Horizon 2020 Secure Societies - PowerPoint PPT Presentation

1 / 46
About This Presentation
Title:

Horizon 2020 Secure Societies

Description:

Horizon 2020 Secure Societies Khoen Liem Security Research and Industry DG Enterprise and Industry Tel Aviv, 24 Feb. 2014 2013 * Third reason for why demand driven ... – PowerPoint PPT presentation

Number of Views:182
Avg rating:3.0/5.0
Slides: 47
Provided by: logt2
Category:

less

Transcript and Presenter's Notes

Title: Horizon 2020 Secure Societies


1
Horizon 2020Secure Societies
  • Khoen Liem
  • Security Research and IndustryDG Enterprise and
    Industry
  • Tel Aviv, 24 Feb. 2014

2013
2
FP7-Security RD (2007-2013)
  • Mission-driven character
  • 1,400 Million EUR (20 to SMEs)
  • More than 300 projects and 2,500 participants
  • EU funding 40 of total European funding

3
FP7 successes and lessons learned
  • Some FP7 project results
  • -have been rapidly integrated into successful
    commercial products
  • - produced (lasting) benefits to stakeholders
    (even outside the consortium involved)
  • First lessons
  • - independent testing and validation of the
    results recommended at the end
  • - greater emphasis should be given to
    dissemination to users' community
  • - Large scale initiatives have given visibility

4
H-2020 Key pillars

  • Supporting Europe's excellent science base
  • Building industrial leadership in Europe
  • Tackling societal challenges for a better society
  • Secure societies


5
Security a societal challenge
  • It concerns the protection of citizens, society
    and economy as well as Europe's assets,
    infrastructures and services, its prosperity,
    political stability and well-being.
  • Any malfunction or disruption, intentional or
    accidental, can have a detrimental impact with
    high associated economic or societal costs.

6
Secure Societies does industry matter?
  • The security industry is one of the sectors with
    highest potential for growth and employment in
    the EU. In 2011, the sector employed 180,000
    people, with an annual turnover of approximately
    30 billion.
  • Overcoming market fragmentation through EU-wide
    standards
  • Reducing the gap from research to market by
    introducing new funding schemes such as
    Pre-Commercial Procurement
  • Better integration of societal considerations by
    thoroughly assessing the impact of security
    technologies on fundamental rights

7
Security Research
  • Maintains its mission driven character
  • Supports EU internal and external security
    policies
  • Supports the EU industry to be competitive
  • Strengthens the involvement of the end-users
  • Takes more into account the Societal Dimension
  • Includes Cyber-Security

8
Security Research
  • Maintains its mission driven character
  • Supports EU internal and external security
    policies
  • Supports the EU industry to be competitive
  • Strengthens the involvement of the end-users
  • Takes more into account the Societal Dimension
  • Includes Cyber-Security

European Cyber Security Strategy
9
Objectives of security research in H2020
  • Reinforce support for the EU's internal and
    external security strategy
  • Improve the competitiveness of EU industries
  • Address security gaps and prevent threats to
    security
  • Maintain a mission-oriented approach and
    integrate end-users needs
  • Enhance the societal dimension and coordination

10
Objectives of security research in H2020
  • Reinforce support for the EU's internal and
    external security strategy
  • Improve the competitiveness of EU industries
  • Address security gaps and prevent threats to
    security
  • Maintain a mission-oriented approach and
    integrate end-users needs
  • Enhance the societal dimension and coordination

Lisbon Treaty
11
"Secure Societies" in Horizon 2020Protecting
Freedom and Security of Europe and its
CitizensREGULATION (EU) No 1291/2013
  • OBJECTIVES
  • 1. Fight crime, illegal trafficking and
    terrorism, including understanding and tackling
    terrorist ideas and beliefs
  • 2. Protect and improve the resilience of critical
    infrastructures, supply chains and transport
    modes
  • 3. Strengthen security through border management
  • 4. Improve cyber security
  • 5. Increase Europe's resilience to crises and
    disasters
  • 6. Ensure privacy and freedom, including in the
    Internet and enhancing the societal legal and
    ethical understanding of all areas of security,
    risk and management
  • 7. Enhance standardisation and interoperability
    of systems, including for emergency purposes
  • 6. Support the Union's external security policies
    including through conflict prevention and
    peace-building

