DIGITAL-ECCC-2025-DEPLOY-CYBER-09-CYBERAI

Cybersecure tools, technologies and services relying on AI -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • HORIZON-CL4-2025-04-DATA-02
    Empowering AI/generative AI along the Cognitive Computing continuum (RIA) (AI/Data/Robotics Partnership)

    MOTIVATION Both deal with AI/GenAI; the HE focuses on advancing cognitive AI, the DEP topic uses AI for cybersecurity. The link is leveraging advanced AI capabilities for cybersécurity applications.

  • HORIZON-CL4-2025-03-DATA-08
    Large-scale pilots for supply end-to-end infrastructures integrating device, network computing and communication capabilities for Telco Edge Cloud deployments, as a basis for Connected Collaborative Computing Networks (3C networks) (RIA)

    MOTIVATION The large-scale pilot infrastructures can serve as realistic testbeds for coordinated cyber preparedness exercises, enabling projects to test threat detection, incident response, and resilience strategies.

Call text (as on F&T portal)

View on F&T portal
Expected Outcome:
  • Deployment of Artificial Intelligence and various AI-powered technologies as enablers for Cyber Hubs, CSIRTs, NCSCs, NIS SPOCs and others.
  • Novel cybersecurity tools based on AI that have been developed, tested and validated in relevant conditions and made available to Cyber Hubs, CSIRTs, NCSCs, NIS SPOCs and others.
  • Enhanced information sharing and collaboration amongst National and Cross-Border Cyber Hubs, CSIRTs, NCSCs, NIS SPOCs and others relevant stakeholders, supported by CTI produced by AI-powered tools.
  • Tools for automation of cybersecurity processes such as the creation, analysis and processing of CTI, to enhance operations of the Cyber Hubs.
  • Original European CTI feeds or services.
  • Ensure that the most advanced and innovative secure AI solutions are developed and implemented for NIS sectors.
  • Secure AI solutions and tools, complying with EU legislation. Promote the mitigation of risks associated with the misuse of AI by malicious actors, with a focus on AI ethics and secure deployment.
  • Contribution to the standardisation and certification of cybersecure, trustworthy AI technologies.
Objective:

This topic addresses AI-based technologies (including GenAI) for national authorities and competent authorities, including National and Cross-Border Cyber Hubs, CSIRTs, public bodies and private entities from the NIS 2 directive, NCCs1, etc. They play a key role in providing central operational capacity to European cybersecurity ecosystems. They may also provide primary input data for AI/ML-based cybersecurity tools and solutions, which can strengthen such authorities’ capacity to analyse, detect and prevent cyber threats and incidents, and to support the production of high-quality intelligence on cyber threats. In particular, the adoption of generative AI2 could be a challenge and an opportunity for cybersecurity3 processes and applications.

These enabling technologies should allow for more effective creation and analysis of Cyber Threat Intelligence (CTI), automation of large-scale processes, as well as faster and scalable processing of CTI and identification of patterns that allow for rapid detection and decision making.

The security of AI itself, especially for the systems in the learning phase, also needs to be addressed, including the misuse of AI by malicious actors. This includes carrying out risk assessments and mitigation of cybersecurity risks inherent to AI technologies, implementing supply chain security, etc., and complying with the AI Act, intellectual property legislation and the GDPR.

In addition to being secure, the AI technologies being developed should perform well, and be robust and trustworthy. In particular, having trustworthy AI solutions will help in the deployment phase, where social acceptance is essential.

1If applicable and in line with individual national strategies.

2Cybersecurity in the age of generative AI, September 2023, available at: https://www.mckinsey.com/featured-insights/themes/cybersecurity-in-the-age-of-generative-ai.

3The Need For AI-Powered Cybersecurity to Tackle AI-Driven Cyberattacks, April 2024, available at: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2024/the-need-for-ai-powered-cybersecurity-to-tackle-ai-driven-cyberattacks.

Scope:

Actions in this topic should develop and deploy systems and tools for cybersecurity1, based on AI technologies2, addressing aspects such as threat detection, vulnerability detection, threat mitigation, incident recovery through self-healing, data analysis and data sharing. These activities must also comply with intellectual property rights (IPR) and the GDPR, depending on the type of information handled. The AI solutions proposed should also be cybersecure.

