Awareness and Training, Data Security

Home » Marketplace » Awareness and Training, Data Security

Project Flyer

Want to know what SPECIAL is about?
Get here our project flyer that explains it all!

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

SPECIAL project deliverables

Find here the public deliverables created in SPECIAL. Our vision is to reconcile Big Data and personal data protection via an innovative data handling solution and a transparency framework. We develop this technology to ease industry’s difficulties with GDPR compliance and to enable respectful treatment of personal information. This introduces new ways of user interaction on data protection, fostering trusted customer relationships. Thus, we
- build a big data architecture to handle linked data for privacy policies, as well as deploy scalable, queryable encryption

Direct Link to CANVAS book

The book The Ethics of Cybersecurity discusses the full plethora of ethical aspects of cybersecurity and has a strong practical focus, including case studies that outline ethical dilemmas in cybersecurity and guidelines and other measures to tackle those dilemmas. The book is published open access and is freely available for everybody.

Direct Link to CANVAS MOOC

The CANVAS Massive Open Online Course (MOOC) transports the main insights of CANVAS to a broad public. In particular, the MOOC provides a comprehensive overview of the central principles and challenges in the fields of cyber security, privacy and trust. Concrete case studies from health, business and national security spheres are presented. Technical, legal and ethical perspectives on the issues are included.

Direct link to CANVAS Reference Curriculum

The CANVAS Reference Curriculum integrates the value perspective into cybersecurity design decisions, with a focus on academia and industry training programs. It contains an overview document outlining the structure of the curriculum, for each lecture a content descriptor (summary, learning goals, freely available presentation slides, literature and videos) and nine case study documents (1 page descriptor; 2 page example solution). It has been developed upon the basis of the identification of good practices of teaching ethics, responsible science, technology and engineering

Direct link to CANVAS briefing packages

The CANVAS Briefing Packages are a set of summarized, easily digestible information on challenges as well as possible, value-driven solution approaches linked to European cybersecurity policy. Addressing mainly (but not exclusively) EU and national policy makers, they provide guidance for decisions in this area. They discuss the following challenges: 1) Achieving Trust in EU Cybersecurity. 2) Cybersecurity and the European Data Protection Framework. 3) All Fundamental Rights are relevant for Cybersecurity.

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

WITDOM Identity Access Management

The WITDOM Identity and Access Management (IAM) component ensures that sensitive data in WITDOM is only accessible to individuals who are granted explicit entitlements to specific services, and has the ability to monitor / audit access to data and operations.

CREDENTIAL Cryptographic Components

All server-side and client-side components and apps needed for secure and privacy-friendly data sharing and identity management in the cloud. It is an open and flexible cloud identity wallet architecture to easily connect to other identity management systems

Pages

News

On November 13th the Italian Parliament finally approved Law Decree No. 105/2019, which significantly extends the scope of application of the Italian “golden powers” regulations, amending Law Decree No. 21/2012.

Future Events

The Annual Computer Security Applications Conference (ACSAC) will be held in San Juan, Puerto Rico on 9-13 December 2019. 

09/12/2019 to 13/12/2019

The one-day Summit on the 13th of January brings together prominent security practitioners for in-depth talks focused on techniques that can be used to successfully identify, contain, and eliminate adversaries targeting your networks. Attendees will gain tools and methods to leverage as soon as they return to work.

The Summit will explore:

13/01/2020 to 19/01/2020