Description

  1. Identification of (relevant) information
  2. Definition of key processes
    1. Information/data ownership
    2. Access rights
  3. Process verification and monitoring (see theme "Digital Trust")
  4. Proving the integrity (see theme "Investigation of cyber attacks")

Ideas

Questions

Research questions

Industrial partners

Organization*Contact personRole & contribution
Huoltovarmuuskeskus?Kalle Luukkainen?





















*Color code:
Orange: "wish list" of companies to participate

Research partners

OrganizationContact personRole & contribution