SlideShare a Scribd company logo
CRISP Project
Overview of findings and
lessons learned
Internal TRI Webinar
Thordis Sveinsdottir
Project Partners
Starting point
 The EU security market:
• Highly fragmented
• Absence of common certification systems
• Limited mechanism for mutual recognition of
national certification
• Slow introduction to new marked needs and
solutions
Starting point
 Security systems often involve intensive
data processing
• potential breach of citizens freedoms.
 Absence of holistic approach to
certification
• socio-legal requirements that show respect
for fundamental rights.
CRISP Mission
 The CRISP project mission was to develop an innovative
evaluation and certification methodology for security
systems:
 increase citizen trust in security technologies
• through evaluating social impacts of security
systems
• certification of systems that comply with the
protection of fundamental rights.
 more harmonized playing field for the European
security industry,
• acceptance of security certification across
Europe
– no need for re-certification in each country.
Embedding socio – legal requirements
Approach
 Innovative
 Holistic
STEFi dimensions
 Security
 Trust
 Efficiency
 Freedom infringement
Process
Building blocks
for certification
scheme
Developing STEFi
methodology
Understanding
stakeholders
needs
Researching
current landscape
Glossary and
taxonomy
Stakeholder
consultations
CRISP Advisory
Board
Confidence
enhancement
DPA workshop
Roundtable
certification bodies
Validation and
Scenario-based
workshops
The STEFi methodology
Two main phases: evaluation and
certification
Example evaluation questions STEFi
Building blocks for certification scheme
Key Deliverable - Standards document: CWA
What is a CEN Workshop Agreement?
 Official standards document
 Agreement developed and approved in a CEN
Workshop
 Open to the direct participation of all interested
parties
 Fast and flexible development (average 1 year)
Standards document: CWA
 Scope of CWA
 Example in Annex: Installed video surveillance systems
 Challenge:
 to come to unambiguous procedures for a multi-
dimensional evaluation that acknowledges the
complexity of the societal context in which security
systems operate.
Certification manual
Provides basic information for the future
owner of the CRISP certification scheme
 pictures the overall evaluation and
certification methodology
 clarifications on roles and responsibilities of
all parties involved
 information on (basic) requirements for
evaluation and certification, including existing
standards and legislation
Roadmap and implementation plan
CRISP project - successes
Very engaged consortium – willing to give time
to think through problems
POs were interested in the project – helpful and
flexible
The expertise of the consortium was fitting the
project – no gaps
Lessons learned
 Ambitious project; need to narrow the scope
 Certification and standardisation activities need broad
support and engagement from stakeholders
 Standards development is an “exact science” – these
activities need extra time
 CWA process can be long and complex – need to
consider this when writing proposals

More Related Content

PPTX
Examining End-User Standardisation Needs for Disaster Resilience
DOCX
Rhonda J Edwards Martin August 2016
PDF
Project Initiation Routemap - Denise Bower, United Kingdom
PPT
Successes And Achievements
PDF
World quality report 2018 19
PDF
TUV SUD - OpenChain Third Party Certification
PPTX
Agile software development
PPTX
A stakeholder based approach to standardisation for disaster resilience
Examining End-User Standardisation Needs for Disaster Resilience
Rhonda J Edwards Martin August 2016
Project Initiation Routemap - Denise Bower, United Kingdom
Successes And Achievements
World quality report 2018 19
TUV SUD - OpenChain Third Party Certification
Agile software development
A stakeholder based approach to standardisation for disaster resilience

Similar to CRISP project: overview of findings and lessons learned. (17)

PPTX
CRISP - Overview and results
PPTX
Trust and security technologies: Lessons from the CRISP project
PPTX
Can Trust In Security TEchnologies be Enhanced through Certification?
PPTX
CRISP and HECTOS projects - key findings
PPTX
CRISP WP3 stakeholder workshop
PPTX
Policy and Standardisation perspective - CRISP Final Conference
PPTX
CRISP Stakeholder Analysis
PDF
Introduction to the CWA process - CRISP Final Conference
PPTX
Euralarm - Glen Dale on security industry perspective on certification of sec...
PPTX
CRISP evaluation using the STEFi approach
PPTX
CRISP Work package 4 Key Outcomes
PPTX
Standardisation and certification basics
PDF
Cross standard and scheme composition - A needed cornerstone for the European...
PPTX
Scaling Systems Securely: Challenges and Risks
PDF
er-security-assurance-3gpp
PDF
Ericsson Review: Setting the standard: methodology counters security threats
CRISP - Overview and results
Trust and security technologies: Lessons from the CRISP project
Can Trust In Security TEchnologies be Enhanced through Certification?
CRISP and HECTOS projects - key findings
CRISP WP3 stakeholder workshop
Policy and Standardisation perspective - CRISP Final Conference
CRISP Stakeholder Analysis
Introduction to the CWA process - CRISP Final Conference
Euralarm - Glen Dale on security industry perspective on certification of sec...
CRISP evaluation using the STEFi approach
CRISP Work package 4 Key Outcomes
Standardisation and certification basics
Cross standard and scheme composition - A needed cornerstone for the European...
Scaling Systems Securely: Challenges and Risks
er-security-assurance-3gpp
Ericsson Review: Setting the standard: methodology counters security threats
Ad

More from Trilateral Research (20)

