Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Horizon 2020 Secure Societies
• Paolo Salieri
• Principal Scientific / Policy Officer
• Security Research and Industry
DG Enterprise and Industry
Roma 17 Feb. 2014 2013
Content
Security Research in FP7 – achievements
H-2020 "Secure Societies"
1st SEC calls H-2020
1st Part: Security Research in FP7
EU R&D Policy objectives:
Contribute to setting up a European Research Area,
Support the implementation of EU policies,
Support the competitiveness of the EU Industry.
PRINCIPLES:
• Collaborative R&D Min 3 entities from 3 countries
• Competitive selection based on Peer Review
• Grants (subventions): calls for proposals (shared costs,
IPR to proposers)
POLICY DRIVERS
Internal Security Strategy (2010) http://register.consilium.europa.eu/pdf/en/10/st07/st07120.en10.pdf
• Serious and organised crime
• Terrorism
• Cyber-crime
• Border security
• Natural and man-made disasters
Innovation Union (2010) http://ec.europa.eu/research/innovation-union/index_en.cfm?pg=home
Strengthen the innovation chain and boost levels of investment
Security Research in FP7
MISSION DRIVEN R&D mission – functions – capabilities- - > technologies
Develop technologies and produce knowledge
Overcome fragmentation of markets
Stimulate collaboration between technology providers and users
FP7-Security R&D (2007-2013)
1,400 Mio EUR (20% to SMEs)
More than 300 projects and 2,500
participants
EU funding: 40% of total European funding in
Security R&D
FP7 Security budget vs. requested EC contribution
Projects: about 50 completed
Technological projects provided results generally demonstrated but typically not in a full exploitation state.
Some
• integrated into successful commercial products
• are producing (lasting) benefits to stakeholders (even outside the consortium)
Some could not succeed in making the planned breakthrough. Conclusions are generally under the form of evaluation of the approach and exploitation of some elements.
Societal projects advance the notion of European Security Research and/or analyse the impact of security systems. In these projects ethical and societal issues are being taken very seriously.
Technological projects benefit today from advances made in this area: most have societal/ethical experts advising them or being part of the consortium.
Lessons learned
• First lessons:
• - large scale initiatives have given visibility
• - independent testing and validation of the results recommended at the end
• - greater emphasis should be given to dissemination to users' community
Challenge for R&D in support to policy
Today: in average 5-6
yrs from definition of
R&D topics to project
completion.
Projects to feed results
of R&D to policy setting
Need to minimize this
interval and
synchronize with
interval of policy
making and
implementation
Internal Security Strategy -
implementation
Threat assessment:
MS, EEAS (SitCen),
agencies
Monitoring
and evaluation:
EP, Council, COSI,
COM annual report
Implementation:
MS, COM, agencies
Decision making:
EP and Council
Policy development:
COM with EEAS
Operational planning: COSI,
COM, EEAS (e.g. CSDP missions)
Research routes in R&D for Maritime (Border) Security
System development and validation
- Combination of capabilities
- Mission specific
SEABILLA (10 M€ EC contr.)
I2C (10 M€ EC contr.)
SUNNY (10 M€ EC contr.)
POV CLOSEYE (9 M€ EC contr.)
Systems of systems demonstration
- Combination of IP results
- Multi-mission
-Demonstration Programme
PERSEUS (27 M€ EC contr.)
Capability development
- Technology development (e.g.
detection) -> (WIMAAS, AMASS,
SECTRONIC) -Road mapping:
OPERAMAR POV CISE ?
Research routes in R&D (for Supply Chain Security) Combine security control with facilitation of (legitimate) trade
System development & validation
- Combination of capabilities
- Mission specific
CASSANDRA (10 M€ EC contr.)
CONTAIN (10 M€ EC contr.)
EUROSKY (10M€)
SAFEPOST (10 M€)
Systems of systems demonstration
- Combination of IP results
- Multi-mission
Demonstration Programme - CORE
-(26 M€ EC contr.)
Capability development
- Technology development (e.g.
detection) -> a set of projects (e.g.
HANDHOLD, SNIFFER(s),
DOGGIES, CONPHIRMER,
MODES_SNM, SNIFFLES), AXCIS
- Road mapping:
LOGSEC, IMCOSEC
2nd Part: HORIZON 2020 (Regulation (EU) No 1291/2013)
• Aim: securing Europe's
global competitiveness by investing in science and innovation
• Budget: €79 000 million
• Duration: 2014-2020
HORIZON 2020 Sustained investments in R&D&I are the main engine of economic
growth. The higher the R&D intensity in the past, the faster economic growth now (e.g. DK, DE, SE, FI).
Combines all research and innovation funding currently provided through:
• Framework Programmes for Research and Technical Development (FP)
• Innovation related activities of the Competitiveness and Innovation Framework Programme (CIP)
• European Institute of Innovation and Technology (EIT)
.
Balanced approach…
….. between science, industry and benefits to society.
Horizon 2020 way of working: rather than defining action in terms of particular disciplines it aims for solutions to particular challenges.
This was already the case for Security Research in FP7!
All forms of innovation, including in services and social innovation.
To be supported through activities such as: prototyping and testing, demonstration and piloting, and first market replication.
Three priorities
Excellent science
Industrial leadership
Societal challenges
Breakdown H2020 budget (2014-2020)
EU REGULATION 77 028 M€
1) Excellent science 31.73% 24 441
2) Industrial leadership 22.09% 17 016
3) Societal challenges 38.53% 29 679
(EURATOM REGULATION 2014-2018 1 603 M€ )
•________________________________________________________
•Overall EU budgets
•MFF (2014 – 2020) 960 B€ (Payments 908 B€)
•2014 142.6 B€ (Payments 135.5 B€)
17
Horizon 2020, as initially proposed by Commission
SOCIETAL CHALLENGES funding
(€ million, 2014-2020)
Health, demographic change and wellbeing 7 472
Food security, sustainable agriculture and forestry, marine and maritime and inland water research and the Bioeconomy
3 851
Secure, clean and efficient energy * 5 931
Smart, green and integrated transport 6 339
Climate action, environment, resource efficiency and raw materials
3 081
Inclusive, innovative and reflective societies 1 310
Secure societies 1 695
Science with and for society 462
Spreading excellence and widening participation 816
Security : a societal challenge
• About protecting citizens, society and economy as well as assets, infrastructures and services, prosperity, political stability and well-being.
• Unprecedented transformations; growing interdependencies and threats.
• Many forms of insecurity, whether from crime, violence, terrorism, natural or man-made disasters, cyber-attacks or privacy abuses.
• Any malfunction or disruption, intentional or accidental, can have detrimental impact with high associated economic or societal costs.
• A primary aim is to enhance the resilience of our society.
• Solutions come from multi-disciplinary collaborations, including social sciences (for adequacy to societal demand and appropriateness of means).
20
Secure Societies: does industry matter?
New technologies to fight crime (75 million / year direct victims of crime in EU). In 2010 the cost of crime, terrorism, illegal activities, violence and disasters in EU estimated to be at least 650 B€ (about 5% of GDP).
Reducing environmental, economic and material damage from natural and man-made disasters. Highly important for economy, jobs and growth. Important market for novel solutions.
--------
The security industry is one of the sectors with highest potential for growth and employment in the EU. In 2011, the sector employed 180,000 people, with annual turnover of some €30 billion.
---------
• Overcoming market fragmentation through EU-wide standards and the promotion of interoperability.
• Reducing the gap from research to market by introducing new funding schemes (such as Pre-Commercial Procurement).
• Better integration of societal considerations by thoroughly assessing the impact of security technologies on fundamental rights.
"Secure Societies" in Horizon 2020
•Maintains the mission driven character
•Supports EU internal and external security policies
•Supports the EU industry to be competitive
•Strengthens the involvement of the end-users
•Takes more into account the Societal Dimension
• Includes Cyber-Security
-------------------------------------------------
The respect of privacy and civil liberties remains the guiding principle.
