Incentives of Privacy Enhancing Technologies Copenhagen, Denmark – 10 September 2010 2010 PRIVAT TEK Oluf Nielsen Scientific Officer Trust & Security Unit.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

Toward an EU strategy to defend our technological assets Second panel interview. Focus on defense against misappropriation of technogical assets Guillaume.
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
European Policy challenges on eAccessibility Paris 31 January 2005 Per BLIXT (HoU) -- Unit eInclusion.
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Dr. Detlef Eckert DG Information Society and Media European Commission Information Security 23 September 2008 SecureComm 2008, Istanbul.
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Digital public services and innovation
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
Dirk van Rooy, Ph.D. DG Information Society and Media European Commission Perspectives for Trust and Security in the future Digital Society Scope for actions.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 1 Horwath InternationalCopyright 2006 Crowe Chizek and Company LLC 1 IT Audits – Understanding the Standards Illinois Digital Government Summit September.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
IT Governance: Simultaneously Empowers and Controls Source: IT Governance, Chapter 1.
Proposed action: European SME Digital Capability Framework Objectives: o Deliver a competency-based assessment system that enables companies to measure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Scientific Publication in the European Research Area: moving towards change Pēteris Zilgalvis Head of Unit, Governance and Ethics European Commission,
Eurostat Coverage of Security Issues Pascal Jacques ESTAT B0 Local Informatics Security Officer.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Prof. Yuan-Shyi Peter Chiu
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
INTERNATIONAL COOPERATION PUBLIC CONSULTATION FIRST OVERVIEW EXPORTIC 27 March 2008 JF SOUPIZET HEAD OF INTERNATIONAL RELATIONS DG INFSO These view are.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
MANIFESTO FOR RESPONSIBLE EUROPEAN MANAGEMENT EUROCADRES’ Conference Nov 2003 Dirk Ameel.
Enav.it Channelling Finance and Innovation to Industry Steps towards the Air Traffic Management system modernisation.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
The Scientific Publications System: A Key Factor for EU Research Policy Celina Ramjoué European Commission, Research Directorate-General Science, Economy.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
EUROPEAN SOCIAL FUND EQUAL - The European Perspective EQUAL Initiative EQUAL The European Perspective Dublin - 25 September 2003 Ian Livingstone European.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
The EU framework programme for research and innovation.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
DG Enterprise and Industry European Commission Standardisation Aspects of ICT and e-Business Antonio Conte Unit D4 - ICT for Competitiveness and Innovation.
Research and development activities in the field of information security Manuel Carvalhosa European Commission Information Society and Media Directorate-General.
Information Security Program
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Security Standard: “reasonable security”
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Perspectives for Trust and Security in the future Digital Society
INFORMATION SYSTEMS SECURITY and CONTROL
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Community of Users.
Standardisation Coordination
Presentation transcript:

Incentives of Privacy Enhancing Technologies Copenhagen, Denmark – 10 September PRIVAT TEK Oluf Nielsen Scientific Officer Trust & Security Unit Information Society and Media Directorate-General European Commission The views expressed in this presentation are purely those of the speaker and may not in any circumstances be regarded as stating an official position of the European Commission.

“TRUSTWORTHY ICT” Cloud computing lets Feds read your Phorm to use BT customers to test precision advertising system on net La colère associative monte contre Edvige, le fichier policier de données personnelles Web giants spark privacy concerns Big Brother tightens his grip on the web YouTube case opens can of worms on online privacy Grosse faille du web, et solution en chemin Revealed: 8 million victims in the world's biggest cyber heist Phishing attacks soar in the UK Cyberwar and real war collide in Georgia Internet security Code red The Evolution of Cyber Espionage Lessons from SocGen: Internal Threats need to become a security priority Six more data discs 'are missing' Big Brother Spying on Americans' Internet Data? UK's Revenue and Customs loses 25 million customer records Identity theft, pornography, corporate blackmail in the web's underworld, business is booming Defenseless on the Net Internet wiretapping Bugging the cloud Privacy Trust Security

“TRUSTWORTHY ICT”  Technology – Cyber-threats, cyber-crime – The Future of the Internet – Complex ICT Systems and Services underpinning Critical Infrastructures  Users – Trust, accountability, transparency – Identity, privacy and empowerment, – Creativity, Usability – Economics of Security – Human values and acceptance

COST/BENEFITS  What Security Economic research is needed to better understand the economic impact of data breaches for stock market valuations highlighting security vulnerabilities?  How can Security Economics be used to analyze how effective cost sharing of liability is possible in order to achieve more societal optimal investments in ICT trust and security applications?  What market conditions and economic incentives has to be in place for firms to invest in ICT security to minimise their long-term costs and respond better to market forces by integrating ICT security into their products and services? TRUSTWORTHY ICT: Security Economy Open Research Questions? What does the rising trend in identity theft and potential cost of data breach imply for companies security strategy for their networks, computers and access?

