Events

CET Partnership Annual Conference 2025
OCT
Tue
21
OCT
Wed
22

Starts in 1 week from now

Location

online

Programmes
Climate, Energy, Mobility

The conference will explore how CETPartnership can enhance its role in supporting this evolution across technologies, regions, and policy frameworks. Discussions will focus on understanding system transition within the CETPartnership context, building on perspectives such as those outlined in the European Commission report “Addressing European Research and Innovation Challenges for System Transitions in Energy and Mobility”.

register for the event by logging in and clicking the green "Attend" button.

 

myOverview - sign up for personalised information

We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).

Stay informed about what matters to you. By signing up, you can opt in for e-mail notifications and get access to a personalised dashboard that groups all news updates and event announcements in your domain(s).

Only for stakeholders located in Flanders

Event calendar

 

Testimonial

image of EITHOS - European Identity Theft Observatory System

EITHOS - European Identity Theft Observatory System

The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.