Call for proposals for Digital Security: Cybersecurity, Privacy and Trust H2020-DS-2015-1 Closed!

Objectives

The Framework Programme for Research and Innovation (2014-2020) is implemented by specific programme and work programmes.

The “Societal challenges” responds directly to the policy priorities and societal challenges that are identified in the Europe 2020 strategy and that aim to stimulate the critical mass of research and innovation efforts needed to achieve the Union's policy goals.

The specific objective is to fully exploit the potential of Europe's talent pool and to ensure that the benefits of an innovation-led economy are both maximised and widely distributed across the Union in accordance with the principle of excellence.

Funding shall be focused on the following specific objectives:
(a) Health, demographic change and well-being.
(b) Food security, sustainable agriculture and forestry, marine, maritime and inland water research. and the bioeconomy.
(c) Secure, clean and efficient energy.
(d) Smart, green and integrated transport.
(e) Climate action, environment, resource efficiency and raw materials.
(f) Europe in a changing world - Inclusive, innovative and reflective societies.
(g) Secure societies - Protecting freedom and security of Europe and its citizens.

Actions

Actions foreseen within this call for proposals include the following topics:

  • DS-03-2015: The role of ICT in Critical Infrastructure Protection. Communication and computing networks are not only critical infrastructures on their own, but underpin many other critical networks (e.g. energy, transport, finance, health …). In addition they are critically dependent on ICT technology. Therefore, the malfunctioning or disruption of the communication channel or of an IT system will have a cascading effect, on several other infrastructures or services that depend on it, potentially across all Europe. This includes Industrial and Automation Control Systems (IACS). They are no longer isolated siloes but are fully integrated with corporate IT infrastructures. Despite this strong connection between the two infrastructures, there is only little awareness regarding IT risks that can affect IACS. An attack to IT assets can spread to the OT environment jumping to SCADA and Control Centres. Many vulnerabilities of critical infrastructures, including the communication networks, stem from the fact that ICT systems are deployed in an environment or for an application that was not designed with security in mind. The deployment of ICT in new critical systems, including new generation ICT system, is exacerbating the problem by constantly introducing new risks and vulnerabilities, in particular for an interconnected system.
  • DS-04-2015: Secure Information Sharing. To protect our society and economy against accidental or man-made disruptions of the information and communication technologies they so much depend on an efficient exchange of information on vulnerabilities, incidents or attacks is desirable. However, at the moment the private and public stakeholders are reluctant to share information unless they have a system and counterparts they can fully trust. A variety of sources of information for incidents or vulnerabilities exist. For example, some business sectors have set-up a sector specific information sharing; large service providers, network operators and antivirus companies monitor attacks and exploits on their infrastructure and on the user systems; CERTs are providing services. However, those sources are rarely integrated or are not interacting by exchanging information between them. The NIS public private platform (Network Information Security Platform) will discuss, among other things, best practices on information sharing and incident coordination. Inputs from other cooperation networks will also be used.
  • DS-05-2015: Trust eServices. The implementation of trust eServices in specific applications areas like health, public administration, eCommerce includes the provision of electronic signatures, e-seals, timestamps or certified electronic delivery. The deployment and widespread adoption of these eServices is hampered by the lack of globally interoperable solutions, mutually recognized or compatible trust models and the absence of solid business cases for the reliance on electronic signatures, e-seals, timestamps or certified electronic delivery. In addition, the impossibility of transparently assessing the security assurance and trustworthiness of such eServices, in particularly when coming from third countries makes it difficult for citizens and businesses to confidently rely on them.

European community funding

The Community provisional funding available for the call for proposals is:

  • 49,61 Million EUR (Global Budget)

All the important deadlines

  • 21 April 2015 - 4 years ago (Deadline for the presentation of proposals)

Further information about the call

Official webpage of the call

Useful documents

  • Digital Security: Cybersecurity, Privacy and Trust (Legal base)

Organisations eligible to participate

Opened to the following bodies or institutes with legal status established in the covered areas:

  • Any legal organisation

Covered areas

Bodies or institutes must have their registered legal seat in one of the countries taking part in the Programme which are:

  • European Union (EU)

Directorate-Generale responsible

Directorate-General for Research

Related calls for proposals

Related calls

Explore other programmes