All projects must meet the requirements of fundamental rights, including the
protection of personal data, and comply with EU law in that regard.
22
23
"Secure Societies" in Horizon 2020 Protecting Freedom and Security of Europe and its Citizens REGULATION (EU) No 1291/2013
• OBJECTIVES
1. Fight crime, illegal trafficking and terrorism, including understanding and tackling terrorist ideas and beliefs
2. Protect and improve the resilience of critical infrastructures, supply chains and transport modes
3. Strengthen security through border management
4. Improve cyber security
5. Increase Europe's resilience to crises and disasters
6. Ensure privacy and freedom, including in the Internet and enhancing the societal legal and ethical understanding of all areas of security, risk and management
7. Enhance standardisation and interoperability of systems, including for emergency purposes
6. Support the Union's external security policies including through conflict prevention and peace-building
Strong link to EU policy initiatives
- The EU Internal Security Strategy in Action, COM(2010)673
- Towards a stronger European disaster response: the role of civil protection and humanitarian assistance, COM(2010)600
- The EU Action Plan on combating terrorism
- The Security Industry Policy Action Plan COM (2012) 417
- Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace JOIN(2013) 1 final
- Flagship Initiative 'Digital Agenda for Europe'
- The EU Strategy towards the Eradication of Trafficking in Human Beings 2012–2016, COM(2012) 286
- European Programme for Critical Infrastructure Protection (EPCIP), COM(2006)786
- Civilian Headline Goal 2008
- EU Maritime Security Strategy……
EU Bodies
Industry, Stakeholders, NGO’s, Researchers, Experts, etc.
Member States
(Committees)
EU Policy implementation:
strategic approach
EU Policies EU Research
DG RTD
Research
DG CNECT
Comm.
JRC
Joint Res.
Centre
DG ENTR
Security
DG TAXUD
Customs
DG MOVE
Transport
DG TRADE
Trade
ECHO
Civil
protection
DG SANCO
Consumer
health
Agencies
DG HOME
Internal
Security
DG DEVCO
International
cooperation
EEAS
Ext. security
FPI
Foreign Policy
Instrument
EDA
Defence DG ENV
Environment
+ UN Bodies, NATO
25
Features
Strengthened coordination with relevant EU-Agencies: FRONTEX, EUROPOL, ENISA, EMSA, eu-LISA etc.
Closer coordination with the activities of EDA
Pre-Commercial Procurement (PCP) instrument
26
Cyber Security
Citizens, businesses and administrations increasingly involved in digital interactions and transactions.
Internet led to cyber-crime worth B€/ year, to attacks to critical infrastructures and to breaches of privacy.
Lack of security of digital technologies is a risk for economy and society.
Cyber security has become a political and economic priority.
Eurobarometer: 50% of the EU citizens are worried (percentage increasing)
Cyber Security has become part of "Secure Societies“
How to best tackle cyber-threats and protect citizens in the digital domain?
Convergence of traditional security needs and the digital world.
Many infrastructures and services privately owned and operated, yet protection of public (safety and) security is responsibility of public authorities.
Security is an issue that can only be tackled effectively if all stakeholders cooperate: companies and authorities must work together across borders.
End users and technology development
Research will continue to be mission driven
EU Council recent conclusions on strengthening the internal security authorities' involvement in security-related research and industrial policy (9814/13)
recognized the importance of using modern and adequate technologies in the field of internal security
….."which necessitates an increased involvement of internal security authorities in research and a proactive involvement with suppliers of modern security technologies“….
29
Pre-Commercial Procurement (PCP)
In “Security Industrial Policy-Action Plan for an innovative and competitive Security Industry” (COM(2012) 417 final) it is written :
“Pre-commercial procurement (PCP) is a very useful tool in bridging the gap from research to market…..in particular in domains, where there is an institutional market or a market largely driven by legislation, given that public procurement of innovative products and services is vital for improving the quality and efficiency of public services at a time of budget constraints.
Eventually, PCP should enable public users to play a more central role in the innovation cycle through the purchase of novel technologies.
Procurers should act as "agents of change".
The Commission intends to devote a significant part of the Secure Societies budget in Horizon 2020 on this instrument.
PCP - Pre-Commercial Procurement
• When
– Challenge requires R&D to get new solutions developed. Problem clear, but pros / cons of several potential competing solutions not compared / validated yet. No commitment to deploy (PPI) yet.
• What
– Public sector buys R&D to steer development of solutions to its needs, gather info about pros / cons of alternative solutions to be better informed to make specs for a follow-up PPI possibly later, to avoid supplier lock-in (create competitive supply base)
• How
– Public sector buys R&D from several suppliers in parallel (comparing alternative solution approaches), in form of competition evaluating progress after critical milestones (design, prototyping, test phase), risks & benefits of R&D (e.g. IPRs) shared with suppliers to maximise incentives for wide commercialisation
Supplier B
Supplier C
Supplier D
Phase 1 Solution design
Phase 2
Prototype
development
Phase 3 Original development
of limited volume of first test products /
services Supplier A
Supplier B
Supplier C
Supplier D
Supplier B
Phase 0 Curiosity
Driven Research
Applied R&D / Pre-commercial Procurement (PCP)
Phase 4 Deployment of commercial volumes of end-products Wide diffusion of newly
developed solutions
Supplier D
Public Procurement of
Innovative Solutions (PPI)
• PCP to steer the development of solutions towards concrete public
sector needs, whilst comparing/validating alternative solution approaches from various vendors
• PPI to act as launching customer / early adopter / first buyer of innovative commercial end-solutions newly arriving on the market
Supplier(s)
A,B,C,D
and/or X
Also normally multiple sourcing here to keep competition going
PCP-PPI Complementarity
Objectives:
– Price/quality products that better fit public sector needs
– Earlier customer feedback for companies developing solutions – Better take-up/Wider commercialisation of R&D results
LESSONS being learnt
Security Authorities realise that demand based R&D approach can bring them benefits.
However:
Big effort (both by EC and participants) needed to mobilise demand side constituency. Much more for a PCP - POV project than for a collaborative R&D project.
For authorities to be motivated (political) support is needed at national level. Encouraging a consortium of Member States to jointly approach the supply side (and take joint liability for R&D investments) requires much more commitment than encouraging "typical" participants in FP7 to file a grant application to recuperate a percentage of costs of their R&D.
Economic crisis made it more difficult to leverage additional resources.
3rd Part : 1st "Secure Societies" Calls
• Four Separate Calls
• reflecting the Structure of the Work Programme of Secure Societies
• - Disaster Resilient Societies – ENTR • Crisis management and civil protection, critical infrastructure protection
• - Fight against Crime and Terrorism - ENTR • Forensics, law enforcement capabilities, ethical/societal dimension
• - Border and External Security - ENTR • Border crossing points, information management, supply chain security
• - Digital Security - CNECT • Privacy, access control, trust eServices, Secure information sharing
Timeline
• 11 Dec. 2013 publication of Work Programme
(new participants portal for H2020) http://ec.europa.eu/research/participants/portal/desktop/en/opportunities/h2020/index.html
• Call(s) open 25 March 2014 WP is being drafted in cooperation with "Shadow"
Programme Committee
• Call(s) closed 28 Aug 2014
• Info on outcome of Evaluation end Oct 2014
• Signature of GA starting early 2015 Time-to-grant of 8 months ("5 + 3 months")
35
Disaster Resilient Societies safeguarding and securing society, including adapting to climate change
