Building security and privacy into technologyfrom the design stage and technologies that are designed to deliver security capabilities like: crypthography, trusted platforms, wireless & mobile security, cloud and computing security, secure software development/coding paradigms
Verification and assurance
- Enabling the establishment of levels of confidence in a system in terms of security and privacy, primarily looking at other systems to either determine if they are secure.
- Formal verification seeks to build a mathmatical model of a digital system and then try to prove whether it is correct, often helping to find subtle flaws.
- Assurance focuses on managing risks related to the use, processing, storage and transmission of information.
Operational risk, management and analytics
- Developing understanding of risk and harm resulting from cyberattack
- Cyberattack propagation across and between organisation
- Awareness of current understanding of scenario and risk management
- Metruics and models for security postures
- Analytics for predicting risk, prioritising responses and supporting security operations
Identity, behaviour, ethics and Privacy
- Management of personal identity including different levels of assurance when used for online capabilities or services
- How to understand common norms when applied in the online or digital realm.
- Diverse perspective and interpretations to questions such as: Who are you online with? How do you communicate and what can (or should) you do? What expectations (personally and legally bindings) are there?
- Whay expectations of privacy can there be and should there be?
National and international security, privacy and governance
- Development of politics, international relations, defence, policy and governance issues.
- How do countries and communities interact with (and through) technology, and how might this change in different contexts?
- How do national standards transcend borders or boundaries?
- How should different threat persistence levels and domain cybersucurity understanding should be shared?
- At what point does something change from being a business problem to a national security problem.
Human aspects of cybersecurity
- Understanding human interaction with (and through) digital systems (whether to understand and design for target users adn to better understand how adversaries operate anc can exploit the system).
- Include aspects like usability, trust, collaborative practices, social embeddedness, nationhood, cultural diversity and the relationship between microsocial interactions and global structures.