Cybersecurity Improvements
Published Deliverables
Published Deliverables
Deliverable No. | Deliverable Name | Type | Dissemination level |
---|---|---|---|
D1.1 | 1st year report on designing and developing an ESRTE (M12) | Report | Public |
D1.2 | 2nd Year Report on Designing and Developing an European Secure, Resilient and Trusted Ecosystem (ESRTE)(M24) | Report | Public |
D2.1 | 1st year report on the development of all pilots (M12) | Report | Confidential |
D2.2 | 2nd year report on prototypes of all pilots (M24) | Report | Confidential |
D3.1 | 1st year report on community building (M12) | Report | Public |
D3.2 | 2nd year report on Community Building and Sustainability(M24) | Report | Public |
D4.1 | 1st year report on cybersecurity threats (M12) | Report | Public |
D4.2 | 2nd year report on cybersecurity threats(M24) | Report | Public |
D4.4 | Preliminary Version of Deliverable D 4.4: Cybersecurity Roadmap for Europe by CONCORDIA(Y3 update) | Report | Public |
D4.5 | 1st report on Cybersecurity Workforce Diversity (M24) | Report | Public |
D4.7 | 1st year report on liaison with stakeholders(M12) | Report | Public |
D4.8 | 2nd year report on liaison with stakeholders (M24) | Report | Public |
D5.1 | Website and Social Media presences (M2) | Report + Demonstration | Public |
D5.2 | 1st year report on exploitation, dissemination, certification and standardization (M12) | Report | Public |
D5.3 | 2nd year report on exploitation, dissemination, certication and standardization(M24) | Report | Public |
D6.1 | Project handbook (M1) | Report | Confidential |
D6.2 | Data management plan (M3) | Report | Confidential |
D6.3 | Innovation strategy plan (M6) | Report | Confidential |
D6.4 | 1st year management report (M12) | Report | Confidential |
D6.5 | 2nd year management report (M24) | Report | Confidential |
D6.8 | Open Data Management Plan(M6) | ORDP: Open Research Data Pilot | Confidential |
D7.1 | H – Requirement No. 1 (M6) | Ethics | Confidential |
D7.2 | POPD – Requirement No. 2(M12) | Ethics | Confidential |
D7.3 | NEC – Requirement No.3(M12) | Ethics | Confidential |
D7.4 | DU – Requirement No. 4(24) | Ethics | Confidential |
D7.5 | M – Requirement No. 5 (M24) | Ethics | Confidential |
D7.6 | GEN – Requirement No. 6(M12) | Ethics | Confidential |
White Papers
White Papers
Title | Authors |
---|---|
Quo Vadis “Data-Centric” Systems Security? | Neeraj Suri |
Security Threat Landscape | Marco Anisetti, Claudio Ardagna, Marco Cremonini, Ernesto Damiani, Jadran Sessa and Luciana Costa |
Reports
August 2021 Gaps and ChallengesOn this page, we show gaps and challenges prior to and after the emergence of COVID-19 pandemic as identified by the H2020 CONCORDIA project. |
August 2021 Gaps and Challenges: Key TakeawaysThe following list briefly highlights the most important findings, i.e. key takeaways, that emerged from the H2020 CONCORDIA gap analysis. |
May 2020 Security Threat LandscapeDriven by digitalization, information sharing has been experiencing exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped decision-making, everyday communication, life, and work, hence highlighting the importance of maintaining the online economy and ensuring its prosperity. |
May 2020 Cybersecurity Top Findings & Key TakeawaysCybersecurity impacts every ICT domain. In the following we consider the CONCORDIA taxonomy of domains:
|
Infographics