PPTX
Star II sme hotline 21.01.20
PPTX
Designing Security Across Boundaries: mapping disperse data to collaborative...
PPTX
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
PPTX
Risky Borders: Designing togetherness using information technology for intero...
PPTX
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
PPTX
Ethics and technology in humanitarian setting
PPTX
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
PPTX
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
PPTX
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
PPTX
Overview of CLARITY project
PPTX
Legal and ethical issues in social capital analysis
PPTX
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
PPTX
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
PPTX
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
PPTX
ENERGIC-OD @ GEO Business 2017 presentation
PPTX
Esports in the UK - privacy risks
PDF
Enhancing ethics assessment in R&I at the national level
PPTX
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
PPTX
Key Outputs of the E-CRIME project
PPTX
Defining vulnerability to understand the obligations of States towards person...
Star II sme hotline 21.01.20
Designing Security Across Boundaries: mapping disperse data to collaborative...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Risky Borders: Designing togetherness using information technology for intero...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
Ethics and technology in humanitarian setting
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Overview of CLARITY project
Legal and ethical issues in social capital analysis
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
ENERGIC-OD @ GEO Business 2017 presentation
Esports in the UK - privacy risks
Enhancing ethics assessment in R&I at the national level
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Key Outputs of the E-CRIME project
Defining vulnerability to understand the obligations of States towards person...
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Machine Learning_overview_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative analysis of optical character recognition models for extracting...
Empathic Computing: Creating Shared Understanding
Machine Learning_overview_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

CRISP project: overview of findings and lessons learned.

  • 1. CRISP Project Overview of findings and lessons learned Internal TRI Webinar Thordis Sveinsdottir
  • 3. Starting point  The EU security market: • Highly fragmented • Absence of common certification systems • Limited mechanism for mutual recognition of national certification • Slow introduction to new marked needs and solutions
  • 4. Starting point  Security systems often involve intensive data processing • potential breach of citizens freedoms.  Absence of holistic approach to certification • socio-legal requirements that show respect for fundamental rights.
  • 5. CRISP Mission  The CRISP project mission was to develop an innovative evaluation and certification methodology for security systems:  increase citizen trust in security technologies • through evaluating social impacts of security systems • certification of systems that comply with the protection of fundamental rights.  more harmonized playing field for the European security industry, • acceptance of security certification across Europe – no need for re-certification in each country.
  • 6. Embedding socio – legal requirements Approach  Innovative  Holistic STEFi dimensions  Security  Trust  Efficiency  Freedom infringement
  • 7. Process Building blocks for certification scheme Developing STEFi methodology Understanding stakeholders needs Researching current landscape Glossary and taxonomy Stakeholder consultations CRISP Advisory Board Confidence enhancement DPA workshop Roundtable certification bodies Validation and Scenario-based workshops
  • 8. The STEFi methodology Two main phases: evaluation and certification
  • 10. Building blocks for certification scheme
  • 11. Key Deliverable - Standards document: CWA What is a CEN Workshop Agreement?  Official standards document  Agreement developed and approved in a CEN Workshop  Open to the direct participation of all interested parties  Fast and flexible development (average 1 year)
  • 12. Standards document: CWA  Scope of CWA  Example in Annex: Installed video surveillance systems  Challenge:  to come to unambiguous procedures for a multi- dimensional evaluation that acknowledges the complexity of the societal context in which security systems operate.
  • 13. Certification manual Provides basic information for the future owner of the CRISP certification scheme  pictures the overall evaluation and certification methodology  clarifications on roles and responsibilities of all parties involved  information on (basic) requirements for evaluation and certification, including existing standards and legislation
  • 15. CRISP project - successes Very engaged consortium – willing to give time to think through problems POs were interested in the project – helpful and flexible The expertise of the consortium was fitting the project – no gaps
  • 16. Lessons learned  Ambitious project; need to narrow the scope  Certification and standardisation activities need broad support and engagement from stakeholders  Standards development is an “exact science” – these activities need extra time  CWA process can be long and complex – need to consider this when writing proposals

Editor's Notes

  • #9: The methodology consists of two phases… Follows widely accepted approach to conformity assessment based on international standards (ISO/IEC 17000 series) Each phase has two or three stages Evaluation In the evaluation phase the STEFi approach is applied during the assessment stage, on the basis of assessment questions. The outcome of the evaluation is a report providing an overview of all criteria This report is the basis for the certification body  in the certification phase Certification The certification phase comprises an assessment of the (report of the) evaluation phase and its results against applicable requirements. If assessment is positive  certificate given  provides assurance that the security system is in accordance with all applicable requirements, including the various stakeholder’s perspectives. For certification, it will be needed to have a clear description of the evaluation phase, the STEFi approach and assessment questions. No existing standards as this is a new development, so CRISP developed this standard.
  • #11: More indept info on STEFi and content of CWA – workshop Learn more about standardisation and certification - workshop
  • #12: There are different types of standards. The most appropriate type in this case is a CEN Workshop Agreement. Most attractive of CWA is relatively fast development (compared to EN standard = 3 years)
  • #13: One of the key results is a CWA Scope of CWA: title The evaluation process is generic for security systems For the Annex to have an example for the evaluation questions and requirements, video-surveillance systems is taken as security system.
  • #14: Next key result is the certifcation manual In addition to methodology and CWA, this document will say how the scheme should work The certification scheme is complementary to existing schemes and standards and not competing with them. Some items in Certification Manual: Scope Roles Procedure Crucial factors scheme
  • #15: - Next building block: Roadmap until 2028 and implementation plan Estimation, but shows that a certification scheme is not ready tomorrow Will highlight the key steps