12
Strong link to EU policy initiatives
  • - The EU Internal Security Strategy in Action,
    COM(2010)673
  • - Towards a stronger European disaster response
    the role of civil protection and humanitarian
    assistance, COM(2010)600
  • - The EU Action Plan on combating terrorism
  • - The Security Industry Policy Action Plan COM
    (2012) 417
  • - Cybersecurity Strategy of the European Union
    An Open, Safe and Secure Cyberspace
    JOIN(2013) 1 final
  • - Flagship Initiative 'Digital Agenda for Europe'
  • - The EU Strategy towards the Eradication of
    Trafficking in Human Beings 20122016,
    COM(2012) 286
  • - European Programme for Critical Infrastructure
    Protection (EPCIP), COM(2006)786
  • - Civilian Headline Goal 2008
  • - EU Maritime Security Strategy(2014)

13
EU Policy implementation strategic approach
EU Bodies
Member States (Committees)
DG SANCO Consumer health
DG TAXUD Customs
DG CNECT Comm.
DG ENTR Security
EEAS Ext. security
EDA Defence
DG HOME InternalSecurity
DG ENV Environment
DG TRADE Trade
DG RTD Research
JRC Joint Res. Centre
FPI Foreign Policy Instrument
DG DEVCO Internationalcooperation
ECHO Civil protection
DG MOVE Transport
EU Policies
EU Research
Agencies
UN Bodies, NATO
Industry, Stakeholders, NGOs, Researchers,
Experts, etc.
14
Features
  • Strengthened coordination with relevant
    EU-Agencies FRONTEX, EUROPOL, ENISA, EMSA,
    eu-LISA etc.
  • Closer coordination with the activities of EDA
  • Pre-Commercial Procurement (PCP) instrument

15
Stakeholder involvement
  • Security is an issue that can only be tackled
    effectively if all stakeholders cooperate.
    Representatives of the public and private sector
    need to work together across borders. The Work
    Programme is addressed to
  • - private companies
  • - industrial corporations
  • - institutional stakeholders

16
Structure of the Secure Societies Work Programme
  • Disaster Resilient Societies ENTR ( RI)
  • Crisis management and civil protection, critical
    infrastructure protection
  • Fight against Crime and Terrorism - ENTR
  • Forensics, law enforcement capabilities,
    ethical/societal dimension
  • Border Security - ENTR
  • Border crossing points, information management,
    supply chain security
  • Digital Security CNCT ( ENTR)
  • Privacy, access control, trust eServices, Secure
    information sharing

17
Disaster Resilient Societies safeguarding and
securing society, including adapting to climate
change
  • The DRS-call is divided in the following
    sub-sectors
  • Crisis management and Civil Protection
  • Disaster Resilience Climate Change
  • These topics come from the Environment Challenge
    5 with their budget.
  • Critical Infrastructure Protection
  • Communication interoperability
  • Ethical/Societal Dimension
  • 2014 62,4 Mio / 2015 65,1 Mio

18
Disaster-resilience Crisis management and Civil
Protection DRS-1-2015 Crisis management topic 1
Potential of current and new measures and
technologies to respond to extreme weather and
climate events DRS-2-2014 Crisis management
topic 2 Tools for detection, traceability,
triage and individual monitoring of victims after
a mass CBRN contamination and/or
exposure DRS-3-2015 Crisis management topic 3
Demonstration activity on large scale disasters
and crisis management and resilience of EU
external assets against major identified threats
or causes of crisis DRS-4- 2014 Crisis
management topic 4 Feasibility study for
strengthening capacity-building for health and
security protection in case of large-scale
pandemics Phase I Demo DRS-5-2014 Crisis
management topic 5 Situation awareness of Civil
Protection decision-making solutions preparing
the ground for a Pre-commercial Procurement
(PCP) DRS-6-2015 Crisis management topic 6
Addressing standardisation opportunities in
support of increasing disaster resilience in
Europe DRS-7-2014 Crisis management topic 7
Crises and disaster resilience operationalizing
resilience concepts
19
Call - Disaster-resilience Disaster Resilience
Climate Change DRS-9-2014/2015 Disaster
Resilience Climate Change topic 1 Science and
innovation for adaptation to climate change from
assessing costs, risks and opportunities to
demonstration of options and practices DRS-10-20
15 Disaster Resilience Climate Change topic 2
Natural Hazards Towards risk reduction science
and innovation plans at national and European
level DRS-11-2015 Disaster Resilience
Climate Change topic 3 Mitigating the impacts of
climate change and natural hazards on cultural
heritage sites, structures and artefacts
20
Call - Disaster-resilience Critical
Infrastructure Protection DRS-12-2015 Critical
Infrastructure Protection topic 1 Critical
Infrastructure smart grid protection and
resilience under smart meters
threats DRS-13-2015 Critical Infrastructure
Protection topic 2 Demonstration activity on
tools for adapting building and infrastructure
standards and design methodologies in vulnerable
locations in case of natural or man-originated
catastrophes DRS-14-2015 Critical
Infrastructure Protection topic 3 Critical
Infrastructure resilience indicator - analysis
and development of methods for assessing
resilience DRS-15-2015 Critical Infrastructure
Protection topic 4 Protecting potentially
hazardous and sensitive sites/areas considering
multi-sectorial dependencies DRS-16-2014
Critical Infrastructure Protection topic 6
Improving the aviation security
chain DRS-17-2014/2015 Critical infrastructure
protection topic 7 SME instrument topic
Protection of urban soft targets and urban
critical infrastructures
21
Call - Disaster-resilience Communication
interoperability DRS-18-2015 Communication
technologies and interoperability topic 1
interoperable next generation of broadband radio
communication system for public safety and
security Pre-commercial Procurement (PCP)
DRS-19-2014 Communication technologies and
interoperability topic 2 Next generation
emergency services ("112 cross border")
22
Call - Disaster-resilience Ethical/Societal
Dimension DRS-20-2014 Ethical/Societal
Dimension topic 1 Improving protection of
Critical infrastructures from insider
threats DRS-21-2014 Ethical/Societal Dimension
topic 2 Better understanding the links between
culture, risk perception and disaster
management DRS-22-2015 Ethical/Societal
Dimension topic 3 Impact of climate change in
third countries on Europe's security
23
Policies matters - EXAMPLE
  • DRS-16-2014 Critical Infrastructure Protection
    topic 6 Improving the aviation security chain
  • Aviation Security is governed by EU
    legislation, such as Directive 2008/114/EC of
    8 December 2008.
  • Policy is moving towards more risk-based,
    outcome- focused, passenger-facilitation
    oriented measures
  • risk-based security and a reduced operational
    impact on passengers and industry
  • COPRA Aviation Security Research Roadmap
    http//www.copra-project.eu/Results.html
  • Flightpath 2050 Europes vision for aviation
  • http//ec.europa.eu/transport/modes/air/doc/f
    lightpath2050.pdf
  • IATA Checkpoint of the Future
  • http//www.iata.org/whatwedo/security/pages/
    checkpoint-future.aspx

24
Fight against Crime and Terrorism
  • The FCT-call is divided in the following
    sub-sectors
  • Forensics
  • Law enforcement capabilities
  • Urban security
  • Ethical/Societal Dimension
  • 2014 56,8 Mio / 2015 44,3Mio

25
Call Fight against crime and Terrorism
Forensics FCT-1-2015 Forensics topic 1 Tools
and infrastructure for the fusion, exchange and
analysis of big data including cyber-offenses
generated data for forensic investigation FCT-2-
2015 Forensic topic 2 Advanced easy to use
in-situ forensic tools at the scene of
crime FCT-3-2015 Forensics topic 3 Mobile,
remotely controlled technologies to examine a
crime scene in case of an accident or a terrorist
attack involving CBRNE materials FCT-4-2015
Forensics topic 4 Internet Forensics to combat
organized crime
26
Call Fight against crime and Terrorism Law
enforcement capabilities FCT-5-2014 Law
enforcement capabilities topic 1 Develop novel
monitoring systems and miniaturised sensors that
improve Law Enforcement Agencies' evidence-
gathering abilities FCT-6-2015 Law Enforcement
capabilities 2 Detection and analysis of
terrorist-related content on the
Internet FCT-7-2014 Law enforcement
capabilities topic 3 Pan European platform for
serious gaming and training FCT-8-2014 Law
enforcement capabilities topic 4 Trans-national
cooperation among public end-users in security
research stakeholders FCT-9-2015 Law
Enforcement capabilities topic 5 Identity
Management
27
Call Fight against crime and Terrorism Urban
security FCT-10-2014 Urban security topic 1
Innovative solutions to counter security
challenges connected with large urban
environment FCT-11-2014 Urban security topic 2
Countering the terrorist use of an explosive
threat, across the timeline of a plot, including
the detection of explosives in a
flow FCT-12-2014 Urban security topic 3
Minimum intrusion tools for de-escalation during
mass gatherings improving citizens protection
28
Call Fight against crime and Terrorism
Ethical/Societal Dimension FCT-13-2014
Ethical/Societal Dimension Topic 1 Factors
affecting (in-) security FCT-14-2014
Ethical/Societal Dimension Topic 2 Enhancing
cooperation between law enforcement agencies and
citizens - Community policing FCT-15-2015
Ethical/Societal Dimension Topic 3 Better
understanding the role of new social media
networks and their use for public security
purposes FCT-16-2015 Ethical/Societal
Dimension Topic 4 - Investigating the role of
social, psychological and economic aspects of the
processes that lead to organized crime (including
cyber related offenses), and/or terrorist
networks and their impact on social
cohesion FCT-17-2015 Fast track to Innovation
Topic
29
Border Security and External Security
  • The BES-call is divided in the following
    sub-sectors
  • Maritime Border Security
  • Border crossing points
  • Supply Chain Security
  • Information Management
  • Conflict prevention and Peace building
  • Ethical/Societal Dimension
  • 2014 20,8 Mio / 2015 44,4 Mio

30
Call Border Security and External Security
Maritime Border Security BES-1-2015 Maritime
Border Security topic 1 radar systems for the
surveillance of coastal and pre-frontier areas
and in support of search and rescue
operations BES-2-2015 Maritime Border Security
topic 2 Low cost and green technologies for EU
coastal border surveillance BES-3-2015
Maritime Border Security topic 3 Light
optionally piloted vehicles (and sensors) for
maritime surveillance BES-4-2015 Maritime
Border Security topic 4 Detection of low flying
aircraft at near shore air space
31
Call Border Security and External Security
Border crossing points BES-5-2015 Border
crossing points topic 1 Novel mobility concepts
for land border security BES-6-2015 Border
crossing points topic 2 Exploring new modalities
in biometric-based border checks BES-7-2015
Border crossing points topic 3 Optimization of
border control processes and planning Supply
Chain Security BES-8-2015 Supply Chain Security
topic 1 Development of an enhanced non-intrusive
(stand-off) scanner BES-9-2014 Supply Chain
Security topic 2 Technologies for inspections of
large volume freight
32
Call Border Security and External Security
Information Management BES-10-2015
Information management topic 1 Civilian
humanitarian mission personnel tracking BES-11-20
15 Information management topic 2 Information
management, systems and infrastructure for
civilian EU External Actions Conflict
prevention and Peace building BES-12-2014
Conflict prevention and peace building topic 1
Enhancing the civilian conflict prevention and
peace building capabilities of the
EU BES-13-2015 Conflict prevention and peace
building topic 2 Training curricula for Conflict
Prevention and Peace Building personnel Ethical
/Societal Dimension BES-14-2014 Ethical
Societal Dimension topic 1 Human factors in
border control
33
Digital Security
  • The DS-call concerns the following subjects
  • Privacy
  • Access Control
  • The role of ICT in Critical Infrastructure
    Protection
  • Secure Information Sharing
  • Trust eServices
  • Risk management and assurance models
  • 2014 47,0 Mio / 2015 50,3 Mio

34
Call Digital Security Cybersecurity, Privacy
and Trust DS-1-2014 Privacy DS-2-2014 Access
Control DS-6-2014 Risk management and assurance
models DS-3-2015 The role of ICT in Critical
Infrastructure Protection DS-4-2015 Secure
Information Sharing DS-5-2015 Trust eServices
35

Time line
  • Call open 25 March 2014
  • Call closed 28 Aug 2014
  • Info on outcome of Evaluation end December 2014
  • Signature of Grant Agreements starting March
    2015

Website http//ec.europa.eu/research/participants
/portal/desktop/en/home.html
36
Cyber Security
  • Citizens, businesses and administrations
    increasingly involved in digital interactions and
    transactions.
  • Internet led to cyber-crime worth B/ year, to
    attacks to critical infrastructures and to
    breaches of privacy.
  • Lack of security of digital technologies is a
    risk for economy and society.
  • Cyber security has become a political and
    economic priority.
  • Eurobarometer 50 of the EU citizens are worried
    (percentage increasing)

37
Cyber security has become part of "Secure
Societies
  • Challenges
  • - How to assess the threats in cyber-space and
    their possible scope?
  • - How to best tackle cyber-threats and protect
    citizens in the digital domain?
  • Convergence of traditional security needs and the
    digital world. Many infrastructures and services
    privately owned and operated, yet protection of
    public (safety and) security is responsibility of
    public authorities.
  • Security is an issue that can only be tackled
    effectively if all stakeholders cooperate
    companies and authorities must work together
    across borders.

38
International Dimension
  • All topics are open to international cooperation
  • Some topics explicitly encourage international
    cooperation
  • "In line with the EU's strategy for
    international cooperation in research and
    innovation international cooperation is
    encouraged, and in particular with international
    research partners involved in on-going
    discussions and workshops, and US homeland
    security research entities. Funding for third
    countries is however still subject to the 
    evaluations."
  • Eligibility for funding see Art. 10.2 of the
    Rules for Participation

39
Maritime Security European Council calls for
action
  • In the December 2013 conclusions, the European
    Council called for "an EU Maritime Security
    Strategy by June 2014, on the basis of a joint
    Communication from the Commission and the High
    Representative, taking into account the opinions
    of the Member States, and the subsequent
    elaboration of action plans to respond to
    maritime challenges"
  • By doing so the Council highlighted the
    importance of the topic and encouraged the
    Commission to take action in the field of
    maritime security.

40
Maritime Security International Instruments
  • International Convention for the Safety of Life
    at Sea, 1974, as amended (London, 1 November
    1974, entered into force 1 May 1991) 1184 UNTS 3
    14 ILM 959 (SOLAS) International Convention on
    Maritime Search and Rescue (Hamburg, 27 April
    1979, entered into force 22 June 1985) 1405 UNTS
    97 (SAR Convention) United Nations Convention
    on the Law of the Sea (Montego Bay, 10 December
    1982, entered into force 16 November 1994) 1833
    UNTS 3 21 ILM 1261 (LOSC) Convention on the
    High Seas (Geneva, 29 April 1958, entered into
    force 30 September 1962) 13 UST 2312 450 UNTS 11
    (HSC) Convention on the Territorial Sea and the
    Contiguous Zone (Geneva, 29 April 1958, entered
    into force 10 September 1964) 15 UST 1606 516
    UNTS 205 (TSC) Protocol for the Suppression of
    Unlawful Acts against the Safety of Fixed
    Platforms Located on the Continental Shelf (Rome,
    10 March 1988, entered into force 1 March 1992)
    27 ILM 685 (SUA Protocol) Convention against
    Illicit Traffic in Narcotic Drugs and
    Psychotropic Substances (Vienna, 20 December
    1988, entered into force 11 November 1990) UN Doc
    E/CONF.82/15 28 ILM 493 (Vienna Drugs
    Convention)Agreement concerning cooperation in
    Suppressing Illicit Maritime and Air Trafficking
    in Narcotic Drugs and Psychotropic Substances in
    the Caribbean Area (San Jose, Costa Rica, 10
    April 2003, not yet in force) (Aruba Agreement)

41
Research routes in RD for Maritime (Border)
Security
  • Systems of systems demonstration
  • Combination of IP results
  • Multi-mission
  • Demonstration Programme
  • PERSEUS (27 M EC contr.)
  • System development and validation
  • Combination of capabilities
  • Mission specific
  • SEABILLA (10 M EC contr.)
  • I2C (10 M EC contr.)
  • SUNNY (10 M EC contr.)
  • POV CLOSEYE (9 M EC contr.)
  • Capability development
  • Technology development (e.g. detection) -gt
    (WIMAAS, AMASS, SECTRONIC)
  • Road mapping
  • OPERAMAR ? POV CISE ?

42
Maritime Border Security in WP 2014-2014 Secure
Societies
  • BES-1-2015 Maritime Border Security topic 1
    radar systems for the surveillance of coastal and
    pre-frontier areas and in support of search and
    rescue operations
  • BES-2-2015 Maritime Border Security topic 2 Low
    cost and green technologies for EU coastal
    border surveillance
  • BES-3-2015 Maritime Border Security topic 3
    Light optionally piloted vehicles (and sensors)
    for maritime surveillance
  • BES-4-2015 Maritime Border Security topic 4
    Detection of low flying aircraft at near shore
    air space

43
Pre-Commercial Procurement (PCP)
  • In Security Industrial Policy-Action Plan for an
    innovative and competitive Security Industry
    (COM(2012) 417 final) it is written
  • Pre-commercial procurement (PCP) is a very
    useful tool in bridging the gap from research to
    market..in particular in domains, where there is
    an institutional market or a market largely
    driven by legislation, given that public
    procurement of innovative products and services
    is vital for improving the quality and efficiency
    of public services at a time of budget
    constraints.
  • Eventually, PCP should enable public users to
    play a more central role in the innovation cycle
    through the purchase of novel technologies.
  • Procurers should act as "agents of change".
  • The Commission intends to devote a significant
    part of the Secure Societies budget in Horizon
    2020 on this instrument.

44
PCP - Pre-Commercial Procurement
  • When
  • Challenge requires RD to get new solutions
    developed. Problem clear, but pros / cons of
    several potential competing solutions not
    compared / validated yet. No commitment to deploy
    (PPI) yet.
  • What
  • Public sector buys RD to steer development of
    solutions to its needs, gather info about pros /
    cons of alternative solutions to be better
    informed to make specs for a follow-up PPI
    possibly later, to avoid supplier lock-in (create
    competitive supply base)
  • How
  • Public sector buys RD from several suppliers in
    parallel (comparing alternative solution
    approaches), in form of competition evaluating
    progress after critical milestones (design,
    prototyping, test phase), risks benefits of RD
    (e.g. IPRs) shared with suppliers to maximise
    incentives for wide commercialisation

45
Pre-Commercial Procurement (PCP)
  • When?
  • Challenge requires RD to get new solutions
    developed. Problem clear, but pros / cons of
    several potential competing solutions not
    compared / validated yet. No commitment to deploy
    (PPI) yet.
  • What?
  • Public sector buys RD to steer development of
    solutions to its needs, gather info about pros /
    cons of alternative solutions to be better
    informed to make specs for a follow-up PPI
    possibly later, to avoid supplier lock-in (create
    competitive supply base)
  • How?
  • Public sector buys RD from several suppliers in
    parallel (comparing alternative solution
    approaches), in form of competition evaluating
    progress after critical milestones (design,
    prototyping, test phase), risks benefits of RD
    (e.g. IPRs) shared with suppliers to maximise
    incentives for wide commercialisation

46
Public Procurement of Innovative Solutions
  • When?
  • Challenge requires solution which is almost on
    the market or already on the market in small
    quantity but not meeting public sector
    requirements for large scale deployment yet. No
    RD involved (already done, or not needed)
  • What?
  • Public sector acts as launching customer / early
    adopter / first buyer for innovative products and
    services that are newly arriving on the market
    (not widely commercially available yet)
  • How?
  • Public sector acts as facilitator establishing a
    buyers group with critical mass that triggers
    industry to scale up its production chain to
    bring products on the market with desired quality
    / price ratio within a specific time. After
    potentially a test / certification / labelling,
    the buyers group buys a significant volume of
    solutions.

47
PCP to steer the development of solutions towards
concrete public sector needs, whilst comparing
alternative solution approaches from various
vendors PPI to act as launching customer / first
buyer of innovative commercial end-solutions
newly arriving on the market
Public Procurement of Innovative Solutions (PPI)
Applied RD / Pre-commercial Procurement (PCP)
Phase 1 Solution design
Phase 0 Curiosity Driven Research
Phase 4 Deployment of commercial volumes of
end-products Wide diffusion of newly developed
solutions
Phase 2 Prototype development
Phase 3 Original development of limited
volume of first test products / services
Supplier A
Supplier B
Supplier B
Supplier B
Supplier(s) A,B,C,D and/or X
Supplier C
Supplier C
Supplier D
Supplier D
Supplier D
Also normally multiple sourcing here to keep
competition going
  • Objectives
  • Price/quality products that better fit public
    sector needs
  • Earlier customer feedback for companies
    developing solutions
  • Better take-up/Wider commercialisation of RD
    results

48
SME Funding
  • General objective
  • Ensure stronger involvement of SMEs in EU RI
    programmes
  • Specific objective
  • facilitate and accelerate the transition of their
    developed products/services to the market place
  • Solution
  • The SME instrument targets all types of
    innovative SMEs showing a strong ambition to
    develop, grow and internationalise
  • Legislative text Article 22(2) Regulation
  • " a dedicated SME instrument that is targeted
    at all types of SMEs with an innovation
    potential, in a broad sense, shall be created
    under a single centralised management system and
    shall be implemented primarily in a bottom-up
    manner via a continuously open call "
  • Budget earmarking
  • Funded by LEITs and SC. Initially 5, will rise
    to at least 7 averaged over H2020

49
SME Funding - Eligibility criteria
Eligibility
  • Only applications for funding from one for-profit
    SME or a consortium of for-profit SMEs
  • Only applications from SMEs established in EU
    Member States or countries associated to Horizon
    2020
  • No concurrent submission or implementation with
    another Phase 1 or Phase 2 project

