2025

Available (20)

Showing 13 - 20 per page



Jean-Pierre Quémard

Description of Activities

In this fellowship the original objective is to start to prepare a NWI to address the age approriate topic and start the standard development. The aim is to improve the benefits and reduce the risks in the digital world for young users up to the age of 18. The solution is to adapt the content delivered by online products and services according to the age of users. Moreover, the process requires establishing the age/capacity of users, including age verification and age estimation. The CWA does NOT define age estimation and verification processes (Out of scope) but requires to select an appropriate age assurance tools/approach in conformity with established standards and official guidance.

Fellow's country
Impact on society (7th Open Call)
Need for an EN: Many organizations engage with children intentionally; others engage with children in the course of their general activities. In each case the organization has a responsibility to that child to provide an age-appropriate service. This is not a marginal market, as one in three users is under 18.
The target stakeholders of this standard are society-wide: governments and policymakers; international institutions and civil society organizations; business and tech sector especially digital service providers; parents, teachers, and children.
The protection of children in the ICT world is a key issue and three domains are to develop complementary; including, age appropriate this work item, Age Assurance and Age verification. The two last topics are managed at ISO/IEC/JTC1/SC27/WG5 level the delineation between the three topics is important
Open Call
Organisation type
Organization
Kuzul An Traezehnn
Portrait Picture
Jean-Pierre Quémard
Proposal Title (7th Open Call)
Age appropriate standardisation
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Philippe Ombredanne

Description of Activities

The gaps that this fellowship enables me to address has been to dedicate solid time first for the ECMA meetings that I convened, but also for the community background work that needs support and attention. The priorities are to users the creation of the core specifications for ECMA approval, which has been challenging because of the influx of attention on PURL for SBOM and CRA compliance. The challenge from PURL getting increased attention meant needing to cater to new contributors and supporting long debates and addressing objections, in particular on topics like character encoding.

Fellow's country
Impact on SMEs (7th Open Call)
PURL makes it easier to integrate multiple SBOM tools for CRA compliance, lowering the costs of compliance for SMEs.
Impact on society (7th Open Call)
The expected impact of this project to usher PURL standardization will significantly improve the accuracy of how free and open source software packages are identified and reported in SBOMs. Software developers - both of open source projects and commercial software vendors - will be able to rely on a stable and widely-accepted international standard, across tooling and data for Software Composition Analysis (SCA), SBOMs, and open source compliance. This will greatly improve the overall security posture of any software using free and open source software packages which itself is the vast majority of software. As a universal identifier for packages, PURL enables the exchange of software inventories across partners in the software supply chain and SCA and SBOM tooling and data. This makes PURL the foundation of all SBOM and VEX standards, which are critical for cybersecurity and essential for compliance with upcoming regulations like the European Union's Cyber Resilience Act. Any recipient of an SBOM can rely on PURL as the unique identifier to query vulnerability databases for package metadata and other information about the package used in the software product or service.
Open Call
Portrait Picture
Philippe Ombredanne
Proposal Title (7th Open Call)
Standardize Package-URL (PURL): From community de-facto to international Ecma standard
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Annegrit Seyerlein-Klug

Description of Activities

Annegrit's priority is the Convenorship of CEN CENELEC JTC21 WG 5,  the organisation and project support to work on the AI Act standardisation request for Cybersecurity. This includes a close collaboration with other groups within JTC 21, JTC 13, ISO IEC SC 42 and SC 27 to collect all information of existing and work under development. The main challenge is that JTC 21 and also our WG5 has a diverse structure of experts and knowledge, which makes the work, the effort and efficiency very difficult. In this case, the challenge in addition is the collaboration with other existing standardisation groups within JTC 21 as well as with JTC 13 for Cyber Resilience Act, with ETSI and their view, with ISO IEC SC 27 and SC 42.

Fellow's country
Impact on SMEs (4th Open Call)
Contributing activity for a new work item NWIP within CEN CENELEC JTC 21 WG5 “Artificial Intelligence - Cybersecurity specifications for AI systems” and developing the standard on the basis of the gap report.
Impact on SMEs (7th Open Call)
A lot of European SME and/or European societies will be affected in the one or other way from AI-systems in the future in all areas of our living environment, from AI in medical devices, in personal equipment over autonomous driving until general purpose AI systems like chat gpt or Metaverse platforms. The challenge is to align the standards with the regulation but also with the needs of SME and European values. For this reason, the AI Act asked for standards, which CEN/CENELEC is developing.
Impact on society (4th Open Call)
Cybersecurity is elementary for every digital asset and very important also for AI-Systems as a digital asset to be secure, safe, healthy and respecting fundamental rights.
Impact on society (7th Open Call)
The proposed activity aims to answer the official EU standardization request for the EU AI Act and specifically No. 8 Cybersecurity. Thrustworthy Metaverse solutions are based on trustworthy AI solutions. Trust and cybersecurity of AI and Metaverse can be ensured with well developed standards from cybersecurity and AI experts with business background. In case of the European Union harmonized standards as presumption of conformity to the EU Regulation are requested, in this case the request is for the AI Act and CRA as an essential fundament for a trustworthy and secure web 4.0 with virtual world and Metaverse with the specific EU focus on safety, fundamental rights, health and data protection.
Open Call
Organisation type
Organization
neurocat GmbH
Portrait Picture
Annegrit Seyerlein-Klug
Proposal Title (4th Open Call)
Convenorship for AI Act Standardization Request CEN CENELEC JTC 21 WG Cybersecurity
Proposal Title (7th Open Call)
Secure Metaverse by using EU harmonized standard for Cybersecurity for Artificial Intelligence
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year
Topic (4th Open Call)

Daniel Waszkiewicz

Description of Activities

My work aims to develop robust frameworks for the verification of cryptographic protocols within the security of ICT products, services, and processes, thereby enhancing resilience against cyber threats.

