CYRENE at the 2nd ECSCI Workshop
Pro. Nineta Polemi, external advisor of CYRENE’s partner FP participated in the 2nd ECSCI Workshop on Critical Infrastructure Protection
Pro. Nineta Polemi, external advisor of CYRENE’s partner FP participated in the 2nd ECSCI Workshop on Critical Infrastructure Protection
Following the first contact made at the DataPorts parallel session during the Shipping Finance Conference 2022, CYRENE participated in the joint workshop between Dataports, VesselAI, Vital-5G, and CYRENE.
Represented by Prof. Nineta Polemi, CYRENE was present at the ESDC/SFP online Course titled “The EU’s Cybersecurity Strategy for Digital Decade”
Maggioli Spa in collaboration with Focal Point sprl and Hyperborea Srl is currently investigating, in the context of the CYRENE, potential cyber attack paths on interconnected Critical Infrastructures (CIs) which operate for the provision of supply chain services.
Centro Ricerche FIAT is participating to the Cyrene project that aims in developing methodologies, techniques and tools for the efficient evaluation and handling of security threats and vulnerabilities supporting the involved infrastructures for the provision of critical Supply Chain Services
Cybersecurity insurance is a new and emerging industry, and companies that purchase these products are considered as early adopters in a very dynamic and fluctuating environments where cybersecurity policies suddenly change depending on the severity of the associated cyber risks.
The CyberHOT Summer School will take place on Thursday 29th and Friday 30th of September 2022, under the auspices of the NMIOTC.
CYRENE partner Privanova discusses Cybersecurity in the 1st intersessional consultation of the Ad Hoc Committee by the UN General Assembly
CYRENE was presented at the Global IoT Day virtual roundtable that was held on April 8th 2022 by the IoTAC project
This blogpost will focus on the privacy and data protection layer of CYRENE’s solution that will enable Critical Information Infrastructures (CIIs) to set up security and data protection configurations based on existing legal and regulatory frameworks.