Innovating Works

H2020

Cerrada
HORIZON-CL3-2022-CS-01-01
HORIZON-CL3-2022-CS-01-01: Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 16-11-2022.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Improved disruption preparedness and resilience of digital infrastructure in EuropeImproved capacity building in digital infrastructure security including organisational and operational capabilitiesRobust evidence used in cybersecurity decisions and toolsBetter prediction of cybersecurity threats and related risksImproved response capabilities based on effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity, including holistic incident reporting and enabling coordinated cyber-incident response. The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Digital infrastructures together with their connected devices are characterised by complex interdependencies involving various physical and logical layers and connecting a wide range of legacy IT solutions and innovative technologies. Application scenarios include but are not limited to cybersecurity of communication systems and networks and their components, e.g. 5G networks, Internet of Things (I... ver más

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Improved disruption preparedness and resilience of digital infrastructure in EuropeImproved capacity building in digital infrastructure security including organisational and operational capabilitiesRobust evidence used in cybersecurity decisions and toolsBetter prediction of cybersecurity threats and related risksImproved response capabilities based on effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity, including holistic incident reporting and enabling coordinated cyber-incident response. The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Digital infrastructures together with their connected devices are characterised by complex interdependencies involving various physical and logical layers and connecting a wide range of legacy IT solutions and innovative technologies. Application scenarios include but are not limited to cybersecurity of communication systems and networks and their components, e.g. 5G networks, Internet of Things (IoT) devices, medical devices, supervisory control and data acquisition (SCADA) systems, and their services, e.g. cloud-based ICT solutions. Their availability, controlled performance and reliability need to be guaranteed at every moment serving the needs, sometimes critical and safety-related e.g. in transportation, energy, healthcare, of millions of citizens, enterprises and society. Therefore, they need to be protected in real-time against ever-evolving cybersecurity threats.

Building on research and innovation in the area of cybersecurity of digital infrastructures for example projects funded from H2020 SU-DS01-2018[1], SU-DS04-2018-2020[2], SU-DS05-2018-2019[3] and SU-TDS-02-2018[4], state of the art technologies should support the logging, categorisation, data aggregation from different sources, automatic information extraction and analysis of cybersecurity incidents. This includes advanced methods for cyber threats intelligence and cyber-incident forensics enabling better prediction of cyber security threats. Proposals should develop and validate demonstration prototypes of tools and technologies to monitor and analyse cybersecurity incidents in an operational environment in line with the NIS directive and the General Data Protection Regulation. They should contribute to improved penetration testing methods and their automation by using machine learning and other AI technologies as appropriate. Moreover, proposals should support effective network traffic analysis applying detection techniques in network operations based on advanced security information management and threat intelligence. Proposed solutions should also include validation or piloting of cyber threat intelligence with early-stage detection, prediction and contributions towards response capability using predictive analytics, and as relevant, with efficient and user-friendly interaction methods, e.g. visual analytics. Furthermore, solutions deployed by this action should validate their approach to intrusion detection and incident monitoring with real end-users and their needs.

For expanding the proposed work in terms of additional pilot sites, additional user groups, additional applications, and complementary assessment of the acceptability of the use case, the actions may involve financial support to third parties in line with the conditions set out in Part B of the General Annexes. Each consortium will define the selection process of the third parties for which financial support will be granted (typically in the order of EUR 50 000 to 300 000 per party). Up to 20% of the EU funding requested by the proposal may be allocated to the purpose of financial support to third parties.

A strong culture awareness of data protection should be fostered. The proposals should also appropriately address concerns about mass surveillance and protection of personal spaces. All technologies and tools developed should be appropriately documented, to support take-up and replicability.

Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side. Participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 7 by the end of the project – see General Annex B.




Cross-cutting Priorities:Digital AgendaArtificial IntelligenceForesight


[1]Cybersecurity preparedness - cyber range, simulation and economics

[2]Cybersecurity in the Electrical Power and Energy System (EPES): an armour against cyber and privacy attacks and data breaches

[3]Digital security, privacy, data protection and accountability in critical sectors

[4]Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures

ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Subcontracting costs.
Purchase costs.
Other cost categories.
Indirect costs.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 6:. Representa un paso importante en demostrar la madurez de una tecnología. Se construye un prototipo de alta fidelidad que aborda adecuadamente las cuestiones críticas de escala, que opera en un entorno relevante, y que debe ser a su vez una buena representación del entorno operativo real. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar desde un 70% hasta un 100%.
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities. The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Sin info.
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Development and validation of processes and tools used for agile certification of ICT products, ICT services and ICT processes
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following outcomes: Availability of applicable tools and proce...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-02 Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components
en consorcio: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: Effective access control to system componen...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de