Things
Spoke 7, called “Infrastructure Security” hereinafter also “Spoke”, has as its general objective the development of security technologies for infrastructures, which translates into the following specific objectives: • Design and develop an open and available secure IT architecture at a national level, which will be the starting point for the construction of safe infrastructures that do not suffer from the potential risks deriving from the use of proprietary technologies; • Improve the safety of the automotive infrastructure which, with the massive interconnection and electrification of cars, will become one of the country's most vulnerable assets; • Improve the safety, protection and resilience of smart power grids, which are a fundamental element for optimizing energy consumption and achieving the Green deal; • Contribute to improving the security of ITC assets (eg, IT/OT networks, systems and services) included in the "Cyber National Security Perimeter", providing ontologies, methodologies, guidelines, best practices and appropriate tools.
Who is it aimed at?
The subjects eligible to submit project proposals - Proposers - in response to this notice can be: • Micro, Small and Medium Enterprises (MSMEs), external to the SERICS Partnership and competing in single mode, having the dimensional parameters set out in Annex I of REG (EC) n. 800/2008 of the Commission of 6 August 2008 (General Block Exemption Regulation) in OJEU L 214 of 9.8.2008; • Large Enterprises (GI), external to the SERICS Partnership and which compete in single mode.
What does it predict
The project proposals must be consistent in terms of repercussions and impacts of the results with the research micro-tasks indicated by the Spoke (as described in Attachment 3 - Micro-tasks). In particular, the micro-tasks are developed within 3 different projects (hereinafter project areas) promoted by Spoke 7 of the SERICS program and listed below: • SANDSTORM – Secure AND Safe infras Structures f OR cps in the compute continuu M : Sandstorm provides a fully open and secure architecture based on RISC-V covering the complete stack, from the hardware architecture up to AI frameworks and companion design tools, for the next-generation Cyber-Physical Systems in the Compute Continuum. • SCAR – Securing the third millennium's cyber-CARs: SCAR defines prototypes, verifies and validates innovative and smart technologies for the HW-SW security of modern cars in their ecosystem, in compliance with the current standards, privacy rights and legal aspects. • Eraclito: The Eraclito project aims at providing strategic and tangible contribution to the modernization of the Nation itself in terms of cybersecurity posture and cyber risk management capabilities. The project intends to bring contributions to the cybersecurity state-of-the-art in terms of knowledge, techniques, methodologies, and tools for cyber risks management, cyber threat intelligence and hunting as well as tools for managing the cybersecurity knowledge-base, with respect to the National (ie, Cyber National Security Perimeter) and European (ie, Cybersecurity Act) regulations.