Find out what's happening in the area of Horizon Europe, Digital Europe and Horizon 2020
This was 1 month ago
LocationOnline
ProgrammesSEREN5 is hosting its next online stakeholder training event entitled, ‘Horizon Europe Security Appraisal Process’ in collaboration with the European Commission’s Department DG HOME.
It forms part of a series of SEREN5 training sessions, which aims to raise the standards of learning and knowledge for its stakeholders, which in turn contributes to improving the quality of Horizon Europe proposals.
Agenda and more details can be found here.
You can register for this training via this webform: https://forms.office.com/e/QXwZuJbwnk
You can also find more information on the security appraisal process in the dedicated infosheet (Security appraisal procedure in Horizon Europe) on our website .
We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
Security AI, data & cloud Cybersecurity Defence Space
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.