EU Cybersecurity Resilience, Coordination and Cybersecurity Ranges
European Comission
ExpectedOutcome :
Outcomes and deliverables
The expected outcomes will be a strong capacity in the Member States to react in a coordinated way to large scale cybersecurity incidents, as well as top-level cybersecurity ranges offering advanced skills, knowledge and testing platforms.
Objective :
The implementation of this topic has two main objectives:
- To strengthen the capacity of cybersecurity actors in the Union to monitor cyber-attacks and threats and supply chain risks, to react jointly against large incidents, and to improve relevant knowledge, skills and training. This objective will be pursued through the implementation of the Blueprint and the future Joint Cyber Unit considering the important role of the Computer Security Incident Response Teams (CSIRTs) network and of the Cyber Crisis Liaison Organization Network (CyCLONe).
- To create, interconnect and strengthen Cybersecurity ranges at European, national and regional level as well as within and across critical infrastructures, including in but not limited to sectors covered by the NIS Directive, in view to share knowledge and cybersecurity threat intelligence between stakeholders in the Member States, better monitor cybersecurity threats, and respond jointly to cyber-attacks. Scope :
Proposals addressing the first objective should build capacity of cybersecurity actors to react in a coordinated way to large scale cybersecurity incidents, while fostering the role of CSIRTs, the CyCLONe network, the future Joint Cybersecurity Unit, and taking into account the Blueprint.
Proposals addressing the second objective should support the creation, operation, capacity increase and/or uptake of cybersecurity ranges, as well as foster networking between them in view to develop cybersecurity skills and expertise in key technologies (e.g. 5G, Internet of Things, Cloud, Artificial Intelligence, industrial control systems) as well as application sectors (e.g. health, energy, finance, transport, telecommunication, agri-food production, resource management) including consideration to cascading effects across sectors. This action will aim to:
- exchange knowledge between cybersecurity ranges and create common data repositories;
- support large-scale and cross-sector scenarios covering a wide range of adversaries and attack strategies, including for example cross centre serious gaming exercises; allow realistic traffic simulation that reflect network conditions;
- support structured training and cybersecurity exercises to prepare cybersecurity defenders at both public and private organisations to enhance the protection and resilience of critical infrastructures, enterprises and communications networks; enable the conduct of hybrid trainings engaging all levels relevant to detecting, mitigating and preventing cyber-attacks (tactical, operational, strategic) while creating an environment where they can train communication, coordination and decision making;
- provide additional services to stakeholders such as structured test methodologies, vulnerability database and forensic tools; develop of automated content delivery options supporting specific job profiles.
Conditions
- Admissibility conditions: described in section 5 of the call document
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
Eligible countries: described in section 6 of of the call document
Other eligibility conditions: described in section 6 of the call document
Financial and operational capacity and exclusion: described in section 7 of the call document
Evaluation and award:
- Award criteria, scoring and thresholds: described in section 9 of the call document
- Submission and evaluation processes : described section 8 of the call document and the Online Manual
- Indicative timeline for evaluation and grant agreement: described in section 4 of the call document
6 . Legal and financial set-up of the grants: described in section 10 of the call document
Documents
Call document is accessible here .
Standard application form — call-specific application form is available in the Submission System
Detailed budget table - available in the Submission System
DIGITAL EUROPE PROGRAMME - General MGA v1
Guidance Classification of information in DIGITAL projects
Guidelines on How to Complete your Ethics Self-Assessment
Guidance on participation in DEP - restricted calls
WORK PROGRAMME - Cybersecurity Work Programme
Digital Europe - Regulation 2021/694