Towards defining priorities for cybersecurity research in Horzon 2020's work programme 2016-2017 Secure ICT Landscape Deliverable Mari Kert, Javier Lopez.

Slides:



Advertisements
Similar presentations
How to Create an Annotated Bibliography. What is an annotated bibliography?  It gives an account of the research that has been done on given topic 
Advertisements

CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide April.
NIS Platform WG3 Secure ICT Research & Innovation NIS WG3 3rd meeting, April 29th WG3 Secure ICT Research & Innovation.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
Title of the WebQuest Introduction Task Process Evaluation Conclusion Credits Teacher’s page Teacher’s page Introduction Designed by (put your name here)
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
WEBQUEST Let’s Begin TITLE AUTHOR:. Let’s continue Return Home Introduction Task Process Conclusion Evaluation Teacher Page Credits This document should.
Open an internet browser such as internet explorer.
Put the Title of the WebQuest Here A WebQuest for xth Grade (Put Subject Here) Designed by (Put Your Name Here) Put Your Address Here Put some interesting.
Put the Lesson Title Here A webquest for xth grade Designed by Put your You may include graphics, a movie, or sound to any of the slides. Introduction.
Proposal Development Sample Proposal Format Mahmoud K. El -Jafari College of Business and Economics Al-Quds University – Jerusalem April 11,2007.
© Copyright 2011 John Wiley & Sons, Inc.
Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan Software Assurance Forum November 4, 2009.
Educational Research. What you have to learn… The execution and reporting of research follows patterns. The understand what others have done you need.
POSTER  Poster Specification: Portrait or landscape view Size:2.5ft x 1.5 ft  Design and format: A well-constructed poster is clear, concise, attractive.
DEPARTMENT OF CULTURE, SPORT AND RECREATION MPUMALANGA PROVINCE COMMUNITY LIBRARY CONDITIONAL GRANT 2011/12 FINANCIAL YEAR 1.
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
1 Framework Programme 7 Call 6. 2 CALL 6 D R A F T Call title: ICT Call 6 Call identifier: FP7-ICT Date of publication: November 2009 Closure date:
Network and Information Security Platform (NIS-P) WG3 on Research and Innovation Fabio Martinelli Co-Chair of EU NIS-P WG3 Istituto di Informatica e Telematica.
1 THE TERM PROJECT GUIDELINES YONATAN RESHEF MANAGING FOR QUALITY September-December, 2009.
PRESENTATION TITLE PRESENTER NAME Presenter title, organization © 2015 Internet2 Subtitle (if any)
BUS 611 Week 4 Assignment Integrated Project Management To purchase this material link
What is: Information & Communications Technology
WP3: D3.1 status, pending comments and next steps
Sample Text for Title of Poster
Level 3 Revision & Portfolio
Title of your poster Author name, affiliation, Who (the team)Where and when (describe methods) What (introduction to the project) Why (results, conclusions,
Parts of an Academic Paper
GCE Applied ICT G053: Lesson 01 Introduction To The Unit
CMGT 433 RANK Education Your Life-- cmgt433rank.com.
CYB 100 Teaching Effectively-- snaptutorial.com
CYB 100 Become Exceptional/ newtonhelp.com. CYB 100 All Assignments For more course tutorials visit uophelp.com is now newtonhelp.com
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Perspectives on ITRs Thomas Wilson
خشنه اتره اهورهه مزدا شيوۀ ارائه مقاله 17/10/1388.
PowerPoint Template
PowerPoint Template.
PowerPoint Template.
PowerPoint Template
دانشگاه شهیدرجایی تهران
P O S T E R T I T L E Authors & Institutions
PowerPoint Template.
P O S T E R T I T L E EXAMPLE EXAMPLE EXAMPLE INTRODUCTION RESULTS
تعهدات مشتری در کنوانسیون بیع بین المللی
Author: Name, Affiliation. Advisor: Name, Affiliation
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Introduction To Computers & Computing [EED 301]
PowerPoint Template
(can use two lines for Title if needed)
P O S T E R T I T L E Authors & Institutions
Responsibility of Text free of restrictions
Presenter’s Name (if case)
Poster size: A0 (width 84 cm, height 119 cm)
Sample Text for Title of Poster
Moderator Mohamed M. K. Elhaj
Sample Text for Title of Poster
Author(s) Name(s) SURNAME(s)
Author(s) Name(s) SURNAME(s)

Title Introduction: Discussion & Conclusion: Methods & Results:
Keystone Library Deliverables
TITLE OF THE PRESENTATION
CMGT 433 RANK Dreams Come True / cmgt433rank.com.
WG03 Task Force "IoT relation and impact on 5G"
“ICTs for Development” Course
Put the Lesson Title Here
Author(s) Name(s) SURNAME(s)
P O S T E R T I T L E EXAMPLE EXAMPLE EXAMPLE (Insert your logos here)
PowerPoint Template.
PowerPoint Template.
Presentation transcript:

Towards defining priorities for cybersecurity research in Horzon 2020's work programme Secure ICT Landscape Deliverable Mari Kert, Javier Lopez Evangelos Markatos, Bart Preneel 8 April 2014

Secure ICT Landscape Deliverable SECURE ICT LANDSCAPE DELIVERABLE

Secure ICT Landscape Deliverable WHAT IS IT? Describe State of the Art In Cyber Security What are the Treats? What are the Existing Defenses for each threat? What are the Research Challenges? What are the Existing Tools?

Secure ICT Landscape Deliverable HOW DID WE DO IT? Created

Secure ICT Landscape Deliverable PROCEDURE created a Table of Contents Asked for feedback In parallel, those who gave feedback (and wanted) became part

Secure ICT Landscape Deliverable PROCEDURE created an “example” section to be used by the rest of the contributors assigned the sections to authors and reviewers as well Text has started to flow April will be a month of writing

Secure ICT Landscape Deliverable STRUCTURE Introduction Basic Technologies Internet of Things Application Domains Conclusions

Secure ICT Landscape Deliverable STRUCTURE Basic Structure of Each section: Introduction What is it? Current Status What has been done? Research Challenges What needs to be done? Existing Tools (if applicable)

Secure ICT Landscape Deliverable WHAT ARE THE NEXT STEPS? Finish with the Writing Quality assurance Assign and Complete Reviews Address some of the Research challenges

Secure ICT Landscape Deliverable EXAMPLE SECTION: INTRUSION DETECTION SYSTEMS Introduction Rule-based, Anomaly-based Current Status Research Challenges The Changing Security Paradigm Speed Whole System Image

Secure ICT Landscape Deliverable SUMMARY Secure ICT Landscape Deliverable Have mobilized the community At several @all Text flows in Quality assurance runs in parallel

Thank you for your attention