000244455 001__ 244455
000244455 005__ 20230208174156.0
000244455 0247_ $$2CORDIS$$aG:(EU-Grant)952702$$d952702
000244455 0247_ $$2CORDIS$$aG:(EU-Call)H2020-SU-ICT-2019$$dH2020-SU-ICT-2019
000244455 0247_ $$2originalID$$acorda__h2020::952702
000244455 035__ $$aG:(EU-Grant)952702
000244455 150__ $$aBuilding Trust in Ecosystems and Ecosystem Components$$y2020-09-01 - 2023-08-31
000244455 372__ $$aH2020-SU-ICT-2019$$s2020-09-01$$t2023-08-31
000244455 450__ $$aBIECO$$wd$$y2020-09-01 - 2023-08-31
000244455 5101_ $$0I:(DE-588b)5098525-5$$2CORDIS$$aEuropean Union
000244455 680__ $$aNowadays most of the ICT solutions developed by companies require the integration or collaboration with other ICT components, which are typically developed by third parties. Even though this kind of procedures are key in order to maintain productivity and competitiveness, the fragmentation of the supply chain can pose a high risk regarding security, as in most of the cases there is no way to verify if these other solutions have vulnerabilities or if they have been built taking into account the best security practices.
In order to deal with these issues, it is important that companies make a change on their mindset, assuming an “untrusted by default” position. According to a recent study only 29% of IT business know that their ecosystem partners are compliant and resilient with regard to security. However, cybersecurity attacks have a high economic impact and it is not enough to rely only on trust. ICT components need to be able to provide verificable guarantees regarding their security and privacy properties. It is also imperative to detect more accurately vulnerabilities from ICT components and understand how they can propagate over the supply chain and impact on ICT ecosystems. However, it is well known that most of the vulnerabilities can remain undetected for years, so it is necessary to provide advanced tools for guaranteeing resilience and also better mitigation strategies, as cybersecurity incidents will happen. Finally, it is necessary to expand the horizons of the current risk assessment and auditing processes, taking into account a much wider threat landscape. BIECO is a holistic framework that will provide these mechanisms in order to help companies to understand and manage the cybersecurity risks and threats they are subject to when they become part of the ICT supply chain. The framework, composed by a set of tools and methodologies, will address the challenges related to vulnerability management, resilience, and auditing of complex systems.
000244455 909CO $$ooai:juser.fz-juelich.de:900895$$pauthority$$pauthority:GRANT
000244455 909CO $$ooai:juser.fz-juelich.de:900895
000244455 980__ $$aG
000244455 980__ $$aCORDIS
000244455 980__ $$aAUTHORITY