Objective
Global Supply Chains are a way of life for modern business, becoming more complex and integrated. The organizations that operate within the Supply Chains have become smarter and are not only heavily dependent on Information and Communication Technologies but are also interconnected for exchanging and sharing large amounts of data. Moreover, there is still no easy, structured, standardized and trusted way to forecast, prevent and manage interrelated and propagated cybersecurity vulnerabilities and threats, in a way that takes into account the heterogeneity and complexity of today’s Supply Chains. Therefore, there is a pressing need for devising methodologies, techniques and tools for the efficient evaluation and handling of security threats and vulnerabilities supporting all involved infrastructures for the provision of critical Supply Chain services. CYRENE comes to fill this gap for devising such methodologies, techniques and tools.
Other projects
Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures
Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures Coordinated bySOFTWARE IMAGINATION & VISION SRLObjectiveShielding the power grid from cyberattacks The Electrical Power and Energy...
Multi-layered Security technologies to ensure hyper connected smart cities with Blockchain, BigData, Cloud and IoT
Multi-layered Security technologies to ensure hyper connected smart cities with Blockchain, BigData, Cloud and IoT Coordinated byWORLDLINE IBERIA SAObjectiveIoT systems today tend to be built around the concept of IoT/cloud convergence, integrating heterogeneous data...
IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector
IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector Coordinated byTHE UNIVERSITY OF READINGObjectiveCyber-physical systems refer to systems requiring interaction between computers, communication...
Trusted Secure Data Sharing Space
Trusted Secure Data Sharing Space Coordinated byGOTTFRIED WILHELM LEIBNIZ UNIVERSITAET HANNOVERObjectiveIn recent years, the data market has been flourishing. A sharp downfall in trust towards platforms considered secure and privacy-aware, however, has hampered the...
Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems
Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems Coordinated bySINTEF ASObjectiveTo unleash the full potential of IoT, realizing the digital society and flourishing innovations in application domains such as eHealth, smart city,...
Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people
Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people Coordinated byUNIVERSITA CATTOLICA DEL SACRO CUOREObjectiveThe EU-funded PANACEA project is producing people-centric cybersecurity...