EL PROGRAMA SOCIEDADES SEGURAS EN H2020 C...
Transcript of EL PROGRAMA SOCIEDADES SEGURAS EN H2020 C...
EL PROGRAMA SOCIEDADES SEGURAS EN H2020
CONVOCATORIA 2016
Infoday UC3M. Leganés, 12 de mayo de 2016
Maite Boyero Representante española y NCP en Sociedades Seguras
2
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
3
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
4
Algo de historia sobre el Programa
“European Security Research: The Next Steps” (Sept 2004)
GoP report “Research for a secure Europe” (March 2004)
time2004 2005 2006 2007
“Towards an EU Defence Equipment Policy” (March 2003)
PASR (2004-2006)
European Security Research within FP 7 (2007 and beyond)ESRAB (2005-2006)
ESRAB report“Meeting the challenge: the European Security Research Agenda”(October 2006)
European Security
Strategy
(2003)
5
Investigación en Seguridad en VIIPM La Visión
Desarrollar tecnologías y producirconocimiento que reduzca los gaps de capacidades
Superar la fragmentación de losmercados
Estimular la colaboración entre proveedores de tecnología y usuarios
6
I+D en Seguridad en VII PM
FP 7
Security Research
CBRN
Explosives
2. Security of
infrastructures and
utilities
1. Security of the
Citizens
6. Security and
society
4. Restoring
security and safety
in case of crisis
3. Intelligent
surveillance and
border security
Land Border/
Checkpoints
Sea
Border
citizens and
security
Foresight
Understanding
organisational
structure and
cultures of public
users
Organised
Crime
Counter
Terrorism
Buildings/
Design
Energy/
Transport/
Communication
Grids
preparedness
and planning
Recovery
Surveillance
5. Security systems
integration,
interconnectivity and
interoperability
7. Security
Research
coordination and
structuring
CBRN
Security
Economics
Ethics and justice
Specific
Areas
Mission
Areas
Interoperable
Secure
communication
Security Missions
Cross-cutting
Missions
Information
management
Air
Border
Supply chains
Response
ERA-NET
Pre-normative
research
SME’s
Studies
NCP &
Otehrs
• 1.350 M€ en 7 años
• Más de 350 proyectos financiados
• Progresiva integración de usuarios finales en los proyectos
7
EU Framework Programme for Research and Innovation
2014-2020
Essential part of Europe 2020 Strategy
Focus on social challenges which are being faced by the European society,
e.g. the Secure Societies~ 80.000 M€
Simplification Partnerships: Public-Private, Public-Public
International cooperation
8
ICT
Nanotechnology
Biotechnology
Advanced Materials
Advanced Manufacturing& Processing
Space
Access to Risk Finance
Innovation in SMEs
European ResearchCouncil (ERC)
Future and EmergingTechnologies (FET)
Marie Skłodowska-Curie actions on skills, training and career development
European researchinfrastructures
Health, demographic change and wellbeing
Food security, sustainable agriculture and forestry, marine and maritime and inland water research and the bioeconomy;
Secure, clean and efficient energy;
Smart, green and integrated transport;
Climate action, environment, resourceefficiency and raw materials
Secure Societies: Protecting freedom and security of Europe and its citizens
Europe in a changing world-Inclusive, innovative and reflexive societies
ExcellentScience
SocietalChallenges
Industrial Leadership
Programa Marco de Investigación e Innovación (2014-2020)
1.613 M€
Seguridad en H2020: SOCIEDADES SEGURAS
9
Secure Societies REGULATION (EU) 1291/2013 establishing Horizon 2020
The specific objective is to foster secure European societies in a context of unprecedented transformations and growing
global interdependencies and threats, while strengthening the European culture of freedom and justice. • Europe has never been so peacefully consolidated, and the levels of security enjoyed by European citizens are high compared to other parts of the world. However,
Europe's vulnerability continues to exist in a context of ever-increasing globalisation in which societies are facing security threats and
challenges that are growing in scale and sophistication.
• The threat of large-scale military aggressions has decreased and security concerns are focused on new multifaceted, interrelated and transnational threats. Aspects such as
human rights, environmental degradation, political stability and democracy, social issues, cultural and religious identity or migration need to be taken into
account. In this context the internal and external aspects of security are inextricably linked. In order to protect freedom and
security, the Union requires effective responses using a comprehensive and innovative suite of security instruments. Research and innovation can
play a clear supporting role although it cannot alone guarantee security. Research and innovation activities should aim at understanding, detecting,
preventing, deterring, preparing and protecting against security threats. Furthermore, security presents fundamental challenges that cannot be resolved by independent and sector-specific treatment but rather need more ambitious, coordinated and holistic approaches.
• Many forms of insecurity, whether from crime, violence, terrorism, natural or man-made disasters, cyber-attacks or privacy abuses, and other forms of social and economic disorders increasingly affect citizens. According to estimates, there are likely to be up to 75 million direct victims of crime every year in Europe ( 1 ). The direct cost of crime,
terrorism, illegal activities, violence and disasters in Europe has been estimated at least EUR 650 billion (about 5 % of the Union GDP) in 2010. Terrorism has
shown its fatal consequences in several parts of Europe and worldwide costing many lives and important economic losses. It also has a significant cultural and global impact.
• Citizens, firms and institutions are increasingly involved in digital interactions and transactions in social, financial and commercial areas of life, but the development of
Internet has also led to cyber crime worth billions of Euros each year, to cyber-attacks on critical infrastructures and to breaches of privacy affecting individuals
or entities across the continent. Changes in the nature and perception of insecurity in everyday life are likely to affect citizens' trust not only in institutions but also in each
other. In order to anticipate, prevent and manage these threats, it is necessary to understand the causes, develop and apply
innovative technologies, solutions, foresight tools and knowledge, stimulate cooperation between providers and users, find civil security solutions, improve the competitiveness of the European security industry and services, including ICT, and prevent and combat the abuse of privacy and breaches of human rights in the Internet and elsewhere, while ensuring European citizens' individual rights and freedom.
To enhance better cross-border collaboration between different kinds of emergency services, attention should be given to interoperability and standardisation. Finally, as
security policies should interact with different social policies, enhancing the societal dimension of security research will be an
important aspect of this societal challenge.
10
Seguridad: un reto industrial
La industria de la seguridad es uno de los sectores con mayor potencial para el crecimiento y el empleo en la UE. En 2011, el sector empleaba a 180.000 personas, con una facturación anual de aproximadamente € 30 mil millones.
El programa de Seguridad ayudará a:
– Superar la fragmentación del mercado a través de las normas en toda la UE
– Reducir la brecha entre la investigación y la llegada al mercado de soluciones mediante la introducción de nuevos sistemas de financiación, tales como la contratación pre-comercial (PCP)
– Mejorar la integración de los aspectos sociales mediante la evaluación del impacto de las tecnologías de seguridad en materia de derechos fundamentales
11
Implicación de distintos stakeholders
La seguridad es un tema que sólo se puede abordar con eficacia si todas las partes interesadas cooperan. Representantes de los sectores público y privado deben trabajar en cooperación.
Así, los programas de trabajo están dirigidos a: – Empresas privadas
– Asociaciones industriales, centros tecnológicos, grupos de investigación
– Actores institucionales
12
The European Agenda on SecurityCOM(2015) 185 final (28 April 2015)
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/index_en.htm
The European Agenda on MigrationCOM(2015) 240 final (13 May 2015)
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/european-agenda-migration/background-information/index_en.htm
Políticas de la UE relacionadas con la temática I
Securing EU bordershttp://ec.europa.eu/dgs/home-affairs/what-we-do/policies/securing-eu-borders/index_en.htm
A number of proposed legislative initiatives including the proposal for a European Border and Coast Guard (15 December 2015)
Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace COM (2013) 1
Promoting a single market for cybersecurity productshttp://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf
13
2008 EU Action Plan on Enhancing the Security of Explosives
Regulation (EU) No 98/2013 on the marketing and use of explosives precursors
Towards a stronger European disaster response: the role of civil protection and humanitarian assistance, COM(2010)600
EU Action Plan on combating terrorism
The Security Industry Policy Action Plan COM (2012)417 final
Políticas de la UE relacionadas con la temática II
14
EU Strategy and Action Plan for customs risk management (COM (2014) 527 final)
The EU Strategy towards the eradication of Trafficking in Human Beings 2012–2016, COM(2012) 286
European Programme for Critical Infrastructure Protection (EPCIP), COM(2006)786
Civilian Headline Goal 2008 (15863/04)
EU Maritime Security Strategy (11205/14) and its action plan (17002/14)
EU Civil Protection Mechanism (Decision 1313/2013/EU)
Políticas de la UE relacionadas con la temática III
15
Objetivos y áreas que cubre el programa
Lucha contra la delincuencia, el crimen y el terrorismo
Recuperación de Europa frente a crisis y desastres
Seguridad cibernética
Protección y resiliencia de infraestructuras críticas, modos de transporte y cadenas de suministro
Mejorar la seguridad y la gestión de las fronteras
Seguridad en el exterior, en misiones civiles
Aspectos sociales, éticos, de privacidad y libertad de los
ciudadanos
Estandarización e interoperabilidad de sistemas
16
Particularidades del programa
2 DGs aportan financiación: DG HOME y DG CONNECT
Orientación a USUARIO FINAL (Practitioners)
Proyectos cercanos a mercado (TRL 4 a 7)
Aplicación civil, exclusivamente
Algunos proyectos resultarán clasificados
Estandarización y certificación de soluciones y demostración de resultados
Aspectos éticos de los proyectos
17
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
18
Seguridad en el VII Programa Marco
• 1.350M€ invertidos en 7 años de programa (2007-2013)• España se consolidó como 5º país• Buena participación tanto en proyectos grandes como pequeños• Excelente participación de la industria (+45% ppto). Los usuarios
finales se implicaron muy activamente en las últimas convocatorias.
FP7-SEC: Resultados de las 6 convocatorias + Convocatoria SEC/ICT
Financiación actividades
Financiadas España (% del total) 166 (52,4%)
Coordinadas España (% del total) 30 (9,5%)
Retorno económico (España)
Millones de € 118,19 M€
Retorno (% UE) 9,55 %
Retorno (% del total) 8,7 %
19
Sociedades Seguras, H2020Programa de trabajo 2014-2015
Gestión de crisis y desastres, incl.
Cambio climático
Lucha contra el crimen y el terrorismo
Seguridad fronteriza y seguridad en el
exterior
Seguridad digital / Ciberseguridad
400 M€
NEW
NEW
20
Particularidades PT 2014-2015
• Presupuesto/ranking lists por convocatoria, no por topic (excepto topics DS)
• Topics “huérfanos”, sin propuestas financiadas, mientras otros han tenido varias propuestas
• Topics muy genéricos, podían llevar a “interpretación”
• Alta competencia (tasas de sobre-suscripción entre 10 y 12 veces)
• No habido condiciones de elegibilidad
21
Resultados de España en convocatoria 2014*
Resultados provisionales de las 4 convocatorias (DRS, FCT, BES y DS)
Financiación actividades Financiadas España (% del total) 24 (58,5%)
Coordinadas España (% del total) 4 (9,8%)
Retorno económico (España)
Millones de € 12,67 M€
Retorno (% UE) 7,6 %
Retorno (% del total) 6,9 %
* Información no definitiva
WP 2014: 25 topics, ~ 200M€. 49 proyectos financiados
Global oversubscription rate: 9,86
22
Convocatoria 2014: resultados por países
0,00%
2,00%
4,00%
6,00%
8,00%
10,00%
12,00%
14,00%
16,00%PRESUPUESTO SOLICITADO
RETORNOS OBTENIDOS
0,00%
2,00%
4,00%
6,00%
8,00%
10,00%
12,00%
14,00%
16,00%
18,00%
España queda en el 6º puesto, tras: UK (15,9%), DE (11%), IT(9,5%),
GR(8,9%) y FR(7,6%)
23
Resultados provisionales convocatoria 2015
24
Desglose del presupuesto
BES; 42,17
DS; 50,21
FCT; 42,16
DRS HOME, 61.73
DRS RTD (Climate
Action), 28
DRS, 89.73
Budget 2015: 224.27 M€ *
* Including SME challenge (7.4 M€) but not FTI (3.92 M€)
25
H2020-Secure Societies-2015Propuestas por “ranking list”
*DRS: all except topics DRS-09, 10 & 11**DS-07: including 1 ineligible proposal with 62MEUR funding
26
Proposals were submitted under all topics
Cobertura por topic
Topic nr 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
BES 7 18 1 5 9 14 5 9 11 3 10
DRS 37 10 4 14 6 44 16 21 28 8 1 8
DS 28 38 24 12
FCT 15 9 31 12 15 9 25 22
27
Resultados de la evaluación
Global Success Rate: 8.0%
In the call 2014 it was 9.2%
0
50
100
150
200
250
BES DRS DS FCT
Rejected Reserve Main
Rejected Reserve MainBES 81 1 10DRS 179 4 14DS 88 4 10FCT 125 1 9Total 473 10 43
28
Resultados convocatoria 2015*
• España queda como 1er país, en términos de retorno, en esta convocatoria (14,6% retorno total, 15,45% UE)
• 4 topics desiertos (provisional)
• Alta participación de PYMES (a nivel global) y de usuarios finales – especialmente EXTRAORDINARIA participación del MINISTERIO DEL INTERIOR (1er participante a nivel global)
• España, en principio, va a coordinar 8 proyectos (el doble que en 2014)
* Datos provisionales
29
Conclusiones
• Valor de los usuarios finales en los consorcios
• Las propuestas deben trabajarse con MUCHA antelación
• Ha aumentado significativamente la calidad de las propuestas
• Recomendamos contactar con los NCPs y la delegación durante la preparación de la propuesta
30
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
31
Programa de trabajo 2016-2017
Soluciones pan-Europeas para problemas pan-Europeos
• Contribuir a las implementación de las últimas políticas Europeas de Seguridad
• Fomentar la “Europeanización” de los usuarios finales (practitionners) que demandan soluciones innovadoras a la industria Europea
• Combinar las amenazas físicas y ciber-amenazas de seguridad
• Aumenta el número de PCPs
http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h2020-wp1617-security_en.pdf
32
Novedades que cabe destacar
• Nuevas condiciones de elegibilidad -> “Europeanización” de los usuarios finales (deberán ser integrados directamente en la propuesta como SOCIOS!!)
• Presupuesto por topic (no por convocatoria)
• Importancia de los PCPs (se financian al 90%)
• Lanzamiento de una cPPP en Ciberseguridad en la segunda mitad de 2016, que se integrará en el programa a partir de 2016
33
Condiciones de elegibilidad (ejemplo)
SEC-12-FCT-2016: Technologies for prevention, investigation and mitigation in the context of fight against crime and terrorism
a) In Sub-topic: 1, Sub-topic: 2 or Sub-topic: 3: a minimum of 3 Law enforcement agencies (LEA) from 3 EU Member States or Associated Countries must be beneficiaries of the grant agreement and should be directly involved in the
carrying out of the tasks foreseen in the grant.
b) In other fields (Sub-topic: “Others”): a minimum of 5 LEA from 5 EU Member States or Associated Countries must be beneficiaries of the grant agreement and should be directly involved in the carrying out of the tasks foreseen in the grant.
c) Proposals on detection technologies are excluded from this topic.
d) Any proposal must include a workpackage for field demonstrations.
Only the sub-topics not covered in 2016 will remain eligible in 2017. A list of topics that remain eligible in 2017 will be published in due time in the section "Topic
Conditions & Documents" for this topic on the Participant Portal.
34
Presupuesto por topic
Cómo se aplica? Objetivos?
Reducción de los “topics huérfanos”
Menor duplicidad en proyectos
Mejorar el apoyo a la implementación de políticas
Evitar la competencia entre distintos tipo de proyecto (CSA vsRIA/IA)
Reducción del sesgo en determinadas áreas científicas
Cuándo se aplica? En casi todos los topics, aunque hay algunas pequeñas
excepciones en las que varios topics comparten presupuesto
35
Estructura del PT 2016-2017
3 convocatorias paralelas/ separadas:
Critical Infrastructure Protection• Combinación de amenazas ciber y físicas, enfocándose en distintossectores críticos
Security• Disaster resilient societies
• Fight against crime and terrorism
• Border and External security
• General Matters
Digital Security Focus Area• ICT, Secure societies and eHealth
2016: Abre: 15 Mar 2016, Cierra: 25 Ago 20162017: Abre: 01 Mar 2017, Cierra: 24 Ago 2017
~ 380 M€
36
Budget: €382,36 million 2016=M€185; 2017=M€197
3 Calls & 30 topics:
• CRITICAL INFRASTRUCTURE PROTECTION – CIP (1 topic)(2016=M€20;2017=M€20)
• SECURITY – SEC (2016=M€113; 2017=M€121):
o Disaster-resilience: safeguarding and securing society – DRS (5 topics)
o Fight against Crime and Terrorism – FCT (7 topics)
o Border Security and External Security – BES (8 topics)
o General Matters – GM (1 topic)
• Digital Security Focus Area – DS (5 topics) (2016=M€29; 2017=M€36)
SME Instrument (2016=M€15; 2017=M€14)
Fast track to Innovation – Pilot (2016=M€4)
Other Actions (2016=M€15; 2017=M€14)
WP 2016-2017 – Desglose del Presupuesto
http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h2020-wp1617-security_en.pdf
37
Calendario
Publication
14/10/15
Opening
15/03/16Deadline 25/08/16
Remote Evaluation (IER)
12/09/16 – 30/09/16
Evaluation in Bxl
(CR)
03–21/10/16
Panel Meeting
(ESR)
October 2016
Remote
Ethics Screening
17/10-03/11
CMs
Ethics Screening
7-11/11/2016
Security Scrutiny
Nov-Dec 2016
Information to Programme
Committee and to applicants
+ Review Jan 2017
Grant Preparation+
Programme Committee consultation
Feb-April 2017
Start of projects
from
May 2017
38HORIZON 2020
38
CIP-01-2016-2017: Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe.
ToA Funding
(M)
Ind.Budget
(M)
TRL Scope
IA 20.0 8.0 7 Critical Infrastructures:
• Water Systems
• Energy Infrastructure (power plants and distribution)
• Transport Infrastructure and means of transportation
• Communication Infrastructure
• Health Services
• Financial Services.
Should cover: prevention, detection, response, and (in case of failure)
mitigation of consequences over life span CI, achieving security &
resilience of all functions performed by the installations, and of
neighbouring populations and the environment.
The participation of SMEs is strongly encouraged.
international cooperation
Max.1 project will be selected per CI
Installations not covered in 16 will remain eligible in 17
Eligibility and admissibility cond.:
At least 2 operators of the chosen type
of critical infrastructure operating in 2
countries must be beneficiaries
(possibly, but not necessarily:
coordinator) of the GA and should be
directly involved in the carrying out of
the tasks foreseen in the grant.
The participation of industry able to
provide security solutions is required.
WP 2016-2017Call - CIP
Topics
39
Call - SECURITY (1)Disaster-resilience: safeguarding and securing society
WP 2016-2017Topics
•Objective:
•To reduce the loss of human life, environmental, economic and material damage from natural and man-made disasters, including from extreme weather events, crime and terrorism threats.
SEC-01-DRS-2016: Integrated tools for response planning and scenario building SEC-02-DRS-2016: Situational awareness systems to support civil protection
preparation and operational decision making SEC-03-DRS-2016: Validation of biological toxins measurements after an
incident: Development of tools and procedures for quality controlSEC-04-DRS-2017: Broadband communication systems (DG HOME) SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN)
cluster (DG HOME)
40
SEC-01-DRS-2016: Integrated tools for response planning and scenario building
Disaster risks (natural/accidental/intentional) addressed in the context of: EU Civil Protection Mechanism (Decision 1313/2013);
the IPCC recommendations to extreme climatic events;
the Sendai Framework
IA / 8 MEUR / Ind. Budget: 8 MEUR / TRL 7 or 8
Participation SMEs is strongly encouraged
International cooperation
At least 1 from each of the 5 categories of FR (firefighting units; medical emergency services;police departments; civil protection units; control command centres).
SEC-02-DRS-2016: Situational awareness systems to support civil protection preparationand operational decision making
Identify new and promising solutions, develop and agree on the core set of specifications of aspecific system, on the roadmap for research still needed, and related tender documents tobase future procurements.
The EU may contribute to subsequent actions (PCP, PPI, others)
CSA / 1,5 MEUR / Ind. Budget: 1,5 MEUR
Max 1 proposal funded
International cooperation
WP 2016-2017Topics
41
SEC-03-DRS-2016: Validation of biological toxins measurements after an incident:Development of tools and procedures for quality control
Develop quality control tools, as well as the Standard Operating Procedures necessary forestablishing a mechanism to systematically validate laboratory-based measurement techniques,including sample preparation strategies and analyses made in-situ issued by mobile and quicklydeployable laboratories, which should be proposed for adoption at EU level.
IA / 8 MEUR / Ind. Budget: 8 MEUR
At least 3 control laboratories from different MS/AC
SEC-05-DRS-2016-2017: Chemical, biological, radiological and nuclear (CBRN) cluster(DG HOME)
Part a) Issue list of technologies to be developed to integrating them into the platforms(building inventory EDEN project). The CSA will deliver the first version of the catalogue on timefor use in the implementation of Part b) - RIA
CSA / 2 MEUR / Ind. Budget: 2 MEUR
Additional exploitation obligation
WP 2016-2017Topics
42
WP 2016-2017Topics
•Objective:
•To mitigate potential consequences of incidents, or to avoid them by using new technologies and capabilities for fighting and preventing crime (including cyber-crime), illegal trafficking and terrorism (including cyber-terrorism), including understanding and tackling terrorist ideas and beliefs, whilst respecting human rights and privacy.
SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from earlyunderstanding to improving protection
SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation of criminal andterrorist acts
SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, across the timeline of
a plot SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the context of fight
against crime and terrorism SEC-09-FCT-2017: Toolkits integrating tools and techniques for forensic laboratories (DG HOME) SEC-10-FCT-2017: Integration of detection capabilities and data fusion with utility providers’ networks
Call - SECURITY (2)Fight against crime and Terrorism
43
RIA / 17 MEUR / Ind. budget: 3 MEUR
International cooperation
"Practitioners (including LEA) from at least 5 MS/AC"
SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU fromearly understanding to improving protection
Focus on developing policy recommendations and practical solutions to be implemented bysecurity end-users vs SC 6 focuses on studying the phenomenon of radicalization to provideinput to policy-making.
SEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and Mitigation ofcriminal and terrorist acts
5 Sub-topics: New methods for protection of crowds; prevent, investigate and mitigatecybercriminal behaviours; pim corruption and financial crime; pim petty crimes; pim domesticviolence.
Only sub-topics not covered in 2016 will be eligible in 2017
Max 1 proposal funded per sub-topic
Must include a WP for practical demonstrations.
WP 2016-2017Topics
44
RIA / 27,25 MEUR / Ind. Budget: 5 MEUR
SEC-08-FCT-2016: Forensics techniques on: a) trace qualification, and b) broadened use of DNA
TRL 5 / International cooperation
Forensic laboratories/institutes from minimum 5 MS (additional AC is encouraged)
Max 1 proposal funded for part a) and part b)
SEC-11-FCT-2016: Detection techniques on explosives: Countering an explosive threat, acrossthe timeline of a plot
Coordination with EDA activities
Practitioners in the field of counter-terrorist activities from at least 3 MS/AC
SEC-12-FCT-2016-2017: Technologies for prevention, investigation, and mitigation in the contextof fight against crime and terrorism
TRL 6
Only sub-topics not covered in 2016 will be eligible in 2017
Max 1 proposal funded per sub-topic
Sub-topics 1-2-3 at least 3 LEA MS/AC (S-t others: at least 5)
Detection technologies are excluded
Must include a WP for field demonstrations
WP 2016-2017Topics
45
Call - SECURITY (3)Border Security and External Security
SEC-13–BES–2017: Next generation of information systems to support EU external policies
SEC-14-BES–2016: Towards reducing the cost of technologies in land border security applications
SEC-15-BES–2017: Risk-based screening at border crossing
SEC-16-BES–2017: Through-foliage detection, including in the outermost regions of the EU
SEC-17-BES-2017: Architectures and organizations, big data and data analytics for customs risk management ofthe international goods supply chain trade movements
SEC-18-BES–2017: Acceptance of "no gate crossing point solutions"
SEC-19-BES-2016: Data fusion for maritime security applications
SEC-20-BES-2016: Border Security: autonomous systems and control systems
WP 2016-2017Topics
•Objective:
•Improve border security, respecting human rights and privacy. Including control and surveillance issues, contributing to the European Border Surveillance System (EUROSUR) and promoting use of new technology for border checks, in relation to the Smart Borders legislative initiative.
•Support the Union's external security policies in civilian tasks.
46
SEC-14-BES–2016: Towards reducing the cost of technologies in landborder security applications
RIA
10 MEUR
Ind. Budget: 5 MEUR
Overlap with EWISA project should be avoided
Coordination with EDA activities
Enhanced SME participation
TRL 6
At least 3 border guard authorities from 3 different EU/Schengen MS
WP 2016-2017Topics
47
IA / 24 MEUR / Ind. Budget: 8 MEUR
International cooperation
SEC-19-BES-2016: Data fusion for maritime security applications
Coordination with EDA activities
TRL 7
At least 3 border guard authorities from 3 MS/AC
At least 3 independent industry organizations from 3 different MS/AC.
SEC-20-BES-2016: Border Security: autonomous systems and control systems
Cover 1 sub-topic:
1. Autonomous surveillance
2. Enhanced command and control systems for the surveillance of borders in a 3Denvironment Autonomous surveillance
SMEs is strongly encouraged
TRL 6 or 7
Practitioners from various disciplines, including Border guard authorities from at least 5EU/Schengen MS
WP 2016-2017Topics
48
General Matters SEC-21–GM-2016-2017: Pan European Networks of practitioners and other actors in the field of security (DG HOME)
WP 2016-2017Topics
Practitioners: e.g. firefighters, police and intelligence communities, border guards, custom authorities, explosive specialists, forensic laboratories, medical emergency teams, etc.
4 different categories of networksa. Same discipline and from across Europeb. From different disciplinesc. From around Europe that manage demonstration and testing sites, training facilities,
including simulators or serious gaming platforms in the area of CBRN and for first responders or civil protection practitioners
d. Consortium of formally nominated NCPs in the area of security research (2017) CSA 15,5 MEUR (2016) Indicative budget: 3,5 MEUR (a, b & c) / duration 5 years Additional Eligibility/Admissibility condition (several including):
- For part a) & c): Practitioner participation from at least 8 MS/AC- For part b): Practitioner participation from at least 2 MS/AC from outside the region.
49
Call – DIGITAL SECURITY FOCUS AREA
DS-01-2016: Assurance and Certification for Trustworthy and Secure ICT systems,services and components (LEIT–ICT)
DS-02-2016: Cyber Security for SMEs, local public administration and Individuals /IA-22 MEUR
DS-03-2016: Increasing digital security of health related data on a systemic level (SC1"Health, demographic change and wellbeing")
DS-04-2016: Economics of Cybersecurity / RIA-4 MEUR
DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity andPrivacy Research and Innovation (DG CNECT) / CSA-3 MEUR (2-0.5-0.5) / Strand 1: 4year duration / Max 1 proposal funded per strand
DS-06-2017: Cryptography (LEIT–ICT)
DS-07-2017: Addressing Advanced Cyber Security Threats and Threat Actors
DS-08-2017: Privacy, Data Protection, Digital Identities
WP 2016-2017Topics
50HORIZON 2020
50
DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
WP 2016-2017 – Call DS
51HORIZON 2020
51
DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
Considering the adequate level of security commensurate with the considered use-case, proposals may address one type of end-user: SMEs, local PA, individual citizens.
Basic cyber security threats
Organisation size and budgetary constraints
Individuals, the "weakest link“?
Human factors, behaviour
Innovative solutions: usability, automation
Consider: guidance, best practices and standards
Validation: end-user feedback
Encouraged to include public and/or private security end-users
TRL 6 or 7
IA / 22 MEUR / Ind. Budget: 3-4 MEUR
WP 2016-2017 – Call DS
52HORIZON 2020
52
DS-04-2016: Economics of Cybersecurity
WP 2016-2017 – Call DS
53HORIZON 2020
53
DS-04-2016: Economics of Cybersecurity
[...] combining methods from microeconomics, econometrics, qualitative social sciences, behavioural sciences, decision making, risk management and experimental economics.
1. Cost-benefit
Intangible assets, metrics, optimal investment, insurance
2. Incentives and business models
Incentives, cooperative and regulatory approaches
Information security markets (e.g. bug bounties, vulnerability disclosure)
Revenue models for criminal activity
Institutional innovation
RIA / 4 MEUR / Ind. Budget: 1-2 MEUR
WP 2016-2017 – Call DS
54HORIZON 2020
54
DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy
Research and Innovation
WP 2016-2017 – Call DS
55HORIZON 2020
55
DS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation (CNECT)
A better overview of EU, MS and regional activities.
Exchange of views on global level; promote EU stakeholder participation.
May cover one of the three strands (CSAs)
1. Synergies between H2020, EU Member States and associated countries R&I activities and cybersecurity innovation clusters.
4 years (2014/15 + 2016/17) / Ind. Budget: 2 MEUR
2. International dialogue with Japan / Ind. Budget: 0,5 MEUR
3. International dialogue with the USA / Ind. Budget: 0,5 MEUR
3 MEUR
Only the best proposal may be funded for strands 1, 2
& 3.
WP 2016-2017 – Call DS
56
CIP-01-2016-2017: Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe
SEC-01-DRS-2016: Integrated tools for response planning and scenario buildingSEC-02-DRS-2016: Situational awareness systems to support civil protection
preparation and operational decision makingSEC-06-FCT-2016: Developing a comprehensive approach to violent
radicalization in the EU from early understanding to improving protectionSEC-07-FCT-2016-2017: Human Factor for the Prevention, Investigation, and
Mitigation of criminal and terrorist actsDS-02-2016: Cyber Security for SMEs, local public administration and IndividualsDS-04-2016: Economics of CybersecurityDS-05-2016: EU Cooperation and International Dialogues in Cybersecurity and
Privacy Research and Innovation
Secure Societies SSH flagged topics
57
Secure Societies Gender flagged topics
SEC-06-FCT-2016: Developing a comprehensive approach to violent radicalization in the EU from early understanding to improving protection
DS-02-2016: Cyber Security for SMEs, local public administration and Individuals
58
Cybersecurity contractual Public-Private Partnership (cPPP)
• Estimular las capacidades de competitividad e innovación de la industria de la seguridad digital y la privacidad en Europa
• Garantizar un suministro sostenido de productos y servicios innovadores de seguridad cibernética en Europa
59
Algunos datos sobre la cPPP
Lanzamiento previsto a mediados de 2016
Ppto estimado: 450-500M€ para 2016-2020
Programas implicados: SECURE SOCIETIES + LEIT-ICT, principalmente, otros podrían unirse (Energía, etc.)
En proceso de constitución de la Asociación Sectorial/industrial en ciberseguridad -> posibilidad de enviar expresiones de interés para ser Miembro (asociación EOS – European Organization forSecurity)
Afectará a las convocatorias de 2017 (enmiendas) y sobretodo al Programa de Trabajo 2018-2020
60
Próximos pasos en la constitución de la cPPP
61
Algunos temas que cubrirá la cPPP(provisional)
Assurance /Security Engineering Data Protection
Privacy preserving technnologies
Identity and Access Management
Trust management Risk management
Governance and cyber security management
network security
system security Cloud security
Trusted hardware /end point security /mobile security
Certification
Achieving User–centricity Auditing and planning
Managed/management security services
Security training services Crypto
62
2017 y más allá…
• WP 2017
– El texto debe ser ratificado en junio de 2016 (posibles enmiendas)
– OJO con los temas ya cubiertos en 2016 (se excluyen de 2017)
• PASAG (Protection and Security Advisory group) -> renovación del 50% de sus miembros
• WP 2018-2020: se empezará a debatir en el 2º semestre de 2016
63
Political drivers relating directly to H2020 objectives:
o Disruptive and Open Innovation
o Migration
o Security: terrorism – radicalisation – cybersecurity
o Physical meets digital - digitalisation of the researching/learning, working and living environment
o Energy challenge and fighting climate change
o Europe's place in the world
Strategic Programming 2018-2020 Contexto Político
64
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
65
Criterios de Evaluación
Excelencia (Descripción relevante de la llamada o topic)
Impacto
Calidad y eficiencia en la implementación
6666
Excellence
(to the extent that the proposal
addresses the WP topic)
ImpactQuality and efficiency of the
implementation
• Clarity and pertinence of the
objectives;
• Soundness of the concept, and
credibility of the proposed
methodology;
• Extent that the proposed work is
beyond the state of the art, and
demonstrates innovation potential
(e.g. ground-breaking objectives,
novel concepts and approaches,
new products, services or business
and organisational models)
• Appropriate consideration of
interdisciplinary approaches and,
where relevant, use of stakeholder
knowledge.
• The extent to which the outputs of the
project would contribute to each of the
expected impacts mentioned in the work
programme under the relevant topic;
• Any substantial impacts not mentioned in
the work programme, that would enhance
innovation capacity; create new market
opportunities, strengthen competitiveness
and growth of companies, address issues
related to climate change or the
environment, or bring other important
benefits for society;
• Quality of the proposed measures to:
• Exploit and disseminate the projectresults (including management of IPR),and to manage research data whererelevant.
• Communicate the project activities todifferent target audiences
• Quality and effectiveness of the work
plan, including extent to which the
resources assigned to work packages
are in line with their objectives and
deliverables;
• Appropriateness of the management
structures and procedures, including
risk and innovation management;
• Complementarity of the participants
and extent to which the consortium as
whole brings together the necessary
expertise;
• Appropriateness of the allocation of
tasks, ensuring that all participants
have a valid role and adequate
resources in the project to fulfil that
role.
Novedades convocatoria 2016 (RIA/IA)
6767
Excellence
(to the extent that the proposal
addresses the WP topic)
ImpactQuality and efficiency of the
implementation
• Clarity and pertinence of the
objectives;
• Soundness of the concept, and
credibility of the proposed
methodology;
• Quality of the proposed
coordination and/or support
measures.
• The extent to which the outputs of the
project would contribute to each of the
expected impacts mentioned in the work
programme under the relevant topic;
• Quality of the proposed measures to:
• Exploit and disseminate the projectresults (including management of IPR),and to manage research data whererelevant.
• Communicate the project activities todifferent target audiences
• Quality and effectiveness of the work
plan, including extent to which the
resources assigned to work packages
are in line with their objectives and
deliverables;
• Appropriateness of the management
structures and procedures, including
risk and innovation management;
• Complementarity of the participants
and extent to which the consortium as
whole brings together the necessary
expertise;
• Appropriateness of the allocation of
tasks, ensuring that all participants
have a valid role and adequate
resources in the project to fulfil that
role.
Novedades convocatoria 2016 (CSA)
68
Excelencia
Incluye :• Un estado del arte “honesto”• Identificar bien el problema y sus diferentes aspectos• Explicar detalladamente las soluciones propuestas (en todos los casos),
nuevos conceptos, etc…
Demostrar que se conoce bien los proyectos y actividades realizados en esedominio hasta el momento Explicar bien el “step forward the currentsituation”, es decir, dónde está la innovación que presentamos (verdaderainnovación)!
Claridad y concisión No repetir conceptos y apoyarse en figuras yresúmenes de lo más destacado de esa sección. (sin abusar)
Demostraciones, validaciones, etc… Hay que explicar en detalle losescenarios de prueba, los socios implicados, cómo se realizará la recopilaciónde información sobre resultados y cómo realimentará esta información alproyecto.
Credibilidad de la propuesta -> idea factible desde el punto de vista de los“Practitioners”
69
Impacto (I)
Incluye :• Repasar los items del impacto específico que lista el topic• Cuál es la mejora del conocimiento existente hasta el momento• Cómo mejoramos la competitividad de las empresas en EU y fuera de la EU• Impacto social, medioambiental (si es el caso) & long-term sustainability• Dissemination Plan, Exploitation plan (approach to market), IPR, Data manegement plan
Factor humano e impacto social No olvidar explicar aceptación social de lasolución, ergonomía, factor humano en la toma de decisiones…
Plan de diseminación (OBLIGATORIO) Identificar correctamente qué y aquién se quieren comunicar resultados.
Complementariedad con acciones ya financiadas en otros programas
Explicación de la sostenibilidad de la solución más allá de la finalización de lapropuesta (visión a medio-largo plazo).
Plan de explotación (OBLIGATORIO) Es bueno hacer un SWOT análisis,explicar cómo afecta a la actividad de cada socio, explicar cómo el proyectoinfluenciará el sector, intentar cuantificar (no sólo descripción cualitativa)…
70
Impacto (II)
Demostrar el beneficio real: la reducción de riesgos y costes para el usuario final
Ser realistas en cuanto a los medios técnicos y humanos necesarios para llevar a cabo la propuesta
Tratar de integrar información sobre sistemas y procesos ya existentes
71
Implementación (I)
Incluye :• Work plan, distribución de tareas y recursos de todo tipo.• Descripción y explicación del consorcio• Management plan, Risk & contingency plan, Innovation management plan,
Internal communication plan
Coherencia y eficacia en el plan de trabajo a desarrollar (no dejar escapar losdetalles)
Planes de contingencia y mitigación de riesgos concisos pero específicos paracada paso crítico dado en pos de la solución.
Dimensión de colaboración internacional, si se da el caso, debe estar muy bienexplicada (qué partner, porqué él, tareas específicas, explotación posterior, ...).
Integración de usuarios finales como socios de las propuestas (Advisory Boardsson cosa del pasado) y con competencias reales en la materia
Consorcio equilibrado y bien balanceado
72
Planificar bien los deliverables Ni demasiados, ni muy pocos, ni todos
al final del proyecto!
No dejar tareas sin especificar quién las va a hacer, cuándo se va a
iniciar acabar y cuál es el resultado (entregable) de la misma.
Tampoco sobre-saturar de tareas!!!!!
Consorcios: Atención condiciones de eligibilidad!!!! Una propuesta
competitiva tiene bien definida la relación entre los partners y usuarios al
respecto de la explotación, cesión y uso de los resultados, así como
actividades bien detalladas.
Equipos multidisciplinares, con verdaderos especialistas de cata tema,
p.e., de temas éticos, regulación, estandarización, business,…
Atención colaboración internacional muy bien detallada y justificada!
Implementación (II)
73
Lecciones aprendidas… Una buena propuesta explica bien sus objetivos, de forma clara y
concisa en las primeras páginas Las propuestas buenas explicancómo responden, punto por punto, a las demandas del topic, de la cally del contexto general del programa en las políticas EU (compliancematrix).
Atención a la planificación de las fechas de preparación de propuestas(no dejar todo lo importante para Julio-Agosto!!) Una propuestabuena da una imagen unificada y no de un “collage” de contribuciones.
Se debe integrar bien a los usuarios finales desde el principio de lapropuesta, y eso se nota. La identificación de diferentes tipos deusuario final al que se pretende llegar (target public) es clave para queuna propuesta de solución sea creíble. Esto influye en un buen plan decomunicación y de aproximación a cliente/usuario.
Una propuesta buena presenta unas secciones de ethics, dataprotection, security aspects concisas pero bien elaboradas (quién, qué,cómo).
74
• Si quieres saber si una propuesta es convincente de cara a un evaluador;
• DÁSELA A LEER A ALGUIEN Y OBSERVA
EN CONCLUSIÓN
75
Escrutinio de propuestas• En qué consiste? Análisis de los entregables y actividades de la propuesta en cuanto al uso
de background, manejo o generación (foreground) de información/datos sensibles decomprometer aspectos de seguridad nacional.
• Cuál puede ser el resultado? Puede dar lugar a clasificación de entregables, a actividades, oal total de la propuesta. ATENCIÓN: EN H2020 NO se financian “proyectos sensibles”.
Proposal with No Security Concerns (NSC) No classification but Recommendations for the grant agreement preparation "Restricted UE" and recommendations for the grant agreement preparation "Confidential UE" and recommendations for the grant agreement preparation "Secret UE" and recommendations for the grant agreement preparation Not to finance the proposal
• Qué cosas son “sensibles” en una propuesta? Desde el punto de vista temático (subject ofresearch) o tipológico (type of research). ATENCIÓN: NO punto de vista de confidencialidadcomercial o explotación.
Potential sensitive subject of research: explosives & CBRN infrastructure & utilities border security intelligent surveillance terrorism & organised crime digital security space
Potential sensitive type of research: threat assessments vulnerability assessments specifications capability assessments incidents/scenarios based on real-
life security incidents and potential threat scenarios
76
Escrutinio de propuestas
• Cómo proceder 1/2 En la template de la Parte-B de toda propuesta aparece latable 3.1.e: List of deliverables donde se debe indicar, para cada deliverable eltipo de deliverable y el nivel de diseminación.
Key for classification of deliverables indicating the TYPE and the DISSEMINATION LEVEL
TYPE: R: Document, report DEM: Demonstrator, pilot, prototype,
plan design DEC: Website, patent filing, press &
media actions, videos, etc OTHER: Software, technical diagram, etc
DISSEMINATION LEVEL:
PU: Public, fully open, i.e., web CO: Confidential, restricted under
conditions set in the model GA CI: Classified, information as referred in
EC Decission 2001/844/EC
CDTICDTISOSTUniv.FreeSOSTUniv.FreeCDTI
Table 3.1.e List of deliverables
77
Escrutinio de propuestas• Cómo proceder 2/2 Además, en la template de la Parte-B de toda propuesta aparece el capítulo de
aspectos de seguridad. Si “Activities or results raising security issues: YES”, entonces será encesarioadjuntar la SAL junto con la tabla anexa y descripción sobre qué entidad y quién va a gestionar estainformación (6.3.1) así como si habrá un SAB (6.3.2) y, finalmente, si hay otras medidas de seguridad(6.4).
Yes / No
Yes / No
78
Aspectos éticos y protección de datos (1)
• Todas las propuestas de la convocatoria pasarán por el panel ético
Expertos independientes, legislación y principios éticos que deben cumplir,recomendaciones en la implementación.
• Todas las propuestas deben describir las cuestiones éticas planteadas y laforma en que se abordarán de manera que cumpla las regulacionesnacionales, europeas e internacionales.
• Las propuestas son responsables de:
– Identificar posibles temas éticos en las propuestas
– Gestionarlos dentro de la propuesta, detallarlos y desarrollar estas actividadesdurante el proyecto (importancia de planificar estas actividades, presupuestar,posible creación de un ethics advisory board, etc.)
Rellenar las hojas de “Ethics self-assessment” – parte A de la propuesta
79
Aspectos éticos y protección de datos (2)
• Ejemplos de temas con implicaciones éticas quepueden aparecer en propuestas de sociedadesseguras:
– Data privacy (difusión, procesamiento, etc.)
– Data protection (legislación, medidas de seguridad, etc.)
– Mission/Function creep: cuando se amplía el alcance del proyecto aotros ámbitos en los que se puedan dañar valores éticosfundamentales.
– Dual use
– Misuse/Malevolent use Uso malintencionado desistemas/tecnologías, etc.
80
Contenidos
1. Introducción a la temática
2. Resultados de España en Seguridad
3. Convocatoria 2016 de Sociedades Seguras
4. Recomendaciones prácticas para la preparación de propuestas
5. Información de interés
81
Plataformas, asociaciones y grupos de interés en España
82
Plataformas, asociaciones y grupos de interés en Europa
(…)IMG-S
83
El equipo de Secure Societies en EspañaLa Delegación española en el Comité de Gestión Secure Societies
Dirección Programas Internacionales
Maite Boyero [email protected]
DG GUCI - Servicio de Innovación tecnológica
Nathalie Pá[email protected]
Puntos Nacionales de Contacto de la temática
El equipo CDTI en Bruselas
Dirección Programas Internacionales
Marina Martí[email protected]
Dirección Programas Internacionales
Maite Boyero [email protected]
Oficina de Proyectos Europeos
Ainara Ripa [email protected]
84
Enlaces de interés y otra informaciónFuentes de información
Programa de Trabajo 2016-2017
http://ec.europa.eu/research/participants/data/ref/h2020/wp/2016_2017/main/h2020-wp1617-security_en.pdf
Web EC Secure societiesH2020
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-terrorism/security-research/index_en.htm
Web Horizonte 2020 Español http://eshorizonte2020.es/
IPR & Open Access http://ec.europa.eu/research/science-society/index.cfm?fuseaction=public.topic&id=1301
Ethical issues http://ec.europa.eu/research/participants/docs/h2020-funding-guide/cross-cutting-issues/ethics_en.htm
Búsqueda en Socios en H2020 en Sociedades Seguras (red Puntos Contacto, próximamente, SEREN3)
http://www.security-research-map.eu/index.php?file=search.php&type=1
85
Más enlaces de interés
• Security Research (DG HOME): http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-terrorism/security-research/index_en.htm
• Security Research (REA): [email protected]
• Infoday nacional Seguridad, 23 de febrero de 2016. Presentaciones disponibles enwww.cdti.es
• Security Research Conference – La Haya, 1 y 2 de Junio de 2016 (www.srie2016.com)
• SMI2Gs (Security Mission Information and Innovation Groups) – Brokerage event finales de enero de 2016: http://www.asd-europe.org/communication/useful-links/smi2g/
• Infoday y Brokerage Event Europeo, 5 y 6 de abril de 2016: https://www.b2match.eu/seren3brussels2016/pages/13547-presentations
• Red de NCPs de Seguridad, SEREN3: www.seren-project.eu
• LISTAS DE DISTRIBUCIÓN CDTI: http://bit.ly/1UBgtbn