Skip to content
      Contact
European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice

Reports

 

 

2016 eu-LISA Annual Conference Reporthttp://www.eulisa.europa.eu/Publications/Reports/eu-LISA Annual Conf 2016 - PDF.pdf2016 eu-LISA Annual Conference Report18/01/2017 22:00:00pdfJHATech 2016 Aligning the capabilities of technology with policy priorities in the areas of migration and internal security Evolution of the JHA landscape in recent years has brought different challenges to the fore. Those working in the field are challenged by an apparent increase in the threat of terrorism, changing patterns and trends in migration and an expectation that the myriad potential threats apparent at borders can be detected. It is clear that assurance of internal security requires a cohesive approach that cuts across traditional boundaries between border control, asylum management and law enforcement. Authorities involved must work together to ensure the availability of relevant data at the time that it is required and to allow for the combination of data as necessary to inform decision making. Read the full Report!44
Protecting Large-scale IT systems developed and/or managed by eu-LISA from modern threatshttp://www.eulisa.europa.eu/Publications/Reports/Protecting Large-scale IT systems developed and or managed by eu-LISA from modern threats.pdfProtecting Large-scale IT systems developed and/or managed by eu-LISA from modern threats09/01/2017 22:00:00pdfSecurity must be a core element of all activities undertaken in an IT-focussed organisation. eu-LISA, for legislative reasons but also as a centre of excellence in the provisions of IT services, emphasises assurance of system and data security in all of its activities. Modern technology when appropriately chosen and implemented facilitates strong IT security and information assurance. Yet such is the range of technological innovations on the market and in the final stages of product development that appropriate decision making on implementation can be difficult. This document, based on monitoring of technologies and their development in the past year, seeks to report on the state of current and emerging cybersecurity-relevant technologies.43
Industry Roundtable Oct 2016http://www.eulisa.europa.eu/Publications/Reports/Industry Roundtable Oct 2016.pdfIndustry Roundtable Oct 201605/01/2017 22:00:00pdfOn the 28th October 2016 eu-LISA hosted an Industry Roundtable entitled "Interoperable IT systems for Europe Towards more Harmonisation, Quality and Efficiency" in Tallinn, Estonia. This report contains highlights of the presentations and discussions that took place on the day.40
eu-LISA Industry Workshop - June 2016http://www.eulisa.europa.eu/Publications/Reports/eu-LISA IW_June 2016.pdfeu-LISA Industry Workshop - June 201628/07/2016 21:00:00pdfOn the 14th June 2016 eu-LISA hosted an Industry Workshop entitled "Increasing the Efficiency of Hotspots Handling Migratory Pressure through Practical Technological Solutions" in Strasbourg, France. This report contains highlights of the presentations and discussions that took place on the day.37

​​
Legal notice | Cookies | ContactTop