Innovating Works
DIGITAL-ECCC-2024-DEPLOY-...
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH: Development and Deployment of Advanced Key Technologies
Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está abierta temporalmente Convocatoria de ayuda abierta temporalmente del 04-07-2024 hasta el 26-03-2025.
Esta ayuda tiene otras 21 convocatoria(s) que puedes consultar.
Presentación: Individual Individual: Esta ayuda esta diseñada para aplicar a ella de manera individual..
Esta ayuda financia Proyectos:

Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.

The objective is to enable European cybersecurity actors to take advantage of these new breakthroughs, improving detection and prevention capabilities, efficiency, scalability, and facilitating data sharing and regulatory compliance.

In particular innovative technologies should allow for the processing of larger amounts of data, automating real-time pattern recognition, log analysis, vulnerability scanning, while enabling security professio... ver más

Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.

The objective is to enable European cybersecurity actors to take advantage of these new breakthroughs, improving detection and prevention capabilities, efficiency, scalability, and facilitating data sharing and regulatory compliance.

In particular innovative technologies should allow for the processing of larger amounts of data, automating real-time pattern recognition, log analysis, vulnerability scanning, while enabling security professionals to focus on higher level interpretation of data and response decisions. They should allow organisations to deploy solutions and larger scale, and in increasingly complex environments.

A priority is to create and strengthen capacity for original Cyber Threat Information (CTI), e.g., in the form of CTI feeds or services.

Scope:Activities should fortify cybersecurity capabilities using breakthrough technologies, encompassing various aspects of cybersecurity. This involves uptake and integration for the deployment of novel tools, systems and services for threat detection, incident response, malware defence, vulnerability management, data protection and so forth. In one or more of the following topics should be addressed:

Real-time Monitoring and Incident Response: ensuring the swift identification and response to security incidents through continuous network monitoring, alert generation, and automated response mechanisms.Malware Defence and Analysis: mitigating malware threats by analysing code behaviour, scrutinizing network traffic, and assessing file characteristics, thereby reducing opportunities for attackers to exploit vulnerabilities.Proactive Vulnerability Management: identifying and addressing weaknesses proactively through automated vulnerability scanning and penetration testing to address potential threats before they can be exploited.Data Protection and Anomaly Detection: safeguarding sensitive data by scrutinizing access patterns and identifying abnormal behaviour to mitigate data breaches and protect critical information.Incident investigation to help uncover cause, scope and impact of security incidents or breaches that have occurred.Data Utilisation with Privacy: enabling organisations to harness data for analysis and insights while preserving data security and privacy through techniques such as anonymisation and de-identification. By addressing such issues, the cybersecurity resilience of organisations should be enhanced, improving overall cybersecurity posture, encompassing various aspects such as threat detection, incident response, and vulnerability management.

In well justified cases, access requests to the EuroHPC high performance computing infrastructure could be granted.

The systems, tools and services developed under this topic, where relevant, will be made available for licencing to National and/or Cross-Border SOC platforms under favourable market conditions.

This action aims at the deployment of key technologies in cybersecurity, in particular also in the context of securing national authorities, providers of critical infrastructures and essential services. As this involves the handling of cyber incidents, malware and management of vulnerabilities that could be exploited by malicious actors, the deployment of such technologies must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to these technologies are subject to Article 12(5) of Regulation (EU) 2021/694.

ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del participante

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: La tramitación de esta ayuda sólo permite:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy. Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 9:. La tecnología está en su forma final y funciona bajo una amplia gama de condiciones. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar como minimo un 100%.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH Development and Deployment of Advanced Key Technologies
Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of...
Abierta | Desde 04-07-2024 Hasta el 26-03-2025
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER Preparedness Support and Mutual Assistance, Targeting Larger Industrial Operations and Installations
Expected Outcome:preparedness support servicesthreat assessment and risk assessment servicesrisk monitoring services Objective:This mechanis...
Abierta | Desde 04-07-2024 Hasta el 26-03-2025
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02 Support for Implementation of EU Legislation on Cybersecurity and National Cybersecurity Strategies (2024)
Expected Outcome:Incident management solutions reducing the overall costs of cybersecurity for individual Member States and for the EU as a...
Abierta | Desde 04-07-2024 Hasta el 26-03-2025
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT Enlarging existing or Launching New Cross-Border SOC Platforms
Expected Outcome:World-class cross-border SOC platforms across the Union for pooling data on cybersecurity threat between several Member Sta...
Abierta | Desde 04-07-2024 Hasta el 26-03-2025
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC National SOCs
Expected Outcome:World-class National SOCs across the Union, strengthened with state-of-the-art technology, acting as clearinghouses for det...
Abierta | Desde 04-07-2024 Hasta el 26-03-2025
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-COMPLIANCECRA Preparedness support and mutual assistance
en consorcio:
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-ENABLINGTECH Tools for compliance with CRA requirements and obligations
Expected Outcome:Deliverables: Tools to simplify and automate CRA compliance, with particular focus towards automated compliance tools that...
Cerrada hace 3 dias | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02 Support for Implementation of EU Legislation on Cybersecurity and National Cybersecurity Strategies (2024)
Expected Outcome:Incident management solutions reducing the overall costs of cybersecurity for individual Member States and for the EU as a...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT Enlarging existing or Launching New Cross-Border SOC Platforms
Expected Outcome:World-class cross-border SOC platforms across the Union for pooling data on cybersecurity threat between several Member Sta...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH Development and Deployment of Advanced Key Technologies
Expected Outcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC National SOCs
Expected Outcome:World-class National SOCs across the Union, strengthened with state-of-the-art technology, acting as clearinghouses for det...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER Preparedness Support and Mutual Assistance, Targeting Larger Industrial Operations and Installations
Expected Outcome:preparedness support servicesthreat assessment and risk assessment servicesrisk monitoring services Objective:This mechanis...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS Strengthening the SOC Ecosystem
en consorcio: Expected Outcome:Events, workshops, stakeholder consultations, architectural designs and white papers on technical coordination and intercon...
Cerrada hace 1 mes | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY Uptake of digital solutions in Health and Care
Cerrada hace 3 meses | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY Uptake of digital solutions in Health and Care
en consorcio:
Cerrada hace 4 meses | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STANDARDPQC Standardisation and awareness of the European transition to post-quantum cryptography
en consorcio: Expected Outcome:Outcomes and deliverables Contributions to European and international standards and regulations in PQCWorkshops, white pa...
Cerrada hace 11 meses | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-TRANSITIONEUPQC Roadmap for the transition of European public administrations to a post-quantum cryptography era
en consorcio: Expected Outcome:Outcomes and deliverables Roadmap for the transition of European public administration for PQCWorkshops, white papers and...
Cerrada hace 11 meses | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STRENGTHENCRA Strengthen Cybersecurity capacities of European SMEs in line with CRA requirements and obligations
Expected Outcome:Deliverables: Financial support for SMEs and other stakeholders for CRA compliance.Openly available platform with CRA-rela...
Cerrada | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY Deployment of Post Quantum Cryptography in systems in industrial sectors
Expected Outcome:Outcomes and deliverables PQC system validation and PQC technology ready for wide-spread deployment in given industrial se...
Cerrada | Próxima convocatoria prevista para el mes de
DIGITAL-ECCC-2024-DEPLOY-CYBER-06-ENABLINGTECH Novel applications of AI and other enabling technologies for security operation centres
Expected Outcome:Deliverables Deployment of Artificial Intelligence and Advanced Key Technologies as enablers for SOCsTools for creation, a...
Cerrada | Próxima convocatoria prevista para el mes de