AEGIS presented the outcomes of the "Identification of EU-US Priorities on Cybersecurity and Privacy R&I" survey. Give your contribution with a quick feedback!
This Communication and Stakeholder Engagement Plan is the first document setting out specific actions and measures that will ensure community building and practical assets key to sustaining a multi-service marketplace beyond the project’s funding lifecycle.
The Plan outlines cyberwatching.eu stakeholder groups and targeted engagement activities with a roadmap for the first 18 months of cyberwatching.eu, as foundational for future actions in two further documents (D4.3 in M18 and D4.9 in M48). The Plan shows how activities will be monitored through pre-defined KPIs. It also provides a concise report on current achievements, upcoming synergies and knowledge sharing, as well as engagement roadmaps for each stakeholder group targeted.D4.1_Communication_&_Stakeholders_Engagement_plan_vFinal.pdf
The Concertation meeting activities are an integral part of Work package 3 and play a key and central role in the project in terms of promoting best practices to projects on topics of legal, standards and policy. The concertation effort works hand in hand with task 3.2 entitled Policy tracking and evolution as the projects or national initiatives on cybersecurity and privacy are mapped and are invited to the concertation meetings for their visibility and to showcase any developments in this domain.
In addition, the Concertation is a key point for supporting WP2: task 2.1 and 2.2 in validating the results of mapping and forming the clusters of CS&P projects; task 2.3 engagement between projects and European CS&P. In addition, the Concertation meetings are also a key contributor to WP4 efforts to disseminate results of projects to cyberwatching.eu stakeholders.
The event will also be important in promoting WP5 results such as the benefits of the cyberwatching.eu marketplace.D3.1_Concertation-Activities-Plan_vFinal.pdf
One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.
The process by which this is achieved involves a two-tier taxonomy of cybersecurity topics, against which European projects, both national and international, are first mapped against the first tier of domains of cybersecurity. Since many projects concern themselves with not only one domain, the three domains in the first tier are ranked accordance to the level of concern in the mapped project: High, medium, low, or not applicable.
As a consequence, some projects are entirely out of scope, as the only concern themselves with using cybersecurity procedures or technology instead of addressing any of them as a concern of its own right.D2.1_Cybersecurity-&-privacy-ecosystem-model-report_vFinal.pdf