In this section you will find more information about the WISER project, its progress and results.
The section is organized into four areas:
Deliverables - This area contains the results of the WISER's research & development efforts in form of public deliverables, showing the progress of the project work.
Presentations - This area contains public presentations held by the WISER representatives in different events, such as conferences, webinars etc.
Publications - This area provides a list of publications produced by the consortium and related to the work developed within the project.
Reports - This area contains different public studies and reports on cyber security.
WISER has adopted a multi-faceted approach to its interaction with the EAPs, as detailed in this report. A key outcome of the feedback received is a clear understanding of the expectations of prospective users of the WISER framework by offering a guide for the design and development of the framework.
Release: May 2016WISER_D6_2_v10.pdf
This report serves two purposes. First, it describes the business processes, cybersecurity needs and current practice of the associate partners for which the early assessment pilots (EAPs) are conducted, thereby creating a shared initial understanding of these organizations among the consortium members. Second, the report provides an overview over standards, methods and tools for security and risk management, security testing, vulnerability and threat monitoring.
Release: August 2015WISER_D6_1_Best Practices & EAP Preliminary Version.pdf
This deliverable documents the design of the Real-Time assessment infrastructure of the WISER Framework and the interfaces among the internal components implementing the real-time feature of WISER and external elements. This is the core of the Framework and is composed by the Risk Assessment Engine, the Data Warehouse and the Decision Support System.
Release: February 201620160115_WISER_D5_1_v10.pdf
This deliverable documents the design of the WISER’s monitoring infrastructure consisting of sensors, agents, and the central Data Warehouse. It also focuses on demonstrating its capabilities. The WISER Monitoring is based on agent push monitoring strategy and consists of WISER Agents pushing monitoring and testing data towards the central storage. In this deliverable we present the details of the monitoring infrastructure and describe the monitoring sensors that comprise the WISER solution.
Release: October 201620160907_WISER_D4_2_v1_0.pdf
This deliverable documents the design of WISER’s monitoring infrastructure and focuses on metrics related to exposed vulnerabilities and detected malicious activities on the target system.
Release: February 201620150507_WISER_D4_1_v10.pdf
This document reports on the work carried out to offer support for cyber risk modelling in the WISER framework. This support is provided in the form of modelling languages and corresponding guidelines and structures that are specifically aimed at facilitating development of cyber risk models to fulfil the role implied by the framework design documented in D2.3 and implemented in D2.4.
Release: March 2017WISER_D3_4_v10.pdf
Deliverable 3.3 is foreseen as a demonstrator consisting of three software tools that have been carefully selected by the consortium in order to serve a specific purpose in the WISER framework. This document gives an overview of the demostrator in the form of a witten report.
Release: May 2016
This document reports on the work carried out during the first year of the project to offer support for cyber risk modelling in the WISER framework. This support is provided in the form of modelling languages and corresponding guidelines and structures that are specifically aimed at facilitating development of cyber risk models to fulfil the role implied by the framework design documented in D2.3.
Release: May 2016WISER_D3_2_v10.pdf
This document reports on cyber risk patterns provided by the WISER framework to support cyber risk modelling. The purpose is to support clients of WISER with a set of predefined risk patterns they may instantiate without going through an extensive risk analysis process. The risk patterns capture typical cyber risks in a generic way and are available to the client in CyberWISER Essential, as well as CyberWISER Plus. This document also provides guidelines for how to instantiate WISER risk patterns.
Release: May 2016WISER_D3_1_v10.pdf
This document reports the work carried out to deliver the final version of the design of the WISER Framework and detials the functioning of the three modes of operation WISER envisages and clarifies the role of the different components of the WISER Framework.
Release: February 201620160113_WISER_D2_3_v1_0.pdf
The purpose of the Deliverable 2.2 is to give an overview of the work performed in the context of the WISER WP2 during the months 4 to 6 of the project. Throughout these 3 months, the task of defining the requirements (Task 2.1) has been completed and the task of designing the WISER Framework (Task 2.2) initiated. This document reports the outcomes of the initial steps in the design of the WISER platform.
Release: November 201520150924_WISER_D2_2_v1_0.pdf