Presentation is loading. Please wait.

Presentation is loading. Please wait.

Overall Exploitation & Sustainability Strategy 4th Steering Committee meeting Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism.

Similar presentations


Presentation on theme: "Overall Exploitation & Sustainability Strategy 4th Steering Committee meeting Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism."— Presentation transcript:

1 Overall Exploitation & Sustainability Strategy 4th Steering Committee meeting Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme of the European Union Valencia/3/15 M. Zacharias, S. Pantelopoulos SingularLogic

2 Pave the way for the exploitation of the project results during the lifecycle of the project and after its end by: – Positioning the project results – Identifying the project market – Assessing the exploitation perspectives of ALL partners – Designing the exploitation activities Attempt investigation of full spectrum of exploitation opportunities Involve all partners in the exploitation efforts A comprehensive & easily adaptable methodology to facilitate in depth investigation of the full spectrum of exploitation opportunities of CYSM results by participating partners Using Our Approach

3 – project results – nature of results – quality of results – applicability in the market – project partners – nature of each partner’s organisation – partners’ perspectives and expectations – partners’ continuous exploitation commitment – the market – the “customers” (stakholders/users) needs – economic/political/societal priorities Critical Exploitation Factors

4 CYSM Project

5 ResearchWorld Maritime World Inside-Out Outside In CYSMWorld External World Public Sector World Inside-Out Assessments

6 CYSM Products RA methodology A targeted RA RA System & Services impact on the political discourse Questionnaire tool boost a new participatory approach to the development of port security Questionnaires (philosophy/content) Encourage port operators’ participation Information assets in CYSM CMS CYSM Taxonomy Collaborative technologies experiences in the port security sector Training material Best practice Users contacts 6 CYSM exploitable products

7 7 Visionary CYSM Products Stakeholders CYSM studies CYSM RA system EU, Public SectorPort Operators Maritime Organisations CYSM services Standardization Bodies CYSM Best practice CYSM questionnaire tool CYSM RA methodology

8 SW CYSM RA methodology is innovative since it ‘s compliant with ISO27001 and ISP addressing both the physical and cyber nature of the ports. CYSM system is collaborative and provides an easy way to perform port security management Port operators are not used to manage security of their ICT systems Port operators are not aware of cyber security incidents Port operators are not aware of the ISO287001 requirements OT CYSM will monitor and better balance port security There are not other open security management tools for the ports Economic crisis has overshadowed new investments in the ports Port operators are used to face-to-face relationships Security officers in the ports only know how to handle the safety of port physical facilities 8 SWOT Analysis

9 Positioning The existing directives (e.g. ISPS, EC Regulation No 725/2004 on enhancing ship and port facility security, and EC Directive 2005/65) do not cover the physical-cyber security nature of the ports. The existing RA methodologies (e.g. CRAMM, OCTAVE, MSRAM MARISA) are not collaborative and they do not target the specificities of the ports’ Critical Information Infrastructures (CII). The existing security management tools are not sector specific and they are not port operator friendly. CYSM provides an innovative, holistic approach to ports’ CIIs nature 9

10 Assumptions: IPRs (CYSM methodology: UPRC; CYSM tool architecture and design: UPRC; CYSM tool implementation: UPRC, SILO; CYSM content, information assets: Feeport, DITEN PPA) Proposal:  The Integrated Business Model CYSM ports deploy the entire open source CYSM tool  Outsourced Model 1 outsourced to a third company.  Outsourced Model 2 would be deployed by the CYSM consortium (or part of the consortium with interested partners) respecting the IPRS in the pricing policy. No third party would be involved. 10 Overall Business Model

11  Non-EU visibility: Organization and participation in security events and fora.  EU/International visibility: UPRC organised NATO workshop and USA workshop;  Scientific dissemination actions (publications, conferences, scientific events etc): SLG and UPRC collaborate closely;  Sustainability channel: UPRC is a member of the NIS platform and security related associations (e.g. IEEE); SILO is a member of the Greek Chambers of Commerce 11 UPRC/SILO exploitation efforts

12 THANK YOU


Download ppt "Overall Exploitation & Sustainability Strategy 4th Steering Committee meeting Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism."

Similar presentations


Ads by Google