Clustering R&I Initiatives

Clustering Cybersecurity and Privacy Excellence in Europe

An overarching goal of is accelerating development and deployment of cybersecurity & privacy research results, thereby increasing Europe’s ability to design and deliver innovative solutions. Research and Innovation (R&I) projects have spearheaded across the EU & Associated Countries (ACs) on the development of novel architectures and technologies, which can protect our European Digital Society against cybersecurity & privacy threats, although they may not gain the necessary visibility to generate impact.

Who will be clustered? is performing a comprehensive observation of national and pan-European R&I initiatives, standards, policy & regulation, and market needs. will provide a platform for fostering project collaboration, through a two-stage clustering of projects, thereby allowing cross pollination of both non-technical policy, experience and best practice findings as well as deeper technical specifics bringing expertise from across the top-level cluster together to concentrate on specific issues in smaller and more tightly focused groups.

How will projects be clustered

As a first meta-clustering to bring together those projects, three specific high-level cluster definitions have been created:

1. Foundational technical methods & risk management for trustworthy systems in cybersecurity & privacy

2. Applications and user-oriented services to support cybersecurity and privacy

3. Policy, governance, ethics, trust, and usability, human aspects of cybersecurity & privacy.

These clusters of projects will form the basis for identifying:

  • Future collaboration and sharing of experience on common technical priorities;
  • Re-use of project results with components, technical ideas, methodologies or best practices identified by a repeatable statistical analysis rather than qualitative methodologies;
  • Identify market positioning and potential exploitation opportunities with other projects.

Our cluster criteria

Secure systems and technology

  • Building security and privacy into technologyfrom the design stage and technologies that are designed to deliver security capabilities like: crypthography, trusted platforms, wireless & mobile security, cloud and computing security, secure software development/coding paradigms

Verification and assurance

  • Enabling the establishment of levels of confidence in a system in terms of security and privacy, primarily looking at other systems to either determine if they are secure.
  • Formal verification seeks to build a mathmatical model of a digital system and then try to prove whether it is correct, often helping to find subtle flaws.
  • Assurance focuses on managing risks related to the use, processing, storage and transmission of information.

Operational risk, management and analytics

  • Developing understanding of risk and harm resulting from cyberattack
  • Cyberattack propagation across and between organisation
  • Awareness of current understanding of scenario and risk management
  • Metruics and models for security postures
  • Analytics for predicting risk, prioritising responses and supporting security operations

Identity, behaviour, ethics and Privacy

  • Management of personal identity including different levels of assurance when used for online capabilities or services
  • How to understand common norms when applied in the online or digital realm.
  • Diverse perspective and interpretations to questions such as: Who are you online with? How do you communicate and what can (or should) you do? What expectations (personally and legally bindings) are there?
  • Whay expectations of privacy can there be and should there be?

National and international security, privacy and governance

  • Development of politics, international relations, defence, policy and governance issues.
  • How do countries and communities interact with (and through) technology, and how might this change in different contexts?
  • How do national standards transcend borders or boundaries? 
  • How should different threat persistence levels and domain cybersucurity understanding should be shared?
  • At what point does something change from being a business problem to a national security problem.

Human aspects of cybersecurity

  • Understanding human interaction with (and through) digital systems (whether to understand and design for target users adn to better understand how adversaries operate anc can exploit the system).
  • Include aspects like usability, trust, collaborative practices, social embeddedness, nationhood, cultural diversity and the relationship between microsocial interactions and global structures. Clustering Activities

News - Supporting European Experts contribution to International ICT Standardisation Activities

Are you an ICT specialist involved in one of the main field of the European Digital Single Market? is the chance for you to give your contribution to the development of ICT standards on global basis and benefit of concrete financial support!


CyberCentral 2018, 11-13 April, Prague

CyberCentral is the most exclusive summit for Cyber Security Experts that will take place next 11-13 April in Prague.

Brussels - Concertation Meeting, 26/04/2018

The registration is open for the first Concertation meeting, Brussels, 26 April 2018.