Fellow's country
Impact on SMEs (4th Open Call)
Ensuring that protocols are rigorously verified according to standardised methodologies could, at least partly, lower the financial barriers for SMEs to enter the certification market, as the consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on SMEs (5th Open Call)
By implementing rigorous, standardized verification methods, the overall efficiency of the certification process would improve. This would, to some extent, lower financial entry barriers for SMEs in the certification market, as consistent and dependable protocol verification would simplify the certification of more intricate systems.
Impact on SMEs (6th Open Call)
A unified approach to the verification of cryptographic protocols within cybersecurity certification schemes could significantly reduce the costs and workload associated with certifying composite products or services. By ensuring that protocols are rigorously verified using standardized methodologies, the overall efficiency of the certification process would improve. This could, at least in part, lower the financial barriers for SMEs to enter the certification market, as consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on society (4th Open Call)
My work is centred on creating robust frameworks for verifying cryptographic protocols within ICT products, services, and processes, ultimately strengthening resilience against cyber threats.
Impact on society (5th Open Call)
In the broader European context, my fellowship is poised to have a significant impact on cybersecurity practices, aligning with the objectives set forth by the Cybersecurity Act (CSA) and advancing European interests in bolstering digital security.
Impact on society (6th Open Call)
My primary focus is on developing standardized verification methodologies for cryptographic protocols, which play a key role in enhancing cybersecurity practices across Europe. I am working on creating robust frameworks for verifying these protocols within ICT products, services, and processes, ultimately contributing to greater resilience against cyber threats.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
Organization
Cryptography specialist, National Institute of Telecommunications
Portrait Picture
wasz
Proposal Title (4th Open Call)
Developing ISO/IEC 29128 parts 2 and 3
Proposal Title (5th Open Call)
Progressing ISO/IEC 29128 parts 2 and 3
Proposal Title (6th Open Call)
Advancing ISO/IEC 29128 parts 2 and 3
Standards Development Organisation
StandICT.eu Year
2026
Year

Stéphane Joret

Description of Activities

Understanding how to work in international standardisation committees is vital, which implies going beyond IT asset management microcosm to deliver more value to related disciplines such as cybersecurity or sustainability. 

Fellow's country
Open Call Topics
Impact on SMEs (4th Open Call)
ISO 19770-10 target audience is organisations that want to improve their IT asset management. This includes SMEs such as practitioners and improvers in public and private organisations, ITAM consultants, ITAM trainers and training providers.
Impact on SMEs (7th Open Call)
ISO 19770-10 target audience is organizations that want to improve their IT asset management. This includes SMEs such as practitioners and improvers in public and private organizations, ITAM consultants, ITAM trainers and training providers.
Impact on society (4th Open Call)
Simplified ITAM adoption, thanks to practical guidance and appropriate skill development, can financially benefit all European public and private organisations, reduce the European impact of ICT on the environment, and reduce economic and technological dependence on non-European companies.
Impact on society (7th Open Call)
Simplified ITAM adoption thanks to practical guidance and appropriate skill development can be financially beneficial to all public and private organizations in Europe, can reduce European impact of ICT on the environment, and reduce economic and technological dependence on non-European companies. The impact can be huge, as IT assets are everywhere, notably with a growing presence in the industry. Trustworthy data about IT assets is a key enabler for IT security that is now crucial in the context of hybrid war at the European eastern border.
Open Call
Organisation type
Organization
Senior expert consultant in ITSM and ITAM, Liscience
Portrait Picture
joret
Proposal Title (4th Open Call)
Guidance (ISO 19770-10) for implementing IT asset management
Proposal Title (7th Open Call)
Guidance (ISO 19770-10) for implementing IT asset management
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year
Topic (4th Open Call)
Topic (7th Open Call)

Angie Qarry Jaegermann

Description of Activities

This technical report, resulting from my fellowship’s contributions, is an equitable analysis of the relationship between Quantum Key Distribution (QKD) and Post-quantum Cryptography (PQC) technologies. It describes the two technologies' complementary nature and highlights their potential advantages and benefits.

Fellow's country
Impact on SMEs (7th Open Call)
The development of this TR is significant to the European market, mainly because Europe is pushing very hard for the development of QKD while NIST favors PQC. NIST has marked QKD as a technology not to be adopted for cybersecurity, and some of these decisions might contradict the European Cybersecurity roadmap.
The European Commission also invests heavily in developing a QKD European Network and hybrid QKD-PQC protocol implementations, and the European Space Agency is involved in many free-space QKD communication projects.
The development of this standard is significant to the European market, mainly because Europe is pushing very hard for the development of QKD while NIST favors PQC.
Impact on society (7th Open Call)
My fellowship supports the creation of CEN/CENELEC/JTC22 WG4 working Items (WI) aiming to develop a Technical Report for QKD related technologies.
CEN/CLC/JTC 22/WG4/WI JT022002 (QKD and PQC - An equitable analysis) was accepted. Due to increased activity in the European Networks to implement hybrid cybersecurity protocols of QKD-PQC, the European Commission requested that the hybrid solutions should also be included in the existing WI JT022002, which currently analyses QKD and PQC separately. Therefore, the proposed activity in this application is an extension of the current WI Technical Report to cover the hybridization protocols.
Open Call
Organisation type
Organization
Founder & CEO/CTO, QDeepTech
Portrait Picture
Angie
Proposal Title (3rd Open Call)
Quantum Key Distribution (QKD) and Post Quantum Cryptography ( PQC) : An equitable analysis
Proposal Title (7th Open Call)
Cybersecurity of Hybrid PQC and QKD solutions
Standards Development Organisation
StandICT.eu Year
2026
Year

Pavel Cuchriajev

Description of Activities

My fellowship significantly contributes to the ICT standards landscape by advancing the Biometric System-on-Card (BSoC) standards, particularly within the ISO/IEC 17839 series.

Fellow's country
Impact on SMEs (4th Open Call)
My contribution impacts European SMEs by providing clear guidelines for implementing Biometric System-on-Card (BSoC) technology. Standards promote interoperability, reduce costs, enhance trust, and foster innovation, enabling SMEs to compete effectively, access markets, and build credibility.
Impact on SMEs (7th Open Call)
My contribution impacts European SMEs by providing clear guidelines for implementing Biometric System-on-Card (BSoC) technology. Standards promote interoperability, reduce costs, enhance trust, and foster innovation, enabling SMEs to compete effectively, access markets, and build credibility.
Impact on society (4th Open Call)
The work supported societal impacts by enhancing security and privacy, facilitating access to services, supporting digital transformation, promoting innovation and economic growth, and protecting individual rights in the digital age.
Impact on society (7th Open Call)
The work supported societal impacts by enhancing security and privacy, facilitating access to services, supporting digital transformation, promoting innovation and economic growth, and protecting individual rights in the digital age.
Organisation type
Organization
Technical expert contributor; Standard Norge
Portrait Picture
cuchriajev
Proposal Title (2nd Open Call)
Advance Biometric System-On-Card (ISO/IEC 17839) Standard improvement
Proposal Title (4th Open Call)
Advance Biometric System-On-Card (ISO/IEC 17839) Standard improvement
Proposal Title (5th Open Call)
Advance Biometric System-On-Card (ISO/IEC 17839) Standard improvement
Proposal Title (7th Open Call)
Advance Biometric System-On-Card (ISO/IEC 17839) Standard improvement
Standards Development Organisation
StandICT.eu Year
2026
Year

Karim Tobich

Description of Activities

This fellowship is meant to increase confidence in cybersecurity through the convergence of international SDOs and the alignment behind a common international standard which relates both to the market and society.

 

Country
United Kingdom of Great Britain and Northern Ireland (the)
Fellow's country
Open Call Topics
Impact on SMEs (5th Open Call)
Organisations willing to achieve a resilient cybersecurity system will have to implement an information security management system. The standards developed through this contribution will provide SME and European societies with a comprehensive guidance on how to use ISO/IEC 27001 and ISO/IEC 27002. Moreover, ISO/IEC 27017 will provide SMEs working as Could service providers with a comprehensive list of guidelines to implement when providing services to Could service customers.
Impact on SMEs (7th Open Call)
Organisations willing to achieve a resilient cybersecurity system will have to implement an information security management system. Within that context, this contribution helps organisations of any size including SMEs to achieve better security and cybersecurity through the use of standards like ISO/IEC 27003, ISO/IEC 27028, and ISO/IEC 27004 that will be revised and developed through this work. In addition, this contribution provides technology organisations with a framework to develop and use secure cloud systems ISO/IEC 27017, edge computing systems ISO/IEC 25545 and raise awareness about security and privacy aspects of digital twin systems ISO/IEC 27568 so those concerns can be integrated at an early stage and achieve security and privacy by design when developing such innovative technology.
Impact on society (5th Open Call)
Developing and providing such standards to organisations allow them to implement the EU values and policies in an easy manner.
Organisation type
Organization
Director - Cybersecurity & Technology Consultancy
Portrait Picture
karim
Proposal Title (1st Open Call)
Standards for Information security and cloud service providers
Proposal Title (5th Open Call)
Standards for Information security management, cloud service providers, and digital twins
Proposal Title (7th Open Call)
Standards for Information security management, cloud, edge and digital twin technologies
Role in SDO
Standards Development Organisation
Topic
Cybersecurity / Cloud Computing
StandICT.eu Year
2026
Year
Topic (1st Open Call)