Projects

What is the cyberwatching.eu Observatory?

Over the next 48 months, our Observatory will become THE European hub for Cybersecurity and Privacy. Cyberwatching.eu is monitoring R&I initiatives throughout EU & Associated Countries while supporting European stakeholders in playing an active role in shaping the global cybersecurity & privacy landscape.
Through a combination of clustering activities and Technical and Market Readiness Level Workshops, cyberwatching.eu is monitoring the whole lifecycle from research development and implementation, to validation and market uptake, making it possible for stakeholders to increase their knowledge, raise their awareness and find possible synergies between different initiatives.

Who benefits and how?

The cyberwatching.eu Observatory is the natural ground  to identify initiatives encompassing security and privacy R&I with a high potential for cross-fertilization and synergy. SMEs, investors, R&I projects and policy makers can all beneift:

  • The Observatory enables operators of essentials services and digital service providers to find and procure the best innovative solutions for risk management and incident reporting.
  • The Observatory offers a fresh, new approach to R&I impact, guiding mainly technical experts within public and private organisations actions on CS&P with the staged integration of a marketplace and catalogue of services for commercialising results.
  • The Observatory helps policy makers and regulators to monitor impact of R&I actions for maximum RoI, shape future research directions for the DSM, provide timely roadmaps on CS&P, regulatory compliance and policy actions, as well as ICT standardisation.

Be part of the European Cybersecurity and Privacy Observatory!

Are you an H2020 project, EU or National initiative? Be part of THE EU Cyber Security Observatory now!

Want to appear on this page? Send us your information on your news, events or releases and we'll publish it here.

Contact us at info@cyberwatching.eu

Customized and Adaptive approach for Optimal Cybersecurity Investment

Customized and Adaptive approach for Optimal Cybersecurity Investment

CYBECO - Supporting Cyberinsurance from a Behavioural Choice Perspective

CYBECO - Supporting Cyberinsurance from a Behavioural Choice Perspective

Cyber Security of Robots in Smart Industry

Cyber Security of Robots in Smart Industry

Cyber security within smart industry. The development of a risk model for increasing the cybersecurity of metal companies

Cyber security within smart industry. The development of a risk model for increasing the cybersecurity of metal companies

Cyber-Safe - Increasing the IT security of traffic control centers and protection against cyber attacks

Cyber-Safe - Increasing the IT security of traffic control centers and protection against cyber attacks

CYBER-TRUST - Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

CYBER-TRUST - Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

cyberwatching.eu - The European watch on cybersecurity privacy

cyberwatching.eu - The European watch on cybersecurity privacy

CyberWISER - Wide-Impact cyber SEcurity Risk framework

CyberWISER - Wide-Impact cyber SEcurity Risk framework

CYBERWISER.eu - Civil Cyber Range Platform for a novel approach to cybersecurity threats simulation and professional training

CYBERWISER.eu - Civil Cyber Range Platform for a novel approach to cybersecurity threats simulation and professional training

CYBERWIZ Project

CYBERWIZ Project

CYCLONE - Complete Dynamic Multi-cloud Application Management

CYCLONE - Complete Dynamic Multi-cloud Application Management

CyMonD

CYRAIL - Cybersecurity in the RAILway sector.

CYRAIL - Cybersecurity in the RAILway sector.

CySiVuS - Cyber Security for Transport Infrastructure- and Road Operators

CySiVuS - Cyber Security for Transport Infrastructure- and Road Operators

DADA

DAPM

DAPRECO - DAta Protection REgulation Compliance

DAPRECO - DAta Protection REgulation Compliance

Data assimilation and forecasting for urban crime models

Data assimilation and forecasting for urban crime models

Data Mining without Spilling the Beans - Preserving more than Privacy Alone

Data Mining without Spilling the Beans - Preserving more than Privacy Alone

DataMantium

DataMantium

DECAMP - Open Distributed European Virtual CAMPus

DECAMP - Open Distributed European Virtual CAMPus

DECODE - Giving people ownership of their personal data

DECODE - Giving people ownership of their personal data

DEEP-FIR

DEEP-FIR

Pages

Project type

Observatory

A Road to Success: AARC - Final "All Hands" Meeting

A Road to Success: AARC - Final "All Hands" Meeting

 

AARC, the successful project about Authentication and Authorisation for Research and Collaboration which aims to support research communities of all scientific disciplines with best practices and expertise on Authorization and Authentication Infrastructures.

Project of the Week - AARC

Cyberwatching.eu Project of the Week: AARC - Authentication and Authorisation for Research and Collaboration

A Shared Framework for Identity Management

AARC is a two-year project funded under the European Union’s Horizon 2020 research and innovation programme, standing for “Authentication and Authorisation for Research and Collaboration”. Its main aim is to provide a shared framework for identity management and access for researchers and research infrastructures.

Future Events

ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments
21/02/2019 to 28/02/2019
Image:

From February 24th to the 28th, 2097, the ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments will be host in Athens, Greece.

The event will focus on state-of-the-art public services, e-government services in the context of digital society, Internet and web services, digital intelligence, networking and telecommunications, e-commerce, e-business and other areas.

Global Cyber Security Summit
27/02/2019
Image:

Global Cyber Security Summit

Developing a Robust Cyber Defense Strategy

Please Note: This program is under Chatham House Rule