Work Package and Tasks plan

The work plan is presented in Table 1 and Table 2. The first one lists the activities (Work Packages in EC language) to be performed within the project, while the second shows the timeline. Table 1 illustrates the main (Work Package) and the detailed activities (Tasks in EC language), the partners participating in each activity and the responsible partner for the activity (Work Package and Deliverables). The responsible partner institution has the primary role in the particular activity (Work Package), monitors and controls its execution (the execution of Tasks), timely delivery and requires quality assurance.

The term „All” refers to all partners in the project. NCBJ is the institution both eligible for receiving and liable for dispersing the grant from the NATO Science for Peace and Security Programme. The project leader from DSV is the Chair of The Programme Committee for the Advanced Research Workshop on Industrial Control Systems, and the editor of the book that will be published in the NATO Science for Peace and Security Series, which should contain all scholarly articles from the ARW.

Table 1: List of activities (Work Packages)

Main activity (Work Package) Detailed activity (Tasks) Participating partners Responsible partner
A1. Initiation of the project 1.1 Online kick-off meeting All DSV/SU
  1.2 Producing a project web-site for monitoring the progress of the project with regular updates All NCBJ
A2. Exchange of information on current cybersecurity education 2.1 Preparing a written report about the current cybersecurity education. This includes: 2.1.1 preparing a questionnaire and sending it to partners; 2.1.2 Partners are responsible for filling it on behalf of their own organization and for collecting the data from few relevant organizations in their country. In case of AZ and GE where we have two organizations/country they have to synchronize their surveys; 2.1.3 Analysis of collected data and preparation of a written report All DSV/SU
  2.2 Online meeting to present and discuss the current cybersecurity education. The meeting will decide whether other data has to be collected and/or interviews/meetings have to be conducted. All NCBJ
  2.3 Creating a summary report (Deliverable) about the state of play in cybersecurity education NCBJ NCBJ
A3. Exploring the needs of industry and students in cybersecurity 3.1 Designing survey and collecting data about the needs of the industry (in general economy). This includes data collection with the help of other partners. All NCBJ
  3.2 Designing survey and collecting data about the needs of students (in general education system). This includes data collection with the help of other partners. All DSV/SU
  3.3 Creating a written report with conclusions from the surveys in 3.1 and 3.2. All DSV/SU, NCBJ
  3.4 Creating a summary (Deliverable) from the reports in 3.3 NCBJ NCBJ
A4. Raising awareness about the cybersecurity of national critical infrastructures & industrial control systems 4.1 Two days ICS CERT/CSIRT (Computer Emergency Response Team) training in Tbilisi All GRENA
  4.2 Three-day NATO ARW SPS (Advanced Research Workshop) in Baku All NCBJ
  4.3 Two days follow-up meeting in Baku to discuss knowledge acquired in activities 2, 3, 4.1 and 4.2. Identifying the building blocks and designing a conceptual model for a Cybersecurity Training Centre at BHOS. All BHOS
A5. Creating and running an online course module "Cybersecurity of critical infrastructures" 5.1 Creating the draft version of the online course module All DSV/SU
  5.2 Providing suggestions for the course module and creating the final course module. Translation of the course into the respective languages of the partners (if needed). All NCBJ
  5.3 Recruiting students for the pilot run of the online course All NCBJ
  5.4 Running and evaluating the course module All DSV/SU
A6. Enhancing the cybersecurity curriculum in higher education institutions 6.1 Preparing a written report on enhanced cybersecurity education All DSV/SU
  6.2 Preparing a report that summarizes the enhancements introduced in the curriculum NCBJ NCBJ
A7 Dissemination of the results and closure of the project 7.1 Two days meeting in Stockholm to discuss the outcomes of the project, the dissemination of the lessons learned and plans for the future that will address projects proposals for (1) EU Horizon Europe, (2) NATO Science for Peace and Security, (3) Vinnova, Erasmus +, Sida, and other funding institutions and organizations. All DSV/SU
  7.2 Dissemination of the results from the project by partner institutions and a book from the NATO workshop published by Elsevier or IOS press in the NATO Science for Peace and Security Series All DSV/SU NCBJ

Project management, which is in the domain of the main applicant DSV/SU, is a crucial activity that spans throughout the entire project. Inter alia, it comprises administration, financial oversight, monitoring, activities assessment and evaluation, final reporting, and an external audit. This activity is referred to as A0 in Table 2.

Risk management is also an umbrella activity over the whole project and is based on monitoring and assessment by the project coordinator, team leaders and all the partners. However, it is an integral part of the complete project management. The progress of the project will be complemented by reporting every three (six?) months including all the financial aspects. It is an iterative process that will require continuous partner involvement and open communication channels to take timely and effective corrective measures if required. Both the project leader, the team leader from the NCJB (the province of the NATO SPS ARW), as well as the other partners have a long experience in the EaP region that is evidenced by numerous projects and activities in more than two decades.

Table 2: Time plan (Gantt chart)

Time plan (Gantt chart)

Legend:

A0: Project management

A1: Initiation of the project

A2: Exchange information on current cybersecurity education

A3: Exploring the needs of industry and students

A4: Raising awareness about the cybersecurity of NCI* and ICS**

A5: Creating and running an online course module

A6: Enhancing the cybersecurity curriculum

A7: Dissemination of the results, future endeavours, and the closure of the project

Image: 
Time plan (Gantt chart)