CONCORDIA Service – Cybersecurity Improvements

Cybersecurity Improvements

Published Deliverables

Deliverable No.Deliverable NameTypeDissemination level
D1.11st year report on designing and developing an ESRTE (M12)ReportPublic
D1.22nd Year Report on Designing and Developing an European Secure, Resilient and Trusted Ecosystem (ESRTE)(M24)ReportPublic
D2.11st year report on the development of all pilots (M12)ReportConfidential
D2.22nd year report on prototypes of all pilots (M24)ReportConfidential
D3.11st year report on community building (M12)ReportPublic
D3.22nd year report on Community Building and Sustainability(M24)ReportPublic
D4.11st year report on cybersecurity threats (M12)ReportPublic
D4.22nd year report on cybersecurity threats(M24)ReportPublic
D4.4Preliminary Version of Deliverable D 4.4: Cybersecurity Roadmap for Europe by CONCORDIA(Y3 update)ReportPublic
D4.51st report on Cybersecurity Workforce Diversity (M24)ReportPublic
D4.7 1st year report on liaison with stakeholders(M12)ReportPublic
D4.82nd year report on liaison with stakeholders (M24)ReportPublic
D5.1 Website and Social Media presences (M2)Report + DemonstrationPublic
D5.21st year report on exploitation, dissemination, certification and standardization (M12)ReportPublic
D5.32nd year report on exploitation, dissemination, certication and standardization(M24)ReportPublic
D6.1 Project handbook (M1)ReportConfidential
D6.2 Data management plan (M3)ReportConfidential
D6.3 Innovation strategy plan (M6)ReportConfidential
D6.41st year management report (M12)ReportConfidential
D6.52nd year management report (M24)ReportConfidential
D6.8Open Data Management Plan(M6)ORDP: Open Research Data PilotConfidential
D7.1H – Requirement No. 1
D7.2POPD – Requirement No. 2(M12)EthicsConfidential
D7.3NEC – Requirement No.3(M12)EthicsConfidential
D7.4DU – Requirement No. 4(24)EthicsConfidential
D7.5M – Requirement No. 5 (M24)EthicsConfidential
D7.6GEN – Requirement No. 6(M12)EthicsConfidential

White Papers

Quo Vadis “Data-Centric” Systems Security?Neeraj Suri
Security Threat LandscapeMarco Anisetti, Claudio Ardagna, Marco Cremonini, Ernesto Damiani, Jadran Sessa and Luciana Costa

August 2021

Gaps and Challenges

On this page, we show gaps and challenges prior to and after the emergence of COVID-19 pandemic as identified by the H2020 CONCORDIA project.

August 2021

Gaps and Challenges: Key Takeaways

The following list briefly highlights the most important findings, i.e. key takeaways, that emerged from the H2020 CONCORDIA gap analysis.

May 2020

Security Threat Landscape

Driven by digitalization, information sharing has been experiencing exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped decision-making, everyday communication, life, and work, hence highlighting the importance of maintaining the online economy and ensuring its prosperity.

May 2020

Cybersecurity Top Findings & Key Takeaways

Cybersecurity impacts every ICT domain. In the following we consider the CONCORDIA taxonomy of domains:
  • Device/IoT-Centric Security: Internet of Things (IoT) can be defined as “the networked interconnection of everyday objects, equipped with ubiquitous intelligence”[1]. IoT, edge computing, and smart devices are changing the environment in many ways, including smart transportation, sustainable mobility, smart cities, e-health, smart vehicles, and UAVs, just to name the few. The exponential growth of connected devices (from minuscule sensors to bigger machines), which, according to Intel[2] are expected to reach 200 billion by 2020, is revolutionizing current IT systems. The existence of billions of resource-constrained devices connected to the Internet introduces fundamental risks that can threaten users’ life and personal sphere.