Projects

What is the cyberwatching.eu Observatory?

Our Observatory will become THE European hub for Cybersecurity and Privacy. Cyberwatching.eu is monitoring R&I initiatives throughout EU & Associated Countries while supporting European stakeholders in playing an active role in shaping the global cybersecurity & privacy landscape.
Through a combination of clustering activities and Technical and Market Readiness Level Workshops, cyberwatching.eu is monitoring the whole lifecycle from research development and implementation, to validation and market uptake, making it possible for stakeholders to increase their knowledge, raise their awareness and find possible synergies between different initiatives.

Who benefits and how?

The cyberwatching.eu Observatory is the natural ground  to identify initiatives encompassing security and privacy R&I with a high potential for cross-fertilization and synergy. SMEs, investors, R&I projects and policy makers can all beneift:

  • The Observatory enables operators of essentials services and digital service providers to find and procure the best innovative solutions for risk management and incident reporting.
  • The Observatory offers a fresh, new approach to R&I impact, guiding mainly technical experts within public and private organisations actions on CS&P with the staged integration of a marketplace and catalogue of services for commercialising results.
  • The Observatory helps policy makers and regulators to monitor impact of R&I actions for maximum RoI, shape future research directions for the DSM, provide timely roadmaps on CS&P, regulatory compliance and policy actions, as well as ICT standardisation.

Be part of the European Cybersecurity and Privacy Observatory!

Are you an H2020 project, EU or National initiative? Be part of THE EU Cyber Security Observatory now!

Want to appear on this page? Send us your information on your news, events or releases and we'll publish it here.

Contact us at info@cyberwatching.eu

ATENA - Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures

ATENA - Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures

Audio Beacon Based Authentication

Audio Beacon Based Authentication

AxE Javascript

AxE Javascript

Be-Aware - Threat analysis for Austria with respect to the vulnerability of GNSS

Be-Aware - Threat analysis for Austria with respect to the vulnerability of GNSS

BEACON - Enabling federated cloud networking

BEACON - Enabling federated cloud networking

Believe

Big-Data Analytics - Developing methods for the analysis of large amounts of data without compromising data protection

Big-Data Analytics - Developing methods for the analysis of large amounts of data without compromising data protection

Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption

Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption

Black Ice HSM

Black Ice HSM

BPR4GDPR – Business Process Re-engineering and functional toolkit for GDPR compliance

BPR4GDPR – Business Process Re-engineering and functional toolkit for GDPR compliance

BRUTUS - Authenticated Ciphers and Resistance against Side-Channel Attacks

BRUTUS - Authenticated Ciphers and Resistance against Side-Channel Attacks

Building and trial operation of the Cyber Threat Intelligence system

Building and trial operation of the Cyber Threat Intelligence system

C3ISP - Collaborative and confidential information sharing and analysis for cyber protection

C3ISP - Collaborative and confidential information sharing and analysis for cyber protection

C4e - CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence

C4e - CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence

CANVAS - Constructing an Alliance for Value-driven Cybersecurity

CANVAS - Constructing an Alliance for Value-driven Cybersecurity

CASUS

CatchMe: Android Malicious Code Localisation

CatchMe: Android Malicious Code Localisation

CERCES - Center for Resilient Critical Infrastructures

CERCES - Center for Resilient Critical Infrastructures

CERTMILS - Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats

CERTMILS - Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats

CHARACTERIZE Characterization of Malicious Code in Mobile Apps

CHARACTERIZE Characterization of Malicious Code in Mobile Apps

CHOREVOLUTION - The Choreography Platform for IoT-Enabled Applications

CHOREVOLUTION - The Choreography Platform for IoT-Enabled Applications

CIDRE

CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework

CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework

CISC - Certification of IoT Secure Compilation

CISC - Certification of IoT Secure Compilation

Pages

Project type

Observatory

POSEIDON: Protection and control of Secured Information by means of a privacy-enhanced Dashboard

Poseidon is one of the General Data Protection Regulation (GDPR) Cluster projects that aims to develop an innovative Privacy Enhancing Dashboard for personal data protection supporting the digital security pillars of the new EU’s GDPR.

DEFeND: the data governance framework for supporting GDPR

DEFeND is an international partnership that will deliver a platform to empower organisations in different sectors to assess and comply with the European Union’s General Data Protection Regulation (GDPR).

Future Events

Cluj Innovation Days
24/05/2019 to 25/05/2019
Image:

Digital transformation is the new buzz concept, threatening the until recently undisputed reign of “Innovation”. Lately, the two have become synonyms or, in many cases, they condition each other in a very fuzzy relationship: you cannot have innovation without at least some degree of digitalization, but digital transformation is a consequence of being innovative.Amidst all this tumult and debate, the process is already transforming our professional and personal environments. Various sectors are on the blink of radical transformation, while others will disappear altogether.

Brussels - Second CW Concertation Meeting, 04/06/2019
04/06/2019
Image:

Join us at the second Cyberwatching.eu Concertation meeting, 04 June 2019!