Validation workshop for Good practices for security of IoT, Den Haag

Ridderzaal in Den Haag
© Kevin Bergenhenegouwen
date October 26, 2018 10:00 - 17:00
city Den Haag
location Europol headquarters, Eisenhowerlaan 73 , 2517KK, The Hague, Netherlands Show location
organisation European Network and Information Security Agency (ENISA) i

ENISA is currently performing a study on Good practices for IoT Security. A particular focus is given on Industry 4.0 and smart manufacturing. Recently ENISA launched the EICS Expert Group for this area of study.

ENISA defines Internet of Things as an emerging concept describing a wide ecosystem where interconnected devices and services collect, exchange and process data in order to adapt dynamically to a context. Internet of Things is tightly bound to cyber-physical systems and in this respect is an enabler of Smart Infrastructures by enhancing their quality of service provisioning.

This study builds on previous work by ENISA, covering the areas of:

ENISA EICS group is an information exchange platform that brings together experts to ensure security and resilience of the entire Industrial Internet of Things ecosystem.

ENISA IoTSEC group is an information exchange platform that brings together experts to ensure security and resilience of the entire Internet of Things ecosystem.

To validate the findings of the study and discuss future challenges, ENISA organizes a workshop with ENISA EICS Expert Group and ENISA IoT Security Experts Group in The Hague, Netherlands on 26th of October 2018 from 10:00 - 17:00.

The event is by invitation only and back to back to the 2nd Europol-ENISA IoT Security Conference

Privacy Statement

For more info, please contact resilience@enisa.europa.eu

Location


1.

European Network and Information Security Agency (ENISA)

ENISA, the European Union Agency for Network and Information Security, is a centre of expertise for cyber security in Europe. ENISA helps the EU and EU countries to be better equipped and prepared to prevent, detect and respond to information security problems.

2.

More about...