Draft: 22 (DRS) topics 2014 62.4 M€ 2015 65.07 M€
The DRS-call is divided in the following sub-sectors:
• Crisis management and Civil Protection
• Disaster Resilience & Climate Change [These topics come from the Environment Challenge 5 – with their budget not accounted here]
• Critical Infrastructure Protection
• Communication interoperability
• Ethical/Societal Dimension
Fight against Crime and Terrorism
Draft 17 (FCT) topics 2014 56.81 M€ 2015 44.26 M€
The FCT-call is divided in the following sub-sectors:
• Forensics
• Law enforcement capabilities
• Urban security
• Ethical/Societal Dimension
Border Security and External Security Draft 14 (BES ) topics 2014 20.73 M€ 2015 31.59 M€
The BES-call is divided in the following sub-sectors
• Maritime Border Security
• Border crossing points
• Supply Chain Security
• Information Management
• Conflict prevention and Peace building
• Ethical/Societal Dimension
Digital Security DRAFT 6 (DS) topics 2014 47.04 M€ 2015 50.31 M€
The DS-call concerns the following subjects:
• Privacy give users control over their data
• Access Control user friendly, non-password based
• The role of ICT in Critical Infrastructure Protection test interdependencies on critical ICT
• Secure Information Sharing highly secure information sharing that creates trust
• Trust eServices business cases for eSignature, eAuthentication
• Risk management and assurance models adapt existing risk management frameworks to cyber-threats
Topics
•Structure to reflect the challenge based approach
•– 3 key features
Specific Challenge
o sets the context, the problem to be addressed, why intervention is
necessary
• Scope
o delineates the problem, specifies the focus and the boundaries of the
potential action BUT without overly describing specific approaches
• Expected Impact
o describe the key elements of what is expected to be achieved in
relation to the specific challenge
Participation to calls is made easier
- easier access
- easier applications
- less reporting
- shorter time to grant
- quicker payments
- fewer audits
Forms of funding
Grants: Strong simplification of the funding rates
• Research and innovation actions: 100%
• With flat rate of 25% for indirect cost = 125%
• Innovation: 70%
• With flat rate of 25% (of 70%) for indirect cost= 87,5 %
• Exception – non-profit entities = 100% +25% = 125 %
• Coordination and Support Actions (CSA): 100%
• With flat rate of 25% for indirect cost = 125%
42
Innovation actions higher weight for "IMPACT"
________________________________________________________
http://ec.europa.eu/research/participants/portal/desktop/en/experts/index.html
Evaluation of proposals
STANDARD AWARD CRITERIA
QUALITY & EFFICIENCY
OF THE ACTION IMPACT EXCELLENCE
Overview of the Evaluation Process
Briefing
Information
& Review
EC
Ranked List
Deadline:
28 August 2014
Call publication:
11 Dec 2013
Opening:
25 March 2014
10 September
Rejection list
Proposal Evaluators
Eligibility
Evaluators Evaluators
Panel Submission Consensus Individual
evaluation Finalisation
Criteria Criteria Criteria
Ethical
Screening
Security
Scrutiny
11–26 Sept
W1 (DRS+DS):
29/09 -3/10
Oct - Jan 6-17 October
W3: 13-17 Oct 2014
Consensus Individual
IER CR ESR
Info day
1 April
Panel
Ranked List W2 (FCT+BES): 6-10 Oct
DG Enterprise & Industry
A “sensitive” Project is handling:
– Information and materials subject to export- or transfer-control
– Data or information requiring protection against unauthorised
disclosure: classified information
– Information or materials subject to national security restrictions
No “Classified” Proposals are allowed in the call
(EPSS does NOT allow for classified information in a proposal)
BUT: a Proposal could lead to a “sensitive” Project
(project that could use classified/sensitive background
and/or produce classified/sensitive foreground)
“Sensitive” Projects: What is a sensitive project?
