Cybersecurity/Network and Information security

Available (23)

Showing 1 - 12 per page



Jean-Pierre Quémard

Description of Activities

In this fellowship the original objective is to start to prepare a NWI to address the age approriate topic and start the standard development. The aim is to improve the benefits and reduce the risks in the digital world for young users up to the age of 18. The solution is to adapt the content delivered by online products and services according to the age of users. Moreover, the process requires establishing the age/capacity of users, including age verification and age estimation. The CWA does NOT define age estimation and verification processes (Out of scope) but requires to select an appropriate age assurance tools/approach in conformity with established standards and official guidance.

Fellow's country
Impact on society (7th Open Call)
Need for an EN: Many organizations engage with children intentionally; others engage with children in the course of their general activities. In each case the organization has a responsibility to that child to provide an age-appropriate service. This is not a marginal market, as one in three users is under 18.
The target stakeholders of this standard are society-wide: governments and policymakers; international institutions and civil society organizations; business and tech sector especially digital service providers; parents, teachers, and children.
The protection of children in the ICT world is a key issue and three domains are to develop complementary; including, age appropriate this work item, Age Assurance and Age verification. The two last topics are managed at ISO/IEC/JTC1/SC27/WG5 level the delineation between the three topics is important
Open Call
Organisation type
Organization
Kuzul An Traezehnn
Portrait Picture
Jean-Pierre Quémard
Proposal Title (7th Open Call)
Age appropriate standardisation
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Gill Whitney

Description of Activities

 

The standards being developed should cover the requirements of the full range of stakeholders (including users, affected bystanders and manufacturers etc) over the complete lifetime of the product.

 

Fellow's country
Impact on society (6th Open Call)
Cybersecurity standards have traditionally focused on the operation of the hardware, software and firmware of the systems. The needs of the human elements have often not been fully considered and negative viewpoints are sometimes heard in cybersecurity standards meeting with respect to untrained and/or vulnerable consumers/end users. By considering and supporting the `human element’ in products with digital elements (an essential element), it is hoped to reduce the potential for harm to the system and also to reduce the harm to the end user. In particular improved communication should reduce the physiological harm caused to the end user when something goes wrong and they think it is their fault. Cybersecurity standards for digital systems can thus be seen to support vulnerable users and to acknowledge that all end users can be vulnerable in specific circumstances
Open Call
Organisation type
Organization
Independent Expert
Portrait Picture
Gill Whitney
Proposal Title (6th Open Call)
Contribution to the modification of standards to facilitate their use by manufacturers and writers of associated vertical standards
Standards Development Organisation
StandICT.eu Year
2026
Year

Philippe Ombredanne

Description of Activities

The gaps that this fellowship enables me to address has been to dedicate solid time first for the ECMA meetings that I convened, but also for the community background work that needs support and attention. The priorities are to users the creation of the core specifications for ECMA approval, which has been challenging because of the influx of attention on PURL for SBOM and CRA compliance. The challenge from PURL getting increased attention meant needing to cater to new contributors and supporting long debates and addressing objections, in particular on topics like character encoding.

Fellow's country
Impact on SMEs (7th Open Call)
PURL makes it easier to integrate multiple SBOM tools for CRA compliance, lowering the costs of compliance for SMEs.
Impact on society (7th Open Call)
The expected impact of this project to usher PURL standardization will significantly improve the accuracy of how free and open source software packages are identified and reported in SBOMs. Software developers - both of open source projects and commercial software vendors - will be able to rely on a stable and widely-accepted international standard, across tooling and data for Software Composition Analysis (SCA), SBOMs, and open source compliance. This will greatly improve the overall security posture of any software using free and open source software packages which itself is the vast majority of software. As a universal identifier for packages, PURL enables the exchange of software inventories across partners in the software supply chain and SCA and SBOM tooling and data. This makes PURL the foundation of all SBOM and VEX standards, which are critical for cybersecurity and essential for compliance with upcoming regulations like the European Union's Cyber Resilience Act. Any recipient of an SBOM can rely on PURL as the unique identifier to query vulnerability databases for package metadata and other information about the package used in the software product or service.
Open Call
Portrait Picture
Philippe Ombredanne
Proposal Title (7th Open Call)
Standardize Package-URL (PURL): From community de-facto to international Ecma standard
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Walte Fumy

Description of Activities


This fellowship supports my engagement in ISO/IEC JTC 1 ‘Information technology’ is not on a working level (such as a contributor to specific standards) but on a strategic level.

