National SOCs

Grant Name
National SOCs
Funder
Digital Europe Programme (DIGITAL)
European Commission
Research Field
Cybersecurity-aware culture
Trust management architectures/mechanisms/policies
Trust in securing digital/physical assets
Cybersecurity
Trust
Security
Deadline
2025-01-21
Grant Size
€5800000
Eligibility

Conditions




1. Admissibility conditions: described in section 5 of the call document


Proposal page limits and layout: described in Part B of the Application Form available in the Submission System


2. Eligible countries: described in section 6 of of the call document


3. Other eligibility conditions: described in section 6 of the call document


4. Financial and operational capacity and exclusion: described in section 7 of the call document


5. Evaluation and award:


  • Award criteria, scoring and thresholds: described in section 9 of the call document


  • Submission and evaluation processes: described section 8 of the call document and the Online Manual


  • Indicative timeline for evaluation and grant agreement: described in section 4 of the call document


6. Legal and financial set-up of the grants: described in section 10 of the call document


Documents


Call document is accessible here


Standard application form — call-specific application form is available in the Submission System


Detailed budget table - available in the Submission System


DIGITAL EUROPE PROGRAMME General MGA v1.0


Guidance Classification of information in DIGITAL projects




Guidelines on How to Complete your Ethics Self-Assessment


WORK PROGRAMME - Cybersecurity Work Programme 2023-2024


Digital Europe - Regulation 2021/694


EU Financial Regulation 2018/1046

Grant Number
DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC
Description
ExpectedOutcome:
  • World-class National SOCs across the Union, strengthened with state-of-the-art technology, acting as clearinghouses for detecting, gathering and storing data on cybersecurity threats, analysing this data, and sharing and reporting CTI, reviews and analyses.
  • Threat intelligence and situational awareness capabilities and capacity building supporting strengthened collaboration between cybersecurity actors, including private and public actors.

Objective:

The objective is to create or strengthen National SOCs, in particular with state-of-the-art tools for monitoring, understanding and proactively managing cyber events, in close collaboration with relevant entities such as CSIRTs. They will also, where possible, benefit from information and feeds from other SOCs in their countries and use the aggregated data and analysis to deliver early warnings to targeted critical infrastructures on a need-to-know basis.


Scope:

The aim is capacity building for new or existing National SOCs, e.g., equipment, tools, data feeds, as well as costs related to data analysis, interconnection with Cross-Border SOC platforms, etc. This can include for example automation, analysis and correlation tools and data feeds covering Cyber Threat Intelligence (CTI) at various levels ranging from field data to Security Information and Event Management (SIEM) data to higher level CTI. National SOCs should also leverage state of the art technology such as artificial intelligence and dynamic learning of the threat landscape and context. This also includes the use of shared cybersecurity information, to the extent possible based on existing taxonomies and/or ontologies, and hardware to ensure the secure exchange and storage of information. The operations should be built upon live network data. Where relevant, consideration should be given to SMEs as the ultimate recipients of cybersecurity operational information.

A key element is the translation of advanced AI/ML, data analytics and other relevant cybersecurity tools from research results to operational tools, and further testing and validating them in real conditions in combination with access to supercomputing facilities (e.g., to boost the correlation and detection features of cross-border platforms).

Another key role for National SOCs is knowledge transfer, such as training of cybersecurity analysts. For example, SOCs dealing with critical infrastructures play a key role and should benefit from the knowledge and experience acquired by or concentrated in National SOCs.

National SOCs must share information with other stakeholders in a mutually beneficial exchange of information and commit to apply to participate in a cross-border SOC platform within the next 2 years, with a view to exchanging information with other National SOCs.

To achieve this aim, a call for expression of interest will be launched to select entities in Member States that provide the necessary facilities to host and operate National SOCs. Applicants to the call for expressions of interest should describe the aims and objectives of the National SOC, describe its role and how such role relates to other cybersecurity actors, and its eventual cooperation with other public or private cybersecurity stakeholders. Applicants should also provide the detailed planning of the activities and tasks of the National SOC, the services it will offer, the way they will operate and be operationalised, and describe the duration of the activity as well as the main milestones and deliverables. They should also specify what equipment, tools and services need to be procured and integrated to build up the National SOC, its services and its infrastructure.

To support the above activities of a National SOC, the following two workstreams of activities are foreseen:

  • [Procurement] A Joint Procurement Action with the Member State where the national SOC is located: this will cover the procurement of the main equipment, tools and services needed to build up the National SOC
  • [Building up and running the National SOC] A grant will also be available to cover, among others, the preparatory activities for setting up the National SOC, its interaction and cooperation with other stakeholders, as well as the running/operating costs involved, enabling the effective operation of the National SOC, e.g., using the equipment, tools and services purchased through the joint procurement. These will also indicate milestones and deliverables to monitor progress.

Applications shall be made to both workstreams. Applications will be object of evaluations procedures. Grants will only be awarded to applicants that have succeeded the evaluation of the joint procurement action.

These actions aim at creating or strengthening national SOCs, which occupy a central role in ensuring the (cyber-)security of national authorities, providers of critical infrastructures and essential services. SOCs are tasked with monitoring, understanding and proactively managing cybersecurity threats. In light of the crucial operative role of SOCs for ensuring cybersecurity in the Union, the nature of the technologies involved as well as the sensitivity of the information handled, SOCs must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to SOCs are subject to Article 12(5) of Regulation (EU) 2021/694, in consistency with WP 2021/2022.

Funding resources

Purdue Grant Writing Lab: Introduction to Grant Writing Open Link
University of Wisconsin Writing Center: Planning and Writing a Grant Proposal Open Link

Quick share


Add deadline to calendar

2025-01-21

Have a funding opportunity that you want to list here?

Submit the grant details to support@peeref.com for review and listing.


Find Funding. Review Successful Grants.

Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.

Explore

Ask a Question. Answer a Question.

Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.

Get Started

Related opportunities

Trustworthy open search and discovery (RIA)
Trustworthy ICT 2024-07-29 €6800000
Foreign Assistance Leveraged for Cybersecurity Operational Needs - FALCON
Other (see text field entitled "Explanat... Aug 02, 2024 12:00:00 AM EDT 10000000
EXtended Collaborative Telepresence (IA)
Artificial Intelligence 2024-08-15 €1000000
Deploying The Network Of National Coordination Centres With Member States
Trust 2024-08-31 €1440000
Internet architecture and decentralised technologies (RIA)
Trustworthy ICT 2024-10-01 €8800000
Advanced radar technologies
N/A 2024-11-05 €35000000
Mitigating new threats and adapting investigation strategies in the era of Internet of Things
Internet of Things 2024-11-20 €5000000
Molecular Foundations for Sustainability: Sustainable Polymers Enabled by Emerging Data Analytics
Science and Technology and other Researc... Jan 16, 2025 12:00:00 AM EST 9500000
A European Collaborative Cloud for Cultural Heritage – Innovative tools for documenting, interlinking and organising data
Digital Agenda 2025-01-22 €8000000