Clustering R&I Initiatives

Clustering Cybersecurity and Privacy Excellence in Europe

An overarching goal of is accelerating development and deployment of cybersecurity & privacy research results, thereby increasing Europe’s ability to design and deliver innovative solutions. Research and Innovation (R&I) projects have spearheaded across the EU & Associated Countries (ACs) on the development of novel architectures and technologies, which can protect our European Digital Society against cybersecurity & privacy threats, although they may not gain the necessary visibility to generate impact.

Who will be clustered? is performing a comprehensive observation of national and pan-European R&I initiatives, standards, policy & regulation, and market needs. will provide a platform for fostering project collaboration, through a two-stage clustering of projects, thereby allowing cross pollination of both non-technical policy, experience and best practice findings as well as deeper technical specifics bringing expertise from across the top-level cluster together to concentrate on specific issues in smaller and more tightly focused groups.

How will projects be clustered

As a first meta-clustering to bring together those projects, three specific high-level cluster definitions have been created:

1. Foundational technical methods & risk management for trustworthy systems in cybersecurity & privacy

2. Applications and user-oriented services to support cybersecurity and privacy

3. Policy, governance, ethics, trust, and usability, human aspects of cybersecurity & privacy.

These clusters of projects will form the basis for identifying:

  • Future collaboration and sharing of experience on common technical priorities;
  • Re-use of project results with components, technical ideas, methodologies or best practices identified by a repeatable statistical analysis rather than qualitative methodologies;
  • Identify market positioning and potential exploitation opportunities with other projects.

Our cluster criteria

Secure systems and technology: How security & privacy can be built into technology from the design stage, including cryptography, trusted platforms, wireless & mobile security, cloud security, secure coding paradigms, etc.

Verification and assurance: Two disciplines that help establish how much confidence you can have in a system, both in terms of security and privacy. Assurance focuses on managing risks related to the use, processing, storage, and transmission of information, whereas Formal Verification seeks to build a mathematical model of a digital system and then try to prove whether it is ‘correct’, often helping to find subtle flaws.

Operational risk, management and analytics: Understanding the risk and harm resulting from cyberattack, and how it propagates across and between organisations. Work focuses on creating situational awareness through aiming for a complete understanding of scenario and risk management; metrics and models for security postures; and analytics for predicting risk, prioritising responses and supporting security operations. 

Identity, behaviour, ethics and Privacy: Bringing diverse perspectives and interpretations to questions such as: Who are you online with, how do you communicate, and what can (or should) you do? This also connects to the ongoing activities on Privacy launched through directives and regulations over the past year.

National and international security, privacy and governance: looking at politics, international relations, defence, policy and governance issues: how do countries and communities interact with (and through) technology, and how might this change in different contexts?

Human aspects of cybersecurity: Understanding the ways humans interact with (and through) digital systems –whether to understand and design for target users, or to understand how adversaries operate and can exploit the systems. This includes aspects like usability, trust, collaborative practices, social embeddedness, nationhood, cultural diversity and the relationship between microsocial interactions and global structures. Clustering Activities


TYPES: helping users in the current quest for privacy & data protection

Types aims to safeguard the individual’s privacy and put them in control of how their data is handled by providers for commercial or advertising purposes. Types also allows users to verify in a simple way if their online rights are adequately safeguarded and if personal data is exchanged for useful reason, and namely to deliver added-value to the end-user.