Share
Print
Call updates
Nov 29, 2023 6:06:34 PM
A total of 26 proposals have been submitted in response to this call. The number of proposals for each topic is shown below including the indicative budget of the topics for 2023:
· HORIZON-CL3-2023-INFRA-01-02: 21 proposals (indicative budget: 9.5 M€)
The evaluation of the proposals will start by mid-December and will be closed by mid-February 2024. Applicants will be informed on the outcome of the evaluations in mid-April 2024.
Jun 29, 2023 12:00:09 AM
The submission session is now available for: HORIZON-CL3-2023-INFRA-01-02(HORIZON-IA)
Supporting operators against cyber and non-cyber threats to reinforce the resilience of critical infrastructures
TOPIC ID: HORIZON-CL3-2023-INFRA-01-02
Programme: Horizon Europe Framework Programme (HORIZON)
Call: Resilient Infrastructure 2023 (HORIZON-CL3-2023-INFRA-01)
Type of action: HORIZON-IA HORIZON Innovation Actions
Type of MGA: HORIZON Lump Sum Grant [HORIZON-AG-LS]
Deadline model: single-stage
Planned opening date: 29 June 2023
Deadline date: 23 November 2023 17:00:00 Brussels time
ExpectedOutcome:
Projects’ results are expected to contribute to some or all of the following outcomes:
Support is provided to the resilience of operators against cyber and non-cyber threats in specific sectors;
A reliable state-of-the-art analysis of physical/cyber detection technologies and risk scenarios is created, in the context of an operator in a specific sector in sectors that have not yet been covered by previous research projects;
Strengthened cooperation against natural or human-made threats and subsequent disruptions of infrastructures in Europe, allowing for operational testing in real scenarios or realistic simulations of scenarios with specific regard to disruptions in a specific sector of critical entities;
Improved situational awareness, preparedness and governance by the implementation of effective solutions that enhance detection and anticipated projection of a determined threating situation, as well as implementation of prevention, preparedness/mitigation, response, and recovery types of intervention;
Significant reduction of risks and exposures to anomalies or deliberate events on cyber-physical systems, or on complex and critical infrastructures/systems;
Enhanced preparedness and response by definition of operational procedures of operators as well as public authorities considering citizen’s behaviour/reaction and societal impact in case of disruption in a specific sector.
Scope:
The operational environment in which operators operate has changed significantly in recent years. Security research and innovation related to infrastructure resilience has been following a sectorial approach in order to increase the resilience. This approach to critical infrastructure resilience is needed that as it reflects the current and anticipated future risk landscape, the increasingly tight interdependencies between different sectors, and also the increasingly interdependent relationships between physical and digital infrastructures.
A disruption affecting the service provision by one operator in one sector has the potential to generate cascading effects on service provision in other sectors, and also potentially in other Member States or across the entire EU.
With more and more infrastructure systems being interconnected, a stronger focus on the systemic dimension and complexity of attacks and disruptions by cyber or physical means needs to be applied. As such, not only interdependencies within one type of infrastructure (or closely related types) can be taken into account. The risk landscape is more complex in the recent years, involving natural hazards (in many cases exacerbated by climate change), state-sponsored hybrid actions, terrorism, insider threats, pandemics, and accidents (such as industrial accidents).
Physical disruptions of the activities of operators active in these sectors have possibly serious negative implications for citizens, business, governments, in the environment and endanger the smooth functioning of the internal market. Therefore, operators should be equipped with the best possible means to be able to prevent, resist, absorb and recover from disruptive incidents, no matter if they are caused by natural hazards, accidents, terrorism, insider threats, or public health emergencies.
Another important issue is to have in place efficient cybersecurity measures to block the access to critical infrastructures. A possible project focusing on the protection of critical infrastructures against such threat should consider gaps and vulnerabilities that need to be identified and overcome (e.g. protection of drinking water supply systems from high chemical levels, nuclear facilities, etc.).
Therefore, the successful proposal, following a sector-based approach and identifying a specific priority sector, should work on how to increase the combined cyber and non-cyber resilience operators. It should do so by orienting itself on sectors that have not been covered in previous research, out of the list of sectors described in the respective Annexes of the of the [proposals for a] directive on the resilience of critical entities (CER) and the directive on measures for high common level of cybersecurity across the Union (NIS-2) and thus contribute to enhancing the overall resilience on EU-level, in line with the EU Security Union Strategy.
The proposal should orient itself on the policy shift from protection towards resilience and thus focus on operators acting in the internal market, rather than only on physical or digital assets. This includes concepts of wider business continuity, as well as logistics and supply-chains. Proposals should also focus on the development of a more effective resilience plan conception method, which shall support operators to draft their resilience plans according to the provisions of the CER and NIS-2 Directives [proposals]. The resilience plan conception method should include risk analysis, domino effects analysis, cross-sector and cross-border analysis, standardised plans etc. In addition, this method could include measures on adequate protection, measures on prevention, response, mitigation, and recovery from the consequences of incidents, protection of classified (e.g. the proposal for a Network Code on sector-specific rules for cybersecurity aspects of cross-border electricity flows) or sensitive information and measures that ensure adequate employee security management.
The main practitioners in this topic should come from private or public operators, meaning organisations and enterprises that use critical infrastructure to deliver services, vital for the functioning of society and the internal market. Consortia that will include MS public entities would be considered as an asset. Competent authorities of MS in charge of resilience and/ or overseeing operators in one or more sectors are also encouraged to join the consortia of applicants.
If the infrastructure includes processing of personal data, the proposal should consider including a risk assessment or privacy impact of individuals and society.
In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content should be addressed only if the consortium deems it relevant in relation to the objectives of the research effort.
This topic requires the effective contribution of SSH disciplines and the involvement of SSH experts, institutions as well as the inclusion of relevant SSH expertise, in order to produce meaningful and significant effects enhancing the societal impact of the related innovation activities.
Applicants are encouraged to explore and demonstrate synergies with the work conducted in the European Reference Network for Critical Infrastructure Protection (ERNCIP), as applicable.
Specific Topic Conditions:
Activities are expected to achieve TRL 6-8 by the end of the project – see General Annex B.