DIGITAL-ECCC-2024-DEPLOY-CYBER-06-ENABLINGTECH

Novel applications of AI and other enabling technologies for security operation centres -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS
    Strengthening the SOC Ecosystem

    MOTIVATION The topic complements other current and previous actions aimed at establishing and operating Security Operation Centres (SOCs) and linking them. The aim is to provide SOCs with further applications to improve their operations.

Call text (as on F&T portal)

View on F&T portal
Expected Outcome:

Deliverables

  • Deployment of Artificial Intelligence and Advanced Key Technologies as enablers for SOCs
  • Tools for creation, analysis and processing of CTI that allow for faster and more scalable SOC operations
  • Original European CTI feeds or services
Objective:

This topic addresses enabling technologies (such as AI) for SOCs, including National SOCs which provide a central operational capacity and support other SOCs at national level and play a central role as a hub within a context of SOCs, and also Cross-border SOC platforms where such technologies can strengthen capacities to analyse, detect and prevent cyber threats and incidents, and to support the production of high-quality intelligence on cyber threats.

These enabling technologies should allow more effective creation and analysis of Cyber Threat Intelligence (CTI), as well as faster and scalable processing of CTI and identification of patterns that allow for rapid detection and decision making.

Scope:

Actions in this topic should develop and deploy systems and tools for cybersecurity based on enabling technologies (such as AI), addressing aspects such as threat detection, vulnerability detection, threat mitigation, incident recovery through self-healing, data analysis and data sharing. Activities should include at least one of the following:

  • Continuous detection of patterns and identification of anomalies that indicate potential threats, recognising new attack vectors and enabling advanced detection in an evolving threat landscape.
  • Creation of CTI based on novel threat detection capabilities.
  • Enhancing speed of incident response through real-time monitoring of networks to identify security incidents and generating alerts or triggering automated responses.
  • Mitigating malware threats by analysing code behaviour, network traffic, and file characteristics, reducing the window of opportunity for attackers to exploit malware.
  • Identification and management of vulnerabilities.
  • Recovery from incidents through self-healing capacities.
  • Reducing the chances of attacks and pre-emptively identifying weaknesses through automated vulnerability scanning and penetration testing.
  • Protecting sensitive data through the analysis of access patterns and detection of abnormal behaviour.
  • Enabling organisations to leverage and share CTI and other actionable information for analysis and insights without compromising data security and privacy, through anonymisation and de-identification. Tool and service providers are welcome to apply to this topic, also when in a consortium with National SOCs. Links with stakeholders in the area of High-Performance Computing should be made where appropriate, as well as activities to foster networking with such stakeholders.

Tool and service providers are welcome to apply to this topic, also when in a consortium with National SOCs. Links with stakeholders in the area of High-Performance Computing should be made where appropriate. In well justified cases, access requests to the EuroHPC high performance computing infrastructure could be granted.

The systems, tools and services developed under this topic will be made available for licencing to National and/or Cross-Border SOC platforms under favourable market conditions.

These actions aim at creating or strengthening national and/or cross-border SOCs, which occupy a central role in ensuring the (cyber-)security of national authorities, providers of critical infrastructures and essential services. SOCs are tasked with monitoring, understanding and proactively managing cybersecurity threats. In light of the crucial operative role of SOCs for ensuring cybersecurity in the Union, the nature of the technologies involved as well as the sensitivity of the information handled, SOCs must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to SOCs are subject to Article 12(5) of Regulation (EU) 2021/694, in consistency with WP 2021/2022.

News flashes

2024-07-17

For information on the evaluations results of this call we invite you to consult the Flash call info (evaluation results) in the following link.

2024-01-16
The submission session is now available for: DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STANDARDPQC(DIGITAL-JU-CSA), DIGITAL-ECCC-2024-DEPLOY-CYBER-06-TRANSITIONEUPQC(DIGITAL-JU-CSA), DIGITAL-ECCC-2024-DEPLOY-CYBER-06-ENABLINGTECH(DIGITAL-JU-SIMPLE), DIGITAL-ECCC-2024-DEPLOY-CYBER-06-COMPLIANCECRA(DIGITAL-JU-SME), DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STRENGTHENCRA(DIGITAL-JU-GFS), DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY(DIGITAL-JU-SIMPLE)
call topic details
Call status: Closed
Publication date: 2023-12-17 (1 year ago)
Opening date: 2024-01-16 (1 year ago)
Closing date: 2024-03-26 (1 year ago)
Procedure: single-stage

Budget: 30000000
Expected grants: 0
News flashes

This call topic has been appended 2 times by the EC with news.

  • 2024-07-17
    for information on the evaluations resul...
  • 2024-01-16
    the submission session is now available...
Call

DIGITAL-ECCC-2024-DEPLOY-CYBER-06

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 5 other topics in this call:

Source information

Showing the latest information. Found 5 versions of this call topic in the F&T portal.

Information from

  • 2025-01-29_03-20-06
  • 2024-11-23_03-20-12
  • 2024-11-04_17-26-59
  • 2024-09-30_21-21-11
  • 2024-03-30_14-27-11

Check the differences between the versions.

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 1 year ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 1 year ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 1 year ago

    The call opened for submissions.

  4. Closing date

    - 1 year ago

    Deadline for submitting a project.

  5. Time to inform applicants Estimate

    - 8 months ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  6. Sign grant agreement Estimate

    - 5 months ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)