Governance activities form the backbone of the network, supporting community activities that range from roadmap design to Request for Challenges, from monthly SPARTA Workshops to bi-yearly SPARTA Days. Research programs are continuously spun from strands of the roadmap, led by experts of their fields, and aim at generating concrete and transformative results.
News & Events
SPARTA | The Future Needs You
18th Oct 2021The instant interconnectivity brought by the rapid advances in technology revolutionised the way we lived and changed the paradigm of security. Cyberspace is a place shared by all the citizens, where social, political, and economic aspects are constantly emerging. As in the physical world, cyberspace faces a range of emerging challenges, namely concerning its security.
An interconnected world means that cyberattacks can come from any part of the world. Cybercriminals, or non-ethical hackers, come from different countries, backgrounds, and cultures, being only possible to prevent cyberattacks globally if there is a common but diverse understanding of the reasons, ways, and forms of attacks. How? By creating cybersecurity teams with professionals from different cultural backgrounds. A diverse workforce is of utter importance to ensure national and global security, peace, and progress.
Besides the need for a diverse workforce, there is an urgent need to fill job positions. The increa...
Local explanation of Machine Learning model with shapkit, a Python module that approximate Shapley Values
4th Oct 2021Nowadays, Machine Learning models are used for various applications with already successful or promising results. Unfortunately, a common criticism is the lack of transparency associated with these algorithm decisions. This is mainly due to a greater interest in performance (measurable on specific tasks) at the expense of a complete understanding of the model. This results in a lack of knowledge of the internal working of the algorithm by the developer and the end user. The most obvious consequences are firstly a difficulty to correct the algorithm by an expert (different assumptions, removing outliers, adding new variables or diverse samples). Secondly, limiting its adoption by operational staff. There is even an urgent need for an explainable Artificial Intelligence (AI). There is no single definition of interpretability or explainability concerning model prediction. Therefore, there are several ways to proceed. Assessing them objectively is a real problem because we do not have u...
National Clusters pushing the JCCI growth
27th Sep 2021European Commission has funded four different pilots for establishing a European Cybersecurity Competence centre, promoting share competences, expertise and knowledge among the institutions, stakeholders, and other members. In this context, in SPARTA project, the Joint Competence Centre Infrastructure is implemented as a solution for addressing these Commission’s needs.
The mission of a Joint Competence Centre Infrastructure is to promote and make available information about tools, infrastructure, data and learning content to all (and not only) partners and associates of SPARTA. Its objective is to be used to optimize research and innovation in cyber security, creating new services or extending those that are currently provided by third parties, offering learning, training and experimentation resources. Those singular assets can be accessed and used in similar ways to those of a Digital Innovation Hub. Such information is publicly available through the SPARTA JCCI NEXUS. The Nexus ...
Evaluation of the Cooperative Car demonstrator developed by TECNALIA in the CAPE program
17th Sep 2021Last week EURECAT technology centre has visited the TECNALIA’s Autonomous Vehicle Cybersecurity laboratory, which is one of the laboratories that forms the BDIH Cybersecurity Node. The aim of the visit was to carry out, together with the TECNALIA team, a penetration test on a fleet of Model Cars while they circulate jointly and in a coordinated manner forming a platoon. This work is part of SPARTA!
In SPARTA, TECNALIA is working on the assessment and improvement of the security of connected vehicles driving autonomously in a platoon mode. A platoon is a group of vehicles driving in close proximity to each other, with the purpose of reducing aerodynamic drag, thereby reducing fuel consumption and CO2 emissions. Each platoon member, thanks to its CACC (Cooperative Adaptive Cruise Control), adapts its speed based on data received from its sensors and information exchanged with the other vehicles. They have also worked in new countermeasures to mitigate the cyber-attacks to which this ...
Turris OS 5.2 has bee released
8th Sep 2021About Turris project:
Project Turris started back in 2013. It was a security project sponsored by CZ.NIC to get more relevant data about attacks on average Joe. As part of the project, routers with custom software were created and given away to Czech Republic households. Those routers were under contract, which stated that they had to be the main access point to the Internet. From those routers, firewall logs were collected. Apart from firewall logs, some minimalistic honeypots were written for popular protocols, trying to learn more about attacker’s behavior. The resulting data were shared with the Czech national CSIRT team and the relevant result with the worldwide security community. Apart from that, those data were used to generate publicly available greylist and dynamically update firewall on the routers and frequent updates, open-source firmware, and performance. After receiving this kind of feedback, CZ.NIC decided to try to spread those routers even further and created a co...
