Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
HORIZON 2020The New EU Framework Programme for Research and Innovation
2014-2020
HORIZON 2020HORIZON 2020Framework Programme for Research and Innovation
HORIZON 2020
SC7:
‘Secure Societies – Protecting Freedom & Security of Europe Freedom & Security of Europe
and its Citizens’
Λίνα Τσούµπανου
Εθνικό Σηµείο Επαφής
«ΑΣΦΑΛΕΙΣ ΚΟΙΝΩΝΙΕΣ», «ΝΟΜΙΚΑ και ΟΙΚΟΝΟΜΙΚΑ ΖΗΤΗΜΑΤΑ»
Ίδρυµα Προώθησης Έρευνας
Priority 1
Excellent Science
(EUR 24,4 billion)
European Research Council
(EUR 13,1 billion)
Priority 2
Industrial Leadership
(EUR 17
Leadership in EIndustrial Technologies:
(EUR 17
- ICT
Future and Emerging Technologies (FET)
(EUR 2,7 billion)
Marie Skłodowska - CurieActions
(EUR 6,1 billion)
Research Infrastructures (Including e-infrastructures)
- ICT
- Nanotechnologies, Advance Materials,
Biotechnology Advanced Manufacturing and
Processing
-Space
Access to Risk Finance
Innovation in SMEs
(EUR 2,9
(Including e-infrastructures)
(EUR 2,5 billion)Access to Risk Finance
(EUR 0,6
Spreading Excellence and Widening Participation
Science with and for Society
Joint Research Centre
(EUR 1,9 billion)
European Institute of
Innovation and Technology
(EUR 2,7 billion)
Priority 2
Industrial Leadership
billion)
in Enabling and Technologies:
billion)
ICT
Priority 3
Societal Challenges
(EUR 29,7 billion)
Health, Demographic Change and Wellbeing (EUR 7,5 billion)
Food Sec., Sustainable Agric., Marine & Maritime & Inland Water &
the Bioeconomy (EUR 3,9 billion)ICT
Nanotechnologies, Advance Materials,
Biotechnology Advanced Manufacturing and
Processing
Space
Access to Risk Finance
Innovation in SMEs
billion)
the Bioeconomy (EUR 3,9 billion)
Secure, Clean and Efficient Energy (EUR 5,9 billion)
Smart, Green and Integrated Transport (EUR 6,3 billion)
Climate Act. Environment, Resource Efficiency & Raw
Materials (EUR 3 billion)
Inclusive, Innovative & Reflective Societies (EUR 1,3 billion)
Access to Risk Finance
billion)Secure Societies
(EUR 1,7 billion)
Widening Participation (EUR 0,8 billion)
and for Society (EUR 0,5 billion)
EURATOM
(EUR 1,6 billion)
Joint Technology Initiatives
(EUR 6,4 billion)
Two year document 2014-2015 published 11 December 2013
However …
Work Programme for Security
However …
– they made an updated version on the 20
– this version will be voted on by the member states on the 3
February and adopted by the commission early March
– therefore it is still provisional…
2015 published 11 December 2013
Work Programme for Security
they made an updated version on the 20th of January 2014
this version will be voted on by the member states on the 3rd of
February and adopted by the commission early March
SC 7 Secure Societies Protecting Freedom & Security of Europe and its Citizens
Overall objectives
Protection of Protection of
Citizens, society and economy
Infrastructure and services
Prosperity
Political stability and wellbeing
The respect of privacy and civilthroughout this Work Programme.
