Saltar al contenido principal.

Escudo de la Junta de Castilla y León; Página de inicio

Contacto

Información Europea de Castilla y León

Contenido principal. Saltar al inicio.

Desarrollo e implementación de tecnologías clave avanzadas ( DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH)

Título:

Desarrollo e implementación de tecnologías clave avanzadas ( DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH)

Categoría temática:

Economía, Empresa, Empleo y Energia

Programa:

PROGRAMA EUROPA DIGITAL - DIGITAL

Descripción y objetivos:

ExpectedOutcome:Deployment of state-of-the-art technologies in the area of cybersecurityTools for automated threat detection, monitoring of networks, data protection and incident response Objective:Breakthroughs in Key Digital Technologies such as Artificial Intelligence (including generative AI and adversarial AI), Big Data Analytics, Quantum, Blockchain Technology, High Performance Computing and Software-Defined Networking, create new opportunities for advancing cybersecurity in the areas of vulnerability detection, threat detection and rapid response, reducing the window of opportunity for attackers to exploit these vulnerabilities. Furthermore, they may enable new possibilities to protect data security and privacy.The objective is to enable European cybersecurity actors to take advantage of these new breakthroughs, improving detection and prevention capabilities, efficiency, scalability, and facilitating data sharing and regulatory compliance.In particular innovative technologies should allow for the processing of larger amounts of data, automating real-time pattern recognition, log analysis, vulnerability scanning, while enabling security professionals to focus on higher level interpretation of data and response decisions. They should allow organisations to deploy solutions and larger scale, and in increasingly complex environments.A priority is to create and strengthen capacity for original Cyber Threat Information (CTI), e.g., in the form of CTI feeds or services. Scope:Activities should fortify cybersecurity capabilities using breakthrough technologies, encompassing various aspects of cybersecurity. This involves uptake and integration for the deployment of novel tools, systems and services for threat detection, incident response, malware defence, vulnerability management, data protection and so forth. In one or more of the following topics should be addressed:Real-time Monitoring and Incident Response: ensuring the swift identification and response to security incidents through continuous network monitoring, alert generation, and automated response mechanisms.Malware Defence and Analysis: mitigating malware threats by analysing code behaviour, scrutinizing network traffic, and assessing file characteristics, thereby reducing opportunities for attackers to exploit vulnerabilities.Proactive Vulnerability Management: identifying and addressing weaknesses proactively through automated vulnerability scanning and penetration testing to address potential threats before they can be exploited.Data Protection and Anomaly Detection: safeguarding sensitive data by scrutinizing access patterns and identifying abnormal behaviour to mitigate data breaches and protect critical information.Incident investigation to help uncover cause, scope and impact of security incidents or breaches that have occurred.Data Utilisation with Privacy: enabling organisations to harness data for analysis and insights while preserving data security and privacy through techniques such as anonymisation and de-identification. By addressing such issues, the cybersecurity resilience of organisations should be enhanced, improving overall cybersecurity posture, encompassing various aspects such as threat detection, incident response, and vulnerability management.In well justified cases, access requests to the EuroHPC high performance computing infrastructure could be granted.The systems, tools and services developed under this topic, where relevant, will be made available for licencing to National and/or Cross-Border SOC platforms under favourable market conditions.This action aims at the deployment of key technologies in cybersecurity, in particular also in the context of securing national authorities, providers of critical infrastructures and essential services. As this involves the handling of cyber incidents, malware and management of vulnerabilities that could be exploited by malicious actors, the deployment of such technologies must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to these technologies are subject to Article 12(5) of Regulation (EU) 2021/694. Conditions 1. Admissibility conditions: described in section 5 of the call document  Proposal page limits and layout: described in Part B of the Application Form available in the Submission System 2. Eligible countries: described in section 6 of of the call document 3. Other eligibility conditions: described in section 6 of the call document 4. Financial and operational capacity and exclusion: described in section 7 of the call document 5. Evaluation and award: Award criteria, scoring and thresholds: described in section 9 of the call document Submission and evaluation processes: described section 8 of the call document and the Online Manual Indicative timeline for evaluation and grant agreement: described in section 4 of the call document 6. Legal and financial set-up of the grants: described in section 10 of the call document Documents Call document is accessible here Standard application form — call-specific application form is available in the Submission System Detailed budget table - available in the Submission System DIGITAL EUROPE PROGRAMME General MGA v1.0 Guidance Classification of information in DIGITAL projects   Guidelines on How to Complete your Ethics Self-Assessment   WORK PROGRAMME - Cybersecurity Work Programme 2023-2024 Digital Europe - Regulation 2021/694 EU Financial Regulation 2018/1046  

Acciones previstas:

Esta convocatoria cubre los siguientes temas:

Organizaciones que pueden participar:

Abierto para entidades legalmente constituidas y localizadas en alguna de las zonas de actuación de cualquiera de los siguientes tipos:

  • Cualquier tipo de organización

Zonas de actuacion:

  • Las entidades u organizaciones que participen deberán disponer de su sede social en el ámbito geográfico siguiente:

    • Unión Europea (UE)

Financiacion comunitaria:

La previsión de financiación comunitaria disponible para la convocatoria de propuestas es:

  • Presupuesto global: 35000000 €

Fechas a tener en cuenta:

  • 2024-07-04 02:00:00 : Fecha inicio de presentación de propuestas
  • 2025-01-21 18:00:00 : Fecha límite de presentación de propuestas

Dirección general responsable:

    • Dirección General de Sociedad de la Información y Medios de Comunicación: Avenue de Beaulieu, 25, 1160 - Auderghem
    • Dirección General de Sociedad de la Información y Medios de Comunicación: Avenue de Beaulieu, 29, 1160 - Auderghem
    • Dirección General de Sociedad de la Información y Medios de Comunicación: Avenue de Beaulieu, 31, 1160 - Auderghem
    • Dirección General de Sociedad de la Información y Medios de Comunicación: Avenue de Beaulieu, 33, 1160 - Auderghem
    • Dirección General de Sociedad de la Información y Medios de Comunicación: Rue Robert Stumper 10, L-2557 Luxembourg/Gasperich

convocatoria:

Para más información visita la página web de la convocatoria

Convocatorias Relacionadas: