BETA

Subject "3.30.07 Cybersecurity, cyberspace policy"

Dossiers (19)

Secure 5G deployment in the EU - Implementing the EU toolbox
List of proposals selected for funding and proposals placed on the reserve list under the European Defence Industrial Development Programme following the calls for proposals EDIDP-MUGS-2019, EDIDP-ISR-2019, EDIDP-CSAMN-2019, EDIDP-PNTSCC-2019, EDIDP-NGPSC-2019, EDIDP-ACC-2019, EDIDP-FNPRT-2019 and EDIDP-SME-2019 launched under the work programme for the years 2019 and 2020 adopted by the Decision C(2019)2205. Commission Implementing Decision
List of proposals selected for funding under the European Defence Industrial Development Programme following the call for proposals EDIDP-ESC2S – European Command and Control (C2) system from strategic to tactical level launched under the work programme for the years 2019 and 2020 adopted by the Decision C(2019)2205. Commission Implementing Decision
Security threats connected with the rising Chinese technological presence in the EU and possible action on the EU level to reduce them
International cooperation in the fight against cybercrime - the threat to public services
Cyber defence
European Cybersecurity Industrial, Technology and Research Competence Centre and Network of National Coordination Centres
European Defence Fund 2021–2027
Digital Europe programme 2021–2027
Fight against cybercrime
EU Cybersecurity Agency (ENISA) and information and communication technology cybersecurity certification (Cybersecurity Act)
European defence industrial development programme
Cyber-attacks against the media - new level of threat to cybersecurity
Resolution on a cybersecurity strategy of the European Union: an open, safe and secure cyberspace
High common level of network and information security across the Union. NIS Directive
Cyber security and defence
Critical information infrastructure protection. Achievements and next steps: towards global cyber-security
European Network and Information Security Agency (ENISA): further development
Judicial cooperation in criminal matters: combating attacks against information systems