Secure Societies –Protecting Freedom & Security of Europe and its Citizens
SEC
civil liberties is a guiding principle
Overall characteristic
SC 7 Secure Societies
Restricted to civil applications
Restricted to public security
Secure Societies
SC 7 Secure Societies
Areas covered
• Disaster-Resilience (DRS) Managed by DG ENTR
• Fight against Crime and Terrorism (FCT)
• Border Security and External Security (BES)
• Digital Security: Cybersecurity, Privacy and Trust (DS) • Digital Security: Cybersecurity, Privacy and Trust (DS)
Secure Societies
Managed by DG ENTR
Fight against Crime and Terrorism (FCT) Managed by DG ENTR
Border Security and External Security (BES) Managed by DG ENTR
Digital Security: Cybersecurity, Privacy and Trust (DS) Digital Security: Cybersecurity, Privacy and Trust (DS) Managed by DG CNECT
Work Programme 2014/15: Timelines publ
Opening Dates Name of Call
25 March 2014 Disaster-resilience
SC 7 Secure Societies
25 March 2014 25 March 2015
Disaster-resilience
25 March 2014 25 March 2015
Fight against Crime
and Terrorism
25 March 2014 Border Security and 25 March 2014 25 March 2015
Border Security and
External Security
11 December 2013 Digital Security:
Cybersecurity, Privacy
and Trust
blished on 11.12.2013 (last update 20.01.2014)
Call identifier Deadlines for submission
H2020-DRS-2014- 28 August 2014
Secure Societies
H2020-DRS-2014-
2015
28 August 2014
27 August 2015
H2020-FCT-2014-
2015
28 August 2014
27 August 2015
H2020-BES-2014- 28 August 2014 H2020-BES-2014-
2015
28 August 2014
27 August 2015
H2020-DS-2014-2015 28 August 2014
21 April 2015
NEW
SC 7 - Secure Societies
Call 1 - Disaster-resilience: (DRS) safeguarding and securing society, including
adapting to climate change
To enhance the resilience of our society against natural and manTo enhance the resilience of our society against natural and man
disasters, ranging from new crisis management tools to communication
interoperability, and to develop novel solutions infrastructure
23 topics on:
• Crisis management (8 topics)• Crisis management (8 topics)
• Disaster Resilience & Climate Change (3 topics)
• Critical Infrastructure Protection (7 topics)
• Communication technologies and interoperability (2 topics)
• Ethical/Societal Dimension (3 topics)
Secure Societies
resilience: (DRS) safeguarding and securing society, including
adapting to climate change
of our society against natural and man-made of our society against natural and man-made
, ranging from new crisis management tools to communication
novel solutions for the protection of critical
Disaster Resilience & Climate Change (3 topics)
Critical Infrastructure Protection (7 topics)
Communication technologies and interoperability (2 topics)
SC 7 - Secure Societies
CALL 1 DRS - SPECIAL TOPICS for KIOS
III. Critical Infrastructure Protection
• DRS-12-2015: Critical Infrastructure “smart grid” “smart meters” threats
• DRS-13-2015: Demonstration activity on tools for adapting building and
RIA
• DRS-13-2015: Demonstration activity on tools for adapting building and infrastructure standards and design methodologies case of natural or man-originated catastrophes
• DRS-14-2015: Critical Infrastructure resilience indicator development of methods for assessing resilience
• DRS-15-2015 Protecting potentially hazmulti-sectorial dependencies
• DRS-16-2014 Improving the aviation security chain OPEN
IA
• DRS-16-2014 Improving the aviation security chain
IV. Communication technologies and interoperability
• DRS-19-2014: Next generation emergency services
(Next Generation 112 products (simultaneous use of voice, data, video and text communications using 112 over the internet) in a controlled environment)
OPEN
OPEN
Secure Societies
SPECIAL TOPICS for KIOS
“smart grid” protection and resilience under
on tools for adapting building and on tools for adapting building and infrastructure standards and design methodologies in vulnerable locations in
originated catastrophes
resilience indicator - analysis and development of methods for assessing resilience
azardous and sensitive sites/areas considering
2014 Improving the aviation security chain (detection technology)
RIA
RIA
RIA2014 Improving the aviation security chain (detection technology)
IV. Communication technologies and interoperability
2014: Next generation emergency services
