Related Projects

Linking Activities with Related Projects

A fruitful dialogue and collaboration was established during the previous three year with related EU-funded projects. The events stemming from common workshop to common panels and discussion on SME cybersecurity problems. Concluding with have open a valued communication channels with the following projects:

  • GHOST Project: Common Workshops, Discussion on SME problems
  • SMESEC Project: Common Workshops, Discussion on SME problems, Plennary Meeting presentation
  • H2020PCW Event Common Workshops, Discussion on SME problems,
  • Parallel Event with ARES CONFERENCE: Common Workshops with 16 EU Funded projects, Discussion on SME problems,
  • Project DICE H2020: Collaboration through common discussion on SME problems
  • CYBERWISER: Daily update on the WEBSITE, Presentation in Common Workshop, Discussion on SME problems, Project of the month (June2020)
  • M2DC: Collaboration through common discussion on SME problems
  • UNICORN Common Workshops, Discussion on SME problems
  • KONFIDO Common Workshops, Discussion on SME IoT problems

SMESEC Protecting Small and Medium-sized Enterprises digital technology through an innovative cyber-SECurity framework

Small and Medium size Enterprises (SMEs) are an important driver for innovation and growth in the EU. SMEs also stand to gain the most from innovative technology, because it is complicated and costly for them to set-up and run ICT in the traditional way. Taking into account cyber-security, SMEs do not always understand all the risks and business consequences for the development of technologies without the adequate level of protection against cybercrime.

The European Union Agency for Network and Information Security (ENISA) declares on the “Information security and privacy Standards for SMEs” study of 2016 that, despite rising concerns on information security risks, the level of SMEs information security and privacy Standard adoption is relatively low.

SMESEC consortium is proposing to develop a cost-effective framework composed of specific cyber-security tool-kit to support SMEs in managing network information security risks and threats, as well as in identifying opportunities for implementing secure innovative technology in the digital market; for this consortium, it is important that SMEs do not only look at cyber-security as an obstacle, but also they understand the business opportunity beyond it.

In this scenario, an international group of experts proposes SMESEC as a response to the cyber-security challenges for business companies with a limited background on cyber-security and a restricted budget. The SMESEC project will be developed in 36 months by a competitive consortium of 12 partners from 7 countries, which corresponds to a well-balanced structure, involving big companies, SMEs, research centres and universities. Despite the great diversity of entities within the proposal, SMESEC is an industry-oriented project, since the private companies will cover more than 73% of the total project costs, and will be led by a big company, ATOS, with many years of experience on project management and cyber-security.

TOPIC DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
Coordinator: ATOS Spain

 

Website:

C3ISP - Collaborative and confidential information sharing and analysis for cyber protection

C3ISP mission is to define a collaborative and confidential information sharing, analysis and protection framework as a service for cyber security management. C3ISP innovation is the possibility to share information in a flexible and controllable manner inside a collaborative multi-domain environment to improve detection of cyber threats and response capabilities, still preserving the confidentiality of the shared information. C3ISP paradigm is collect, analyse, inform, and react.

Topic: H2020-DS-2015-1
Coordinator: CONSIGLIO NAZIONALE DELLE RICERCHE

Website:

CYBECO - Supporting Cyberinsurance from a Behavioural Choice Perspective

CYBECO will research, develop, demonstrate, evaluate and exploit a new framework for managing cybersecurity risks, one that is focusing on cyberinsurance, as key risk management treatment. CYBECO integrates multidisciplinary research methods from Behavioural Economics, Statistics, Game and Decision Theory, Security Engineering and Behavioral Psychology in order to develop new concepts and models that are combined within a prototype software architecture (CYBECO Toolbox 2.0). CYBECO recognizes that the cyberinsurance domain is not adequately developed, partly due to the lack of sufficiently large statistical data sample and partly due to the difficulties customers face when deciding on their cyberinsurance investment options. CYBECO will address both these barriers, aiming at delivering advances clearly positioned beyond the State-of-the-Art. We plan to implement a prototype tool that will demonstrate and promote the CYBECO model and concepts. We then foresee to perform behavioural experiments to validate current institutional cybersecurity frameworks and to provide relevant policy insights, particularly in reference to behavioural nudges in cybersecurity. The CYBECO consortium is composed by complementary partners, coming from the addressed research, technological and market domains, that have a proven track record of high quality research capacity. Thus, the carefully structured workplan, embodies a holistic approach towards meeting the CYBECO objectives and delivering market-relevant outcomes of significant exploitation potential.

Topic: DS-04-2016 - Economics of Cybersecurity
Coordinator: TREK ANAPTYKSIAKON IPODOMON KE IPIRESION ANONIMI ETERIA

 

Website:

HERMENEUT - Enterprises intangible Risks Management via Economic models based on simulatioN of modErn cyber-aTtacks

IT security and risk management often ignore or underestimate the human factor (psychological, behavioural, societal, organisational and economic aspects) in the identification of cyber-risks, their quantitative economic impact and the costs of countermeasures. Cyber-attacks can harm intangible assets like reputation, IPR, expertise, and know-how. And there is severe imbalance between the efficiency of attacks and inadequate defences, due in part to the lack of quantitative information for decision makers to prioritise security investments.

To foster a culture of risk management by an individual organisation or a complete sector, HERMENEUT answers: What is the real fallout of a data compromise and the long-run consequences on associated assets? What are the losses for intangible assets? Do other type of attacks (beyond data breach) severely impact intangible and tangible assets?