Info Day 1 April 2014
Morning Session
Room A2 4/121 (Pink) A2 5/121 (Yellow) Room
max 150 max 150
08:30 Registration and coffee 08:30
09:30 Welcome (TB): 5m Welcome (AM): 5m 09:30
09:35 Presentation of the Secure Societies calls (POT): 50m Rules for participation & H2020 legal/financial issues (PMS): 40m 09:35
10:25 The new proposal submission system SEP (DB tbc): 20m Ethical and Societal Issues (MS): 20m 10:15
10:45 Q&A: 15m Security sensitive proposals (LC): 15m 10:35
Q&A: 10m 10:50
11:00 Coffee Break: 15m 11:00
11:15 Rules for participation & H2020 legal/financial issues (PMS): 40m Presentation of the Secure Societies calls (MCI): 50m 11:15
11:55 Ethical and Societal Issues (MS): 20m The new proposal submission system SEP (DB tbc): 20m 12:05
12:15 Security sensitive proposals (LC): 15m Q&A: 15m 12:25
12:30 Q&A: 10m
12:40 Lunch Break (1h) 12:40
Afternoon Session
Room A2 4/121 A2 4/68 A2 5/121 A2 05/68 Room
max 150 max.: 50 max 150 max.: 50
13:30 Topics presentation: DRS (9) Topics presentation: DS (3) Topics presentation: FCT/BES
(8+3) Topics presentation: 13:30
REA/ENTR (tbc) CNECT (tbc) REA/ENTR (tbc) DRS9 (2): RTD-I.4
DRS17 (1): EASME-A.2
Chair: Chair: Chair: Chair:
14:30 Brokerage event & Networking 14:30
17:30 End of the event 17:30
SMEs and Horizon 2020
SMEs encouraged to participate across the whole Horizon 2020
They can engage in collaborative projects as part of a consortium
In addition, they are supported through a new dedicated SME instrument (operated centrally by EASME) designed specifically for innovative smaller companies.
This should lead to a minimum of 20%, or about € 8.65 billion, of the total combined budgets of the specific objective 'Leadership in enabling and industrial technologies' (LEITs) and the ‘Societal Challenges’ going to SMEs.
47
Policy Research and Innovation
SME Instrument
• https://ec.europa.eu/digital-agenda/en/sme-instrument-0
2.8 B€ made easily accessible to SMEs under Horizon 2020 for funding research and innovation businesses and accelerating the exploitation of innovations
Business Coaching from Idea to Market
Art. 22.2 of Regulation
48
Policy Research and Innovation
Implementation
49
Topics the WP 2014/2015
LEIT ICT Open Disruptive Innovation (2014: 45 M€ / 2015: 45 M€)
LEIT NMP Accelerating the uptake of nanotechnologies , advanced materials or advanced
manufacturing and processing technologies by SMEs (21.8 M€ /23.8 M€)
LEIT
Biotech
SME boosting biotechnology-based industrial processes driving competitiveness
and sustainability (3.8 M€ /2.4 M€)
LEIT Space SME Instrument (8.5 M€ /8.75 M€)
SC1 Health Clinical validation of biomarkers and/or diagnostic medical devices (66.1 M€ /
45M€)
SC2 Bio-
economy
Resource-efficient eco-innovative food production and processing (9 M€ /17 M€)
& Supporting SMEs efforts for the development - deployment and market
replication of innovative solutions for blue growth (6.8 M€ /7.4 M€)
SC3 Energy Stimulating the innovation potential of SMEs for a low carbon and efficient
energy system (33.95 M€ /37.26 M€)
SC4
Transport
Small business innovation research for Transport (35.87 M€ /38.96 M€)
SC5
Climate
Boosting the potential of small businesses for eco-innovation and a sustainable
supply of raw materials (17 M€ /19 M€)
SC6 IIIS Innovative mobile e-government applications by SMEs (2015: 4M€) & SME
business model innovation (2015: 11M€)
SC7
Security
Protection of urban soft targets and urban critical infrastructures (7 M€
/7.4 M€)
Communication "Towards a more competitive and efficient Defence and Security Sector" (COM(2013)542 final) July 2013
EU industrial policies and R&D&I programmes in Ho2020 for security (and space) will support both internal and external security in areas such as protection of external borders, maritime surveillance, civil protection, or crisis management.
Technological, industrial, conceptual and operational similarities and links with defence.
The Communication proposes the launching of a Preparatory Action (PA) for CSDP-related research, focusing on those areas where EU defence capabilities are most needed.
50
Grazie! More information: http://ec.europa.eu/enterprise/policies/security/index_en.htm Contact: [email protected] [email protected]