Share
Print
Call updates
Nov 5, 2021 3:49:59 PM
Submissions to call HORIZON-CL3-2021-CS-01
A total of 105 proposals has been submitted to call HORIZON-CL3-2021-CS-01, which closed on 21 October 2021. These proposals, of which the evaluation will be organized over the coming weeks and months, were submitted to the following topics:
HORIZON-CL3-2021-CS-01-01 - Dynamic business continuity and recovery methodologies based on models and prediction for multi-level Cybersecurity (RIA)
28 proposals (indicative budget 21,5 EUR million)
Aug 18, 2021 10:36:17 AM
Please note that an option has been added in the system, which also allows for affiliated and associated partners and entities to participate under this call for proposals.
Jun 30, 2021 8:23:47 AM
The submission session is now available for: HORIZON-CL3-2021-CS-01-04(HORIZON-RIA), HORIZON-CL3-2021-CS-01-02(HORIZON-RIA), HORIZON-CL3-2021-CS-01-01(HORIZON-RIA), HORIZON-CL3-2021-CS-01-03(HORIZON-RIA)
Dynamic business continuity and recovery methodologies based on models and prediction for multi-level Cybersecurity
TOPIC ID: HORIZON-CL3-2021-CS-01-01
Programme: Horizon Europe Framework Programme (HORIZON)
Call: Increased cybersecurity 2021 (HORIZON-CL3-2021-CS-01)
Type of action: HORIZON-RIA HORIZON Research and Innovation Actions
Type of MGA: HORIZON Action Grant Budget-Based [HORIZON-AG]
Deadline model: single-stage
Planned opening date: 30 June 2021
Deadline date: 21 October 2021 17:00:00 Brussels time
Topic description
ExpectedOutcome:
Projects are expected to contribute to all of the following expected outcomes:
The proposal should provide appropriate indicators to measure its progress and specific impact.
Scope:
This action aims at developing new methodologies, services and tools for accelerating the self-recovery and possible adaptation of the infrastructures and supply chains after an attack. In line with the NIS Directive the focus should be on critical sectors (e.g. energy, transportation, health) as well as telecommunication networks. The proposal should go beyond the state-of-the-art in developing and validating AI-based self-healing, effective business continuity and disaster recovery in real-world scenarios covering two or more business sectors and supporting their private and public actors.
Cyber threat intelligence and situational awareness need to be developed from the current research level towards strategic considerations, and down to real-time events. This requires collaboration and data sharing between different security actors and should be based on a collection of heterogeneous data, models and predictions for multi-level security. Cyber incidents are likely to require the efforts from a heterogeneous network of organisations or a network of business units inside a single organisation, both when it comes to prevention, detection and response. The solutions (technologies, methods, tools, procedures, practices and/or strategies including escalation and de-escalation) developed must satisfy the needs of the end-users and support daily tasks, efficient and effective operations and ensure business continuity. Thus, an organisational perspective should be included. Furthermore, the methods for exchanging information and the actors considered should build, whenever possible, on the current practices in line with the NIS Directive.
The proposed solutions should include dynamic execution of disruption recovery and business continuity processes. They should dynamically extract all relevant digital evidence, information and digital traces, provide real-time personalised technical assistance, share information and real-time alerts with relevant stakeholders.
Human factors (e.g. behavioural, psychological, physical, cultural and gender) need to be considered appropriately in all aspects of the proposed solution. Proposals should build on existing research and projects[1], clearly identify the state-of-the-art and explain the strengths of the new solution in the context of the chosen sectors.
Research should address the risks and impact of a cyber-incident on the business itself, using appropriate KPIs, but also possible cascading effects of cyber incidents for critical infrastructure (including potential cross-sectoral and cross-border impacts) and society overall.
The research should include a proof of concept in order to validate the claimed progress and show the benefits in an adequate testing environment involving real end-users. End-users should be involved in all steps of the cycle from design to development and testing. Participation of SMEs is encouraged. This topic requires the effective contribution of SSH disciplines and the involvement of SSH experts, institutions as well as the inclusion of relevant SSH expertise, in order to produce meaningful and significant effects enhancing the societal impact of the related research and innovation activities.
Cross-cutting Priorities:
Socio-economic science and humanities
[1]For example projects funded under the H2020 topic SU-INFRA01-2018-2019-2020: Prevention, detection, response and mitigation of combined physical and cyber threats to critical infrastructure in Europe.