This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
1st CYRENE Workshop presentations

Workshop Agenda
Time | Topic | Speaker |
10:00-10:05 | Welcome | Farhan Sahito |
10:05-10:20 | Sofoklis Efremidis Sophia Karageorgou | |
10:20-10:30 | Haris Mouratidis | |
10:30-10:50 | Supply Chains (SC) as Targets of Evaluation (ToE), CYRENE ToEs | Alexandra Michota Elma Kalogeraki |
10:50-11:10 | Danijela Boberic | |
11:10-11:40 | CYRENE Questionnaire Feedback, discussion, Q/A by AB members Collection of end user requirements | Danijela Boberic Sofoklis Efremidis |
11:40-11:45 | Conclusions and closing remarks | Farhan Sahito |
Intro















CYRENE Overview
Our Technical Approach








Security of Supply Chain Services








Supply Chain Services (SCS ) as Targets of Evaluation (ToE)

















End user requirements









KEY FACTS
Project Coordinator: Sofoklis Efremidis
Institution: Maggioli SPA
Email: sofoklis.efremidis@gmail.com
Start: 1-10-2020
Duration: 36 months
Participating organisations: 14
Number of countries: 10
TWEETS by
Join @CYRENE_H2020 at the #CyberHOT #SummerSchool 2022 on September 29-30, 2022, under the auspices of the @nmiotc, and advance your #security knowledge to practical, effective #cyber incident expertise! Registrations are open:
Read More@CYRENE_H2020 partners gathered for their 6th plenary #meeting on Thursday the 16th and Friday the 17th of June 2022, in Chania, Greece. The consortium members took the chance to meet face-to-face for the first time! The meeting was hosted by #TSI
Read More📢New Blogpost! In this article, Dr. Sofia Karagiorgou from @UBITECH_GR explains the Multiple Visual Analytics over Dark Web and how this is utilized in CYRENE. Read the article here: #Cybersecurity #supplychains #supplychainmanagement #darkweb
Read MoreThere are several attacks regarding #IoT devices: Man-in-the-Middle Attacks, Eavesdropping, Firmware hijacking, DDoS, Physical tampering...We will try to detect some of them using the @CYRENE_H2020 integrated system in the next period setting the appropriate pilot cases
Read MoreFUNDING
This project has received funding from the European Union’s Horizon 2020 Research and Innovation program under grant agreement No 952690. The website reflects only the view of the author(s) and the Commission is not responsible for any use that may be made of the information it contains.