What is the cyberwatching.eu Observatory?

Over the next 48 months, our Observatory will become THE European hub for Cybersecurity and Privacy. We'll monitor R&I initiatives throughout EU & Associated Countries while supporting European stakeholders in playing an active role in shaping the global cybersecurity & privacy landscape.
Through a combination of clustering activities and Technical and Market Readiness Level Workshops, we will monitor the whole lifecycle from research development and implementation, to validation and market uptake, making it possible for stakeholders to increase their knowledge, raise their awareness and find possible synergies between different initiatives.

Who benefits and how?

The cyberwatching.eu Observatory will be the natural ground  to identify initiatives encompassing security and privacy R&I with a high potential for cross-fertilization and synergy. SMEs, investors, R&I projects and policy makers can all beneift:

  • The Observatory will enable operators of essentials services and digital service providers to find and procure the best innovative solutions for risk management and incident reporting.
  • The Observatory will offer a fresh, new approach to R&I impact, guiding mainly technical experts within public and private organisations actions on CS&P with the staged integration of a marketplace and catalogue of services for commercialising results.
  • The Observatory will help policy makers and regulators to monitor impact of R&I actions for maximum RoI, shape future research directions for the DSM, provide timely roadmaps on CS&P, regulatory compliance and policy actions, as well as ICT standardisation.

Be part of the European Cybersecurity and Privacy Observatory!

Are you an H2020 project, EU or National initiative? Be part of THE EU Cyber Security Observatory now!

Want to appear on this page? Send us your information on your news, events or releases and we'll publish it here.

Contact us at info@cyberwatching.eu

Projects

CROSSMINER - Developer-Centric Knowledge Mining from Large Open-Source Software Repositories

CROSSMINER - Developer-Centric Knowledge Mining from Large Open-Source Software Repositories

CS-AWARE - A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis

CS-AWARE - A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis

CYBECO - Supporting Cyberinsurance from a Behavioural Choice Perspective

CYBECO - Supporting Cyberinsurance from a Behavioural Choice Perspective

cyberwatching.eu - The European watch on cybersecurity privacy

cyberwatching.eu - The European watch on cybersecurity privacy

CyberWISER - Wide-Impact cyber SEcurity Risk framework

CyberWISER - Wide-Impact cyber SEcurity Risk framework

CYBERWIZ Project

CYBERWIZ Project

CYCLONE - Complete Dynamic Multi-cloud Application Management

CYCLONE - Complete Dynamic Multi-cloud Application Management

CYRAIL - Cybersecurity in the RAILway sector.

CYRAIL - Cybersecurity in the RAILway sector.

DECODE - Giving people ownership of their personal data

DECODE - Giving people ownership of their personal data

DISIEM - Diversity Enhancements for SIEMs

DISIEM - Diversity Enhancements for SIEMs

DITAS - Data-sensitive applications

DITAS - Data-sensitive applications

DOGANA - Advanced Social Engineering and Vulnerability Assessment Framework

DOGANA - Advanced Social Engineering and Vulnerability Assessment Framework

E-SIDES - Ethical and societal implications of Data Science

E-SIDES - Ethical and societal implications of Data Science

ECRYPT

EU-SEC - The European Security Certification Framework

EU-SEC - The European Security Certification Framework

EUNITY - Cybersecurity and privacy dialogue between Europe and Japan

EUNITY - Cybersecurity and privacy dialogue between Europe and Japan

FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystem

FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystem

FutureTrust - Future Trust Services for Trustworthy Global Transactions

FutureTrust - Future Trust Services for Trustworthy Global Transactions

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control

HERMENEUT - Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks

HERMENEUT - Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks

KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services

KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services

LIGHTest - Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and Trust schemes

LIGHTest - Lightweight Infrastructure for Global Heterogeneous Trust management in support of an open Ecosystem of Stakeholders and Trust schemes

MAMI - Measurement and architecture for a middleboxed internet

MAMI - Measurement and architecture for a middleboxed internet

MAPPING - Managing Alternatives for Privacy, Property and INternet Governance

MAPPING - Managing Alternatives for Privacy, Property and INternet Governance

Pages

The most alarming cybersecurity threats for SMEs

Small businesses may consider themselves too little to appeal as an inviting target for cyber-attacks. They could not be more mistaken. Indeed, they face the same (if not greater) risk of being a victim of cyber-crime. Surprisingly, two out of three UK small firms suffered hacker’s attacks between 2014-2016 (as reported from Federation of Small Businesses).

Why Ransomware poses such a threat for SMEs

Ransomware attacks have become an increasing trend worldwide over the past two years. Just six months ago, for example, a ransomware called "Wannacry" stormed the entire web wrecking most damages in Europe. The ways in which any individual can be affected by this kind of virus are multiple: through email attachments, malicious links, a compromised ad or an exploit kits. Exploit kits act as true Trojan horses by searching for any weakness or entry point in a computer (usually old or not updated software) to install the ransomware.

The rising urgency of Cybersecurity: why this should be a top priority for organisations

We live in an increasingly interconnected world of both citizens and public infrastructures with a growing associated risk of cyber-attacks. Robust protection is no longer just an option. Today, cyber-risk is one of the major concerns sitting at the top of the international agenda of any government, as hacker’s attacks or security breaches have the potential to jeopardize the global economy.

Data protection in the current IT landscape

Numerous companies and organisations struggle when it comes to understanding how to deal with cybersecurity and data protection issues. However, the vast majority are aware that they have to put effective strategies in place to safeguard their business from cybercriminal attacks.

The amount of online services and the ensuing exchange of personal data are constantly on the rise, with present business models relying on cutting-edge IT services and connectivity to meet consumer demand. With connectivity comes potential threats from external sources.

GDPR: What's new for European SMEs?

The Internet landscape has significantly changed over the last few years impacting on how we communicate with each other and on our everyday lives. With more and more personal shared online and high-profile cyber security scandals hitting the headlines, companies and individuals need better guidelines on how to deal with cyber attacks which threaten data security. The General Data Protection Regulation (GDPR) looks to do address this need.

ReCRED supporting the European Cyber Security Challenge 2017

Driven by the increasing need for sufficient IT security professionals, ENISA organizes the European Cyber Security Challenge that is aimed at identifying new talents in cyber security. National teams from all across Europe will compete against each other in solving security related tasks, to determine the country with the most gifted aspiring hackers.

Cyberwatching.eu supporting EU-JP alignment at EUNITY Workshop

Cyberwatching.eu were part of the first EUNITY wokshop in Tokyo today. Nick Ferguson, Trust-IT Services and Cyberwatching.eu coordinator presented how the Cyberwatching.eu project will help SMEs to address cybersecurity challenges that they face by giving them direct access to the results emerging from EU R&I project results.

New standards to make web traffic more secure

NIST and the Department of Homeland Security (DHS) Science and Technology Directorate have recently worked in collaboration with the industry internet to increase the cybersecurity of electronic messages and data flowing through the internet.

WISER supports the European Cyber Security Month with a series of workshops across Europe

WISER supports the European Cyber Security Month with a series of 3 workshops in Romania, Italy and Spain with the aim of helping businesses to improve their cyber security culture, offering innovative and affordable tools and services to breaking down barriers to effective cyber risk management.

NIST releases draft version of the NICE Framework

According to the NIST report, "The NICE Cybersecurity Workforce Framework improves communication, about how to identify, recruit, develop, and retain cyber security talent". Employers, recruiters, and guidance counselors, for example, may use the framework as a resource when writing cybersecurity job descriptions, or use it to define with greater clarity the types of IT security professionals in the workforce.

Pages

Observatory

Share your view to identify EU-US priorities on cybersecurity and privacy R&I

The AEGIS project is working to promote cybersecurity and privacy dialogue and cooperation between the US and the EU.

As part of its activities AEGIS is conducting an online survey to identify R&I priorities for EU-US cooperation in cybersecurity and privacy.

Call for experts for a group on liability and new technologies

The European Commission has launched a call for experts for a group on liability and new technologies. The deadline for application is 30 April 2018.

New technologies such as artificial intelligence, advanced robotics and the Internet of Things bring enormous opportunities in various fields (transport, healthcare, agriculture, manufacturing). At the same time they could raise challenges related to liability, which is why the Commission wants to initiate a discussion on the way forward.

The main tasks of the Expert Group will be:

Events

28/06/2018
Free Live Cybersecurity Webinar – Cyberwatching.eu: opportunities for CS&P clusters

Cyberwatching.eu launch the first webinar for clusters that are actively working in Cybersecurity and Privacy, in order to share experiences and information on how they can help their members to keep up to date in these sectors.

One of the main goals of cyberwatching.eu project is to take advantage of the results of previous European R&D projects to build new product and services, fostering synergies among different European clusters. In this webinar we will give you an overview of:

10/10/2018 to 11/10/2018
Transatlantic ICT Forum 2018