DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH

Development and Deployment of Advanced Key Technologies -

About the connections

The graph above was generated based on the following links

Call text (as on F&T portal)

View on F&T portal
Expected Outcome:
  • Deployment of state-of-the-art technologies in the area of cybersecurity
  • Tools for automated threat detection, monitoring of networks, data protection and incident response
Objective:

Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.

The objective is to enable European cybersecurity actors to take advantage of these new breakthroughs, improving detection and prevention capabilities, efficiency, scalability, and facilitating data sharing and regulatory compliance.

In particular innovative technologies should allow for the processing of larger amounts of data, automating real-time pattern recognition, log analysis, vulnerability scanning, while enabling security professionals to focus on higher level interpretation of data and response decisions. They should allow organisations to deploy solutions and larger scale, and in increasingly complex environments.

A priority is to create and strengthen capacity for original Cyber Threat Information (CTI), e.g., in the form of CTI feeds or services.

Scope:

Activities should fortify cybersecurity capabilities using breakthrough technologies, encompassing various aspects of cybersecurity. This involves uptake and integration for the deployment of novel tools, systems and services for threat detection, incident response, malware defence, vulnerability management, data protection and so forth. In one or more of the following topics should be addressed:

  • Real-time Monitoring and Incident Response: ensuring the swift identification and response to security incidents through continuous network monitoring, alert generation, and automated response mechanisms.
  • Malware Defence and Analysis: mitigating malware threats by analysing code behaviour, scrutinizing network traffic, and assessing file characteristics, thereby reducing opportunities for attackers to exploit vulnerabilities.
  • Proactive Vulnerability Management: identifying and addressing weaknesses proactively through automated vulnerability scanning and penetration testing to address potential threats before they can be exploited.
  • Data Protection and Anomaly Detection: safeguarding sensitive data by scrutinizing access patterns and identifying abnormal behaviour to mitigate data breaches and protect critical information.
  • Incident investigation to help uncover cause, scope and impact of security incidents or breaches that have occurred.
  • Data Utilisation with Privacy: enabling organisations to harness data for analysis and insights while preserving data security and privacy through techniques such as anonymisation and de-identification.

By addressing such issues, the cybersecurity resilience of organisations should be enhanced, improving overall cybersecurity posture, encompassing various aspects such as threat detection, incident response, and vulnerability management.

In well justified cases, access requests to the EuroHPC high performance computing infrastructure could be granted.

The systems, tools and services developed under this topic, where relevant, will be made available for licencing to National and/or Cross-Border SOC platforms under favourable market conditions.

This action aims at the deployment of key technologies in cybersecurity, in particular also in the context of securing national authorities, providers of critical infrastructures and essential services. As this involves the handling of cyber incidents, malware and management of vulnerabilities that could be exploited by malicious actors, the deployment of such technologies must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to these technologies are subject to Article 12(5) of Regulation (EU) 2021/694.

News flashes

2025-05-09

Submissions to call DIGITAL-ECCC-2024-DEPLOY-CYBER-07:

A total of 172 proposals has been submitted to call DIGITAL-ECCC-2024-DEPLOY-CYBER-07, which closed on 27 March 2025. These proposals, for which the evaluation will be organized in Q2-2025, were submitted to the following topics:

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC - National SOCs : 6 proposals
  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT - Enlarging existing or Launching New Cross-Border SOC Platforms: 4 proposals
  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS - Strengthening the SOC Ecosystem: 8 proposals
  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH - Development and Deployment of Advanced Key Technologies: 78 proposals
  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER - Preparedness Support and Mutual Assistance, Targeting Larger Industrial Operations and Installations: 40 proposals
  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02 - Support for Implementation of EU Legislation on Cybersecurity and National Cybersecurity Strategies (2024): 36 proposals
2025-05-09

The deadline of the call changed to 27th of March 2025.

2024-07-23

Please note that the call document has been amended to include a minor update under the topic DIGITAL-2024-DEPLOY-CUBER-07-CYBERSEC-02 (please refer to the section 10 ). It is to be noted that this update DOES NOT modify in any way the topic conditions, the eligibility or evaluation criteria and it is only relevant to these topics

2024-07-04
The submission session is now available for: DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02(DIGITAL-JU-SIMPLE), DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH(DIGITAL-JU-SME), DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC(DIGITAL-JU-SIMPLE), DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT(DIGITAL-JU-SIMPLE), DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS(DIGITAL-JU-CSA), DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER(DIGITAL-JU-GFS)
call topic details
Call status: Closed
Publication date: 2024-06-10 (10 months ago)
Opening date: 2024-07-04 (10 months ago)
Closing date: 2025-03-27 (1 month ago)
Procedure: single-stage

Budget: 35000000
Expected grants: 0
News flashes

This call topic has been appended 4 times by the EC with news.

  • 2025-05-09
    submissions to call digital-eccc-2024-de...
  • 2025-05-09
    the deadline of the call changed to 27th...
  • 2024-07-23
    please note that the call document has b...
  • 2024-07-04
    the submission session is now available...
Call

DIGITAL-ECCC-2024-DEPLOY-CYBER-07

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 5 other topics in this call:

Source information

Showing the latest information. Found 9 versions of this call topic in the F&T portal.

Information from

  • 2025-04-04_03-20-19
  • 2025-03-28_03-20-07
  • 2025-01-25_03-20-06
  • 2025-01-10_03-20-10
  • 2025-01-07_03-20-07
  • 2024-11-23_03-20-10
  • 2024-11-04_17-26-58
  • 2024-09-30_21-21-12
  • 2024-07-04_15-02-43

Check the differences between the versions.

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 1 year ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 10 months ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 10 months ago

    The call opened for submissions.

  4. Closing date

    - 1 month ago

    Deadline for submitting a project.

  5. Today

  6. Time to inform applicants Estimate

    - 3 months from now

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  7. Sign grant agreement Estimate

    - 6 months from now

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)