[21-06-11] Cyber secure and resilient CCAM (CCAM partnership)
The two tables below can be used when a European organization is looking for project partner, i.e. a specific type of organization, with a specific type of skill or interest.
The first table shows the skills and interests among a number of potential partners. When searching for a specific skill, start by looking at column 1. For each skill the potential partners are listed in the same row. The organization’s names are also links to their home pages.
The second table below shows all the organizations that are interested in this call, and also the types of organization (SME, startup, RTO etc.).
If you are interested in getting in touch with any of these organizations, please contact the node for more information at email@example.com.
|Type of expertise needed||Organisations|
|Best practices in cybersecurity fo CCAM||Swedavia, Sectyne|
|Cybersecurity requirements||Swedavia, Linköpings universitet, T2 Data, Sectyne|
|Sector specific security features||Clavister, Swedavia, Sectyne, Omen Technologies|
|The development process of CCAM solutions||Swedavia|
|Anomaly detection||Clavister, Swedavia, Linköpings universitet, Stream Analyze, Omen Technologies|
|Methods and tools strengthening the security of CCAM solutions||Swedavia, Linköpings universitet|
|Communication protocols||Swedavia, Linköpings universitet, T2 Data|
|Harmonised interfaces and protocols||Swedavia, Linköpings universitet|
|Continuous assessment of the robustness and resilience||Swedavia, T2 Data|
|Protecting the user’s privacy||N/A|
|SSH disciplines and SSH experts, societal impact||N/A|