Home » About » Reports

Reports

D3.1 Concertation Activities Plan

The Concertation meeting activities are an integral part of Work package 3 and play a key and central role in the project in terms of promoting best practices to projects on topics of legal, standards and policy. The concertation effort works hand in hand with task 3.2 entitled Policy tracking and evolution as the projects or national initiatives on cybersecurity and privacy are mapped and are invited to the concertation meetings for their visibility and to showcase any developments in this domain.

In addition, the Concertation is a key point for supporting WP2: task 2.1 and 2.2 in validating the results of mapping and forming the clusters of CS&P projects; task 2.3 engagement between projects and European CS&P. In addition, the Concertation meetings are also a key contributor to WP4 efforts to disseminate results of projects to cyberwatching.eu stakeholders.

The event will also be important in promoting WP5 results such as the benefits of the cyberwatching.eu marketplace.

PDF icon D3.1 Concertationn Activities Plan.pdf

D2.6 Statistical analysis of the Cybersecurity and Privacy ecosystem

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies. It compares the results for a full set of projects funded in the past with a subset of projects that at the time of writing are still active. The results are then condensed into a proposed clustering of active projects Cyberwatching.eu may further engage with in more tailored and focused communication.
 

PDF icon D2.6 - Statistical analysis of the Cybersecurity and Privacy ecosystem v1.0_Final.pdf

D2.5 Cybersecurity Technology Radar 2nd Report

This deliverable present a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

PDF icon D2.5_Technology-radar-2nd-report v1.0_Final.pdf

D2.4 Statistical analysis of the Cybersecurity and Privacy ecosystem

This deliverable offers an analysis of the landscape of EU funded projects in the Cybersecurity and Privacy research community using well-known statistical analysis methodologies. It compares the results for a full set of projects funded in the past with a subset of projects that at the time of writing are still active. The results are then condensed into a proposed clustering of active projects Cyberwatching.eu may further engage with in more tailored and focused communication.
 

PDF icon D2.4 Statistical analysis of the Cybersecurity and Privacy ecosystem 1st Report.pdf

D2.3 Methodology for the Classification of Projects/Services and Market Readiness

This deliverable is the first in a series of publications over the duration of the cyberwatching.eu project, related with to methodology for the classification of projects/services and their Market Readiness. This document is focused on the description of the methodology for determining the TRL/MRL of a project and how these values will be used to build a classification matrix for the projects. Next documents will focus on the matrix itself, with data, and on the analysis of that matrix to elaborate a recommendations report on R&I needs.

PDF icon D2.3 Methodology for the classification of projects and market readiness.pdf

D2.2 Cybersecurity technology radar 1st Report Autumn 2018

We present in this report a visualisation of EC supported activities in the area of Cybersecurity and Privacy that allows possible exploiters of the outputs of these projects to understand their status.

PDF icon D2.2 Cybersecurity technology radar 1st Report.pdf

D2.1 Cybersecurity and Privacy ecosystem model report - A Taxonomy of Cybersecurity and Privacy to assess the coverage of developed landscape by EC and nationally funded projects

One of the objectives of the Cyberwatching.eu project is to support projects in the cybersecurity domain in classifying and clustering themselves and others into meaningful groups of common topics and concerns to generate synergies and collaboration.

The process by which this is achieved involves a two-tier taxonomy of cybersecurity topics, against which European projects, both national and international, are first mapped against the first tier of domains of cybersecurity. Since many projects concern themselves with not only one domain, the three domains in the first tier are ranked accordance to the level of concern in the mapped project: High, medium, low, or not  applicable.

As a consequence, some projects are entirely out of scope, as the only concern themselves with using cybersecurity procedures or technology instead of addressing any of them as a concern of its own right.

PDF icon D2.1 Cybersecurity and Privacy ecosystem model report.pdf

Pages

News

SerIoT project have launched a dedicated section on innovation at the SerIoT website. This section is providing an overview of SerIoT results and highlights.

Future Events

On Thursday April 15, 2021 at 14:00 CEST, CUREXPANACEAProTegoASCLEPIOS, and SPHINX projects are co-organizing the online workshop "Human-Centric Cyber Hygiene in Healthcare".

15/04/2021

he EnergyShield Consortium is preparing an online workshop to promote the EnergyShield project and engage different stakeholders in cross-domain topics.

15/04/2021