Activities should include at least one of the following:

  • Continuous detection of patterns and identification of anomalies that can potentially indicate emerging threats, recognising new attack vectors and enabling advanced detection in an evolving threat landscape, including in ICT or in Operational Technology infrastructures using open technologies.
  • Creation of CTI based on novel threat detection capabilities.
  • Enhancing speed of incident response through real-time monitoring of networks to identify security incidents and generating alerts or triggering automated responses.
  • Mitigating malware threats by analysing code behaviour, network traffic, and file characteristics, reducing the window of opportunity for attackers to exploit malware.
  • Identification of vulnerabilities and support for management considering multiple sources of information.
  • Cybersecure tools and solutions that provide risk-reduction in the crossover between AI, IoT and smart grids or other manufacturing chains.
  • Support for recovery from incidents through self-healing capacities.
  • Reducing the chances of attacks and pre-emptively identifying weaknesses through automated vulnerability scanning and penetration testing.
  • Protecting business sensitive data through the analysis of access patterns and detection of abnormal behaviour.
  • Enabling organisations to leverage and share CTI and other actionable information for analysis and insights without compromising data security and privacy, through anonymisation.
  • Tools and solutions that provide product security or cybersecurity by design/default in line with CRA requirements.
  • Tool and service providers are welcome to apply for this topic, also when in a consortium with Cyber Hubs. Links with stakeholders in the area of High-Performance Computing should be made where appropriate, as well as activities to foster networking with such stakeholders. In well justified cases, access requests to the EuroHPC high performance computing infrastructure could be granted.
  • The systems, tools and services developed under this topic will be made available for licensing to National and/or Cross-Border Cyber Hubs platforms, CSIRTs, competent authorities, and other relevant authorities under favourable market conditions.
  • These actions aim at providing AI-powered cybersecurity capabilities for National and/or Cross-Border Cyber Hubs and for national authorities encompassing Cyber Hubs, CSIRTs, which occupy a central role in ensuring the cybersecurity of national authorities, providers of critical infrastructures and essential services. These entities are tasked with monitoring, understanding and proactively managing cybersecurity threats. In light of their crucial operative role in ensuring cybersecurity in the Union, the nature of the technologies involved as well as the sensitivity of the information handled, Cyber Hubs must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control.
  • Tools to protect and secure AI solutions in line with the EU legislative framework and considering integration of requirements for robustness, performance, trust and balanced AI autonomy.
  • Contribute to the cybersecurity certification of AI-driven cybersecurity solutions and systems. The primary objective of cybersecurity certification for AI systems within the EU is twofold: to mitigate cybersecurity risks inherent in AI technologies and to demonstrate compliance with the EU’s comprehensive legislative framework, including the AI Act. By establishing a standardised, transparent, and rigorous certification process, the EU seeks to foster trust in AI technologies among users, developers, and regulators alike.

1 Multilayer Framework for Good Cybersecurity Practices for AI, ENISA, June 2023, available at: https://www.enisa.europa.eu/publications/multilayer-framework-for-good-cybersecurity-practices-for-ai.

2Cybersecurity of AI and Standardisation, ENISA, March 2023, available at: https://www.enisa.europa.eu/publications/cybersecurity-of-ai-and-standardisation.

News flashes

2025-12-06
The submission session is now available for: DIGITAL-ECCC-2025-DEPLOY-CYBER-09-CABLEHUBS, DIGITAL-ECCC-2025-DEPLOY-CYBER-09-UPTAKE, DIGITAL-ECCC-2025-DEPLOY-CYBER-09-COORDPREP, DIGITAL-ECCC-2025-DEPLOY-CYBER-09-CYBERAI
Found 1 annotations in info base click to see
call topic details
Call status: Open
Publication date: 2025-10-28 (1 month ago)
Opening date: 2025-10-28 (1 month ago)
Closing date: 2026-03-31 (3 months from now)
Procedure: single-stage

Budget: 15,000,000
Expected grants: 4
Contribution: 3,000,000 - 5,000,000
News flashes

This call topic has been appended 1 time by the EC with news.

  • 2025-12-06
    the submission session is now available...
Call

DIGITAL-ECCC-2025-DEPLOY-CYBER-09

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 3 other topics in this call:

Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2025-10-28_15-26-57

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
Call Document info
Added 4 days ago by Daniela Hackl
DEP LF INFOSHEET_Restricted calls and other security issues in DEP.pdf (161.2 KB)
For this topic, security restrictions under Article 12(5) of the Digital Europe Regulation apply.

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 3 months ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 1 month ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 1 month ago

    The call opened for submissions.

  4. Today

  5. Closing date

    - 3 months from now

    Deadline for submitting a project.

  6. Time to inform applicants Estimate

    - 8 months from now

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  7. Sign grant agreement Estimate

    - 11 months from now

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)

Bubbles

This call topic is part of: