Presentación convocatoria 2016 Sociedades Seguras

Anuncio
EL PROGRAMA SOCIEDADES SEGURAS
EN H2020
CONVOCATORIA 2016
Infoday UC3M. Leganés, 12 de mayo de 2016
Maite Boyero
Representante española y NCP en Sociedades Seguras
[email protected]
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación de
propuestas
5. Información de interés
2
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación de
propuestas
5. Información de interés
3
Algo de historia sobre el Programa
European Security
Strategy
(2003)
European Security Research
within FP 7
(2007 and beyond)
ESRAB (2005-2006)
PASR (2004-2006)
2004
2005
2006
“European Security Research:
The Next Steps” (Sept 2004)
GoP report
“Research for a secure Europe”
(March 2004)
“Towards an EU
Defence Equipment Policy”
(March 2003)
4
2007
ESRAB report
“Meeting the challenge:
the European Security
Research Agenda”
(October 2006)
time
Investigación en Seguridad en VIIPM
La Visión
Desarrollar tecnologías y producir
conocimiento que reduzca los gaps de
capacidades
Superar la fragmentación de los
mercados
Estimular la colaboración entre
proveedores de tecnología y usuarios
5
I+D en Seguridad en VII PM
FP 7
Security Research
Security Missions
Mission
Areas
1. Security of the
Citizens
Organised
Crime
Counter
Terrorism
2. Security of
infrastructures and
utilities
Buildings/
Design
Energy/
Transport/
Communication
Grids
3. Intelligent
surveillance and
border security
Land Border/
Checkpoints
4. Restoring
security and safety
in case of crisis
5. Security systems
integration,
interconnectivity and
interoperability
6. Security and
society
7. Security
Research
coordination and
structuring
preparedness
and planning
Information
management
citizens and
security
ERA-NET
Ethics and justice
SME’s
Foresight
Studies
Interoperable
Secure
communication
Response
Sea
Border
Explosives
Pre-normative
research
Recovery
Surveillance
Specific
Areas
Cross-cutting
Missions
CBRN
Air
Border
Understanding
organisational
structure and
cultures of public
users
CBRN
Supply chains
Security
Economics
6
NCP &
Otehrs
• 1.350 M€ en 7
años
• Más de 350
proyectos
financiados
• Progresiva
integración de
usuarios
finales en los
proyectos
EU Framework Programme for
Research and Innovation
2014-2020
Essential part of Europe 2020
Strategy
Focus on social challenges which are
being faced by the European society,
e.g. the Secure Societies
~ 80.000 M€
Simplification
Partnerships:
Public-Private, Public-Public
International cooperation
7
Seguridad en H2020: SOCIEDADES SEGURAS
Programa Marco de Investigación e Innovación (2014-2020)
Excellent
Science
European Research
Council (ERC)
Future and Emerging
Technologies (FET)
Marie Skłodowska-Curie
actions on skills, training
and career development
European research
infrastructures
Industrial
Leadership
Societal
Challenges
ICT
Health, demographic change and wellbeing
Nanotechnology
Biotechnology
Food security, sustainable agriculture and
forestry, marine and maritime and inland
water research and the bioeconomy;
Advanced Materials
Secure, clean and efficient energy;
Advanced Manufacturing
& Processing
Smart, green and integrated transport;
Space
Climate action, environment, resource
efficiency and raw materials
Access to Risk Finance
Innovation in SMEs
Europe in a changing world-Inclusive,
innovative and reflexive societies
Secure Societies: Protecting freedom and
security of Europe and its citizens
1.613 M€
8
Secure Societies
REGULATION (EU) 1291/2013
establishing Horizon 2020
The specific objective is to foster secure European societies in a context of unprecedented transformations and growing
global interdependencies and threats, while strengthening the European culture of freedom and justice.
• Europe has never been so peacefully consolidated, and the levels of security enjoyed by European citizens are high compared to other parts of the world. However,
Europe's vulnerability continues to exist in a context of ever-increasing globalisation in which societies are facing security threats and
challenges that are growing in scale and sophistication.
• The threat of large-scale military aggressions has decreased and security concerns are focused on new multifaceted, interrelated and transnational threats. Aspects such as
human rights, environmental degradation, political stability and democracy, social issues, cultural and religious identity or
migration need to be taken into
the internal and external aspects of security are inextricably linked. In order to protect freedom and
security, the Union requires effective responses using a comprehensive and innovative suite of security instruments. Research and innovation can
play a clear supporting role although it cannot alone guarantee security. Research and innovation activities should aim at understanding, detecting,
account. In this context
preventing, deterring, preparing and protecting against security threats. Furthermore, security presents fundamental challenges that cannot be resolved by independent
and sector-specific treatment but rather need more ambitious, coordinated and holistic approaches.
• Many forms of insecurity, whether from crime, violence, terrorism, natural or man-made disasters, cyber-attacks or privacy abuses, and other forms of social and economic
disorders increasingly affect citizens. According to estimates, there are likely to be up to 75 million direct victims of crime every year in Europe ( 1 ). The direct cost of crime,
Terrorism has
shown its fatal consequences in several parts of Europe and worldwide costing many lives and important economic losses. It also has a significant
cultural and global impact.
terrorism, illegal activities, violence and disasters in Europe has been estimated at least EUR 650 billion (about 5 % of the Union GDP) in 2010.