SPARTA at the 47th edition of the Cybersecurity Breakfast
2nd Sep 2021AGENDA
The 47th edition of the Cybersecurity Breakfast was organized in cooperation with the SPARTA project. It was focused on lessons learned while effectively transforming cybersecurity research into innovation.
The agenda was divided in 3 parts:
A keynote by Dr Mart Noorma, Science and Development Director at Milrem Robotics, Professor of Space and Defense Technology at University of Tartu (Estonia), on “Lessons learned from a highly innovative company, working for years with both academy and industry researchers to build unmanned ground systems”.
Focused highlights provided by senior leaders in the domain
Jacques Klein, Chief Scientist in Software Engineering and Mobile Security, University of Luxembourg (Luxembourg): “How realistic is it for researchers to access real world data for academic research, and then open innovation purposes?”
François Thill, Director Cybersecurity and Digital Technologies at the Ministry of the Economy (Luxembourg): “A MECO i...
Personal Data Breach Regulation
27th Jul 2021Article 33 of the General Data Protection Regulation 2016/679 (GDPR) requires that, as soon as the data controller becomes aware that a personal data breach has occurred, it should without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority, unless the controller can demonstrate that the breach is unlikely to result in a risk for the rights and freedoms of individuals. “Personal data breach” is defined in Article 4(12) GDPR as a “breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of personal data transmitted, stored or otherwise processed.” Where this cannot be achieved within 72 hours, an explanation of the reasons for the delay should accompany the notification to the supervisory authority and information may be provided in phases without undue further delay.
Furthermore, data subjects should be notified without undue dela...
Analysis of foreign influence and cyber incidents during the Latvian municipal elections 2021
21st Jul 2021Disclamer: This analysis was conducted by one of Sub-case owners (DeBunkEU.org) that recently joined the SPARTA T-SHARK Program. The aim of the “Analysis of foreign influence and cyber incidents during the Latvian municipal elections 2021” was to demonstrate how the incidents collected from the different data sources (Information and cyber environment) can be linked and analysed together and how the decision makers can benefit from the full spectrum of cybersecurity awareness.
In the beginning of June, regular municipal elections were held in Latvia. Even though the municipality of Riga did not hold the elections this year, the capital was targeted the most amid the decision of the mayor to remove the Belarusian flag during the hockey tournament.
To complete this analysis, DebunkEU.org joined the T-SHARK programme, which concentrates on combining information and technological spheres to draw connections between cyber incidents and the information landscape. Analysis of Latvian mu...
Making Cybersecurity more Responsible
16th Jul 2021Cybersecurity has become more and more critical for the functioning of our society. Cybersecurity measures, however, may come at the expense of other interests and values. This is problematic since those who decide on security measures in politics, industry and law enforcement don’t have the same interests and priorities as those who are finally affected by them, namely citizens and companies. Researchers and engineers implementing cyber security measures may have their ideas and priorities. Thus, finding the right balance between the interests of different stakeholders remains difficult even if actors are aware of possible value conflicts. It is also obvious that the social groups affected by cybersecurity measures and the range of impacts can vary greatly and depend heavily on the specific use cases and implementation details, so that no concrete instructions for action can be given apart from very general guidelines.
One way to address this conflict is through the concept of “re...
SPARTA organized Summer School on the relationship between cybersecurity and privacy
12th Jul 2021SPARTA and CyberSec4Europe are involved in the organisation of the 16th Summer School on Privacy and Identity Management, which will take place in August 2021. This Summer School is a joint effort together with IFIP, the International Federation for Information Processing and its working groups on Social Accountability and Cybersecurity.
The topic of the Summer School is “It’s complicated: Exploring the complex relationship between cybersecurity, privacy, and other liberties”. These relations are manifest at both regulatory and practical levels: with digital media and information technology as everyday commodities, an increasing number of attacks on IT security are based on privacy breaches and privacy breaches are facilitated by security attacks. Examples include CEO fraud, spear fishing, and leakage of consumer information like credit card details. Although there is a general consensus that security, privacy, and data protection are interrelated, the complexity of their relation...