{"id":1,"date":"2019-05-15T13:53:40","date_gmt":"2019-05-15T13:53:40","guid":{"rendered":"http:\/\/conference.blackseacybersecurity.net\/2019\/?p=1"},"modified":"2019-05-15T15:12:52","modified_gmt":"2019-05-15T15:12:52","slug":"bscysec-2019-program","status":"publish","type":"post","link":"https:\/\/conference.blackseacybersecurity.net\/2019\/2019\/05\/15\/bscysec-2019-program\/","title":{"rendered":"BSCySec-2019 Conference program"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-334\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/001.png\" alt=\"\" width=\"764\" height=\"1175\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/001.png 764w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/001-195x300.png 195w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/001-666x1024.png 666w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/001-176x270.png 176w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-335\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/002.png\" alt=\"\" width=\"762\" height=\"1216\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/002.png 762w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/002-188x300.png 188w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/002-642x1024.png 642w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/002-169x270.png 169w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-336\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/003.png\" alt=\"\" width=\"763\" height=\"693\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/003.png 763w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/003-300x272.png 300w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/003-297x270.png 297w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-337\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/004.png\" alt=\"\" width=\"764\" height=\"1105\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/004.png 764w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/004-207x300.png 207w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/004-708x1024.png 708w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/004-187x270.png 187w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-338\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/005.png\" alt=\"\" width=\"760\" height=\"912\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/005.png 760w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/005-250x300.png 250w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/005-225x270.png 225w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-339\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/006.png\" alt=\"\" width=\"761\" height=\"1112\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/006.png 761w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/006-205x300.png 205w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/006-701x1024.png 701w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/006-185x270.png 185w\" sizes=\"auto, (max-width: 761px) 100vw, 761px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-340\" src=\"http:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/007.png\" alt=\"\" width=\"760\" height=\"428\" srcset=\"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/007.png 760w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/007-300x169.png 300w, https:\/\/conference.blackseacybersecurity.net\/2019\/wp-content\/uploads\/sites\/4\/2019\/05\/007-479x270.png 479w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/p>\n<p style=\"text-align: center;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<h2 style=\"text-align: center;\"><strong>18 May 2019 &#8211;\u00a0<\/strong>Parallel Event<\/h2>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #ff0000;\">Workshop I2DS2-EDF<\/span><\/strong><\/h2>\n<h2 style=\"text-align: center;\"><strong>(10:00-13:00)<\/strong><\/h2>\n<h4 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong><a href=\"https:\/\/ec.europa.eu\/docsroom\/documents\/34509\/attachments\/1\/translations\/en\/renditions\/native\" target=\"_blank\" rel=\"noopener noreferrer\">European Defense Fund<\/a><\/strong><\/span><\/h4>\n<h4 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>&#8211; conceptualisation and applying rules&amp;tools &#8211;<\/strong><\/span><\/h4>\n<p style=\"text-align: center;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span class=\"\" title=\"\">We invite you to a working debate on the conceptual milestones, working mechanisms and tools dedicated to the EDF-European Defense Fund, the latest European Commission initiative in the field of common defense and security, on joint funding of research,<\/span> <span class=\"\" title=\"\">development and acquisition of defense technology and equipment.<\/span><\/span><\/p>\n<p><strong>Coordinators:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/nicu-iancu-038163150\/\" target=\"_blank\" rel=\"noopener noreferrer\">Niculae Iancu<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/gheorghe-tibil-025a5650\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gheorghe Tibil<\/a><\/p>\n<ul>\n<li><span style=\"color: #0000ff;\">Participation fee: 300 RON (only workshop)<\/span><\/li>\n<li><span style=\"color: #0000ff;\">The fee will be paid as following:<\/span>\n<ul>\n<li><span style=\"color: #0000ff;\">RO67 RZBR 0000 0600 1993 0844<\/span><\/li>\n<li><span style=\"color: #0000ff;\">The Insource Development Group SRL (CUI: 28062577)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The first European Defence Industrial Development Programme work programme agreed with the Member States provides \u20ac500 million in co-financing for the joint development of defence capabilities during 2019-2020.<\/p>\n<p>These calls will cover priority areas in all domains \u2013 air, land, sea, cyber and space:<\/p>\n<ul>\n<li><strong>Enabling operations, protection and mobility of military forces:<\/strong> \u20ac80 million is available to help develop CBRN threat detections capabilities or counter drone systems;<\/li>\n<li><strong>Intelligence, secured communication &amp; Cyber:<\/strong> \u20ac182 million will cover cyber situational awareness and defence, space situational awareness and early warning capabilities, or maritime surveillance capabilities;<\/li>\n<li><strong>Ability to conduct high-end operations:<\/strong> \u20ac71 million will support the upgrade or the development of the next generation of ground-based precision strike capabilities, ground combat capabilities, air combat capabilities and future naval systems;<\/li>\n<li><strong>Innovative defence technologies &amp; SMEs:<\/strong> \u20ac27 million will support solutions in Artificial Intelligence, Virtual Reality and Cyber technologies, as well as to support SMEs.<\/li>\n<li>In addition, two projects have been proposed for direct award:\u00a0\u20ac100 million to support the development of the<strong>\u00a0Eurodrone, a crucial capability for Europe&#8217;s strategic autonomy<\/strong>, and \u20ac37 million to support\u00a0ESSOR\u00a0interoperable and secure military communications.<\/li>\n<\/ul>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">I2DS2-EDF addresses defense managers and specialists from state institutions operating in the Defense, European Affairs, European Funds, and Scientific Research and Technological Development entities with defense applications.<\/span><br \/>\n<span class=\"\" title=\"\">With a overall budget of over 13 billion euros, EDF aims to stimulate cooperation between Member States for research, development and joint procurement of military equipment, technology and technology.<\/span> <span class=\"\" title=\"\">Only partnership projects are eligible, involving at least 3 participants from at least 3 Member States.<\/span><\/span><\/p>\n<p><strong>Workshop Main Topics:<\/strong><\/p>\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">What is the European Defense Fund<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span class=\"\" title=\"\">Structure of the European Defense Fund: Research window ad capabilities window<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span class=\"\" title=\"\">Governance mechanisms of the European Defense Fund<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span class=\"\" title=\"\">Eligibility criteria for accessing funds<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">What is the European Defense Industrial Development Program (EDIDP)<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">The functioning mechanisms of EDIDP<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">EU consultancy for the production phase of products developed by EDF<\/span><\/span><\/li>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span class=\"\" title=\"\">Directions for accessing EDF funds<\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p style=\"text-align: center;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p><span style=\"color: #0000ff;\"><strong>13:00-13:30 Conference Closing Speech<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; 18 May 2019 &#8211;\u00a0Parallel Event Workshop I2DS2-EDF (10:00-13:00) European Defense Fund &#8211; conceptualisation and applying rules&amp;tools &#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- We invite you to a working debate on the conceptual milestones, working mechanisms and tools dedicated to the EDF-European Defense Fund, the latest European Commission initiative in the field of common defense and security, on joint &hellip; <\/p>\n","protected":false},"author":1,"featured_media":24,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":134,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/posts\/1\/revisions\/342"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/media\/24"}],"wp:attachment":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2019\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}