View this email online
We are happy to deliver the second EnergyShield newsletter to our readers. This time, we inform you about our participation in the BRIDGE project and what has happend since the last newsletter.
Events with EnergyShield participation
||First REA project to policy
||Introduction at BRIDGE General Assembly
EnergyShield project attended BRIDGE GA in Brussels on the 11th and 12th of February 2020 and introduced the main objectives of the project together with identifying the task forces that could be supported by project team.
Following a two-day dynamic agenda the meeting was a great opportunity for meeting new and old energy sector projects and also networking with projects aiming at achieving similar results. Together with EnergyShield, another 19 new energy sector projects that joined BRIDGE initiative in the last months were pitched, while 12 ended projects presented their key exploitable results in plenary sessions. As a new BRIDGE project EnergyShield also got the opportunity to present its challenges in a poster session.
||Paper Accepted at IADIS Conference
The work of NTUA has been accepted at the IADIS Information Systems Conference (IS 2020). The paper, titled "TOWARDS A CYBERSECURITY CULTURE TOOL THROUGH A HOLISTIC, MULTI-DIMENSIONAL ASSESSMENT FRAMEWORK", is about the framework and the tool the NTUA is developing for the Task 2.2 of the project.
||Software Company presenting EnergyShield in Africa
Software Company Ltd. is part of the European Commission-funded project SUPPORT TO SOUTHERN AFRICAN STATES IN NUCLEAR SAFETY AND SAFEGUARDS. The main overarching objective of this project is to provide the software and hardware necessary to support the tracking and monitoring of transport of uranium oxide concentrate (UOC) across the territory of multiple African states.
In connection with it, on December 11, 12 and 13, a training was held in Livingstone, Zambia, where Software Company presented the EnergyShield project to all participants in the training.
Since the last time, we have provided different deliverables:
This document addresses technical requirements for the EnergyShield project. The main focus is on eliciting the security requirements related to EnergyShield tools and system.
The elaboration of this report is based on the assessment of existing tools, use case identification, user needs and security maturity levels of the end-user organizations (Practitioners). The tools assessment surveys have clarified the role of each tool within EnergyShield project, its capabilities together with their maturity level. Information collected from practitioners and pilot leaders in the form of use cases and user needs showcase the demonstrator characteristics and expected outcomes.
This document provides commercial requirements for the EnergyShield solution for the first few years (2022 – 2025) after the end of the project. The requirements are based on interviews with cybersecurity experts and energy sector experts from the EnergyShield consortium. Together with other requirement documents on the technical functional, non-functional, and legal-requirements, it will direct the design of the EnergyShield solution, including commercial aspects, such as the license model, product definition, contract templates, and business model.
The aim of this deliverable is to ensure that the EnergyShield project is compliant with the new provisions enshrined in the EU General Data Protection Regulation and the Directive on Security of Network and Information Systems. In particular, the focus is to establish the main legal requirements with regard to data protection and data security, and to show how some of these requirements have been technically implemented.
The aim of the exploitation is that the project results are commercialized or used in public policy making and standardization. This document is the first of three subsequent reports and provides an initial exploitation strategy. It covers what the project results are, which are considered subject of exploitation, and addresses the strategy how to achieve successful exploitation for these exploitable project results.
The exploitation strategy was developed mainly based on a qualitative survey with the project partners, which also covered potential users and recipients for the project results, market status, and obstacles.
||Data Management Plan
This report is an initial Data Management Plan (DMP), follows the H2020 Programme Guidelines in FAIR Data Management in Horizon H2020 [DMP16DMP16] and addresses:
i. handling of research data within project lifecycle;
ii. collection, processing and/or generation of data;
iii. applicable methodology and standards for data management;
iv. sharing/making data open access;
v. curating and preserving data.