50
Topics the WP 2014/2015
LEIT ICT Open Disruptive Innovation (2014 45 M / 2015 45 M)
LEIT NMP Accelerating the uptake of nanotechnologies , advanced materials or advanced manufacturing and processing technologies by SMEs (21.8 M /23.8 M)
LEIT Biotech SME boosting biotechnology-based industrial processes driving competitiveness and sustainability (3.8 M /2.4 M)
LEIT Space SME Instrument (8.5 M /8.75 M)
SC1 Health Clinical validation of biomarkers and/or diagnostic medical devices (66.1 M / 45M)
SC2 Bio-economy Resource-efficient eco-innovative food production and processing (9 M /17 M) Supporting SMEs efforts for the development - deployment and market replication of innovative solutions for blue growth (6.8 M /7.4 M)
SC3 Energy Stimulating the innovation potential of SMEs for a low carbon and efficient energy system (33.95 M /37.26 M)
SC4 Transport Small business innovation research for Transport (35.87 M /38.96 M)
SC5 Climate Boosting the potential of small businesses for eco-innovation and a sustainable supply of raw materials (17 M /19 M)
SC6 IIIS Innovative mobile e-government applications by SMEs (2015 4M) SME business model innovation (2015 11M)
SC7 Security Protection of urban soft targets and urban critical infrastructures (7 M /7.4 M)
51
SME Instrument Topic (DRS 17)
  • Structure
  • The SME instrument consists of three separate
    phases and a coaching and mentoring service for
    beneficiaries. Participants can apply to phase 1
    (feasibility study) with a view to applying to
    phase 2 (innovation project) at a later date, or
    directly to phase 2. In phase 3 (if applicable)
    SMEs can benefit from indirect support
    measures/services as well as access to the
    financial facilities supported under Access to
    Risk Finance of the work programme.
  • Expected impact
  • Enhancing profitability and growth performance of
    SMEs by combining and transferring new and
    existing knowledge into innovative, disruptive
    and competitive solutions seizing European and
    global business opportunities.
  • Budget
  • Phase 1 lump sum of EUR 50.000
  • Phase 2 between EUR 0.5 and 2.5 million

52
SME Instrument Topic (DRS 17 - Protection of
urban soft targets and urban critical
infrastructure)
  • Objective to carry out a small-scale
    demonstration of innovative technologies and
    tools (Phase 2).
  • Area urban critical infrastructure protection,
    such as, for example
  • - designing buildings and urban areas
  • - protection of energy/transport/communication
    grids
  • - critical infrastructure surveillance solutions
  • - protecting supply chains
  • - avoiding cyber-attacks and developing cyber
    resilience systems for critical infrastructures.
  • Scope focused to cover, for example
  • - high throughput screening of people and bags
    including ability to screen them in reasonably
    real-time as people approach entrances to
    buildings or enter public transportation system
  • - high throughput screening for vehicles to
    identify threats that warrant further inspection
    (as opposed to random searching)
  • - potential CBRN-E threats and the way in which
    these threats could be carried-out against soft
    targets and critical infrastructures
  • - mitigation of vehicle-borne improvised
    explosive devices, with a specific focus on
    vehicle-borne ones (e.g. in cases of parked
    vehicles, penetrative attacks, etc.).

53
European Council (19-20/12 2014) Conclusions
  • First thematic debate on defence since the entry
    into force of the Lisbon Treaty.
  • Highlighted the importance of an effective Common
    Security and Defence Policy (CSDP).
  • Recognised that financial constraints and
    fragmented defence markets limit military
    capabilities and jeopardise the stability and
    competitiveness of Europe's defence and security
    industry.
  • A number of priority actions were identified
  • Increasing the effectiveness, visibility and
    impact of CSDP
  • Enhancing the development of capabilities
  • Strengthening Europe's defence industry

54
European Council Research Dual-use
  • "To ensure the long-term competitiveness of the
    European defence industry and secure the modern
    capabilities needed, it is essential to retain
    defence Research Technology (RT) expertise,
    especially in critical defence technologies."
  • Civil and defence research reinforce each other
  • Further dual-use research is encouraged
  • Synergies between national and EU research should
    be maximised
  • A Preparatory Action on CDSP-related research
    will be set up

55
More information http//ec.europa.
eu/enterprise/policies/security/index_en.htmCon
tactENTR-SECURITY-RESEARCH-INDUSTRY_at_ec.europa.eu
(you can also find me in 'LinkedIn' -
khoen.liem_at_gmail.com)
Write a Comment
User Comments (0)
About PowerShow.com