Projects

What is the cyberwatching.eu Observatory?

Over the next 48 months, our Observatory will become THE European hub for Cybersecurity and Privacy. Cyberwatching.eu is monitoring R&I initiatives throughout EU & Associated Countries while supporting European stakeholders in playing an active role in shaping the global cybersecurity & privacy landscape.
Through a combination of clustering activities and Technical and Market Readiness Level Workshops, cyberwatching.eu is monitoring the whole lifecycle from research development and implementation, to validation and market uptake, making it possible for stakeholders to increase their knowledge, raise their awareness and find possible synergies between different initiatives.

Who benefits and how?

The cyberwatching.eu Observatory is the natural ground  to identify initiatives encompassing security and privacy R&I with a high potential for cross-fertilization and synergy. SMEs, investors, R&I projects and policy makers can all beneift:

  • The Observatory enables operators of essentials services and digital service providers to find and procure the best innovative solutions for risk management and incident reporting.
  • The Observatory offers a fresh, new approach to R&I impact, guiding mainly technical experts within public and private organisations actions on CS&P with the staged integration of a marketplace and catalogue of services for commercialising results.
  • The Observatory helps policy makers and regulators to monitor impact of R&I actions for maximum RoI, shape future research directions for the DSM, provide timely roadmaps on CS&P, regulatory compliance and policy actions, as well as ICT standardisation.

Be part of the European Cybersecurity and Privacy Observatory!

Are you an H2020 project, EU or National initiative? Be part of THE EU Cyber Security Observatory now!

Want to appear on this page? Send us your information on your news, events or releases and we'll publish it here.

Contact us at info@cyberwatching.eu

Audio Beacon Based Authentication

Audio Beacon Based Authentication

AxE Javascript

AxE Javascript

Be-Aware - Threat analysis for Austria with respect to the vulnerability of GNSS

Be-Aware - Threat analysis for Austria with respect to the vulnerability of GNSS

BEACON - Enabling federated cloud networking

BEACON - Enabling federated cloud networking

Believe

Big-Data Analytics - Developing methods for the analysis of large amounts of data without compromising data protection

Big-Data Analytics - Developing methods for the analysis of large amounts of data without compromising data protection

Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption

Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption

Black Ice HSM

Black Ice HSM

BRUTUS - Authenticated Ciphers and Resistance against Side-Channel Attacks

BRUTUS - Authenticated Ciphers and Resistance against Side-Channel Attacks

Building and trial operation of the Cyber Threat Intelligence system

Building and trial operation of the Cyber Threat Intelligence system

C3ISP - Collaborative and confidential information sharing and analysis for cyber protection

C3ISP - Collaborative and confidential information sharing and analysis for cyber protection

C4e - CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence

C4e - CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence

CANVAS - Constructing an Alliance for Value-driven Cybersecurity

CANVAS - Constructing an Alliance for Value-driven Cybersecurity

CASUS

CatchMe: Android Malicious Code Localisation

CatchMe: Android Malicious Code Localisation

CERCES - Center for Resilient Critical Infrastructures

CERCES - Center for Resilient Critical Infrastructures

CERTMILS - Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats

CERTMILS - Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats

CHARACTERIZE Characterization of Malicious Code in Mobile Apps

CHARACTERIZE Characterization of Malicious Code in Mobile Apps

CHOREVOLUTION - The Choreography Platform for IoT-Enabled Applications

CHOREVOLUTION - The Choreography Platform for IoT-Enabled Applications

CIDRE

CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework

CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework

CISC - Certification of IoT Secure Compilation

CISC - Certification of IoT Secure Compilation

CITADEL - Critical Infrastructure Protection using Adaptive MILS

CITADEL - Critical Infrastructure Protection using Adaptive MILS

CLARUS - A framework for user centred privacy and security in the cloud

CLARUS - A framework for user centred privacy and security in the cloud

Pages

Project type

Observatory

Report on Cybersecurity and Privacy - Priorities for EU-US Cooperation

AEGIS presented the outcomes of the "Identification of EU-US Priorities on Cybersecurity and Privacy R&I" survey. Give your contribution with a quick feedback!

Share your view to identify EU-US priorities on cybersecurity and privacy R&I

The AEGIS project is working to promote cybersecurity and privacy dialogue and cooperation between the US and the EU.

As part of its activities AEGIS is conducting an online survey to identify R&I priorities for EU-US cooperation in cybersecurity and privacy.

Events

17/01/2019
Reinforcing Cyber Security in the EU: Building Coordinated Security, Confidence and Capability in the Cyber Domain

With 315 million Europeans using the internet each day, the provision of critical services and the functioning of a modern economy are now entirely dependent upon the robustness and safety of cyberspace and its infrastructure. Cyber security attacks are a growing source of threat and concern, while also representing a growing economic opportunity for Europe, with the market predicted to be worth over $100 Billion by 2018 (European Commission). Moreover, cyber attacks in the EU are constantly growing in both their frequency (quintuplicate between 2013 and 2017) and sophistication.