Filter Search for grants
Call Navigation
Deadline expired
The deadline for this call has expired.
Call key data
Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
Call number
HORIZON-CL3-2022-CS-01-01
deadlines
Opening
01.07.2022
Deadline
16.11.2022 17:00
Funding rate
70 %
Call budget
€ 21,000,000.00
Estimated EU contribution per project
€ 4,000,000.00 - 6,000,000.00
Link to the call
Link to the submission
Call content
Call objectives
Digital infrastructures together with their connected devices are characterised by complex interdependencies involving various physical and logical layers and connecting a wide range of legacy IT solutions and innovative technologies. Application scenarios include but are not limited to cybersecurity of communication systems and networks and their components, e.g. 5G networks, Internet of Things (IoT) devices, medical devices, supervisory control and data acquisition (SCADA) systems, and their services, e.g. cloud-based ICT solutions. Their availability, controlled performance and reliability need to be guaranteed at every moment serving the needs, sometimes critical and safety-related e.g. in transportation, energy, healthcare, of millions of citizens, enterprises and society. Therefore, they need to be protected in real-time against ever-evolving cybersecurity threats.
Building on research and innovation in the area of cybersecurity of digital infrastructures for example projects funded from H2020 SU-DS01-2018, SU-DS04-2018-2020, SU-DS05-2018-2019 and SU-TDS-02-2018, state of the art technologies should support the logging, categorisation, data aggregation from different sources, automatic information extraction and analysis of cybersecurity incidents. This includes advanced methods for cyber threats intelligence and cyber-incident forensics enabling better prediction of cyber security threats. Proposals should develop and validate demonstration prototypes of tools and technologies to monitor and analyse cybersecurity incidents in an operational environment in line with the NIS directive and the General Data Protection Regulation. They should contribute to improved penetration testing methods and their automation by using machine learning and other AI technologies as appropriate. Moreover, proposals should support effective network traffic analysis applying detection techniques in network operations based on advanced security information management and threat intelligence. Proposed solutions should also include validation or piloting of cyber threat intelligence with early-stage detection, prediction and contributions towards response capability using predictive analytics, and as relevant, with efficient and user-friendly interaction methods, e.g. visual analytics. Furthermore, solutions deployed by this action should validate their approach to intrusion detection and incident monitoring with real end-users and their needs.
For expanding the proposed work in terms of additional pilot sites, additional user groups, additional applications, and complementary assessment of the acceptability of the use case, the actions may involve financial support to third parties in line with the conditions set out in Part B of the General Annexes. Each consortium will define the selection process of the third parties for which financial support will be granted (typically in the order of EUR 50 000 to 300 000 per party). Up to 20% of the EU funding requested by the proposal may be allocated to the purpose of financial support to third parties.
A strong culture awareness of data protection should be fostered. The proposals should also appropriately address concerns about mass surveillance and protection of personal spaces. All technologies and tools developed should be appropriately documented, to support take-up and replicability.
Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side. Participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.
read more
Expected results
- Improved disruption preparedness and resilience of digital infrastructure in Europe
- Improved capacity building in digital infrastructure security including organisational and operational capabilities
- Robust evidence used in cybersecurity decisions and tools
- Better prediction of cybersecurity threats and related risks
- Improved response capabilities based on effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity, including holistic incident reporting and enabling coordinated cyber-incident response.
Eligibility Criteria
Regions / countries for funding
Moldova (Moldova), Albania (Shqipëria), Armenia (Հայաստան), Bosnia and Herzegovina (Bosna i Hercegovina / Босна и Херцеговина), Faeroes (Føroyar / Færøerne), Georgia (საქართველო), Iceland (Ísland), Kosovo (Kosova/Kosovë / Косово), Montenegro (Црна Гора), Morocco (المغرب), North Macedonia (Северна Македонија), Norway (Norge), Serbia (Srbija/Сpбија), Tunisia (تونس /Tūnis), Türkiye, Ukraine (Україна), United Kingdom
eligible entities
EU Body, Education and training institution, International organization, Non-Profit Organisation (NPO) / Non-Governmental Organisation (NGO), Other, Private institution, incl. private company (private for profit), Public Body (national, regional and local; incl. EGTCs), Research Institution incl. University, Small and medium-sized enterprise (SME)
Mandatory partnership
Yes
Project Partnership
Unless otherwise provided for in the specific call conditions , legal entities forming a consortium are eligible to participate in actions provided that the consortium includes:
- at least one independent legal entity established in a Member State;and
- at least two other independent legal entities, each established in different Member States or Associated Countries.
eligible non-EU countries:
- countries associated to Horizon Europe
- low-and middle-income countries
Legal entities which are established in countries not listed above will be eligible for funding if provided for in the specific call conditions, or if their participation is considered essential for implementing the action by the granting authority.
other eligibility criteria
Activities are expected to achieve TRL 7 by the end of the project.
Beneficiaries may provide financial support to third parties in the form of grants. The maximum amount to be granted to each third party is EUR 300 000 to support disruption preparedness and resilience of digital infrastructure in Europe and effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity.
Additional information
Topics
UN Sustainable Development Goals (UN-SDGs)
Additional Information
Proposal page limits and layout:
The application form will have two parts:
-
Part A to be filled in directly online (administrative information, summarised budget, call-specific questions, etc.)
-
Part B to be downloaded from the Portal submission system, completed and re-uploaded as a PDF in the system; page limit: 70 pages
To see more information about this call, you can register for free here
or log in with an existing account.
Log in
Register now