R1.1 Consortium Agreement (Confidential)

R1.2 Project Management Handbook (Confidential)

R1.3 EAB framework (Confidential)

R1.4 Coordination and Communication Platform (Confidential)

R1.5 Project meetings (Confidential)

R1.6 Progress and Final Reports (Confidential)

R1.7 Privacy Policy & Procedures (Public – Download the Pdf)

The R 1.7 Privacy Policy & Procedures document contains an accounting of the basic processes that have been designed and implemented by the REWIRE project on personal data processing and protection. It includes the results of the actions performed until month 6 of the project, and relevant updates will be implemented throughout the project life. The results of the activities and corresponding updates will be included in the relevant official reporting of the project and will reside at the project repository. A continuous process has been designed to collect and monitor the personal data processed by the REWIRE project and keep a relevant record. In addition, a Data protection policy has been created, providing the basic principles and rules regarding personal data processing within the REWIRE project. Each project partner will monitor its compliance to the applicable legal and regulatory framework and comply to the REWIRE data protection policy. 

R1.8 Open Data procedures and guidelines (Public – Download the Pdf)

The R 1.8. Open Data procedures and guidelines document presents the methodology that will be followed in the REWIRE project in relation to non-personal and Open Data Management, the data that will be collected, created or processed during the project and how these data will be stored or shared. In order to correctly identify the relevant data, a questionnaire was distributed to all relevant partners and their comments were collected and analyzed, in relation to the data that will be managed during the project lifecycle. The analysis of the data led to the creation of data maps (personal, non-personal and open data). These maps and the relevant information provided in this document can be used by the project partners in their decision regarding the management of data.  

R2.1.1 PESTLE Analysis results (Public – Download this PDF)

Improving the availability and quality of cybersecurity education plays a fundamental role in addressing the current global cybersecurity skills shortage and the demand for cybersecurity professionals. Despite these pressing needs, the reasons for the inability of academia to produce enough graduates with the skills needed at the cybersecurity industry level are still not well understood. We used a PESTLE analysis to explore the factors impacting cybersecurity education from 6 different angles, i.e., Political, Economic, Social, Technological, Legal, and Environmental. In our analysis, 31 different factors affecting cybersecurity education and skills development were revealed. These factors were collected from a European- and Country-level point of view. It is important to notice that this analysis highlights areas that should be addressed in the future. 

R2.2.1 Stakeholder database (Confidential)

The Stakeholders Database (SDB) document aims to assemble a curated dataset about the key project stakeholders, since the REWIRE project relies on incremental collaboration and communication with its relevant stakeholders in the consortium countries and Europe generally. The SDB contains structured information about organizations and individuals operating at local, regional national and European levels which can provide required and necessary insights and inputs for the implementation of multiple REWIRE tasks. The Stakeholders Database was developed in a joint effort with the WP7 team, by requesting the REWIRE consortium partners to update the existing database entries with additional information on existing stakeholders, as well as to add additional stakeholders to use as a base for research in Task 2.2 Skills Needs Analysis.

R2.2.2 Cybersecurity Skills Needs Analysis (Public – Download the PDF)

Finding a scalable methodology for identifying cyber security skills needs is challenging due to a lack of reliable sources of direct information and a lack of a unified terminology across different industry sectors. The R 2.2.2 Cybersecurity Skills Needs Analysis approach relies on creating a data set of job advertisements labelled by the set of skills that the individual job advertisements seek for. The labelled data set was used for training a natural language processing (NLP) machine learning model to be able to predict what skills a particular job ad is seeking. The developed methodology was tested on a set of job advertisements collected from online job ad portals and found that the NLP model has a sufficiently high accuracy for making it a good candidate for automated skills needs analysis. 

R2.2.3 Methodology to anticipate future needs (Public – Download the PDF)

The R 2.2.3 Methodology to Anticipate Future Needs document describes the insights of pilot projects and other valuable sources and methodology applied, giving an overview and proposal of the most valuable methodological approaches. Facing the tremendous speed of new technology development and worrying increase in the number of cyberattacks, it is essential to include and evaluate all possible factors that could contribute to the creation of a long-lasting methodology. However, one of the main challenges missing is a unified cybersecurity skills framework. Having a shared vision is essential to develop long-lasting model and methodology to forecast future cybersecurity skills needs. Combining previous work with a newly created stakeholder survey and automated job ads analysis based on machine learning, methodology for anticipating future needs will also be adjusted to reflect actual market needs.

R2.3.1 Cybersecurity Skills Strategy (Public – Download the PDF)

The R 2.3.1 Cybersecurity Skills Strategy document aims to define strategic directions and action items required for achieving key strategic objectives in order to address skills demand and foster supply in the cybersecurity field. It was developed considering the results of the PESTLE Analysis, the Cybersecurity Skills Needs Analysis, and the preliminary results of the Methodology to Anticipate Future Needs. In the Cybersecurity Skills Strategy, three strategic priorities were defined and the goal is to address all three by seeing them as closely interrelated and dependent on each other. Achieving all three strategic priorities ensures an increase of awareness and attraction of potential cybersecurity talents and guiding them forward and meeting market needs that are expressed using simple and relevant taxonomy. 

R3.1.1 Governance model for the organization (Confidential)

R3.1.2 Governance processes and procedures (Confidential)

R3.2.1 European Cybersecurity Blueprint (Public)

R3.3.1 Cybersecurity skills Framework (Public)

R3.4.1 Mapping the framework to existing courses and schemes (Public)

R3.5.1 Cybersecurity career pathway analysis (Public)

R3.6.1 European Cybersecurity Blueprint (Public)

R4.1.1 Cyberrange Establishment methodology and roadmap (Public)

R4.1.2 REWIRE Cyberrange (Public)

R4.2.1 REWIRE Curricula and Training Framework (Public)

R4.2.2 Training courses material (Public)

R4.2.3 Training courses material suitable for VOOC delivery (Public)

R4.3.1 REWIRE Cyber range scenario development framework (Public)

R4.3.2 REWIRE Scenario Sharing Platform (Public)

R4.4.1 Technical Specifications for the REWIRE VLE (Public)

R4.4.2 REWIRE VLE (Public)

R4.5.1 Results of the 1st Cybersecurity VOOCs delivery (Public)

R4.5.2 Results of the 2nd Cybersecurity VOOCs delivery (Public)

R4.6.1 Cybersecurity Skills Certification Scheme Core (Public)

R4.6.2 Cybersecurity Skills Qualification Standards (Public)

R4.6.3 Cybersecurity Skills Certification Scheme Examination material (Public)

R4.6.4 Cybersecurity Skills Certificates (Confidential)

R4.6.5 Cybersecurity Skills Assessment Recommendation

R5.1.1 CyberABILITY platform (Public)

R5.2.1 Annual Cybersecurity Skills Trends Reports (Public)

R5.3. REWIRE Fiches (Public)

The REWIRE Fiches aim to underpin and illustrate the REWIRE strategy by identifying, documenting, and promoting concrete best and good practices at national and regional level with the objective of addressing skills shortages and mismatches as well as fostering multi-stakeholder partnerships in the field of cybersecurity. The REWIRE Fiches will be made up of a series of fiches presented every six months. To carry out the REWIRE Fiches and achieve its objective, a wide range of initiatives or actions aimed at addressing the cybersecurity skills gap and shortage has been identified so that a much broader spectrum has been obtained. The next steps will consist of deepening the analysis of all the collected initiatives and developing a method to evaluate which of them meet the requirements of being considered an example of best or good practice. 

R5.4. Policy Recommendations (Public)

The Policy Recommendations will be composed of different Policy Briefs presented every six months. Each of these Policy Briefs will aim at conveying the implications of project outputs for policy and practice. The content of the different Policy Briefs will cover the main areas that need to be addressed in the future, such as the European Cybersecurity Skills Framework, the lack of cooperation among stakeholders or the lack of awareness of cybersecurity risks. The purpose will be to implement the solutions of the European Cybersecurity Blueprint proposed through WP3 by facilitating its implementation and making policy recommendations on the different topics to be dealt with. 

R5.5.1 Cybersecurity SSA Network building/Campaign (Public)

R5.5.2 Cybersecurity SSA Network building/Campaign Assessment Report (Public)

R5.6.1 National Cybersecurity Events List (Public)

R5.6.2 REWIRE National Endorsement Events (Public)

R5.7.1 Action Plan for the Blueprint sustainability (Public)

R6.1 Quality Assurance Plan (Confidential)

R6.2 Quality Assurance Reports (Confidential)

R6.3 Impact Evaluation Reports (Public – Download IE Report No.1)

R7.1 Stakeholders Analysis (Confidential)

The Stakeholder Analysis document was aimed to identify and develop a comprehensive map of all stakeholders that have either a direct or indirect interest, influence, and impact, at local, regional, national, and European levels. This analysis is used to inform the communication, dissemination and exploitations plans and strategies, allowing the development of tailored approaches based on the stakeholders’ level of influence and importance. This report focuses on those categories of stakeholders considered as the most relevant in the field of Cybersecurity, based on the project goals and objectives, namely: End Users-ICT Professionals; VET providers & Networks; Academia/ Research Institutes; Industrial/ Sectorial partners/Companies/Industry Associations; Certification & Standardization Bodies; Governments/ Authorities/ Policymakers. 

R7.2 Targeting key policymakers (Confidential)

The main objective of the Targeting Key Policymakers document was to develop a map of the key policy makers that have either a direct or indirect interest, influence, and impact in the REWIRE project and to determine these levels of influence and importance in order to inform the dissemination and exploitation strategies and plans. The mapping will also be used in Task 5.4 related to policy recommendations targeting the entities and individuals mapped. It consisted in a three-fold process, namely: (1) mapping stakeholders broadly speaking, i.e. policy makers involved in decision-making processes related to either education and training or cybersecurity; (2) identifying level of importance and influence, and (3) analysis of the information collected and distribution of stakeholders in 4 different groups, based on the level of influence and importance.  

R7.3 Dissemination Plan (Confidential)

The aim of the Dissemination plan is to establish and run the highest possible visibility and communication infrastructure of the project. The dissemination activities, which have been planned based on an initial dissemination roadmap are structured in a way that serves this objective. In all stages of the project (beginning of the project, design of the European Cybersecurity Blueprint, Blueprint Toolbox – Tools, end of the project and after the implementation of it), primary, secondary and key stakeholders will be reached out through communication material and channels (logos that have been created; website that is linked to the social media pages of the REWIRE project; websites and social media of partners which will be used as a communicator; newsletters; flyers; posters; banners; fiches; policy recommendations; networking and synergies with all types of stakeholders).  

R7.4 REWIRE website (Public – Website link)

The REWIRE Website embeds all important sections such as a homepage, project description and its objectives, results with a download option for the public deliverables, and partners’ section with a link to the website page of each one, blueprint, training (cyber range, online courses, certification), cyberABILITY, a media corner with the portfolio of dissemination material, news with a subsection for the newsletters, and contact with details of the coordinator and the general email address. The page includes the privacy policy according to the DGPR regulations and cookies policy. The REWIRE Website abides by the Web Content Accessibility Guidelines (WCAG) 2.0 in order to be accessible by disabled people and other stakeholders. Finally, the project website is linked to the social media pages of the REWIRE project, namely Facebook, Twitter, LinkedIn, and YouTube. 

R7.5 Portfolio of dissemination material (Public – Media corner)

The REWIRE dissemination portfolio includes a brochure, a poster, a banner, templates for short articles about the project and the finalised deliverables in MS Word format together with the template for short presentations in MS PowerPoint format to be used for dissemination at project meetings, events, conferences, etc. The different templates and graphic designed documents are created in such a way that the content could be easily translatable in all EU languages. They have originally been created in English and consequently translated in German and French so that they are available in all EU official languages (EN, FR, DE). Following a first version of the flyer created at the beginning of the project implementation stating its objectives and foreseen activities, a new one will be created in a second stage at the end of the project implementation stating its results. 

R7.6 REWIRE International conference (Public)

R7.7 Exploitation Plan (Confidential)