(Next Generation 112 products (simultaneous use of voice, data, video and text communications using 112 over the internet) in a controlled environment)
RIA
RIA
SC 7 - Secure Societies
Call 1 - Disaster-resilience (DRS)
TOPICS DEADLINES
DRS - 2, 4 ,5 ,7 ,8 ,9,
16,19, 20, 21 for 2014
Opening date: 25/03/2014
28/08/2014 at
17:00:00
(Brussels time)
DRS - 1, 3, 6, 10, 11, 12,
13, 14, 15, 18, 22 for 2015
27/08/2015 at
17:00:00
(Brussels time)
Opening date: 25/03/2015
(Brussels time)
Secure Societies
TOPICS 2014EUR million
2015EUR million
DRS - 2, 4 ,5 ,7 ,8,
16,19, 20, 21
55.40
DRS-9a-2014 3.00
DRS-9b-2014 15.00
DRS- 1, 3, 6, 12, 13, 14,
15, 18, 22
65.07
DRS-9-2015 15.00
DRS-10-2015 3.00
DRS- 11- 2015 10.00
SC 7 - Secure Societies
Call 2 – Fight against crime and Terrorism (FCT)
To fight crime and terrorism ranging
against explosives
17 topics on:
• Forensics (4 topics)
• Law enforcement capabilities (5 topics)
• Urban security (3 topics)
• Ethical/Societal Dimension (4 topics)
• Fast track to Innovation Topic (1 topic)• Fast track to Innovation Topic (1 topic)
Secure Societies
Fight against crime and Terrorism (FCT)
ranging from new forensic tools to protection
Law enforcement capabilities (5 topics)
Fast track to Innovation Topic (1 topic)Fast track to Innovation Topic (1 topic)
SC 7 - Secure SocietiesCALL 2 FCT - SPECIAL TOPICS for
I. Forensics
• FCT-1-2015: Tools and infrastructure for the fusion, exchange and analysis of big data
including cyber-offenses generated data for forensic investigation
• FCT-4-2015: Internet Forensics to combat organized crime
II. Law enforcement capabilitiesOPEN
II. Law enforcement capabilities
• FCT-5-2014: Develop novel monitoring systLaw Enforcement Agencies' evidence- gathering abilities
(new type of sensors & equipments, monitoring s
• FCT-6-2015: Detection and analysis of terrorist
• FCT-9-2015: Identity Management (reliable e-
III. Urban securityOPEN
OPEN
• FCT-10-2014: Innovative solutions to counturban environment (technologically enhanced platforms that allow citizens both to share
information and experiences in real-time streaming and to receive alerts and messages from
security command and control centres)
• FCT-11-2014: Countering the terrorist use oa plot, including the detection of explosives in a flow to detect and locate an explosive threat inside a flow)
OPEN
RIAOPEN
Secure SocietiesSPECIAL TOPICS for KIOS
2015: Tools and infrastructure for the fusion, exchange and analysis of big data
offenses generated data for forensic investigation
2015: Internet Forensics to combat organized crime
RIA
IA
ystems and miniaturised sensors that improve gathering abilities
g station & their associated communication channel)
2015: Detection and analysis of terrorist-related content on the Internet
-identity ecosystem)
IA
IA
RIA
nter security challenges connected with large (technologically enhanced platforms that allow citizens both to share
time streaming and to receive alerts and messages from
e of an explosive threat, across the timeline of a plot, including the detection of explosives in a flow (combination of technologies required
to detect and locate an explosive threat inside a flow) RIA
SC 7 - Secure Societies
Call 2 – Fight against crime and Terrorism (FCT)
TOPICS DEADLINES
FCT - 5, 7, 8, 10, 11, 12 13,
14 for 2014
Opening date: 25/03/2014
28/08/2014 at 17:00:00
(Brussels time)
FCT- 1, 2, 3, 4, 6, 9, 15, 16,
17 for 2015
Opening date: 25/03/2015
27/08/2015 at 17:00:00
(Brussels time)
Opening date: 25/03/2015
Secure Societies
Fight against crime and Terrorism (FCT)
DEADLINES BUDGET EUR millionEUR million
28/08/2014 at 17:00:00
Brussels time)
56.81
27/08/2015 at 17:00:00
(Brussels time)
44.26
SC 7 - Secure Societies
Call 3 – Border Security and External Security (BES)
To improve border security, ranging f
to supply chain security and to support the
including through conflict prevention and peace building
14 topics on:
• Maritime Border Security (4 topics)
• Border crossing points (3 topics)
• Supply Chain Security (2 topics)
• Information management (2 topics)
• Conflict prevention and peace building (2 topics)
• Ethical Societal Dimension (1 topic)
Secure Societies
Border Security and External Security (BES)
g from improved maritime border protection
to supply chain security and to support the Unions external security policies including through conflict prevention and peace building
Conflict prevention and peace building (2 topics)
SC 7 - Secure Societies
CALL 3 BES - SPECIAL TOPICS for
I. Maritime Border Security
• BES-1-2015: radar systems for the surveillance of coastal and presupport of search and rescue operations
• BES-2-2015: Low cost and “green” technologies for EU coastal border surveillance
• BES-3-2015: Maritime Border Security topic 3: Light optionally piloted vehicles (and sensors) for maritime surveillance
II. Border crossing points
• BES-5-2015: Novel mobility concepts for land border security
• BES-6-2015: Exploring new modalities in biometric
III. Supply Chain Security
• BES-8-2015: Development of enhanced non
IA
• BES-8-2015: Development of enhanced non
• BES-9-2014: Technologies for inspections of large volume freight
(technology which could scan a load with high probability of detection)
IV. External Security
• BES-10-2015: Civilian humanitarian mission personnel tracking
OPEN
Secure Societies
SPECIAL TOPICS for KIOS
2015: radar systems for the surveillance of coastal and pre-frontier areas and in
2015: Low cost and “green” technologies for EU coastal border surveillance
IA
RIA
2015: Maritime Border Security topic 3: Light optionally piloted vehicles (and
2015: Novel mobility concepts for land border security
2015: Exploring new modalities in biometric-based border checks
2015: Development of enhanced non-intrusive scanner (body-scan technology)
RIA
RIA
RIA2015: Development of enhanced non-intrusive scanner (body-scan technology)
2014: Technologies for inspections of large volume freight
(technology which could scan a load with high probability of detection)
2015: Civilian humanitarian mission personnel tracking
RIA
RIA
RIA
SC 7 - Secure Societies
Call 3 –Border Security and External Security (BES)
TOPICS DEADLINES
BES 9, 12, 14 for 2014
Opening date: 25/03/2014
28/08/2014 at 17:00:00
(Brussels time)
BES 1, 2, 3, 4, 5, 6, 7, 8, 10,
11, 13 - for 2015
27/08/2015 at 17:00:00
(Brussels time)
Opening date: 25/03/2015
Secure Societies
Border Security and External Security (BES)
DEADLINES BUDGETEUR million EUR million
28/08/2014 at 17:00:00
Brussels time)
42.7
27/08/2015 at 17:00:00
(Brussels time)
31.59
SC 7 - Secure Societies
Call 4 – Digital Security: Cybersecurity, Privacy and Trust (DS)
Technology to secure the infrastructure (e.g. networks), hardware (e.g.
access devices), services (e.g. cloud computing), components (e.g. RFID),
software (e.g. operating systems, web
or malevolent use. or malevolent use.
6 topics on:
• Privacy - give users control over their data
• Access Control - user friendly, non-password based
• Risk management and assurance modelsframeworks to cyber-threats frameworks to cyber-threats
• The role of ICT in Critical Infrastructure Protectioncritical ICT
• Secure Information Sharing- highly secure information sharing that creates trust
• Trust eServices - business cases for eSignature
Secure Societies
, Privacy and Trust (DS)
Technology to secure the infrastructure (e.g. networks), hardware (e.g.
access devices), services (e.g. cloud computing), components (e.g. RFID),
software (e.g. operating systems, web-browsers), etc… against accidental
give users control over their data
password based
Risk management and assurance models - adapt existing risk management
The role of ICT in Critical Infrastructure Protection - test interdependencies on
highly secure information sharing that creates trust
eSignature, eAuthentication, ...
SC 7 - Secure Societies
CALL 4 DS - SPECIAL TOPICS for KIOS
• DS-1-2014: Privacy
(investigation of measures to safeguard privacy
where services exploiting big data, cloud servic
internet of things, and data handling in the highly sensitive context of criminal investigations)
OPENIA
internet of things, and data handling in the highly sensitive context of criminal investigations)
• DS-2-2014: Access Control
(development and testing of usable, economic and privacy preserving access control platforms
based on the use of biometrics, smart cards, or other devices)
• DS-3-2015: The role of ICT in Critical Infrastructure Protection
(resilient and robust communication networks
critical infrastructures)
• DS-4-2015: Secure Information Sharing
IAOPEN
• DS-4-2015: Secure Information Sharing
(development and implementation of a network for secure sharing of sensitive information)
• DS-5-2015: Trust eServices
(interoperability of trust eServices, contribute to empower and protect users in their digital
experiences like e-contracting, e-bidding, e-inv
services of local or national administrations)
IA
Secure Societies
SPECIAL TOPICS for KIOS
acy in the context of mass data handling, for example
vices, data sharing by interconnected devices in the
internet of things, and data handling in the highly sensitive context of criminal investigations)internet of things, and data handling in the highly sensitive context of criminal investigations)
development and testing of usable, economic and privacy preserving access control platforms
based on the use of biometrics, smart cards, or other devices)
2015: The role of ICT in Critical Infrastructure Protection
s offering a reduced attack surface to the supported
2015: Secure Information Sharing IA
IA
2015: Secure Information Sharing
development and implementation of a network for secure sharing of sensitive information)
(interoperability of trust eServices, contribute to empower and protect users in their digital
nvoicing, accessing social networks, or accessing the
IA
SC 7 - Secure Societies
Call 4 – Digital Security: Cybersecurity, Privacy and Trust (DS)
TOPICS DEADLINES
DS-1,2,6 for 2014
Opening date: 11/10/
2013
28/08/2014 at
17:00:00
(Brussels time)
DS-3,4,5 for 2015
Opening date:
25/03/2015
21/04/2015 at
17:00:00
(Brussels time)
Secure Societies
Digital Security: Cybersecurity, Privacy and Trust (DS)
TOPICS 2014EUR million
2015EUR million
DS- 1-2014 19.04
DS- 2-2014 18.00
DS- 6-2014 10.00
DS- 3-2015 17.50DS- 3-2015 17.50
DS- 4-2015 15.31
DS- 5-2015 17.50
CYPRUS PARTICIPATION IN FP7 SECURITY THEME
Project Acronym Project Title
EU-SEC IICoordinating National Research Programmes
Policies on Security at Major Events in Europe
STAR-TRANSStrategic Risk Assessment and Contingency
Planning in Interconnected Transport Networks
SUPPORT Security UPgrade for PORTs
TWOBIASTwo Stage Rapid Biological Surveillance and Alarm
System for Airborne Pathogenic Threats
CONTAINContainer Security Advanced Information
NetworkingNetworking
THE HOUSE
Enhancing European Coordination for National
Research Programmes in the Area of Security at
Major Events
CIPRNETCritical Infrastructure Preparedness and Resilience
Research Network
PARTICIPATION IN FP7 SECURITY THEME – PROJECTS & PARTICIPANTS
Participant Legal Name Participant Role
Programmes and
Policies on Security at Major Events in EuropeCyprus police Participant
Strategic Risk Assessment and Contingency
Planning in Interconnected Transport Networks
CTL CYPRUS TRANSPORT
LOGISTICS LIMITEDParticipant
eBOS Technologies Ltd Participant
Two Stage Rapid Biological Surveillance and Alarm
System for Airborne Pathogenic ThreatsDycor Global Solutions Ltd Participant
Container Security Advanced Information eBOS Technologies Ltd Participant
Enhancing European Coordination for National
in the Area of Security at Cyprus police Participant
Critical Infrastructure Preparedness and Resilience UNIVERSITY OF CYPRUS Participant
Useful Links 1/2Useful Links 1/2• Participant Portal
• http://ec.europa.eu/research/participants/portal/desktop/en/home.html
• Helpdesk• Helpdesk
• http://ec.europa.eu/research/enquiries
• Expert evaluators needed!
• http://ec.europa.eu/research/participants/portal/desktop/en/experts/index.html
• Learn more about Horizon 2020
• http://ec.europa.eu/horizon2020
National Contact PointsNational Contact Points
• http://www.seren-project.eu
http://ec.europa.eu/research/participants/portal/desktop/en/home.html
http://ec.europa.eu/research/participants/portal/desktop/en/experts/index.html
Useful Links 2/2Useful Links 2/2
• www.research.org.cy• www.research.org.cy
• http://horizon2020cyprus.blogspot.com/
• www.facebook.com/horizon2020cyprus
http://horizon2020cyprus.blogspot.com/
www.facebook.com/horizon2020cyprus
Λίνα Τσούµπανου
Εθνικό Σηµείο ΕπαφήςΕθνικό Σηµείο Επαφής«ΑΣΦΑΛΕΙΣ ΚΟΙΝΩΝΙΕΣ
ΟΙΚΟΝΟΜΙΚΑ ΖΗΤΗΜΑΤΑΤοµέας Ευρωπαϊκών
Προγραµµάτων και ∆ιεθνούςΤηλ: +357-
Email: [email protected]
Τσούµπανου
Επαφής για την ΚΠ7 Επαφής για την ΚΠ7 ΚΟΙΝΩΝΙΕΣ» και για «ΝΟΜΙΚΑ και
ΟΙΚΟΝΟΜΙΚΑ ΖΗΤΗΜΑΤΑ»Ευρωπαϊκών Ερευνητικών
και ∆ιεθνούς Συνεργασίας-22205055