Cybersecurity Improvements
Published Deliverables
Published Deliverables
Deliverable No. | Deliverable Name | Type | Dissemination level |
---|---|---|---|
D1.1 | 1st year report on designing and developing an ESRTE (M12) | Report | Public |
D1.2 | 2nd Year Report on Designing and Developing an European Secure, Resilient and Trusted Ecosystem (ESRTE)(M24) | Report | Public |
D1.3 | 3rd year report on designing and developing an ESRTE (M36) | Report | Public |
D2.1 | 1st year report on the development of all pilots (M12) | Report | Confidential |
D2.2 | 2nd year report on prototypes of all pilots (M24) | Report | Confidential |
D2.3 | 3rd year report on marketable solutions (M36) | Demonstrator | Confidential |
D3.1 | 1st year report on community building (M12) | Report | Public |
D3.2 | 2nd year report on Community Building and Sustainability(M24) | Report | Public |
D3.3 | 3rd year report on community building and sustainability (M36) | Report | Public |
D3.6 | DDoS Clearing House Platform (M48) | Report + Demonstration | Public |
D4.1 | 1st year report on cybersecurity threats (M12) | Report | Public |
D4.2 | 2nd year report on cybersecurity threats(M24) | Report | Public |
D4.3 | 3rd year report on cybersecurity threats(M36) | Report | Public |
D4.4 | Preliminary Version of Deliverable D 4.4: Cybersecurity Roadmap for Europe by CONCORDIA(Y3 update) | Report | Public |
D4.5 | 1st report on Cybersecurity Workforce Diversity (M24) | Report | Public |
D4.7 | 1st year report on liaison with stakeholders(M12) | Report | Public |
D4.8 | 2nd year report on liaison with stakeholders (M24) | Report | Public |
D4.9 | 3rd year report on liaison with stakeholders(M36) | Report | Public |
D5.1 | Website and Social Media presences (M2) | Report + Demonstration | Public |
D5.2 | 1st year report on exploitation, dissemination, certification and standardization (M12) | Report | Public |
D5.3 | 2nd year report on exploitation, dissemination, certication and standardization(M24) | Report | Public |
D5.4 | 3rd year report on exploitation, dissemination, certication and standardization(M36) | Report | Public |
D6.1 | Project handbook (M1) | Report | Confidential |
D6.2 | Data management plan (M3) | Report | Confidential |
D6.3 | Innovation strategy plan (M6) | Report | Confidential |
D6.4 | 1st year management report (M12) | Report | Confidential |
D6.5 | 2nd year management report (M24) | Report | Confidential |
D6.6 | 3rd year management report (M36) | Report | Confidential |
D6.8 | Open Data Management Plan(M6) | ORDP: Open Research Data Pilot | Confidential |
D7.1 | H – Requirement No. 1 (M6) | Ethics | Confidential |
D7.2 | POPD – Requirement No. 2(M12) | Ethics | Confidential |
D7.3 | NEC – Requirement No.3(M12) | Ethics | Confidential |
D7.4 | DU – Requirement No. 4(24) | Ethics | Confidential |
D7.5 | M – Requirement No. 5 (M24) | Ethics | Confidential |
D7.6 | GEN – Requirement No. 6(M12) | Ethics | Confidential |
White Papers
White Papers
Title | Authors |
---|---|
Quo Vadis “Data-Centric” Systems Security? | Neeraj Suri |
Security Threat Landscape | Marco Anisetti, Claudio Ardagna, Marco Cremonini, Ernesto Damiani, Jadran Sessa and Luciana Costa |
Reports
March 2023 Report on Cybersecurity Certification, the schemes under development and the related challengesThis document describes the results of discussions carried out within the Certification Group of the CONCORDIA project. The purpose of the document is to provide an introduction to basic cybersecurity certification terms and standards, to present the certification schemes currently in process and to enumerate some of the related challenges. |
March 2023 Report on SME Cybersecurity StandardsThis document describes the methodology and results on cybersecurity standards for SMEs. The document concludes with recommendations and directions for development of future cybersecurity standards and frameworks targeting SMEs. |
August 2022 Countermeasures and Research ActionsWe provide an overview of existing countermeasures and research actions that focus on one or more threats and address gaps and challenges in Appendix A.1 of document D4.3. More information about countermeasures and research actions related to each specific domain can be found in the provided links below. |
August 2021 Gaps and ChallengesOn this page, we show gaps and challenges prior to and after the emergence of COVID-19 pandemic as identified by the H2020 CONCORDIA project. |
August 2021 Gaps and Challenges: Key TakeawaysThe following list briefly highlights the most important findings, i.e. key takeaways, that emerged from the H2020 CONCORDIA gap analysis. |
May 2020 Security Threat LandscapeDriven by digitalization, information sharing has been experiencing exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped decision-making, everyday communication, life, and work, hence highlighting the importance of maintaining the online economy and ensuring its prosperity. |
May 2020 Cybersecurity Top Findings & Key TakeawaysCybersecurity impacts every ICT domain. In the following we consider the CONCORDIA taxonomy of domains:
|
Infographics