TRUSTWORTHY ICT: Security Economy Open Research Questions? Could vulnerability markets help buyers and sellers to establish the actual cost of finding ICT systems and software flaw?  Would Market-based approaches increase the number of identified vulnerabilities by motivating more people to search flaws?  Why is Cyber insurance markets not taken up more widely?  Would Reputation systems deter free-riding and cheating in peer-to-peer networks?

How to create?  Better knowledge when it pays off for companies investing in more ICT security applications by linking closely to corporate values in their assets?  More incentives for better company reporting e.g. how they manage their assets and security breaches for both their internal and external stakeholders?  More trust worthy financial reporting that includes: controls of information; security policy; security standards access; authentication; network security? TRUSTWORTHY ICT: Security Economy Open Research Questions? Personalised Services

 How to identify and manage vulnerabilities in cyber space?  What does it take for a competitor to reproduce your company assets?  What does it take for a competitor to reproduce your company assets?  How to focus your IT security investment on the core assets?  How to focus your IT security investment on the core assets?  How to apply the appropriate control measures?  How to apply the appropriate control measures? TRUSTWORTHY ICT: Security Economic ICT Applications? – How to Value your Core Assets?

Is there a need for developing user friendly and cost effective ICT tools which enable organisations to better assess and value their high value assets? To be used for collecting information on incidents, losses, and spending ICT applications which integrates economic incentive trust mechanism ICT systems which ensures informed and automated management decision creating transparency and accountability for key stakeholders There is a need for user friendly automated tools which can perform those controls on organisations most critical assets to cope with rapid evolving ICT security challenges

TRUSTWORTHY ICT: Security Economic ICT Applications? – How to Value Your Core Assets? TOTAL VALUE ASSETS [TANGIBLE PLUS INTANGIBLES] Data Application Host Network TOTAL IT EXPENDITURE CYBER VULNERABILITIES MATRIX Core Assets Core Assets Data Application Network Host TOTAL IT SECURITY EXPENDITURE

Embedding Privacy by Design in Technology Technological data protection should be taken into account already at the planning stage. Privacy by design should be technological neutral. From the creation of standards and the design of architecture to their implementation by the data controller. The European Digital Agenda endorses the principles of privacy by design to ensure citizens and trust in ICT and for online services. Privacy and Trust goes hand in hand and Privacy by Design should be guiding principle for the development of new trustworthy ICT. Source: Opinion of the European Data Protection Supervisor on Promoting Trust in the Information Society by Fostering Data Protection and Privacy, Brussels 18 March 2010

Embedding Privacy by Design in Technology The Lisbon Treaty has reinforced protection by recognizing the respect for private life and protection of personal data as separate fundamental rights in articles 7 and 8 of the EU Charter of Fundamental Rights. Whereas the protection of the rights and freedom of data subjects with regard to the processing of personal data that requires appropriate technical and organizational measures to be taken; both at the time of design of the processing system, and the time of the processing itself particularly in order to maintain security and thereby to prevent any unauthorized processing.

ICT FP7 WORK PROGRAMME Objective ICT Trustworthy ICT a)Heterogeneous networked, services and computing environments b)Trust, eIdentity and Privacy management infrastructures c)Data policy, governance and socio- economic ecosystems d)Networking and coordinating activities

ICT FP7 WORK PROGRAMME Objective ICT Trustworthy ICT b) Trust, eIdentity and Privacy management infrastructures Development of trusted architectures, protocols and models for trust assurance Protocols for privacy infrastructures Interoperability or federated management of identity claims  Flexible use of centric privacy  Accountability  Non-repudiation  Traceability  Right to oblivion at the design level

ICT FP7 WORK PROGRAMME Objective ICT Trustworthy ICT c) Data policy, governance and socio-economic ecosystems Management and governance frameworks Technology supported social economics frameworks for risk analysis, liability assignment, assurance and certification Tools for trust management based on cost benefit analysis

ICT FP7 WORK PROGRAMME Objective ICT Trustworthy ICT Expected Impact Improved European industrial competitiveness in markets of trustworthy ICT Adequate support to users to make informed decisions on the trustworthiness of ICT Demonstrable usability and societal acceptance of proposed handling of information and privacy

Further information  On ICT-FP7 Security:  ICT-FP7 Project Synopsis:  Objective 1.4 Call Details: –Opening expected 26 July Ending 17 January 2012  More information: Research Programme Officer Trust and