HERMENEUT assesses vulnerabilities of organisations and corresponding tangible and intangible assets at risk, taking into account the business plans of the attacker, the commoditisation level of the target organisations, the exposure of the target and including human factors as well as estimating the likelihood that a potential cyber-attack exploits identified vulnerabilities. HERMENEUT’s cyber-security cost-benefit approach combines integrated assessment of vulnerabilities and their likelihoods with an innovative macro- and micro-economic model for intangible costs, delivering a quantitative estimation of the risks for an organisation or a business sector and investment guidelines for mitigation measures. 11 partners from 6 countries deliver an innovative methodology and advanced macro- and micro-economic models and make it available to the European research community. HERMENEUT implements its innovations in a decision support tool, tested with 2 users in healthcare and an IPR-intensive industry.

 

Topic: DS-04-2016 - Economics of Cybersecurity
Coordinator: ENGINEERING - INGEGNERIA INFORMATICA SPA

 

Website:

PROTASIS - Restoring Trust in the Cyber Space: A Systems Security Proposal

Fueled by a string of high profile attacks and recent revelations about unprecedented cyber surveillance, interest in systems security is rising-not just among industry and governments, but even among individual citizens across Europe. Corporate organizations worry about the viability of their businesses, nation states about cyber attacks by other nation states or terrorist groups, and citizens about the trustworthiness of the ICT infrastructures. The long list of recent security incidents is eroding people's trust in the digital economy and shows that more research is needed.

Unfortunately, expertise is fragmented across many places, while the exchange of knowledge is lacking. If one group specializes in code-reuse attacks and another in embedded systems, ideally they should team up to detect code-reuse vulnerabilities in embedded devices. Today, however, the flow of ideas is limited to publications and ad-hoc collaborations. A more efficient exchange would occur if a researcher temporarily joins the other group to collaborate directly on-site.

Over the past few years Europe has created several world-class research centers in systems security. They publish in the most prestigious venues and have a significant impact on both the scientific community and society at large. Nevertheless, in terms of numbers, most top groups are still in the US and the ability to collaborate with them would be a tremendous boost for security research in Europe.

We plan to foster such collaborations by supporting researchers from European institutes to spend time with their American counterparts in top universities. We will gather the research results in a repository that links all the exchanges and provides a valuable input for collaborative projects in itself. We will focus our research efforts on both advanced attacks (e.g., exploits, malware, and exfiltration techniques), and defenses (e.g., developing secure software and protecting resource-constrained devices).

Topic: MSCA-RISE-2015 - Marie Skłodowska-Curie Research and Innovation Staff Exchange (RISE)
Coordinator: FOUNDATION FOR RESEARCH AND TECHNOLOGY HELLAS

 

Website:

YAKSHA – Cybersecurity Awareness and Knowledge Systemic High-level Application

YAKSHA will develop innovative methods for malware detection, collection and analysis, as well as design a specialised ontology to be used for long-term storage and analysis of the information and deploy standard information formats and interfaces to facilitate interoperability.

YAKSHA will further build an ecosystem of partners around its solutions that will contribute to enhancing cybersecurity skills in Europe and creating new positions for cybersecurity specialists in ASEAN.

Moreover, the direct access to the important ASEAN market will positively impact the competitiveness of European security industry. The YAKSHA software solution will be validated in real-world pilot projects in both Europe and Southeast Asia regions, initially focusing on Vietnam and Greece, and with plans to expand the deployments to other countries and will be supported by the network of YAKSHA Ambassadors, i.e. representatives of YAKSHA who are active in the field of cybersecurity, software and/or more largely internet security and defence.

In addition, the project will create YAKSHA Label of Excellence – a European certification of technology excellence which will serve as a sustainable recognition of a product’s quality and thus support ASEAN users to certify the quality, security and functionality of labelled product and services.

Coordinator: Sociedade Portuguesa de Inovação

 

Website:

SISSDEN - Secure Information Sharing Sensor Delivery event Network

SISSDEN is a project aimed at improving the cybersecurity posture of EU entities and end users through development of situational awareness and sharing of actionable information. It builds on the experience of Shadowserver, a non-profit organization well known in the security community for its efforts in mitigation of botnet and malware propagation, free of charge victim notification services, and close collaboration with Law Enforcement Agencies, national CERTs, and network providers.

The core of SISSDEN is a worldwide sensor network, which will be deployed and operated by the project consortium. This passive threat data collection mechanism will be complemented by behavioral analysis of malware and multiple external data sources. Actionable information produced by SISSDEN will be used for the purposes of no‐cost victim notification and remediation via organizations such as National CERTs, ISPs, hosting providers and Law Enforcement Agencies such as EC3. It will especially benefit SMEs and citizens, which do not have the capability to resist threats alone, allowing them to participate in this global effort, and profit from the improved information processing, analysis and exchange of security intelligence, to effectively prevent and counter security breaches.

The main goal of the project is creation of multiple high-quality feeds of actionable security information that will be used for remediation purposes and for proactive tightening of computer defences. This will be achieved through development and deployment of a distributed sensor network based on state-of-the-art honeypot/darknet technologies and creation of a high-throughput data processing center. SISSDEN will provide in-depth analytics on the collected data and develop metrics that will be used to establish the scale of most important security issues in the EU, and impact of the project itself. Finally, a curated reference data set will be created and published to provide a high-value resource.

Topic: DS-04-2015 - Information driven Cyber Security Management
Coordinator: NAUKOWA I AKADEMICKA SIEC KOMPUTEROWA - PANSTWOWY INSTYTUT 

 

Website: