EL PROGRAMA SOCIEDADES SEGURAS EN H2020 CONVOCATORIA 2016 Infoday UC3M. Leganés, 12 de mayo de 2016 Maite Boyero Representante española y NCP en Sociedades Seguras [email protected] Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 2 Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 3 Algo de historia sobre el Programa European Security Strategy (2003) European Security Research within FP 7 (2007 and beyond) ESRAB (2005-2006) PASR (2004-2006) 2004 2005 2006 “European Security Research: The Next Steps” (Sept 2004) GoP report “Research for a secure Europe” (March 2004) “Towards an EU Defence Equipment Policy” (March 2003) 4 2007 ESRAB report “Meeting the challenge: the European Security Research Agenda” (October 2006) time Investigación en Seguridad en VIIPM La Visión Desarrollar tecnologías y producir conocimiento que reduzca los gaps de capacidades Superar la fragmentación de los mercados Estimular la colaboración entre proveedores de tecnología y usuarios 5 I+D en Seguridad en VII PM FP 7 Security Research Security Missions Mission Areas 1. Security of the Citizens Organised Crime Counter Terrorism 2. Security of infrastructures and utilities Buildings/ Design Energy/ Transport/ Communication Grids 3. Intelligent surveillance and border security Land Border/ Checkpoints 4. Restoring security and safety in case of crisis 5. Security systems integration, interconnectivity and interoperability 6. Security and society 7. Security Research coordination and structuring preparedness and planning Information management citizens and security ERA-NET Ethics and justice SME’s Foresight Studies Interoperable Secure communication Response Sea Border Explosives Pre-normative research Recovery Surveillance Specific Areas Cross-cutting Missions CBRN Air Border Understanding organisational structure and cultures of public users CBRN Supply chains Security Economics 6 NCP & Otehrs • 1.350 M€ en 7 años • Más de 350 proyectos financiados • Progresiva integración de usuarios finales en los proyectos EU Framework Programme for Research and Innovation 2014-2020 Essential part of Europe 2020 Strategy Focus on social challenges which are being faced by the European society, e.g. the Secure Societies ~ 80.000 M€ Simplification Partnerships: Public-Private, Public-Public International cooperation 7 Seguridad en H2020: SOCIEDADES SEGURAS Programa Marco de Investigación e Innovación (2014-2020) Excellent Science European Research Council (ERC) Future and Emerging Technologies (FET) Marie Skłodowska-Curie actions on skills, training and career development European research infrastructures Industrial Leadership Societal Challenges ICT Health, demographic change and wellbeing Nanotechnology Biotechnology Food security, sustainable agriculture and forestry, marine and maritime and inland water research and the bioeconomy; Advanced Materials Secure, clean and efficient energy; Advanced Manufacturing & Processing Smart, green and integrated transport; Space Climate action, environment, resource efficiency and raw materials Access to Risk Finance Innovation in SMEs Europe in a changing world-Inclusive, innovative and reflexive societies Secure Societies: Protecting freedom and security of Europe and its citizens 1.613 M€ 8 Secure Societies REGULATION (EU) 1291/2013 establishing Horizon 2020 The specific objective is to foster secure European societies in a context of unprecedented transformations and growing global interdependencies and threats, while strengthening the European culture of freedom and justice. • Europe has never been so peacefully consolidated, and the levels of security enjoyed by European citizens are high compared to other parts of the world. However, Europe's vulnerability continues to exist in a context of ever-increasing globalisation in which societies are facing security threats and challenges that are growing in scale and sophistication. • The threat of large-scale military aggressions has decreased and security concerns are focused on new multifaceted, interrelated and transnational threats. Aspects such as human rights, environmental degradation, political stability and democracy, social issues, cultural and religious identity or migration need to be taken into the internal and external aspects of security are inextricably linked. In order to protect freedom and security, the Union requires effective responses using a comprehensive and innovative suite of security instruments. Research and innovation can play a clear supporting role although it cannot alone guarantee security. Research and innovation activities should aim at understanding, detecting, account. In this context preventing, deterring, preparing and protecting against security threats. Furthermore, security presents fundamental challenges that cannot be resolved by independent and sector-specific treatment but rather need more ambitious, coordinated and holistic approaches. • Many forms of insecurity, whether from crime, violence, terrorism, natural or man-made disasters, cyber-attacks or privacy abuses, and other forms of social and economic disorders increasingly affect citizens. According to estimates, there are likely to be up to 75 million direct victims of crime every year in Europe ( 1 ). The direct cost of crime, Terrorism has shown its fatal consequences in several parts of Europe and worldwide costing many lives and important economic losses. It also has a significant cultural and global impact. terrorism, illegal activities, violence and disasters in Europe has been estimated at least EUR 650 billion (about 5 % of the Union GDP) in 2010. • Citizens, firms and institutions are increasingly involved in digital interactions and transactions in social, financial and commercial areas of life, but the development of cyber crime Internet has also led to worth billions of Euros each year, to cyber-attacks on critical infrastructures and to breaches of privacy affecting individuals or entities across the continent. Changes in the nature and perception of insecurity in everyday life are likely to affect citizens' trust not only in institutions but also in each it is necessary to understand the causes other. In order to anticipate, prevent and manage these threats, , develop and apply innovative technologies, solutions, foresight tools and knowledge, stimulate cooperation between providers and users, find civil security solutions, improve the competitiveness of the European security industry and services, including ICT, and prevent and combat the abuse of privacy and breaches of human rights in the Internet and elsewhere, while ensuring European citizens' individual rights and freedom. To enhance better cross-border collaboration between different kinds of emergency services, attention should be given to interoperability and standardisation. Finally, as 9 security policies should , enhancing the societal dimension of security research will be an interact with different social policies Seguridad: un reto industrial La industria de la seguridad es uno de los sectores con mayor potencial para el crecimiento y el empleo en la UE. En 2011, el sector empleaba a 180.000 personas, con una facturación anual de aproximadamente € 30 mil millones. El programa de Seguridad ayudará a: – Superar la fragmentación del mercado a través de las normas en toda la UE – Reducir la brecha entre la investigación y la llegada al mercado de soluciones mediante la introducción de nuevos sistemas de financiación, tales como la contratación pre-comercial (PCP) – Mejorar la integración de los aspectos sociales mediante la evaluación del impacto de las tecnologías de seguridad en materia de derechos fundamentales 10 Implicación de distintos stakeholders La seguridad es un tema que sólo se puede abordar con eficacia si todas las partes interesadas cooperan. Representantes de los sectores público y privado deben trabajar en cooperación. Así, los programas de trabajo están dirigidos a: – Empresas privadas – Asociaciones industriales, centros tecnológicos, grupos de investigación – Actores institucionales 11 Políticas de la UE relacionadas con la temática I The European Agenda on Security COM(2015) 185 final (28 April 2015) http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/index_en.htm The European Agenda on Migration COM(2015) 240 final (13 May 2015) http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/background-information/index_en.htm Securing EU borders http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/securing-eu-borders/index_en.htm A number of proposed legislative initiatives including the proposal for a European Border and Coast Guard (15 December 2015) Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace COM (2013) 1 Promoting a single market for cybersecurity products http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf 12 Políticas de la UE relacionadas con la temática II 2008 EU Action Plan on Enhancing the Security of Explosives Regulation (EU) No 98/2013 on the marketing and use of explosives precursors Towards a stronger European disaster response: the role of civil protection and humanitarian assistance, COM(2010)600 EU Action Plan on combating terrorism The Security Industry Policy Action Plan COM (2012)417 final 13 Políticas de la UE relacionadas con la temática III EU Strategy and Action Plan for customs risk management (COM (2014) 527 final) The EU Strategy towards the eradication of Trafficking in Human Beings 2012–2016, COM(2012) 286 European Programme for Critical Infrastructure Protection (EPCIP), COM(2006)786 Civilian Headline Goal 2008 (15863/04) EU Maritime Security Strategy (11205/14) and its action plan (17002/14) EU Civil Protection Mechanism (Decision 1313/2013/EU) 14 Objetivos y áreas que cubre el programa Lucha contra la delincuencia, el crimen y el terrorismo Seguridad cibernética Protección y resiliencia de infraestructuras críticas, modos de transporte y cadenas de suministro Recuperación de Europa frente a crisis y desastres Mejorar la seguridad y la gestión de las fronteras Aspectos sociales, éticos, de privacidad y libertad de los ciudadanos Seguridad en el exterior, en misiones civiles 15 Estandarización e interoperabilidad de sistemas Particularidades del programa 2 DGs aportan financiación: DG HOME y DG CONNECT Orientación a USUARIO FINAL (Practitioners) Proyectos cercanos a mercado (TRL 4 a 7) Aplicación civil, exclusivamente Algunos proyectos resultarán clasificados Estandarización y certificación de soluciones y demostración de resultados Aspectos éticos de los proyectos 16 Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 17 Seguridad en el VII Programa Marco FP7-SEC: Resultados de las 6 convocatorias + Convocatoria SEC/ICT Financiación actividades Financiadas España (% del total) Retorno económico (España) Millones de € 118,19 M€ Retorno (% UE) 9,55 % Retorno (% del total) 8,7 % • • • • 166 (52,4%) Coordinadas España (% del total) 30 (9,5%) 1.350M€ invertidos en 7 años de programa (2007-2013) España se consolidó como 5º país Buena participación tanto en proyectos grandes como pequeños Excelente participación de la industria (+45% ppto). Los usuarios finales se implicaron muy activamente en las últimas convocatorias. 18 Sociedades Seguras, H2020 Programa de trabajo 2014-2015 400 M€ Gestión de crisis y desastres, incl. Cambio climático NEW Lucha contra el crimen y el terrorismo Seguridad fronteriza y seguridad en el exterior NEW Seguridad digital / Ciberseguridad 19 Particularidades PT 2014-2015 • Presupuesto/ranking lists por convocatoria, no por topic (excepto topics DS) • Topics “huérfanos”, sin propuestas financiadas, mientras otros han tenido varias propuestas • Topics muy genéricos, podían llevar a “interpretación” • Alta competencia (tasas de sobre-suscripción entre 10 y 12 veces) • No habido condiciones de elegibilidad 20 Resultados de España en convocatoria 2014* Resultados provisionales de las 4 convocatorias (DRS, FCT, BES y DS) Financiación actividades Retorno económico (España) Financiadas España (% del total) 24 (58,5%) Coordinadas España (% del total) 4 (9,8%) Millones de € 12,67 M€ Retorno (% UE) 7,6 % Retorno (% del total) 6,9 % WP 2014: 25 topics, ~ 200M€. 49 proyectos financiados Global oversubscription rate: 9,86 * Información no definitiva 21 Convocatoria 2014: resultados por países 16,00% PRESUPUESTO SOLICITADO 14,00% 12,00% 10,00% 8,00% 6,00% 4,00% 2,00% 0,00% 18,00% 16,00% 14,00% 12,00% 10,00% 8,00% 6,00% 4,00% 2,00% 0,00% España queda en el 6º puesto, tras: UK (15,9%), DE (11%), IT(9,5%), RETORNOS OBTENIDOS GR(8,9%) y FR(7,6%) 22 Resultados provisionales convocatoria 2015 23 Desglose del presupuesto Budget 2015: 224.27 M€ * FCT; 42,16 DRS HOME, 61.73 DRS, 89.73 DS; 50,21 BES; 42,17 * Including SME challenge (7.4 M€) but not FTI (3.92 M€) 24 DRS RTD (Climate Action), 28 H2020-Secure Societies-2015 Propuestas por “ranking list” *DRS: all except topics DRS-09, 10 & 11 **DS-07: including 1 ineligible proposal with 62MEUR funding 25 Cobertura por topic Proposals were submitted under all topics Topic nr 1 3 4 5 7 8 BES 7 18 1 5 9 14 5 9 DRS 37 DS FCT 2 10 6 4 28 38 24 15 9 31 12 9 10 11 12 13 14 15 16 17 18 19 20 21 22 11 3 10 14 6 44 16 21 28 8 12 15 9 26 25 22 1 8 Resultados de la evaluación Global Success Rate: 8.0% Rejected In the call 2014 it was 9.2% Reserve Main 250 BES DRS DS FCT Total Rejected 81 179 88 125 473 Reserve 1 4 4 1 10 Main 10 14 10 9 43 200 150 100 50 0 BES 27 DRS DS FCT Resultados convocatoria 2015* • España queda como 1er país, en términos de retorno, en esta convocatoria (14,6% retorno total, 15,45% UE) • 4 topics desiertos (provisional) • Alta participación de PYMES (a nivel global) y de usuarios finales – especialmente EXTRAORDINARIA participación del MINISTERIO DEL INTERIOR (1er participante a nivel global) • España, en principio, va a coordinar 8 proyectos (el doble que en 2014) * Datos provisionales 28 Conclusiones • Valor de los usuarios finales en los consorcios • Las propuestas deben trabajarse con MUCHA antelación • Ha aumentado significativamente la calidad de las propuestas • Recomendamos contactar con los NCPs y la delegación durante la preparación de la propuesta 29 Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 30 Programa de trabajo 2016-2017 • • • • Soluciones pan-Europeas para problemas panEuropeos Contribuir a las implementación de las últimas políticas Europeas de Seguridad Fomentar la “Europeanización” de los usuarios finales (practitionners) que demandan soluciones innovadoras a la industria Europea Combinar las amenazas físicas y ciber-amenazas de seguridad Aumenta el número de PCPs http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h2020-wp1617-security_en.pdf 31 Novedades que cabe destacar • Nuevas condiciones de elegibilidad -> “Europeanización” de los usuarios finales (deberán ser integrados directamente en la propuesta como SOCIOS!!) • Presupuesto por topic (no por convocatoria) • Importancia de los PCPs (se financian al 90%) • Lanzamiento de una cPPP en Ciberseguridad en la segunda mitad de 2016, que se integrará en el programa a partir de 2016 32 Condiciones de elegibilidad (ejemplo) SEC-12-FCT-2016: Technologies for prevention, investigation and mitigation in the context of fight against crime and terrorism a) In Sub-topic: 1, Sub-topic: 2 or Sub-topic: 3: a minimum of 3 Law enforcement agencies (LEA) from 3 EU Member States or Associated Countries must be beneficiaries of the grant agreement and should be directly involved in the carrying out of the tasks foreseen in the grant. b) In other fields (Sub-topic: “Others”): a minimum of 5 LEA from 5 EU Member States or Associated Countries must be beneficiaries of the grant agreement and should be directly involved in the carrying out of the tasks foreseen in the grant. c) Proposals on detection technologies are excluded from this topic. d) Any proposal must include a workpackage for field demonstrations. Only the sub-topics not covered in 2016 will remain eligible in 2017. A list of topics that remain eligible in 2017 will be published in due time in the section "Topic Conditions & Documents" for this topic on the Participant Portal. 33 Presupuesto por topic Cómo se aplica? Objetivos? Reducción de los “topics huérfanos” Menor duplicidad en proyectos Mejorar el apoyo a la implementación de políticas Evitar la competencia entre distintos tipo de proyecto (CSA vs RIA/IA) Reducción del sesgo en determinadas áreas científicas Cuándo se aplica? En casi todos los topics, aunque hay algunas pequeñas excepciones en las que varios topics comparten presupuesto 34 Estructura del PT 2016-2017 3 convocatorias paralelas/ separadas: Critical Infrastructure Protection • Combinación de amenazas ciber y físicas, enfocándose en distintos sectores críticos Security • • • • Disaster resilient societies Fight against crime and terrorism Border and External security General Matters ~ 380 M€ Digital Security Focus Area • ICT, Secure societies and eHealth 2016: Abre: 15 Mar 2016, Cierra: 25 Ago 2016 2017: Abre: 01 Mar 2017, Cierra: 24 Ago 2017 35 WP 2016-2017 – Desglose del Presupuesto Budget: €382,36 million 3 Calls & 30 topics: 2016=M€185; 2017=M€197 • CRITICAL INFRASTRUCTURE PROTECTION – CIP (1 topic)(2016=M€20; 2017=M€20) • SECURITY – SEC (2016=M€113; 2017=M€121): o Disaster-resilience: safeguarding and securing society – DRS (5 topics) o Fight against Crime and Terrorism – FCT (7 topics) o Border Security and External Security – BES (8 topics) o General Matters – GM (1 topic) • Digital Security Focus Area – DS (5 topics) (2016=M€29; 2017=M€36) SME Instrument (2016=M€15; 2017=M€14) Fast track to Innovation – Pilot (2016=M€4) Other Actions (2016=M€15; 2017=M€14) http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h20 20-wp1617-security_en.pdf 36 Calendario Publication Opening 14/10/15 15/03/16 Deadline 25/08/16 Remote Evaluation (IER) 12/09/16 – 30/09/16 CMs Remote Panel Meeting Evaluation in Bxl Ethics Screening Ethics Screening (ESR) (CR) 7-11/11/2016 17/10-03/11 October 2016 03–21/10/16 Information to Programme Committee and to applicants Grant Preparation + Programme Committee consultation Start of projects from May 2017 Security Scrutiny Nov-Dec 2016 + Review Jan 2017 37 Feb-April 2017 WP 2016-2017 Call - CIP Topics CIP-01-2016-2017: Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe. ToA Funding (M) Ind.Budget (M) TRL IA 20.0 8.0 7 Eligibility and admissibility cond.: At least 2 operators of the chosen type of critical infrastructure operating in 2 countries must be beneficiaries (possibly, but not necessarily: coordinator) of the GA and should be directly involved in the carrying out of the tasks foreseen in the grant. The participation of industry able to provide security solutions is required. HORIZON 2020 38 Scope Critical Infrastructures: • Water Systems • Energy Infrastructure (power plants and distribution) • Transport Infrastructure and means of transportation • Communication Infrastructure • Health Services • Financial Services. Should cover: prevention, detection, response, and (in case of failure) mitigation of consequences over life span CI, achieving security & resilience of all functions performed by the installations, and of neighbouring populations and the environment. The participation of SMEs is strongly encouraged. international cooperation Max.1 project will be selected per CI Installations not covered in 16 will remain eligible in 17 38 Topics WP 2016-2017 Call - SECURITY (1) Disaster-resilience: safeguarding and securing society •Objective: •To reduce the loss of human life, environmental, economic and material damage from natural and man-made disasters, including from extreme weather events, crime and terrorism threats. SEC-01-DRS-2016: Integrated tools for response planning and scenario building SEC-02-DRS-2016: Situational awareness systems to support civil protection preparation and operational decision making SEC-03-DRS-2016: Validation of biological toxins measurements after an incident: Development of tools and procedures for quality control SEC-04-DRS-2017: Broadband communication systems (DG HOME) SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN) cluster (DG HOME) 39 Topics WP 2016-2017 SEC-01-DRS-2016: Integrated tools for response planning and scenario building Disaster risks (natural/accidental/intentional) addressed in the context of: EU Civil Protection Mechanism (Decision 1313/2013); the IPCC recommendations to extreme climatic events; the Sendai Framework IA / 8 MEUR / Ind. Budget: 8 MEUR / TRL 7 or 8 Participation SMEs is strongly encouraged International cooperation At least 1 from each of the 5 categories of FR (firefighting units; medical emergency services; police departments; civil protection units; control command centres). SEC-02-DRS-2016: Situational awareness systems to support civil protection preparation and operational decision making Identify new and promising solutions, develop and agree on the core set of specifications of a specific system, on the roadmap for research still needed, and related tender documents to base future procurements. The EU may contribute to subsequent actions (PCP, PPI, others) CSA / 1,5 MEUR / Ind. Budget: 1,5 MEUR Max 1 proposal funded International cooperation 40 Topics WP 2016-2017 SEC-03-DRS-2016: Validation of biological toxins measurements after an incident: Development of tools and procedures for quality control Develop quality control tools, as well as the Standard Operating Procedures necessary for establishing a mechanism to systematically validate laboratory-based measurement techniques, including sample preparation strategies and analyses made in-situ issued by mobile and quickly deployable laboratories, which should be proposed for adoption at EU level. IA / 8 MEUR / Ind. Budget: 8 MEUR At least 3 control laboratories from different MS/AC SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN) cluster (DG HOME) Part a) Issue list of technologies to be developed to integrating them into the platforms (building inventory EDEN project). The CSA will deliver the first version of the catalogue on time for use in the implementation of Part b) - RIA CSA / 2 MEUR / Ind. Budget: 2 MEUR Additional exploitation obligation 41 Topics WP 2016-2017 Call - SECURITY (2) Fight against crime and Terrorism •Objective: •To mitigate potential consequences of incidents, or to avoid them by using new technologies and capabilities for fighting and preventing crime (including cybercrime), illegal trafficking and terrorism (including cyber-terrorism), including understanding and tackling terrorist ideas and beliefs, whilst respecting human rights and privacy. SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early understanding to improving protection SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of criminal and terrorist acts SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, across the timeline of a plot SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the context of fight against crime and terrorism SEC-09-FCT-2017: Toolkits integrating tools and techniques for forensic laboratories (DG HOME) SEC-10-FCT-2017: Integration of detection capabilities and data fusion with utility providers’ networks 42 Topics WP 2016-2017 RIA / 17 MEUR / Ind. budget: 3 MEUR International cooperation "Practitioners (including LEA) from at least 5 MS/AC" SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early understanding to improving protection Focus on developing policy recommendations and practical solutions to be implemented by security end-users vs SC 6 focuses on studying the phenomenon of radicalization to provide input to policy-making. SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of criminal and terrorist acts 5 Sub-topics: New methods for protection of crowds; prevent, investigate and mitigate cybercriminal behaviours; pim corruption and financial crime; pim petty crimes; pim domestic violence. Only sub-topics not covered in 2016 will be eligible in 2017 Max 1 proposal funded per sub-topic Must include a WP for practical demonstrations. 43 Topics WP 2016-2017 RIA / 27,25 MEUR / Ind. Budget: 5 MEUR SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA TRL 5 / International cooperation Forensic laboratories/institutes from minimum 5 MS (additional AC is encouraged) Max 1 proposal funded for part a) and part b) SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, across the timeline of a plot Coordination with EDA activities Practitioners in the field of counter-terrorist activities from at least 3 MS/AC SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the context of fight against crime and terrorism TRL 6 Only sub-topics not covered in 2016 will be eligible in 2017 Max 1 proposal funded per sub-topic Sub-topics 1-2-3 at least 3 LEA MS/AC (S-t others: at least 5) Detection technologies are excluded Must include a WP for field demonstrations 44 Topics WP 2016-2017 Call - SECURITY (3) Border Security and External Security •Objective: •Improve border security, respecting human rights and privacy. Including control and surveillance issues, contributing to the European Border Surveillance System (EUROSUR) and promoting use of new technology for border checks, in relation to the Smart Borders legislative initiative. •Support the Union's external security policies in civilian tasks. SEC-13–BES–2017: Next generation of information systems to support EU external policies SEC-14-BES–2016: Towards reducing the cost of technologies in land border security applications SEC-15-BES–2017: Risk-based screening at border crossing SEC-16-BES–2017: Through-foliage detection, including in the outermost regions of the EU SEC-17-BES-2017: Architectures and organizations, big data and data analytics for customs risk management of the international goods supply chain trade movements SEC-18-BES–2017: Acceptance of "no gate crossing point solutions" SEC-19-BES-2016: Data fusion for maritime security applications SEC-20-BES-2016: Border Security: autonomous systems and control systems 45 Topics WP 2016-2017 SEC-14-BES–2016: Towards reducing the cost of technologies in land border security applications RIA 10 MEUR Ind. Budget: 5 MEUR Overlap with EWISA project should be avoided Coordination with EDA activities Enhanced SME participation TRL 6 At least 3 border guard authorities from 3 different EU/Schengen MS 46 Topics WP 2016-2017 IA / 24 MEUR / Ind. Budget: 8 MEUR International cooperation SEC-19-BES-2016: Data fusion for maritime security applications Coordination with EDA activities TRL 7 At least 3 border guard authorities from 3 MS/AC At least 3 independent industry organizations from 3 different MS/AC. SEC-20-BES-2016: Border Security: autonomous systems and control systems Cover 1 sub-topic: 1. Autonomous surveillance 2. Enhanced command and control systems for the surveillance of borders in a 3D environment Autonomous surveillance SMEs is strongly encouraged TRL 6 or 7 Practitioners from various disciplines, including Border guard authorities from at least 5 EU/Schengen MS 47 Topics WP 2016-2017 General Matters SEC-21–GM-2016-2017: Pan European Networks of practitioners and other actors in the field of security (DG HOME) Practitioners: e.g. firefighters, police and intelligence communities, border guards, custom authorities, explosive specialists, forensic laboratories, medical emergency teams, etc. 4 different categories of networks a. Same discipline and from across Europe b. From different disciplines c. From around Europe that manage demonstration and testing sites, training facilities, including simulators or serious gaming platforms in the area of CBRN and for first responders or civil protection practitioners d. Consortium of formally nominated NCPs in the area of security research (2017) CSA 15,5 MEUR (2016) Indicative budget: 3,5 MEUR (a, b & c) / duration 5 years Additional Eligibility/Admissibility condition (several including): - For part a) & c): Practitioner participation from at least 8 MS/AC - For part b): Practitioner participation from at least 2 MS/AC from outside the region. 48 Topics WP 2016-2017 Call – DIGITAL SECURITY FOCUS AREA DS-01-2016: Assurance and Certification for Trustworthy and Secure ICT systems, services and components (LEIT–ICT) DS-02-2016: Cyber Security for SMEs, local public administration and Individuals / IA-22 MEUR DS-03-2016: Increasing digital security of health related data on a systemic level (SC1 "Health, demographic change and wellbeing") DS-04-2016: Economics of Cybersecurity / RIA-4 MEUR DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation (DG CNECT) / CSA-3 MEUR (2-0.5-0.5) / Strand 1: 4 year duration / Max 1 proposal funded per strand DS-06-2017: Cryptography (LEIT–ICT) DS-07-2017: Addressing Advanced Cyber Security Threats and Threat Actors DS-08-2017: Privacy, Data Protection, Digital Identities 49 WP 2016-2017 – Call DS DS-02-2016: Cyber Security for SMEs, local public administration and Individuals HORIZON 2020 50 50 WP 2016-2017 – Call DS DS-02-2016: Cyber Security for SMEs, local public administration and Individuals Considering the adequate level of security commensurate with the considered use-case, proposals may address one type of end-user: SMEs, local PA, individual citizens. Basic cyber security threats Organisation size and budgetary constraints Individuals, the "weakest link“? Human factors, behaviour Innovative solutions: usability, automation Consider: guidance, best practices and standards Validation: end-user feedback Encouraged to include public and/or private security end-users TRL 6 or 7 IA / 22 MEUR / Ind. Budget: 3-4 MEUR HORIZON 2020 51 51 WP 2016-2017 – Call DS DS-04-2016: Economics of Cybersecurity HORIZON 2020 52 52 WP 2016-2017 – Call DS DS-04-2016: Economics of Cybersecurity [...] combining methods from microeconomics, econometrics, qualitative social sciences, behavioural sciences, decision making, risk management and experimental economics. 1. Cost-benefit Intangible assets, metrics, optimal investment, insurance 2. Incentives and business models Incentives, cooperative and regulatory approaches Information security markets (e.g. bug bounties, vulnerability disclosure) Revenue models for criminal activity Institutional innovation RIA / 4 MEUR / Ind. Budget: 1-2 MEUR HORIZON 2020 53 53 WP 2016-2017 – Call DS DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation HORIZON 2020 54 54 WP 2016-2017 – Call DS DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation (CNECT) A better overview of EU, MS and regional activities. Exchange of views on global level; promote EU stakeholder participation. May cover one of the three strands (CSAs) 1. Synergies between H2020, EU Member States and associated countries R&I activities and cybersecurity innovation clusters. 4 years (2014/15 + 2016/17) / Ind. Budget: 2 MEUR 2. International dialogue with Japan / Ind. Budget: 0,5 MEUR 3. International dialogue with the USA / Ind. Budget: 0,5 MEUR 3 MEUR Only the best proposal may be funded for strands 1, 2 & 3. HORIZON 2020 55 55 Secure Societies SSH flagged topics CIP-01-2016-2017: Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe SEC-01-DRS-2016: Integrated tools for response planning and scenario building SEC-02-DRS-2016: Situational awareness systems to support civil protection preparation and operational decision making SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early understanding to improving protection SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of criminal and terrorist acts DS-02-2016: Cyber Security for SMEs, local public administration and Individuals DS-04-2016: Economics of Cybersecurity DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation 56 Secure Societies Gender flagged topics SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early understanding to improving protection DS-02-2016: Cyber Security for SMEs, local public administration and Individuals 57 Cybersecurity contractual Public-Private Partnership (cPPP) • Estimular las capacidades de competitividad e innovación de la industria de la seguridad digital y la privacidad en Europa • Garantizar un suministro sostenido de productos y servicios innovadores de seguridad cibernética en Europa 58 Algunos datos sobre la cPPP Lanzamiento previsto a mediados de 2016 Ppto estimado: 450-500M€ para 2016-2020 Programas implicados: SECURE SOCIETIES + LEIT-ICT, principalmente, otros podrían unirse (Energía, etc.) En proceso de constitución de la Asociación Sectorial/industrial en ciberseguridad -> posibilidad de enviar expresiones de interés para ser Miembro (asociación EOS – European Organization for Security) Afectará a las convocatorias de 2017 (enmiendas) y sobretodo al Programa de Trabajo 2018-2020 59 Próximos pasos en la constitución de la cPPP 60 Algunos temas que cubrirá la cPPP (provisional) Assurance /Security Engineering Data Protection Privacy preserving technnologies Identity and Access Management Trust management Risk management Governance and cyber security management network security system security Cloud security Trusted hardware /end point security /mobile security Certification Achieving User–centricity Auditing and planning Managed/management security services Security training services Crypto 61 2017 y más allá… • WP 2017 – El texto debe ser ratificado en junio de 2016 (posibles enmiendas) – OJO con los temas ya cubiertos en 2016 (se excluyen de 2017) • PASAG (Protection and Security Advisory group) -> renovación del 50% de sus miembros • WP 2018-2020: se empezará a debatir en el 2º semestre de 2016 62 Strategic Programming 2018-2020 Contexto Político Political drivers relating directly to H2020 objectives: o Disruptive and Open Innovation o Migration o Security: terrorism – radicalisation – cybersecurity o Physical meets digital - digitalisation of the researching/learning, working and living environment o Energy challenge and fighting climate change o Europe's place in the world 63 Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 64 Criterios de Evaluación Excelencia (Descripción relevante de la llamada o topic) Impacto Calidad y eficiencia en la implementación 65 Novedades convocatoria 2016 (RIA/IA) Excellence (to the extent that the proposal addresses the WP topic) • Clarity and pertinence of the objectives; • Soundness of the concept, and credibility of the proposed methodology; Quality and efficiency of the implementation Impact • The extent to which the outputs of the project would contribute to each of the expected impacts mentioned in the work programme under the relevant topic; • Quality and effectiveness of the work plan, including extent to which the resources assigned to work packages are in line with their objectives and deliverables; • Any substantial impacts not mentioned in the work programme, that would enhance • • Extent that the proposed work is innovation capacity; create new market beyond the state of the art, and demonstrates innovation potential opportunities, strengthen competitiveness and growth of companies, address issues (e.g. ground-breaking objectives, • related to climate change or the novel concepts and approaches, new products, services or business environment, or bring other important benefits for society; and organisational models) • Quality of the proposed measures to: • Appropriate consideration of • • Exploit and disseminate the project interdisciplinary approaches and, results (including management of IPR), where relevant, use of stakeholder and to manage research data where knowledge. relevant. 66 • Communicate the project activities to different target audiences 66 Appropriateness of the management structures and procedures, including risk and innovation management; Complementarity of the participants and extent to which the consortium as whole brings together the necessary expertise; Appropriateness of the allocation of tasks, ensuring that all participants have a valid role and adequate resources in the project to fulfil that role. Novedades convocatoria 2016 (CSA) Excellence (to the extent that the proposal addresses the WP topic) • Clarity and pertinence of the objectives; • Soundness of the concept, and credibility of the proposed methodology; • Quality of the proposed coordination and/or support measures. Quality and efficiency of the implementation Impact • The extent to which the outputs of the project would contribute to each of the expected impacts mentioned in the work programme under the relevant topic; • Quality of the proposed measures to: • Quality and effectiveness of the work plan, including extent to which the resources assigned to work packages are in line with their objectives and deliverables; • Exploit and disseminate the project • results (including management of IPR), and to manage research data where relevant. • • Communicate the project activities to different target audiences Appropriateness of the management structures and procedures, including risk and innovation management; Complementarity of the participants and extent to which the consortium as whole brings together the necessary expertise; • Appropriateness of the allocation of tasks, ensuring that all participants have a valid role and adequate resources in the project to fulfil that role. 67 67 Excelencia Incluye : • Un estado del arte “honesto” • Identificar bien el problema y sus diferentes aspectos • Explicar detalladamente las soluciones propuestas (en todos los casos), nuevos conceptos, etc… Demostrar que se conoce bien los proyectos y actividades realizados en ese dominio hasta el momento Explicar bien el “step forward the current situation”, es decir, dónde está la innovación que presentamos (verdadera innovación)! Claridad y concisión No repetir conceptos y apoyarse en figuras y resúmenes de lo más destacado de esa sección. (sin abusar) Demostraciones, validaciones, etc… Hay que explicar en detalle los escenarios de prueba, los socios implicados, cómo se realizará la recopilación de información sobre resultados y cómo realimentará esta información al proyecto. Credibilidad de la propuesta -> idea factible desde el punto de vista de los “Practitioners” 68 Impacto (I) Incluye : • Repasar los items del impacto específico que lista el topic • Cuál es la mejora del conocimiento existente hasta el momento • Cómo mejoramos la competitividad de las empresas en EU y fuera de la EU • Impacto social, medioambiental (si es el caso) & long-term sustainability • Dissemination Plan, Exploitation plan (approach to market), IPR, Data manegement plan Factor humano e impacto social No olvidar explicar aceptación social de la solución, ergonomía, factor humano en la toma de decisiones… Plan de diseminación (OBLIGATORIO) Identificar correctamente qué y a quién se quieren comunicar resultados. Complementariedad con acciones ya financiadas en otros programas Explicación de la sostenibilidad de la solución más allá de la finalización de la propuesta (visión a medio-largo plazo). Plan de explotación (OBLIGATORIO) Es bueno hacer un SWOT análisis, explicar cómo afecta a la actividad de cada socio, explicar cómo el proyecto influenciará el sector, intentar cuantificar (no sólo descripción cualitativa)… 69 Impacto (II) Demostrar el beneficio real: la reducción de riesgos y costes para el usuario final Ser realistas en cuanto a los medios técnicos y humanos necesarios para llevar a cabo la propuesta Tratar de integrar información sobre sistemas y procesos ya existentes 70 Implementación (I) Incluye : • Work plan, distribución de tareas y recursos de todo tipo. • Descripción y explicación del consorcio • Management plan, Risk & contingency plan, Innovation management plan, Internal communication plan Coherencia y eficacia en el plan de trabajo a desarrollar (no dejar escapar los detalles) Planes de contingencia y mitigación de riesgos concisos pero específicos para cada paso crítico dado en pos de la solución. Dimensión de colaboración internacional, si se da el caso, debe estar muy bien explicada (qué partner, porqué él, tareas específicas, explotación posterior, ...). Integración de usuarios finales como socios de las propuestas (Advisory Boards son cosa del pasado) y con competencias reales en la materia Consorcio equilibrado y bien balanceado 71 Implementación (II) Planificar bien los deliverables Ni demasiados, ni muy pocos, ni todos al final del proyecto! No dejar tareas sin especificar quién las va a hacer, cuándo se va a iniciar acabar y cuál es el resultado (entregable) de la misma. Tampoco sobre-saturar de tareas!!!!! Consorcios: Atención condiciones de eligibilidad!!!! Una propuesta competitiva tiene bien definida la relación entre los partners y usuarios al respecto de la explotación, cesión y uso de los resultados, así como actividades bien detalladas. Equipos multidisciplinares, con verdaderos especialistas de cata tema, p.e., de temas éticos, regulación, estandarización, business,… Atención colaboración internacional muy bien detallada y justificada! 72 Lecciones aprendidas… Una buena propuesta explica bien sus objetivos, de forma clara y concisa en las primeras páginas Las propuestas buenas explican cómo responden, punto por punto, a las demandas del topic, de la call y del contexto general del programa en las políticas EU (compliance matrix). Atención a la planificación de las fechas de preparación de propuestas (no dejar todo lo importante para Julio-Agosto!!) Una propuesta buena da una imagen unificada y no de un “collage” de contribuciones. Se debe integrar bien a los usuarios finales desde el principio de la propuesta, y eso se nota. La identificación de diferentes tipos de usuario final al que se pretende llegar (target public) es clave para que una propuesta de solución sea creíble. Esto influye en un buen plan de comunicación y de aproximación a cliente/usuario. Una propuesta buena presenta unas secciones de ethics, data protection, security aspects concisas pero bien elaboradas (quién, qué, cómo). 73 EN CONCLUSIÓN • Si quieres saber si una propuesta es convincente de cara a un evaluador; • DÁSELA A LEER A ALGUIEN Y OBSERVA 74 Escrutinio de propuestas • En qué consiste? Análisis de los entregables y actividades de la propuesta en cuanto al uso de background, manejo o generación (foreground) de información/datos sensibles de comprometer aspectos de seguridad nacional. • Cuál puede ser el resultado? Puede dar lugar a clasificación de entregables, a actividades, o al total de la propuesta. ATENCIÓN: EN H2020 NO se financian “proyectos sensibles”. • Proposal with No Security Concerns (NSC) No classification but Recommendations for the grant agreement preparation "Restricted UE" and recommendations for the grant agreement preparation "Confidential UE" and recommendations for the grant agreement preparation "Secret UE" and recommendations for the grant agreement preparation Not to finance the proposal Qué cosas son “sensibles” en una propuesta? Desde el punto de vista temático (subject of research) o tipológico (type of research). ATENCIÓN: NO punto de vista de confidencialidad comercial o explotación. Potential sensitive subject of research: explosives & CBRN infrastructure & utilities border security intelligent surveillance terrorism & organised crime digital security space 75 Potential sensitive type of research: threat assessments vulnerability assessments specifications capability assessments incidents/scenarios based on reallife security incidents and potential threat scenarios Escrutinio de propuestas • Cómo proceder 1/2 En la template de la Parte-B de toda propuesta aparece la table 3.1.e: List of deliverables donde se debe indicar, para cada deliverable el tipo de deliverable y el nivel de diseminación. Key for classification of deliverables indicating the TYPE and the DISSEMINATION LEVEL TYPE: R: Document, report DEM: Demonstrator, pilot, prototype, plan design DEC: Website, patent filing, press & media actions, videos, etc OTHER: Software, technical diagram, etc DISSEMINATION LEVEL: PU: Public, fully open, i.e., web CO: Confidential, restricted under conditions set in the model GA CI: Classified, information as referred in EC Decission 2001/844/EC Table 3.1.e List of deliverables CDTI CDTI SOST Univ.Free SOST Univ.Free CDTI 76 Escrutinio de propuestas • Cómo proceder 2/2 Además, en la template de la Parte-B de toda propuesta aparece el capítulo de aspectos de seguridad. Si “Activities or results raising security issues: YES”, entonces será encesario adjuntar la SAL junto con la tabla anexa y descripción sobre qué entidad y quién va a gestionar esta información (6.3.1) así como si habrá un SAB (6.3.2) y, finalmente, si hay otras medidas de seguridad (6.4). Yes / No Yes / No 77 Aspectos éticos y protección de datos (1) • Todas las propuestas de la convocatoria pasarán por el panel ético Expertos independientes, legislación y principios éticos que deben cumplir, recomendaciones en la implementación. • Todas las propuestas deben describir las cuestiones éticas planteadas y la forma en que se abordarán de manera que cumpla las regulaciones nacionales, europeas e internacionales. • Las propuestas son responsables de: – Identificar posibles temas éticos en las propuestas – Gestionarlos dentro de la propuesta, detallarlos y desarrollar estas actividades durante el proyecto (importancia de planificar estas actividades, presupuestar, posible creación de un ethics advisory board, etc.) Rellenar las hojas de “Ethics self-assessment” – parte A de la propuesta 78 Aspectos éticos y protección de datos (2) • Ejemplos de temas con implicaciones éticas que pueden aparecer en propuestas de sociedades seguras: – Data privacy (difusión, procesamiento, etc.) – Data protection (legislación, medidas de seguridad, etc.) – Mission/Function creep: cuando se amplía el alcance del proyecto a otros ámbitos en los que se puedan dañar valores éticos fundamentales. – Dual use – Misuse/Malevolent use Uso malintencionado de sistemas/tecnologías, etc. 79 Contenidos 1. 2. 3. 4. Introducción a la temática Resultados de España en Seguridad Convocatoria 2016 de Sociedades Seguras Recomendaciones prácticas para la preparación de propuestas 5. Información de interés 80 Plataformas, asociaciones y grupos de interés en España 81 Plataformas, asociaciones y grupos de interés en Europa IMG-S 82 (…) El equipo de Secure Societies en España La Delegación española en el Comité de Gestión Secure Societies Dirección Programas Internacionales Maite Boyero Egido [email protected] DG GUCI - Servicio de Innovación tecnológica Nathalie Páez [email protected] Puntos Nacionales de Contacto de la temática Dirección Programas Internacionales Maite Boyero Egido [email protected] Oficina de Proyectos Europeos Ainara Ripa Centeno [email protected] El equipo CDTI en Bruselas Dirección Programas Internacionales 83 Marina Martínez [email protected] Enlaces de interés y otra información Fuentes de información Programa de Trabajo 20162017 http://ec.europa.eu/research/participants/data /ref/h2020/wp/2016_2017/main/h2020wp1617-security_en.pdf Web EC Secure societies H2020 http://ec.europa.eu/dgs/home-affairs/whatwe-do/policies/crisis-and-terrorism/securityresearch/index_en.htm Web Horizonte 2020 Español http://eshorizonte2020.es/ IPR & Open Access http://ec.europa.eu/research/sciencesociety/index.cfm?fuseaction=public.topic&id= 1301 Ethical issues http://ec.europa.eu/research/participants/doc s/h2020-funding-guide/cross-cuttingissues/ethics_en.htm Búsqueda en Socios en H2020 http://www.security-researchen Sociedades Seguras (red map.eu/index.php?file=search.php&type=1 Puntos Contacto, próximamente, SEREN3) 84 Más enlaces de interés • Security Research (DG HOME): http://ec.europa.eu/dgs/home-affairs/what-wedo/policies/crisis-and-terrorism/security-research/index_en.htm • Security Research (REA): [email protected] • Infoday nacional Seguridad, 23 de febrero de 2016. Presentaciones disponibles en www.cdti.es • Security Research Conference – La Haya, 1 y 2 de Junio de 2016 (www.srie2016.com) • SMI2Gs (Security Mission Information and Innovation Groups) – Brokerage event finales de enero de 2016: http://www.asd-europe.org/communication/useful-links/smi2g/ • Infoday y Brokerage Event Europeo, 5 y 6 de abril de 2016: https://www.b2match.eu/seren3brussels2016/pages/13547-presentations • Red de NCPs de Seguridad, SEREN3: www.seren-project.eu • LISTAS DE DISTRIBUCIÓN CDTI: http://bit.ly/1UBgtbn 85 Muchas gracias por su atención Maite Boyero [email protected] 86