4CT190319aftertechnicalmeeting_konvertiert

Dieses Dokument ist Teil der Anfrage „European Cybersecurity Industrial, Technology and Research Competence Centre and Network of National Coordination Centres

Diese Anfrage wurde als Teil der Kampagne „Black Box EU“ gestellt.

/ 205
PDF herunterladen
development and the uptake of       uptake of Union cybersecurity     uptake of Union cybersecurity      COM proposal awaited, Union cybersecurity products and    products and holistic processes   products and solutions by public solutions by public authorities and throughout the entire             authorities and user industries;   [EP text added to new article 4.2] user industries;                    innovation cycle, by, inter alia, public authorities, the industry and the market; (e)                   assisting     (b) assisting public              (b) assisting public               Art 4a(2) CNS public authorities, demand side     authorities, demand side          authorities, demand side industries and other users in       industries and other users in     industries and other users in      COM proposal awaited, adopting and integrating the latest increasing their resilience by    adopting and integrating the cyber security solutions;           adopting and integrating state-   latest cyber security solutions;   [EP text added to new article 4.2] of-the-art cybersecurity 113 products and processes; (f)                   supporting in (c) supporting in particular      (c) supporting in particular       Art 4a(2) CNS particular public authorities in    public authorities in organising  public authorities in organising organising their public             their public procurement, or      their public procurement, or       COM proposal awaited, procurement, or carrying out        carrying out procurement of       carrying out procurement of procurement of state-of-the-art     state-of-the-art cybersecurity    state-of-the-art cybersecurity     [EP text added to new article 4.2] cybersecurity products and          products and processes on         products and solutions on behalf solutions on behalf of public       behalf of public authorities,     of public authorities; authorities;                        including by providing support for procurement, to increase the security of and the benefits 114 from public investment; (g)                   providing     (d) providing financial support   (d) providing financial support    Art 4a(2) CNS                       115 financial support and technical     and technical assistance to       and technical assistance to assistance to cybersecurity start-  cybersecurity start-ups and       cybersecurity start-ups and        COM proposal awaited ups and SMEs to connect to          SMEs, micro-enterprises,          SMEs to connect to potential xxxxx/18                                                                                                  EB/kp                                75 ANNEX                                                                  JAI.2                          LIMITE                                 EN
75

potential markets and to attract    individual experts, commonly     markets and to attract             [EP text added to new article 4.2] investment;                         used Free and Open Source        investment; Software projects, and civic tech projects, to enhance expertise on cybersecurity, connect to potential markets and deployment opportunities, and to attract investment; 5.    improve the understanding    5.      improve the understanding 5.     improve the understanding   Art 4a(5) CNS of cybersecurity and contribute to of cybersecurity and contribute   of cybersecurity and contribute reducing skills gaps in the Union  to reducing skills gaps and       to reducing skills gaps in the     [EP text added to new article 4.5] related to cybersecurity by        strengthening the level of skills Union related to cybersecurity carrying out the following tasks:  in the Union related to           by carrying out the following cybersecurity by carrying out the tasks: 116 following tasks: (a) supporting, where                                                [EP text added to article 4a.5] appropriate, the achievement of the specific objective 4, Advanced digital skills, of the Digital Europe Programme in cooperation with European 117 Digital Innovation Hubs; (h)                   supporting   (a) supporting further            (h) supporting further             [EP text added to article 4a.5]     118 further development of             development, pooling, and         development of cybersecurity cybersecurity skills , where       sharing of cybersecurity skills   skills , where appropriate appropriate together with relevant and competences at all relevant   together with relevant EU EU agencies and bodies including   educational levels, supporting    agencies and bodies including ENISA.                             the objective of achieving        ENISA. xxxxx/18                                                                                                 EB/kp                                76 ANNEX                                                                 JAI.2                          LIMITE                                 EN
76

gender balance, facilitating a common high level of cybersecurity knowledge and contributing to the resilience of users and infrastructures throughout the Union in cooperation with the Network and, where appropriate, aligning with relevant EU agencies and bodies including ENISA; 6.     contribute to the           6.     contribute to the          6.    contribute to the reinforcement of cybersecurity     reinforcement of cybersecurity    reinforcement of cybersecurity research and development in the    research and development in the   research and development in the 119 Union by:                          Union by:                         Union by: (i)                    providing   (a) providing financial support   (i) providing financial support financial support to cybersecurity to cybersecurity research efforts to cybersecurity research efforts research efforts based on a        based on a common,                based on a common, common, continuously evaluated     continuously evaluated and        continuously evaluated and and improved multiannual           improved multiannual strategic,   improved multiannual strategic, strategic, industrial, technology  industrial, technology and        industrial, technology and and research agenda;               research plan referred to in      research agenda; 120 Article 13 ; (k)                    support     (b) supporting large-scale       (j) support large-scale            [EP text added to article 4a.3]    121 large-scale research and           research and demonstration       research and demonstration demonstration projects in next     projects in next generation      projects in next generation generation cybersecurity           cybersecurity technological      cybersecurity technological technological capabilities, in     capabilities, in collaboration   capabilities, in collaboration collaboration with the industry    with the industry, the academic  with the industry and the xxxxx/18                                                                                                 EB/kp                             77 ANNEX                                                                 JAI.2                          LIMITE                              EN
77

and the Network; and research community,           Network; public sector and authorities, including the Network and the Community ; (ba) ensuring respect for                      [EP text added to new article 4.2] fundamental rights and ethical conduct in cybersecurity research projects supported by 122 the Competence Centre; (bb) monitoring reports of                     [EP text not retained. Reason: this vulnerabilities discovered by                  doesn’t belong to a Regulation but the Community and facilitating                 to work programme choices. But if the disclosure of                              finally retained, this could be vulnerabilities, the development               placed under article 4a2] of patches, fixes and solutions, 123 and the distribution of those; (bc) monitoring research                       [EP text not retained. Reason: this results regarding self-learning                doesn’t belong to a Regulation but algorithms used for malicious                  to work programme choices. But if cyber activities in collaboration              finally retained, this could be with ENISA and supporting the                  placed under article 4a2] implementation of Directive 124 (EU) 2016/1148 ; (bd) supporting research in the                [EP text not retained. Reason: this   125 field of cybercrime;                           doesn’t belong to a Regulation but to work programme choices. But if finally retained, this could be xxxxx/18                                                         EB/kp                                78 ANNEX                                               JAI.2    LIMITE                                  EN
78

placed under article 4a2] (be) supporting the research               [EP text not retained. Reason: this and development of products                doesn’t belong to a Regulation but and processes that can be freely           to work programme choices. But if studied, shared, and built upon,           finally retained, this could be in particular in the field of              placed under article 4a2] verified and verifiable hardware and software, in close cooperation with the industry, the Network and the 126 Community; (m)                  support     (c) support research and                   [EP text not retained. Reason: this research and innovation for      innovation for formal and non-             doesn’t belong to a Regulation but standardisation in cybersecurity formal standardisation and                 to work programme choices. But if technology                       certification in cybersecurity             finally retained, this could be technology, linking to the                 placed under article 4a2] existing work and where appropriate in close cooperation with the European Standardisation Organisations, certification bodies and 127 ENISA; (ca) provide special support to            [EP text added to new article 4.4,    128 SMEs by facilitating their                 although replacing “tailored” by access to knowledge and                    “easy”] training through tailored access to the deliverables of research and development xxxxx/18                                                                     EB/kp                                79 ANNEX                                                              JAI.2 LIMITE                                  EN
79

reinforced by the Competence Centre and the Network in order to increase competitiveness; 7.     enhance cooperation         7. enhance cooperation between   7.    enhance cooperation        Art 4a(6) and recital 18a CNS between the civil and defence      the civil and defence spheres    between the civil and defence spheres with regard to dual use    with regard to dual use          spheres with regard to dual use   Political issue technologies and applications in   technologies and applications in technologies and applications in cybersecurity, by carrying out the cybersecurity, by carrying out   cybersecurity, by carrying out    [EP text added to new article 4.6] following tasks:                   the following tasks, which shall the following tasks: be reactive and defensive cyber defence technology, 129 applications and services: (o)                  supporting    (a) supporting Member States     (l) supporting Member States Member States and industrial and   and industrial and research      and industrial and research research stakeholders with regard  stakeholders with regard to      stakeholders with regard to to research, development and       research, development and        research, development and 130 deployment;                        deployment;                      deployment; (q)                  contributing  (b) contributing to cooperation  (m) contributing to cooperation to cooperation between Member      between Member States by         between Member States by States by supporting education,    supporting education, training   supporting education, training 131 training and exercises ;           and exercises ;                  and exercises ; xxxxx/18                                                                                              EB/kp                                80 ANNEX                                                                JAI.2                        LIMITE                                  EN
80

(s)                   bringing      (c) bringing together             (n) bringing together together stakeholders, to foster    stakeholders, to foster synergies stakeholders, to foster synergies synergies between civil and         between civil and defence cyber   between civil and defence cyber defence cyber security research     security research and markets;    security research and markets; 132 and markets; 8.     enhance synergies between    8.    enhance synergies between   8.    enhance synergies between     [EP text added to new article 4.6] the civil and defence dimensions    the civil and defence dimensions  the civil and defence dimensions of cybersecurity in relation to the of cybersecurity in relation to   of cybersecurity in relation to European Defence Fund by            the European Defence Fund by      the European Defence Fund by carrying out the following tasks:   carrying out the following tasks  carrying out the following tasks: which shall be reactive and defensive cyber defence technology, applications and 133 services: (u)                   providing     (a) providing advice, sharing     (o) providing advice, sharing advice, sharing expertise and       expertise and facilitating        expertise and facilitating facilitating collaboration among    collaboration among relevant      collaboration among relevant 134 relevant stakeholders;              stakeholders;                     stakeholders; (w)                   managing      (b) managing multinational        (p) managing multinational multinational cyber defence         cyber defence projects, when      cyber defence projects, when projects, when requested by         requested by Member States,       requested by Member States, Member States, and thus acting as   and thus acting as a project      and thus acting as a project a project manager within the        manager within the meaning of     manager within the meaning of meaning of Regulation XXX           Regulation XXX [Regulation        Regulation XXX [Regulation [Regulation establishing the        establishing the European         establishing the European 135 European Defence Fund].             Defence Fund].                    Defence Fund]. xxxxx/18                                                                                                  EB/kp                                81 ANNEX                                                                  JAI.2                          LIMITE                                  EN
81

(ba) assisting and providing advice to the Commission with regard to the implementation of Regulation (EU) 2019/XXX [recast of Regulation (EC) No 428/2009 as proposed by 136 COM(2016)616]. 8a. contribute to the Union’s                         Art 10 CNS efforts to enhance international cooperation with regard to 137 cybersecurity by: (a) facilitating the participation of the Competence Centre in international conferences and governmental organisations as well as the contribution to international 138 standardisation organisations; (b) cooperating with third countries and international organisations within relevant international cooperation 139 frameworks. Article 4a     [For this article, the Council text 140 used as basis and EP text added (marked in dark green). Text not coming from Council or EP marked xxxxx/18                                                       EB/kp                               82 ANNEX                                     JAI.2            LIMITE                                EN
82

in purple] Tasks of the Centre         Tasks of the Centre                   141 In order to fulfill the mission   In order to fulfill the mission laid laid out in Article 3 and the     out in Article 3 and the objectives objectives laid out in Article 4, laid out in Article 4, the Centre the Centre shall in close         shall in close cooperation with the cooperation with the Network      Network have the following tasks:     142 have the following tasks: 1.    Set up and update the       1.    Set up and update the multi-annual strategic plan for   multi-annual strategic plan for the Centre, the Network and       the Centre, the Network and the the Community, with a view to     Community, with a view to supporting European               supporting European excellence, excellence, capacities and        capacities and competitiveness on competitiveness on                cybersecurity;                        143 cybersecurity; 2.    Establish annual work       2.    Establish annual work plan      144 plan for the implementation of    for the implementation of the the cybersecurity part of the     cybersecurity part of the Digital Digital Europe Programme          Europe Programme established established by Regulation No      by Regulation No XXX and in XXX and in particular actions     particular actions related to related to Article 6 of           Article 6 of Regulation (EU) No Regulation (EU) No XXX            XXX [Digital Europe [Digital Europe Programme]        Programme] and of the Horizon and of the Horizon Europe         Europe Programme established Programme established by          by Regulation No XXX and in xxxxx/18                                   EB/kp                                83 ANNEX    JAI.2                         LIMITE                                  EN
83

Regulation No XXX and in          particular Section 2.2.6 of Pillar particular Section 2.2.6 of       II of Annex I. of Decision No Pillar II of Annex I. of          XXX on establishing the specific Decision No XXX on                programme implementing establishing the specific         Horizon Europe – the programme implementing            Framework Programme for Horizon Europe – the              Research and Innovation[ref. Framework Programme for           number of the Specific Research and Innovation[ref.      Programme] and of other Union number of the Specific            programmes when provided for Programme] and of other           in legal acts of the Union]. Union programmes when             Contribute to the implementation provided for in legal acts of the of the actions funded by the Union]. This shall in particular  European Defence Fund facilitate the use of results     established by Regulation (EU) from scientific research          2019/XXX This shall in projects in within actions        particular facilitate the use of related to the development of     results from scientific research cyber products and solutions,     projects in within actions related seeking to avoid fragmentation    to the development of cyber duplication of efforts and to     products and solutions, seeking replicate good cybersecurity      to avoid fragmentation practices, products and           duplication of efforts and to solutions, including those        replicate good cybersecurity developed by SMEs and those       practices, products and solutions, based on open-source              including those developed by software. Support to              SMEs and those based on open- deployment of cybersecurity       source software. Support to products and solutions shall to   deployment of cybersecurity the extent possible rely on the   products and solutions shall to xxxxx/18                                   EB/kp                               84 ANNEX    JAI.2                         LIMITE                                 EN
84

Zur nächsten Seite