Fellow's country
Impact on SMEs (6th Open Call)
While the nature of my engagement in ISO/IEC JTC 1 does not directly impact European SMEs, I have volunteered to participate in the StandICT.eu Mentorship Programme and to mentor new SME experts, who are less familiar with the workings of SDO technical committees, by providing guidance and advice.
Open Call
Organisation type
Organization
Independent Consultant
Portrait Picture
Walte Fumy
Proposal Title (6th Open Call)
communication and promotion of European interests in international ICT standardisation
Standards Development Organisation
StandICT.eu Year
2026
Year

Antoine Sciberras

Description of Activities


My work aims to rationalise the resulting compliance efforts through a dedicated Technical Report (TR) under ETSI CYBER. This report will help reduce legal ambiguity, support standardisation across sectors, and ensure proportional and efficient compliance.

Fellow's country
Impact on SMEs (6th Open Call)
This project has significant implications for SMEs across the EU. Many of these companies provide ICT services to regulated entities but may lack the resources to navigate complex, overlapping regulatory regimes. By providing a unified interpretation of NIS2 and DORA obligations, the project reduces uncertainty and helps SMEs avoid redundant compliance efforts.
Impact on society (6th Open Call)
Yes. The initiative is centred on the development of a new Technical Report within ETSI CYBER, aimed at clarifying the joint application of NIS2 and DORA. A formal proposal has been submitted and approved as a work item under ETSI CYBER’s work programme.
Open Call
Organisation type
Organization
University of Malta
Portrait Picture
Antoine Sciberras
Proposal Title (6th Open Call)
Contributing to the evolution of ICT standards by providing clarity where EU-level legislation currently creates operational ambiguity
Standards Development Organisation
StandICT.eu Year
2026
Year

Nicolae Paladi

Description of Activities

Through this fellowship, I am contributing to shape the standards around next-generation secure computing infrastructure. We are on the verge of a new paradigm where the security of the computing infrastructure is endorsed by hardware features and ensures protection of data at rest, in transit, and in use. 

Fellow's country
Impact on SMEs (5th Open Call)
Trusted execution environments (TEEs) allow deploying code and data in a separate, secure segment of computing platforms. Standardised security assessment and provisioning of configuration and personalisation information to Trusted execution environments (TEEs) can be a key contributor to more secure services and an enabler for new products and services.
Open Call
Organisation type
Organization
CEO CanaryBit.eu
Portrait Picture
Paladi
Standards Development Organisation
StandICT.eu Year
2026
Year

Denis Pinkas

Description of Activities

The use of digital identity wallets is foreseen to be the best appropriate solution to support an age verification method, which uses the date of birth of the individual without disclosing it.

Fellow's country
Impact on SMEs (5th Open Call)
If successful, the impact will not be restricted to European SMEs and/or European societies.
As my contributions are both for ISO and the IETF, the impact can be worldwide. However, I have not observed the presence of another European expert motivated by the topic of Age assurance systems that participates both in ISO JTC1 SC 27 and in the IETF.
Impact on society (5th Open Call)
The societal impacts can be important. Age assurance which entails age verification, age estimation and age inference is applicable for a large variety of use cases. Protection of children is the most prominent use case.
Open Call
Organization
CEO, DP Security Consulting SAS
Portrait Picture
Pinkas
Proposal Title (5th Open Call)
Age-restricted accesses to services while preserving the privacy of individuals
Standards Development Organisation
StandICT.eu Year
2026
Year

Daniel Waszkiewicz

Description of Activities

My work aims to develop robust frameworks for the verification of cryptographic protocols within the security of ICT products, services, and processes, thereby enhancing resilience against cyber threats.

Fellow's country
Impact on SMEs (4th Open Call)
Ensuring that protocols are rigorously verified according to standardised methodologies could, at least partly, lower the financial barriers for SMEs to enter the certification market, as the consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on SMEs (5th Open Call)
By implementing rigorous, standardized verification methods, the overall efficiency of the certification process would improve. This would, to some extent, lower financial entry barriers for SMEs in the certification market, as consistent and dependable protocol verification would simplify the certification of more intricate systems.
Impact on SMEs (6th Open Call)
A unified approach to the verification of cryptographic protocols within cybersecurity certification schemes could significantly reduce the costs and workload associated with certifying composite products or services. By ensuring that protocols are rigorously verified using standardized methodologies, the overall efficiency of the certification process would improve. This could, at least in part, lower the financial barriers for SMEs to enter the certification market, as consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on society (4th Open Call)
My work is centred on creating robust frameworks for verifying cryptographic protocols within ICT products, services, and processes, ultimately strengthening resilience against cyber threats.
Impact on society (5th Open Call)
In the broader European context, my fellowship is poised to have a significant impact on cybersecurity practices, aligning with the objectives set forth by the Cybersecurity Act (CSA) and advancing European interests in bolstering digital security.
Impact on society (6th Open Call)
My primary focus is on developing standardized verification methodologies for cryptographic protocols, which play a key role in enhancing cybersecurity practices across Europe. I am working on creating robust frameworks for verifying these protocols within ICT products, services, and processes, ultimately contributing to greater resilience against cyber threats.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
Organization
Cryptography specialist, National Institute of Telecommunications
Portrait Picture
wasz
Proposal Title (4th Open Call)
Developing ISO/IEC 29128 parts 2 and 3
Proposal Title (5th Open Call)
Progressing ISO/IEC 29128 parts 2 and 3
Proposal Title (6th Open Call)
Advancing ISO/IEC 29128 parts 2 and 3
Standards Development Organisation
StandICT.eu Year
2026
Year

Johann Groszschaedl

Description of Activities

Improving security is one of the most, if not the most, important priorities for the evolution and future development of the IoT.

Fellow's country
Impact on SMEs (2nd Open Call)
MSP430 microcontrollers are deployed in thousands of IoT devices of European companies in all segments of the Embedded/IoT industry, ranging from automotive appliances over industrial control systems to medical devices. Many of the companies that designed and/or manufactured these devices are SMEs.
Impact on society (2nd Open Call)
This project has contributed to improve the security of the IoT since cryptographically strong E2E protocols are the foundation upon which secure architectures, systems and protocols can be built.
Open Call
Organisation type
Organization
University of Luxembourg
Portrait Picture
Johann
Proposal Title (2nd Open Call)
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things
Standards Development Organisation
StandICT.eu Year
2026
Year

François Lorek

Description of Activities

This fellowship allows me to take part to all meetings concerning Cybersecurity, Privacy and Artificial Intelligence (even most are very early or very late in the day, as per rules for scheduling in SDO's), whilst being able to keep delivering standard based consulting especially for SMEs which need to comply for ISO 27001 certifications mostly. 

Fellow's country
Impact on SMEs (2nd Open Call)
Provide confidence to SMEs about concerned about Cybersecurity & Privacy standards within Artificial Intelligence.
Impact on SMEs (4th Open Call)
Many small and mediums companies are about to be impacted by Cybersecurity & Privacy, IoT & DT or Artificial Intelligence standards or are concerned by Cybersecurity & Privacy within Artificial Intelligence with a need to make their market and potential customers confident, especially in the context of forthcoming standards related to regulations at european level.
Impact on society (2nd Open Call)
The work being carried out under the guidance of the officers of which I am a member is helping to reassure businesses and civil society alike as to how confidence can be guaranteed, and how drifts can be avoided by providing maximum protection against today’s emerging threats associated with the acceleration of artificial intelligence-based technologies.
Impact on society (4th Open Call)
Among others ISO officer duties and ISO/CEN/CENELEC standardisation expert I expect to provide the following benefits: clarity of roadmap and scopes, encourage constructive collaboration and participation of SC41 & SC42 experts in SC27 AhG2 & 3, maintain a smooth and efficient organisation of working sessions,
Open Call
Organisation type
Organization
TRAX
Portrait Picture
lorek
Proposal Title (2nd Open Call)
Developing cybersecurity standardisation for Artificial Intelligence and Internet of Things
Proposal Title (4th Open Call)
Developing cybersecurity standardisation for Artificial Intelligence and Internet of Things
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Sandra Feliciano

Description of Activities

My fellowship focuses on several priorities and key gaps related to AI and cybersecurity standards applied in education.

Fellow's country
Impact on SMEs (5th Open Call)
It impacts educational organisations in any country and of all legal forms and sizes (including SME) and also includes training departments of SMEs from other economic sectors.
Impact on society (5th Open Call)
Moreover, by tailoring ISO 42001 and ISO 27001 to the education sector, the project directly strengthens the cybersecurity posture of educational institutions across Europe. This includes safeguarding sensitive student data and protecting educational infrastructures from cyber threats. Also, the development of specific guidelines ensures a harmonized approach to cybersecurity across European educational systems, fostering a more secure and resilient digital education environment.
Open Call
Organisation type
Organization
Invited Adjunct Professor, AESTAS INSIGNIS - Investigação e Suportes de Apoio à Gestão, Unipessoal, Lda.
Portrait Picture
feliciano
Proposal Title (3rd Open Call)
AI & Cybersecurity Standards in Education: A Collaborative approach for Safer Learning Environments
Proposal Title (5th Open Call)
AI & Cybersecurity Standards in Education II (Project Continuation)
Blockchain for a Sustainable Future: Dual-Impact Standards for ESG and SDGs
Standards Development Organisation
StandICT.eu Year
2026
Year

Angie Qarry Jaegermann

Description of Activities

This technical report, resulting from my fellowship’s contributions, is an equitable analysis of the relationship between Quantum Key Distribution (QKD) and Post-quantum Cryptography (PQC) technologies. It describes the two technologies' complementary nature and highlights their potential advantages and benefits.

Fellow's country
Impact on SMEs (7th Open Call)
The development of this TR is significant to the European market, mainly because Europe is pushing very hard for the development of QKD while NIST favors PQC. NIST has marked QKD as a technology not to be adopted for cybersecurity, and some of these decisions might contradict the European Cybersecurity roadmap.
The European Commission also invests heavily in developing a QKD European Network and hybrid QKD-PQC protocol implementations, and the European Space Agency is involved in many free-space QKD communication projects.
The development of this standard is significant to the European market, mainly because Europe is pushing very hard for the development of QKD while NIST favors PQC.
Impact on society (7th Open Call)
My fellowship supports the creation of CEN/CENELEC/JTC22 WG4 working Items (WI) aiming to develop a Technical Report for QKD related technologies.
CEN/CLC/JTC 22/WG4/WI JT022002 (QKD and PQC - An equitable analysis) was accepted. Due to increased activity in the European Networks to implement hybrid cybersecurity protocols of QKD-PQC, the European Commission requested that the hybrid solutions should also be included in the existing WI JT022002, which currently analyses QKD and PQC separately. Therefore, the proposed activity in this application is an extension of the current WI Technical Report to cover the hybridization protocols.
Open Call
Organisation type
Organization
Founder & CEO/CTO, QDeepTech
Portrait Picture
Angie
Proposal Title (3rd Open Call)
Quantum Key Distribution (QKD) and Post Quantum Cryptography ( PQC) : An equitable analysis
Proposal Title (7th Open Call)
Cybersecurity of Hybrid PQC and QKD solutions
Standards Development Organisation
StandICT.eu Year
2026
Year