• Citizens, firms and institutions are increasingly involved in digital interactions and transactions in social, financial and commercial areas of life, but the development of
cyber crime
Internet has also led to
worth billions of Euros each year, to cyber-attacks on critical infrastructures and to breaches of privacy affecting individuals
or entities across the continent. Changes in the nature and perception of insecurity in everyday life are likely to affect citizens' trust not only in institutions but also in each
it is necessary to understand the causes
other. In order to anticipate, prevent and manage these threats,
, develop and apply
innovative technologies, solutions, foresight tools and knowledge, stimulate cooperation between providers and users, find civil security solutions, improve the
competitiveness of the European security industry and services, including ICT, and prevent and combat the abuse of privacy and breaches of human rights in the Internet
and elsewhere, while ensuring European citizens' individual rights and freedom.
To enhance better cross-border collaboration between different kinds of emergency services, attention should be given to interoperability and standardisation. Finally, as
9
security policies should
, enhancing the societal dimension of security research will be an
interact with different social policies
Seguridad: un reto industrial
La industria de la seguridad es uno de los sectores con
mayor potencial para el crecimiento y el empleo en la UE. En
2011, el sector empleaba a 180.000 personas, con una
facturación anual de aproximadamente € 30 mil millones.
El programa de Seguridad ayudará a:
– Superar la fragmentación del mercado a través de las normas en toda la UE
– Reducir la brecha entre la investigación y la llegada al mercado de soluciones
mediante la introducción de nuevos sistemas de financiación, tales como la
contratación pre-comercial (PCP)
– Mejorar la integración de los aspectos sociales mediante la evaluación del
impacto de las tecnologías de seguridad en materia de derechos
fundamentales
10
Implicación de distintos stakeholders
La seguridad es un tema que sólo se puede abordar
con eficacia si todas las partes interesadas
cooperan. Representantes de los sectores público y
privado deben trabajar en cooperación.
Así, los programas de trabajo están dirigidos a:
– Empresas privadas
– Asociaciones industriales, centros tecnológicos, grupos de
investigación
– Actores institucionales
11
Políticas de la UE relacionadas con la temática I
The European Agenda on Security
COM(2015) 185 final (28 April 2015)
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/index_en.htm
The European Agenda on Migration
COM(2015) 240 final (13 May 2015)
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/background-information/index_en.htm
Securing EU borders
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/securing-eu-borders/index_en.htm
A number of proposed legislative initiatives including the proposal for a European Border and Coast Guard (15
December 2015)
Cybersecurity Strategy of the European Union: An Open, Safe and Secure
Cyberspace COM (2013) 1
Promoting a single market for cybersecurity products
http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf
12
Políticas de la UE relacionadas con la temática II
 2008 EU Action Plan on Enhancing the Security of
Explosives
 Regulation (EU) No 98/2013 on the marketing and use
of explosives precursors
 Towards a stronger European disaster response: the
role of civil protection and humanitarian assistance,
COM(2010)600
 EU Action Plan on combating terrorism
 The Security Industry Policy Action Plan
COM (2012)417 final
13
Políticas de la UE relacionadas con la temática III
 EU Strategy and Action Plan for customs risk management (COM
(2014) 527 final)
 The EU Strategy towards the eradication of Trafficking in Human
Beings 2012–2016, COM(2012) 286
 European Programme for Critical Infrastructure Protection
(EPCIP), COM(2006)786
 Civilian Headline Goal 2008 (15863/04)
 EU Maritime Security Strategy (11205/14) and its action plan
(17002/14)
 EU Civil Protection Mechanism (Decision 1313/2013/EU)
14
Objetivos y áreas que cubre el programa
Lucha contra la delincuencia,
el crimen y el terrorismo
Seguridad cibernética
Protección y resiliencia de
infraestructuras críticas,
modos de transporte y
cadenas de suministro
Recuperación de Europa
frente a crisis y desastres
Mejorar la seguridad y la
gestión de las fronteras
Aspectos sociales, éticos, de
privacidad y libertad de los
ciudadanos
Seguridad en el exterior, en
misiones civiles
15
Estandarización e
interoperabilidad de sistemas
Particularidades del programa
 2 DGs aportan financiación: DG HOME y DG CONNECT
 Orientación a USUARIO FINAL (Practitioners)
 Proyectos cercanos a mercado (TRL 4 a 7)
 Aplicación civil, exclusivamente
 Algunos proyectos resultarán clasificados
 Estandarización y certificación de soluciones y
demostración de resultados
 Aspectos éticos de los proyectos
16
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación de
propuestas
5. Información de interés
17
Seguridad en el VII Programa Marco
FP7-SEC: Resultados de las 6 convocatorias + Convocatoria SEC/ICT
Financiación
actividades
Financiadas España (% del total)
Retorno económico
(España)
Millones de €
118,19 M€
Retorno (% UE)
9,55 %
Retorno (% del total)
8,7 %
•
•
•
•
166 (52,4%)
Coordinadas España (% del total) 30 (9,5%)
1.350M€ invertidos en 7 años de programa (2007-2013)
España se consolidó como 5º país
Buena participación tanto en proyectos grandes como pequeños
Excelente participación de la industria (+45% ppto). Los usuarios
finales se implicaron muy activamente en las últimas
convocatorias.
18
Sociedades Seguras, H2020
Programa de trabajo 2014-2015
400 M€
Gestión de crisis y
desastres, incl.
Cambio climático
NEW
Lucha contra el
crimen y el
terrorismo
Seguridad fronteriza
y seguridad en el
exterior
NEW
Seguridad digital /
Ciberseguridad
19
Particularidades PT 2014-2015
• Presupuesto/ranking lists por convocatoria, no por
topic (excepto topics DS)
• Topics “huérfanos”, sin propuestas financiadas,
mientras otros han tenido varias propuestas
• Topics muy genéricos, podían llevar a
“interpretación”
• Alta competencia (tasas de sobre-suscripción entre
10 y 12 veces)
• No habido condiciones de elegibilidad
20
Resultados de España en convocatoria 2014*
Resultados provisionales de las 4 convocatorias (DRS, FCT, BES y DS)
Financiación actividades
Retorno económico
(España)
Financiadas España (% del total)
24 (58,5%)
Coordinadas España (% del total)
4 (9,8%)
Millones de €
12,67 M€
Retorno (% UE)
7,6 %
Retorno (% del total)
6,9 %
WP 2014: 25 topics, ~ 200M€. 49 proyectos financiados
Global oversubscription rate: 9,86
* Información no definitiva
21
Convocatoria 2014: resultados por países
16,00%
PRESUPUESTO SOLICITADO
14,00%
12,00%
10,00%
8,00%
6,00%
4,00%
2,00%
0,00%
18,00%
16,00%
14,00%
12,00%
10,00%
8,00%
6,00%
4,00%
2,00%
0,00%
España queda en el 6º puesto, tras:
UK (15,9%), DE (11%), IT(9,5%),
RETORNOS
OBTENIDOS
GR(8,9%)
y FR(7,6%)
22
Resultados provisionales convocatoria
2015
23
Desglose del presupuesto
Budget 2015: 224.27 M€ *
FCT; 42,16
DRS HOME,
61.73
DRS, 89.73
DS; 50,21
BES; 42,17
* Including SME challenge (7.4 M€) but not FTI (3.92 M€)
24
DRS RTD
(Climate
Action), 28
H2020-Secure Societies-2015
Propuestas por “ranking list”
*DRS: all except topics DRS-09, 10 & 11
**DS-07: including 1 ineligible proposal with 62MEUR funding
25
Cobertura por topic
Proposals were submitted under all topics
Topic nr 1
3
4
5
7
8
BES
7 18 1
5
9 14 5
9
DRS
37
DS
FCT
2
10
6
4
28 38 24
15 9 31 12
9 10 11 12 13 14 15 16 17 18 19 20 21 22
11 3
10
14 6 44 16 21 28 8
12
15
9
26
25 22
1
8
Resultados de la evaluación
Global Success Rate: 8.0%
Rejected
In the call 2014 it was 9.2%
Reserve
Main
250
BES
DRS
DS
FCT
Total
Rejected
81
179
88
125
473
Reserve
1
4
4
1
10
Main
10
14
10
9
43
200
150
100
50
0
BES
27
DRS
DS
FCT
Resultados convocatoria 2015*
• España queda como 1er país, en términos de
retorno, en esta convocatoria (14,6% retorno total,
15,45% UE)
• 4 topics desiertos (provisional)
• Alta participación de PYMES (a nivel global) y de
usuarios finales – especialmente EXTRAORDINARIA
participación del MINISTERIO DEL INTERIOR (1er
participante a nivel global)
• España, en principio, va a coordinar 8 proyectos (el
doble que en 2014)
* Datos provisionales
28
Conclusiones
• Valor de los usuarios finales en los consorcios
• Las propuestas deben trabajarse con MUCHA
antelación
• Ha aumentado significativamente la calidad de las
propuestas
• Recomendamos contactar con los NCPs y la
delegación durante la preparación de la propuesta
29
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación de
propuestas
5. Información de interés
30
Programa de trabajo 2016-2017
•
•
•
•
Soluciones pan-Europeas para problemas panEuropeos
Contribuir a las implementación de las últimas
políticas Europeas de Seguridad
Fomentar la “Europeanización” de los usuarios
finales (practitionners) que demandan soluciones
innovadoras a la industria Europea
Combinar las amenazas físicas y ciber-amenazas de
seguridad
Aumenta el número de PCPs
http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h2020-wp1617-security_en.pdf
31
Novedades que cabe destacar
• Nuevas condiciones de elegibilidad -> “Europeanización” de
los usuarios finales (deberán ser integrados directamente
en la propuesta como SOCIOS!!)
• Presupuesto por topic (no por convocatoria)
• Importancia de los PCPs (se financian al 90%)
• Lanzamiento de una cPPP en Ciberseguridad en la segunda
mitad de 2016, que se integrará en el programa a partir de
2016
32
Condiciones de elegibilidad (ejemplo)
SEC-12-FCT-2016: Technologies for prevention, investigation and
mitigation in the context of fight against crime and terrorism
a) In Sub-topic: 1, Sub-topic: 2 or Sub-topic: 3: a minimum of 3 Law enforcement
agencies (LEA) from 3 EU Member States or Associated Countries must be
beneficiaries of the grant agreement and should be directly involved in the
carrying out of the tasks foreseen in the grant.
b) In other fields (Sub-topic: “Others”): a minimum of 5 LEA from 5 EU Member
States or Associated Countries must be beneficiaries of the grant agreement and
should be directly involved in the carrying out of the tasks foreseen in the grant.
c) Proposals on detection technologies are excluded from this topic.
d) Any proposal must include a workpackage for field demonstrations.
Only the sub-topics not covered in 2016 will remain eligible in 2017. A list of topics
that remain eligible in 2017 will be published in due time in the section "Topic
Conditions & Documents" for this topic on the Participant Portal.
33
Presupuesto por topic
Cómo se aplica? Objetivos?
 Reducción de los “topics huérfanos”
 Menor duplicidad en proyectos
 Mejorar el apoyo a la implementación de políticas
 Evitar la competencia entre distintos tipo de proyecto (CSA vs
RIA/IA)
 Reducción del sesgo en determinadas áreas científicas
Cuándo se aplica?
 En casi todos los topics, aunque hay algunas pequeñas
excepciones en las que varios topics comparten presupuesto
34
Estructura del PT 2016-2017
3 convocatorias paralelas/ separadas:
 Critical Infrastructure Protection
• Combinación de amenazas ciber y físicas, enfocándose en distintos
sectores críticos
 Security
•
•
•
•
Disaster resilient societies
Fight against crime and terrorism
Border and External security
General Matters
~ 380 M€
 Digital Security Focus Area
•
ICT, Secure societies and eHealth
2016: Abre: 15 Mar 2016, Cierra: 25 Ago 2016
2017: Abre: 01 Mar 2017, Cierra: 24 Ago 2017
35
WP 2016-2017 – Desglose del Presupuesto

Budget: €382,36 million

3 Calls & 30 topics:
2016=M€185; 2017=M€197
•
CRITICAL INFRASTRUCTURE PROTECTION – CIP (1 topic)(2016=M€20;
2017=M€20)
•
SECURITY – SEC (2016=M€113; 2017=M€121):
o Disaster-resilience: safeguarding and securing society – DRS (5 topics)
o Fight against Crime and Terrorism – FCT (7 topics)
o Border Security and External Security – BES (8 topics)
o General Matters – GM (1 topic)
•
Digital Security Focus Area – DS (5 topics) (2016=M€29; 2017=M€36)

SME Instrument (2016=M€15; 2017=M€14)

Fast track to Innovation – Pilot (2016=M€4)

Other Actions (2016=M€15; 2017=M€14)
http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h20
20-wp1617-security_en.pdf
36
Calendario
Publication
Opening
14/10/15
15/03/16
Deadline 25/08/16
Remote Evaluation
(IER)
12/09/16 – 30/09/16
CMs
Remote
Panel Meeting
Evaluation in Bxl
Ethics Screening
Ethics Screening
(ESR)
(CR)
7-11/11/2016
17/10-03/11
October 2016
03–21/10/16
Information to
Programme
Committee and to
applicants
Grant Preparation
+
Programme
Committee
consultation
Start of projects
from
May 2017
Security Scrutiny
Nov-Dec 2016
+ Review Jan 2017
37
Feb-April 2017
WP 2016-2017
Call - CIP
Topics
 CIP-01-2016-2017: Prevention, detection, response and
mitigation of the combination of physical and cyber threats to
the critical infrastructure of Europe.
ToA
Funding
(M)
Ind.Budget
(M)
TRL
IA
20.0
8.0
7
Eligibility and admissibility cond.:
 At least 2 operators of the chosen type
of critical infrastructure operating in 2
countries must be beneficiaries
(possibly, but not necessarily:
coordinator) of the GA and should be
directly involved in the carrying out of
the tasks foreseen in the grant.
 The participation of industry able to
provide security solutions is required.
HORIZON 2020
38
Scope
 Critical Infrastructures:
• Water Systems
• Energy Infrastructure (power plants and distribution)
• Transport Infrastructure and means of transportation
• Communication Infrastructure
• Health Services
• Financial Services.
 Should cover: prevention, detection, response, and (in case of failure)
mitigation of consequences over life span CI, achieving security &
resilience of all functions performed by the installations, and of
neighbouring populations and the environment.
 The participation of SMEs is strongly encouraged.
 international cooperation
 Max.1 project will be selected per CI
 Installations not covered in 16 will remain eligible in 17
38
Topics
WP 2016-2017
Call - SECURITY
(1)
Disaster-resilience: safeguarding and securing society
•Objective:
•To reduce the loss of human life, environmental, economic and material
damage from natural and man-made disasters, including from extreme
weather events, crime and terrorism threats.
 SEC-01-DRS-2016: Integrated tools for response planning and scenario building
 SEC-02-DRS-2016: Situational awareness systems to support civil protection
preparation and operational decision making
 SEC-03-DRS-2016: Validation of biological toxins measurements after an
incident: Development of tools and procedures for quality control
SEC-04-DRS-2017: Broadband communication systems (DG HOME)
 SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN)
cluster (DG HOME)
39
Topics
WP 2016-2017
SEC-01-DRS-2016: Integrated tools for response planning and scenario building
 Disaster risks (natural/accidental/intentional) addressed in the context of:







EU Civil Protection Mechanism (Decision 1313/2013);
the IPCC recommendations to extreme climatic events;
the Sendai Framework
IA / 8 MEUR / Ind. Budget: 8 MEUR / TRL 7 or 8
Participation SMEs is strongly encouraged
International cooperation
At least 1 from each of the 5 categories of FR (firefighting units; medical emergency services;
police departments; civil protection units; control command centres).
SEC-02-DRS-2016: Situational awareness systems to support civil protection preparation
and operational decision making
 Identify new and promising solutions, develop and agree on the core set of specifications of a
specific system, on the roadmap for research still needed, and related tender documents to
base future procurements.
 The EU may contribute to subsequent actions (PCP, PPI, others)
 CSA / 1,5 MEUR / Ind. Budget: 1,5 MEUR
 Max 1 proposal funded
 International cooperation
40
Topics
WP 2016-2017
SEC-03-DRS-2016: Validation of biological toxins measurements after an incident:
Development of tools and procedures for quality control
 Develop quality control tools, as well as the Standard Operating Procedures necessary for
establishing a mechanism to systematically validate laboratory-based measurement techniques,
including sample preparation strategies and analyses made in-situ issued by mobile and quickly
deployable laboratories, which should be proposed for adoption at EU level.
 IA / 8 MEUR / Ind. Budget: 8 MEUR
 At least 3 control laboratories from different MS/AC
SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN) cluster
(DG HOME)
 Part a) Issue list of technologies to be developed to integrating them into the platforms
(building inventory EDEN project). The CSA will deliver the first version of the catalogue on time
for use in the implementation of Part b) - RIA
 CSA / 2 MEUR / Ind. Budget: 2 MEUR
 Additional exploitation obligation
41
Topics
WP 2016-2017
Call - SECURITY
(2)
Fight against crime and Terrorism
•Objective:
•To mitigate potential consequences of incidents, or to avoid them by using new
technologies and capabilities for fighting and preventing crime (including cybercrime), illegal trafficking and terrorism (including cyber-terrorism), including
understanding and tackling terrorist ideas and beliefs, whilst respecting human
rights and privacy.
 SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early
understanding to improving protection
 SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of criminal and
terrorist acts
 SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA
 SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, across the timeline of
a plot
 SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the context of fight
against crime and terrorism
 SEC-09-FCT-2017: Toolkits integrating tools and techniques for forensic laboratories (DG HOME)
 SEC-10-FCT-2017: Integration of detection capabilities and data fusion with utility providers’ networks
42
Topics
WP 2016-2017
 RIA / 17 MEUR / Ind. budget: 3 MEUR
 International cooperation
 "Practitioners (including LEA) from at least 5 MS/AC"
SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from
early understanding to improving protection
 Focus on developing policy recommendations and practical solutions to be implemented by
security end-users vs SC 6 focuses on studying the phenomenon of radicalization to provide
input to policy-making.
SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of
criminal and terrorist acts
 5 Sub-topics: New methods for protection of crowds; prevent, investigate and mitigate
cybercriminal behaviours; pim corruption and financial crime; pim petty crimes; pim domestic
violence.
 Only sub-topics not covered in 2016 will be eligible in 2017
 Max 1 proposal funded per sub-topic
 Must include a WP for practical demonstrations.
43
Topics
WP 2016-2017
 RIA / 27,25 MEUR / Ind. Budget: 5 MEUR
SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA
 TRL 5 / International cooperation
 Forensic laboratories/institutes from minimum 5 MS (additional AC is encouraged)
 Max 1 proposal funded for part a) and part b)
SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, across
the timeline of a plot
 Coordination with EDA activities
 Practitioners in the field of counter-terrorist activities from at least 3 MS/AC
SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the context
of fight against crime and terrorism
 TRL 6
 Only sub-topics not covered in 2016 will be eligible in 2017
 Max 1 proposal funded per sub-topic
 Sub-topics 1-2-3 at least 3 LEA MS/AC (S-t others: at least 5)
 Detection technologies are excluded
 Must include a WP for field demonstrations
44
Topics
WP 2016-2017
Call - SECURITY
(3)
Border Security and External Security
•Objective:
•Improve border security, respecting human rights and privacy. Including control
and surveillance issues, contributing to the European Border Surveillance System
(EUROSUR) and promoting use of new technology for border checks, in relation to
the Smart Borders legislative initiative.
•Support the Union's external security policies in civilian tasks.
SEC-13–BES–2017: Next generation of information systems to support EU external policies
 SEC-14-BES–2016: Towards reducing the cost of technologies in land border security applications
SEC-15-BES–2017: Risk-based screening at border crossing
SEC-16-BES–2017: Through-foliage detection, including in the outermost regions of the EU
SEC-17-BES-2017: Architectures and organizations, big data and data analytics for customs risk management of
the international goods supply chain trade movements
SEC-18-BES–2017: Acceptance of "no gate crossing point solutions"
 SEC-19-BES-2016: Data fusion for maritime security applications
 SEC-20-BES-2016: Border Security: autonomous systems and control systems
45
Topics
WP 2016-2017
SEC-14-BES–2016: Towards reducing the cost of technologies in land
border security applications








RIA
10 MEUR
Ind. Budget: 5 MEUR
Overlap with EWISA project should be avoided
Coordination with EDA activities
Enhanced SME participation
TRL 6
At least 3 border guard authorities from 3 different EU/Schengen MS
46
Topics
WP 2016-2017
 IA / 24 MEUR / Ind. Budget: 8 MEUR
 International cooperation
SEC-19-BES-2016: Data fusion for maritime security applications




Coordination with EDA activities
TRL 7
At least 3 border guard authorities from 3 MS/AC
At least 3 independent industry organizations from 3 different MS/AC.
SEC-20-BES-2016: Border Security: autonomous systems and control systems
 Cover 1 sub-topic:
1. Autonomous surveillance
2. Enhanced command and control systems for the surveillance of borders in a 3D
environment Autonomous surveillance
 SMEs is strongly encouraged
 TRL 6 or 7
 Practitioners from various disciplines, including Border guard authorities from at least 5
EU/Schengen MS
47
Topics
WP 2016-2017
General Matters
SEC-21–GM-2016-2017: Pan European Networks of practitioners and other
actors in the field of security (DG HOME)
 Practitioners: e.g. firefighters, police and intelligence communities, border guards, custom
authorities, explosive specialists, forensic laboratories, medical emergency teams, etc.
 4 different categories of networks
a. Same discipline and from across Europe
b. From different disciplines
c. From around Europe that manage demonstration and testing sites, training facilities,
including simulators or serious gaming platforms in the area of CBRN and for first
responders or civil protection practitioners
d. Consortium of formally nominated NCPs in the area of security research (2017)
 CSA
 15,5 MEUR (2016)
 Indicative budget: 3,5 MEUR (a, b & c) / duration 5 years
 Additional Eligibility/Admissibility condition (several including):
- For part a) & c): Practitioner participation from at least 8 MS/AC
- For part b): Practitioner participation from at least 2 MS/AC from outside the region.
48
Topics
WP 2016-2017
Call – DIGITAL SECURITY FOCUS AREA
DS-01-2016: Assurance and Certification for Trustworthy and Secure ICT systems,
services and components (LEIT–ICT)
 DS-02-2016: Cyber Security for SMEs, local public administration and Individuals /
IA-22 MEUR
DS-03-2016: Increasing digital security of health related data on a systemic level (SC1
"Health, demographic change and wellbeing")
 DS-04-2016: Economics of Cybersecurity / RIA-4 MEUR
 DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and
Privacy Research and Innovation (DG CNECT) / CSA-3 MEUR (2-0.5-0.5) / Strand 1: 4
year duration / Max 1 proposal funded per strand
DS-06-2017: Cryptography (LEIT–ICT)
DS-07-2017: Addressing Advanced Cyber Security Threats and Threat Actors
DS-08-2017: Privacy, Data Protection, Digital Identities
49
WP 2016-2017 – Call DS
DS-02-2016: Cyber Security for SMEs, local public
administration and Individuals
HORIZON 2020
50
50
WP 2016-2017 – Call DS
DS-02-2016: Cyber Security for SMEs, local public
administration and Individuals
 Considering the adequate level of security commensurate with the
considered use-case, proposals may address one type of end-user: SMEs,
local PA, individual citizens.










Basic cyber security threats
Organisation size and budgetary constraints
Individuals, the "weakest link“?
Human factors, behaviour
Innovative solutions: usability, automation
Consider: guidance, best practices and standards
Validation: end-user feedback
Encouraged to include public and/or private security end-users
TRL 6 or 7
IA / 22 MEUR / Ind. Budget: 3-4 MEUR
HORIZON 2020
51
51
WP 2016-2017 – Call DS
DS-04-2016: Economics of Cybersecurity
HORIZON 2020
52
52
WP 2016-2017 – Call DS
DS-04-2016: Economics of Cybersecurity
 [...] combining methods from microeconomics,
econometrics, qualitative social sciences, behavioural
sciences, decision making, risk management and
experimental economics.
1. Cost-benefit
 Intangible assets, metrics, optimal investment, insurance
2. Incentives and business models
 Incentives, cooperative and regulatory approaches
 Information security markets (e.g. bug bounties, vulnerability disclosure)
 Revenue models for criminal activity
 Institutional innovation
 RIA / 4 MEUR / Ind. Budget: 1-2 MEUR
HORIZON 2020
53
53
WP 2016-2017 – Call DS
DS-05-2016: EU Cooperation and International
Dialogues in Cybersecurity and Privacy
Research and Innovation
HORIZON 2020
54
54
WP 2016-2017 – Call DS
DS-05-2016: EU Cooperation and International Dialogues in
Cybersecurity and Privacy Research and Innovation (CNECT)
 A better overview of EU, MS and regional activities.
 Exchange of views on global level; promote EU
stakeholder participation.
 May cover one of the three strands (CSAs)
1. Synergies between H2020, EU Member States and associated
countries R&I activities and cybersecurity innovation clusters.
 4 years (2014/15 + 2016/17) / Ind. Budget: 2 MEUR
2. International dialogue with Japan / Ind. Budget: 0,5 MEUR
3. International dialogue with the USA / Ind. Budget: 0,5 MEUR
 3 MEUR
 Only the best proposal may be funded for strands 1, 2
& 3.
HORIZON 2020
55
55
Secure Societies SSH flagged topics
CIP-01-2016-2017: Prevention, detection, response and mitigation of the
combination of physical and cyber threats to the critical infrastructure of Europe
SEC-01-DRS-2016: Integrated tools for response planning and scenario building
SEC-02-DRS-2016: Situational awareness systems to support civil protection
preparation and operational decision making
SEC-06-FCT-2016: Developing a comprehensive approach to violent
radicalization in the EU from early understanding to improving protection
SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and
Mitigation of criminal and terrorist acts
DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
DS-04-2016: Economics of Cybersecurity
DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and
Privacy Research and Innovation
56
Secure Societies Gender flagged topics
 SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization
in the EU from early understanding to improving protection
 DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
57
Cybersecurity contractual Public-Private
Partnership (cPPP)
• Estimular las capacidades de
competitividad e innovación
de la industria de la seguridad
digital y la privacidad en
Europa
• Garantizar un suministro
sostenido de productos y
servicios innovadores de
seguridad cibernética en
Europa
58
Algunos datos sobre la cPPP
 Lanzamiento previsto a mediados de 2016
 Ppto estimado: 450-500M€ para 2016-2020
 Programas implicados: SECURE SOCIETIES + LEIT-ICT,
principalmente, otros podrían unirse (Energía, etc.)
 En proceso de constitución de la Asociación Sectorial/industrial
en ciberseguridad -> posibilidad de enviar expresiones de interés
para ser Miembro (asociación EOS – European Organization for
Security)
 Afectará a las convocatorias de 2017 (enmiendas) y sobretodo al
Programa de Trabajo 2018-2020
59
Próximos pasos en la constitución de la cPPP
60
Algunos temas que cubrirá la cPPP
(provisional)
Assurance /Security Engineering
Data Protection
Privacy preserving technnologies
Identity and Access Management
Trust management
Risk management
Governance and cyber security management
network security
system security
Cloud security
Trusted hardware /end point security /mobile security
Certification
Achieving User–centricity
Auditing and planning
Managed/management security services
Security training services
Crypto
61
2017 y más allá…
• WP 2017
– El texto debe ser ratificado en junio de 2016 (posibles
enmiendas)
– OJO con los temas ya cubiertos en 2016 (se excluyen de
2017)
• PASAG (Protection and Security Advisory group) ->
renovación del 50% de sus miembros
• WP 2018-2020: se empezará a debatir en el 2º
semestre de 2016
62
Strategic Programming 2018-2020
Contexto Político
Political drivers relating directly to H2020 objectives:
o Disruptive and Open Innovation
o Migration
o Security: terrorism – radicalisation – cybersecurity
o Physical meets digital - digitalisation of the
researching/learning, working and living environment
o Energy challenge and fighting climate change
o Europe's place in the world
63
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación
de propuestas
5. Información de interés
64
Criterios de Evaluación

Excelencia (Descripción relevante de la llamada o topic)

Impacto

Calidad y eficiencia en la implementación
65
Novedades convocatoria 2016 (RIA/IA)
Excellence
(to the extent that the proposal
addresses the WP topic)
• Clarity and pertinence of the
objectives;
• Soundness of the concept, and
credibility of the proposed
methodology;
Quality and efficiency of the
implementation
Impact
• The extent to which the outputs of the
project would contribute to each of the
expected impacts mentioned in the work
programme under the relevant topic;
• Quality and effectiveness of the work
plan, including extent to which the
resources assigned to work packages
are in line with their objectives and
deliverables;
• Any substantial impacts not mentioned in
the work programme, that would enhance •
• Extent that the proposed work is
innovation capacity; create new market
beyond the state of the art, and
demonstrates innovation potential opportunities, strengthen competitiveness
and growth of companies, address issues
(e.g. ground-breaking objectives,
•
related
to
climate
change
or
the
novel concepts and approaches,
new products, services or business environment, or bring other important
benefits for society;
and organisational models)
• Quality of the proposed measures to:
• Appropriate consideration of
•
• Exploit and disseminate the project
interdisciplinary approaches and,
results (including management of IPR),
where relevant, use of stakeholder
and to manage research data where
knowledge.
relevant.
66
• Communicate the project activities to
different target audiences
66
Appropriateness of the management
structures and procedures, including
risk and innovation management;
Complementarity of the participants
and extent to which the consortium as
whole brings together the necessary
expertise;
Appropriateness of the allocation of
tasks, ensuring that all participants
have a valid role and adequate
resources in the project to fulfil that
role.
Novedades convocatoria 2016 (CSA)
Excellence
(to the extent that the proposal
addresses the WP topic)
• Clarity and pertinence of the
objectives;
• Soundness of the concept, and
credibility of the proposed
methodology;
• Quality of the proposed
coordination and/or support
measures.
Quality and efficiency of the
implementation
Impact
• The extent to which the outputs of the
project would contribute to each of the
expected impacts mentioned in the work
programme under the relevant topic;
• Quality of the proposed measures to:
• Quality and effectiveness of the work
plan, including extent to which the
resources assigned to work packages
are in line with their objectives and
deliverables;
• Exploit and disseminate the project •
results (including management of IPR),
and to manage research data where
relevant.
•
• Communicate the project activities to
different target audiences
Appropriateness of the management
structures and procedures, including
risk and innovation management;
Complementarity of the participants
and extent to which the consortium as
whole brings together the necessary
expertise;
• Appropriateness of the allocation of
tasks, ensuring that all participants
have a valid role and adequate
resources in the project to fulfil that
role.
67
67
Excelencia
Incluye :
• Un estado del arte “honesto”
• Identificar bien el problema y sus diferentes aspectos
• Explicar detalladamente las soluciones propuestas (en todos los casos),
nuevos conceptos, etc…
 Demostrar que se conoce bien los proyectos y actividades realizados en ese
dominio hasta el momento  Explicar bien el “step forward the current
situation”, es decir, dónde está la innovación que presentamos (verdadera
innovación)!
 Claridad y concisión  No repetir conceptos y apoyarse en figuras y
resúmenes de lo más destacado de esa sección. (sin abusar)
 Demostraciones, validaciones, etc…  Hay que explicar en detalle los
escenarios de prueba, los socios implicados, cómo se realizará la recopilación
de información sobre resultados y cómo realimentará esta información al
proyecto.
 Credibilidad de la propuesta -> idea factible desde el punto de vista de los
“Practitioners”
68
Impacto (I)
Incluye :
• Repasar los items del impacto específico que lista el topic
• Cuál es la mejora del conocimiento existente hasta el momento
• Cómo mejoramos la competitividad de las empresas en EU y fuera de la EU
• Impacto social, medioambiental (si es el caso) & long-term sustainability
• Dissemination Plan, Exploitation plan (approach to market), IPR, Data manegement plan
 Factor humano e impacto social  No olvidar explicar aceptación social de la
solución, ergonomía, factor humano en la toma de decisiones…
 Plan de diseminación (OBLIGATORIO)  Identificar correctamente qué y a
quién se quieren comunicar resultados.
 Complementariedad con acciones ya financiadas en otros programas 
Explicación de la sostenibilidad de la solución más allá de la finalización de la
propuesta (visión a medio-largo plazo).
 Plan de explotación (OBLIGATORIO)  Es bueno hacer un SWOT análisis,
explicar cómo afecta a la actividad de cada socio, explicar cómo el proyecto
influenciará el sector, intentar cuantificar (no sólo descripción cualitativa)…
69
Impacto (II)
 Demostrar el beneficio real: la reducción de riesgos
y costes para el usuario final
 Ser realistas en cuanto a los medios técnicos y
humanos necesarios para llevar a cabo la propuesta
 Tratar de integrar información sobre sistemas y
procesos ya existentes
70
Implementación (I)
Incluye :
• Work plan, distribución de tareas y recursos de todo tipo.
• Descripción y explicación del consorcio
• Management plan, Risk & contingency plan, Innovation management plan,
Internal communication plan
 Coherencia y eficacia en el plan de trabajo a desarrollar (no dejar escapar los
detalles)
 Planes de contingencia y mitigación de riesgos concisos pero específicos para
cada paso crítico dado en pos de la solución.
 Dimensión de colaboración internacional, si se da el caso, debe estar muy bien
explicada (qué partner, porqué él, tareas específicas, explotación posterior, ...).
 Integración de usuarios finales como socios de las propuestas (Advisory Boards
son cosa del pasado) y con competencias reales en la materia
 Consorcio equilibrado y bien balanceado
71
Implementación (II)
 Planificar bien los deliverables  Ni demasiados, ni muy pocos, ni todos
al final del proyecto!
 No dejar tareas sin especificar quién las va a hacer, cuándo se va a
iniciar acabar y cuál es el resultado (entregable) de la misma. 
Tampoco sobre-saturar de tareas!!!!!
 Consorcios: Atención condiciones de eligibilidad!!!!  Una propuesta
competitiva tiene bien definida la relación entre los partners y usuarios al
respecto de la explotación, cesión y uso de los resultados, así como
actividades bien detalladas.
 Equipos multidisciplinares, con verdaderos especialistas de cata tema,
p.e., de temas éticos, regulación, estandarización, business,…
 Atención colaboración internacional muy bien detallada y justificada!
72
Lecciones aprendidas…
 Una buena propuesta explica bien sus objetivos, de forma clara y
concisa en las primeras páginas  Las propuestas buenas explican
cómo responden, punto por punto, a las demandas del topic, de la call
y del contexto general del programa en las políticas EU (compliance
matrix).
 Atención a la planificación de las fechas de preparación de propuestas
(no dejar todo lo importante para Julio-Agosto!!)  Una propuesta
buena da una imagen unificada y no de un “collage” de contribuciones.
 Se debe integrar bien a los usuarios finales desde el principio de la
propuesta, y eso se nota.  La identificación de diferentes tipos de
usuario final al que se pretende llegar (target public) es clave para que
una propuesta de solución sea creíble. Esto influye en un buen plan de
comunicación y de aproximación a cliente/usuario.
 Una propuesta buena presenta unas secciones de ethics, data
protection, security aspects concisas pero bien elaboradas (quién, qué,
cómo).
73
EN CONCLUSIÓN
• Si quieres saber si una propuesta es convincente de
cara a un evaluador;
• DÁSELA A LEER A ALGUIEN Y OBSERVA
74
Escrutinio de propuestas
•
En qué consiste?  Análisis de los entregables y actividades de la propuesta en cuanto al uso
de background, manejo o generación (foreground) de información/datos sensibles de
comprometer aspectos de seguridad nacional.
•
Cuál puede ser el resultado?  Puede dar lugar a clasificación de entregables, a actividades, o
al total de la propuesta.  ATENCIÓN: EN H2020 NO se financian “proyectos sensibles”.






•
Proposal with No Security Concerns (NSC)
No classification but Recommendations for the grant agreement preparation
"Restricted UE" and recommendations for the grant agreement preparation
"Confidential UE" and recommendations for the grant agreement preparation
"Secret UE" and recommendations for the grant agreement preparation
Not to finance the proposal
Qué cosas son “sensibles” en una propuesta?  Desde el punto de vista temático (subject of
research) o tipológico (type of research).  ATENCIÓN: NO punto de vista de confidencialidad
comercial o explotación.
Potential sensitive subject of research:
 explosives & CBRN
 infrastructure & utilities
 border security
 intelligent surveillance
 terrorism & organised crime
 digital security
 space
75
Potential sensitive type of research:
 threat assessments
 vulnerability assessments
 specifications
 capability assessments
 incidents/scenarios based on reallife security incidents and potential
threat scenarios
Escrutinio de propuestas
• Cómo proceder 1/2  En la template de la Parte-B de toda propuesta aparece la
table 3.1.e: List of deliverables donde se debe indicar, para cada deliverable el
tipo de deliverable y el nivel de diseminación.
Key for classification of deliverables indicating the TYPE and the DISSEMINATION LEVEL
TYPE:
 R: Document, report
 DEM: Demonstrator, pilot, prototype,
plan design
 DEC: Website, patent filing, press &
media actions, videos, etc
 OTHER: Software, technical diagram, etc
DISSEMINATION LEVEL:
 PU: Public, fully open, i.e., web
 CO: Confidential, restricted under
conditions set in the model GA
 CI: Classified, information as referred in
EC Decission 2001/844/EC
Table 3.1.e List of deliverables
CDTI
CDTI
SOST
Univ.Free
SOST
Univ.Free
CDTI
76
Escrutinio de propuestas
•
Cómo proceder 2/2  Además, en la template de la Parte-B de toda propuesta aparece el capítulo de
aspectos de seguridad.  Si “Activities or results raising security issues: YES”, entonces será encesario
adjuntar la SAL junto con la tabla anexa y descripción sobre qué entidad y quién va a gestionar esta
información (6.3.1) así como si habrá un SAB (6.3.2) y, finalmente, si hay otras medidas de seguridad
(6.4).
Yes / No
Yes / No
77
Aspectos éticos y protección de datos (1)
• Todas las propuestas de la convocatoria pasarán por el panel ético 
Expertos independientes, legislación y principios éticos que deben cumplir,
recomendaciones en la implementación.
• Todas las propuestas deben describir las cuestiones éticas planteadas y la
forma en que se abordarán de manera que cumpla las regulaciones
nacionales, europeas e internacionales.
• Las propuestas son responsables de:
– Identificar posibles temas éticos en las propuestas
– Gestionarlos dentro de la propuesta, detallarlos y desarrollar estas actividades
durante el proyecto (importancia de planificar estas actividades, presupuestar,
posible creación de un ethics advisory board, etc.)
Rellenar las hojas de “Ethics self-assessment” – parte A de la propuesta
78
Aspectos éticos y protección de datos (2)
• Ejemplos
de temas con implicaciones éticas que
pueden aparecer en propuestas de sociedades
seguras:
– Data privacy (difusión, procesamiento, etc.)
– Data protection (legislación, medidas de seguridad, etc.)
– Mission/Function creep: cuando se amplía el alcance del proyecto a
otros ámbitos en los que se puedan dañar valores éticos
fundamentales.
– Dual use
– Misuse/Malevolent
use

Uso
malintencionado
de
sistemas/tecnologías, etc.
79
Contenidos
1.
2.
3.
4.
Introducción a la temática
Resultados de España en Seguridad
Convocatoria 2016 de Sociedades Seguras
Recomendaciones prácticas para la preparación de
propuestas
5. Información de interés
80
Plataformas, asociaciones y grupos de interés
en España
81
Plataformas, asociaciones y grupos de interés
en Europa
IMG-S
82
(…)
El equipo de Secure Societies en España
La Delegación española en el Comité de Gestión Secure Societies
Dirección Programas
Internacionales
Maite Boyero Egido
[email protected]
DG GUCI - Servicio de
Innovación tecnológica
Nathalie Páez
[email protected]
Puntos Nacionales de Contacto de la temática
Dirección Programas
Internacionales
Maite Boyero Egido
[email protected]
Oficina de Proyectos
Europeos
Ainara Ripa Centeno
[email protected]
El equipo CDTI en Bruselas
Dirección Programas
Internacionales
83
Marina Martínez
[email protected]
Enlaces de interés y otra información
Fuentes de información
Programa de Trabajo 20162017
http://ec.europa.eu/research/participants/data
/ref/h2020/wp/2016_2017/main/h2020wp1617-security_en.pdf
Web EC Secure societies
H2020
http://ec.europa.eu/dgs/home-affairs/whatwe-do/policies/crisis-and-terrorism/securityresearch/index_en.htm
Web Horizonte 2020 Español
http://eshorizonte2020.es/
IPR & Open Access
http://ec.europa.eu/research/sciencesociety/index.cfm?fuseaction=public.topic&id=
1301
Ethical issues
http://ec.europa.eu/research/participants/doc
s/h2020-funding-guide/cross-cuttingissues/ethics_en.htm
Búsqueda en Socios en H2020 http://www.security-researchen Sociedades Seguras (red
map.eu/index.php?file=search.php&type=1
Puntos Contacto,
próximamente, SEREN3)
84
Más enlaces de interés
•
Security Research (DG HOME): http://ec.europa.eu/dgs/home-affairs/what-wedo/policies/crisis-and-terrorism/security-research/index_en.htm
•
Security Research (REA): [email protected]
•
Infoday nacional Seguridad, 23 de febrero de 2016. Presentaciones disponibles en
www.cdti.es
•
Security Research Conference – La Haya, 1 y 2 de Junio de 2016 (www.srie2016.com)
•
SMI2Gs (Security Mission Information and Innovation Groups) – Brokerage event finales
de enero de 2016: http://www.asd-europe.org/communication/useful-links/smi2g/
•
Infoday y Brokerage Event Europeo, 5 y 6 de abril de 2016:
https://www.b2match.eu/seren3brussels2016/pages/13547-presentations
•
Red de NCPs de Seguridad, SEREN3: www.seren-project.eu
•
LISTAS DE DISTRIBUCIÓN CDTI: http://bit.ly/1UBgtbn
85
Muchas gracias por su atención
Maite Boyero
[email protected]
86
Descargar