ABOUT_

CIPHER (Cybersecurity Intelligence, Protection, and Holistic Enterprise Resilience) aims to tackle and provide demonstrable solutions for security and information assurance in critical sectors. It develops a collaborative, standardized, and available-as-a-service testing facility for security strategies and enablers qualification.

Core methodology:
The project envisions associating a fabric of solution providers, essential service operators, and external auditors to build adapted, efficient, and compliant security measures. CIPHER adopts a demanding evaluation strategy by involving three internal use-case providers contributing to programmatic requirements identification and internal validation.

Experimentation laboratory

Developing and integrating a laboratory serving pre-emptive security capability contributing to increased preparedness.

Holistic resilience

Protecting critical infrastructures (Energy, Transport, Telecoms) against sophisticated attack campaigns.

Regulator compliance

Fostering compliance with the EU’s cybersecurity strategy (NIS2, DORA) and fostering technological sovereignty.

OBJECTIVES_

To deliver relevant security assessments and a faithful testbench that confidently emulates the information management system (IMS) and operational technology (OT) infrastructure of essential entities.

TECHNICAL OBJECTIVES_

TO1.

Collaborative Experimentation Platform

Constitute the architecture, implement and integrate a mature experimentation platform, covering the cloud continuum and offering cyber range capacity for attack simulations.

TO2.

Dynamic Risk & Threat Assessment

Deliver and deploy a dynamic risk and threat assessment suite. Perform multi-attribute risk assessment based on attack class analysis and feeds from known Cyber Threat Intelligence (e.g., CERT-EU, ENISA).

TO3.

Automated Pentesting (TO3)

Instrument automated penetration testing activities in the experimentation laboratory. Integrate results into risk analysis to detect vulnerabilities of different natures (including zero-days).

TO4.

Security Countermeasures & Response

Study the effects of possible responses to mitigate and remediate cyberthreats. Orchestrate security controls and monitoring services to simplify the configuration of the testbed.

TO5.

Trustworthy Information Sharing (TO5)

Enable trustworthy information sharing for joint cyber-exercises across multiple organizations. Integrate data provenance mechanisms and distributed access control (Self-Sovereign Identity).

TO5.

Advisory & Compliance Services

Safely engage external consulting and advisory services to conduct compliance assessment (NIS2, DORA). Propose holistic and trustworthy data management for auditing purposes.

IMPACT_

CIPHER enhances the resilience and security of critical infrastructures across the European Union by offering crucial support in three key areas:

Preparedness support services

  • The platform serves as a testing and training environment for essential service providers to evaluate cybersecurity governance.


 

  • It facilitates realistic attack simulations via Cyber-range capabilities and supports cybersecurity exercises across different sectors (e.g., transport, telecommunications).

Threat & risk assessment services

  • Deploys a dynamic risk assessment framework integrating threat intelligence feeds and predictive risk assessment (UEBA). 


 

  • It supports automated pentesting activities to provide continuous evaluation of attack surfaces.

Risk monitoring services

  • Provides continuous risk monitoring through attack surface monitoring and vulnerability tracking. 


 

  • It facilitates ongoing assessment of security controls and enables cross-border collaboration and joint exercises for collective cybersecurity posture.

WORKPLAN_

The CIPHER project implementation comprises eight Work Packages (WP).

WORK PACKAGES_

Project Management and Consortium Coordination

This work package ensures effective project management, overall coordination with the Granting Authority, data management, and ethics compliance throughout the project lifecycle.
Lead: EVIDEN

Cyber-Risk & Threat Assessment

WP2 establishes the framework for cyber-risk and threat assessment by analyzing external threat intelligence sources to blueprint security risks.
Lead: CERCA-i2CAT

Increased Preparedness though Risk Monitoring and Countermeasure Evaluation

This work package implements real-time risk monitoring agents and develops a security response manager to enhance preparedness.
Lead: ICCS

Pentesting and Simulation Environment

WP4 develops the flexible deployment framework, automated penetration testing tools, and the Cyber-range facility for safe experimentation.
Lead: EVIDEN

Security Advisory Services

This work package provides AI-driven security recommendations and tools for regulatory compliance checking (e.g., NIS2, DORA), along with secure data management.
Lead: K3Y

Integrated CIPHER Platform & Internal Pilot Demonstrators Preparation

WP6 integrates the complete CIPHER platform architecture and coordinates the implementation of the three internal pilot demonstrators.
Lead: EXZ

Open Calls Management

This Work Package manages the entire lifecycle of the Open Calls and the distribution of Financial Support to Third Parties (FSTP) to foster innovation.
Lead: F6S

Project Management and Consortium Coordination

WP8 defines and executes the communication, dissemination, and exploitation strategies to maximize community engagement and project impact.
Lead: INTERACTIVE4D

PARTNERS_

To deliver these essential services, CIPHER brings together a diverse consortium of 13 expert partners from seven EU member states, each providing the specialised technical and industrial knowledge required to secure Europe’s critical infrastructure.

Eviden is an Atos Group business, a global leader in digital transformation. Eviden Technologies Romania operates as a key hub for R&D, specializing in advanced computing, security, and digital platforms.

They offer top-tier services in software development, cybersecurity, Big Data, and High Performance Computing (HPC). Their ambition is to coherently address cybersecurity through a holistic approach (people, processes, technology), focusing on cyber incident detection, impact assessment, and automated response.

Role: As the Project Coordinator, Eviden holds the helm of the consortium (WP1) while simultaneously driving the technical development of the pentesting and simulation environments (WP4). 
They leverage their industrial-grade expertise to implement Zero Trust architectures and Security Operations capabilities.

Eviden

The i2CAT Foundation is a non-profit research and innovation centre based in Barcelona that promotes mission-driven R&D activities. They are committed to designing the future digital society by leveraging knowledge in 5G/6G, IoT, immersive technologies, and cybersecurity. Their Cybersecurity research group specializes in Cyber-threat management, user-centric security, and risk assessment, integrating technologies like Artificial Intelligence and Robot Process Automation.

Role: i2CAT orchestrates the Cyber-Risk & Threat Assessment efforts as the Leader WP2. Their primary mandate involves designing the privacy toolkit based on User Entity Behavior Analytics (UEBA) and analyzing diverse threat intelligence sources to feed the platform.

i2cat

Linked to the National Technical University of Athens (NTUA), ICCS is a non-profit research institute that performs top-quality research and development. The Information Management Unit (IMU) participating in CIPHER focuses on cloud and edge computing, cybersecurity, access control, and distributed data management. ICCS has vast experience in coordinating European R&D projects and is a member of key associations like IDSA.

Role: ICCS spearheads the initiatives for Increased Preparedness through Risk Monitoring as the Leader of WP3. They are in charge of deploying federated monitoring agents and establishing blockchain-based mechanisms for continuous authentication.

ICCS

Aquatim S.A. is the leading regional water and wastewater operator in Timiș County, Romania. With over 130 years of experience, the company provides essential services to more than 500,000 residents, operating an extensive infrastructure network. Aquatim stands out for its ambitious digitalization strategy, implementing advanced solutions such as SCADA systems and smart consumption monitoring.

Role: Aquatim serves as the Pilot Provider for the Water Utility sector (WP6). They provide a critical live environment to test and validate CIPHER’s detection capabilities within a converged IT/OT infrastructure, ensuring the solution meets real-world utility needs.

Aquatim

Existanze – Connecting Dots is a leading ICT solutions provider based in Athens, Greece, with over 20 years of experience delivering tailored software development and systems integration. Security and authorization are at the core of their work, specializing in identity and access management (IAM), data protection, and secure cloud architectures.

Role: Connecting Dots holds a strategic dual mandate as Leader of WP6 (Integrated Platform) and Leader of WP8 (Dissemination & Exploitation). They are the technical architects behind the platform integration while ensuring the project’s results are effectively communicated to the market.

Existanze

LOGIKA is a premier logistics provider, offering end-to-end transportation and warehousing solutions on a global scale. Specializing in multimodal transport, the company handles air, sea, and road freight. Committed to technological innovation, LOGIKA places cybersecurity at the core of its operations to ensure secure digital transactions and supply chain integrity.

Role: LOGIKA acts as the Pilot Provider for the Logistics sector (WP6). They bring CIPHER into the field to stress-test cybersecurity preparedness in cross-border scenarios, covering complex operations like warehousing and real-time fleet tracking.

Logika

K3Y Ltd is a dynamic SME from Sofia, Bulgaria, specialising in cybersecurity and Research and Development (R&D). K3Y offers a diverse range of AI-driven cybersecurity solutions, emphasizing intrusion and anomaly detection, threat intelligence, and intelligent honeypots. They develop research products such as K3CyberRadar and K3DecoyNet.

Role: K3Y manages the Security Advisory Services as the Leader of WP5. They are tasked with delivering AI-driven security recommendations and developing the Regulatory Compliance Checker to ensure adherence to standards like NIS2 and DORA.

K3Y

Based in Timișoara, Romania, TEMERON is an SME that specializes in cybersecurity, software development, IoT, and AI-driven solutions. As a trusted technology integrator, they deliver high-quality, tailored solutions to small businesses and multinational corporations alike, ranging from advanced threat detection to AI-powered IoT solutions.

Role: Functioning as a Technology Provider, TEMERON integrates specialized tools into the Risk Management framework (WP2). Their contribution focuses on developing the Risk Management Toolbox and visualization modules for threat assessment.

Temeron

Delft University of Technology (TU Delft) stands as the oldest and largest technical university in the Netherlands. The Faculty of Technology, Policy, and Management brings world-class expertise in context-aware access control and usage control for data management, as well as the trustworthiness, non-repudiation, and traceability of analytics.

Role: TU Delft acts as a Research & Technology Partner (WP3). They provide academic oversight and technical solutions for Continuous Federated Risk Monitoring, utilizing Distributed Ledger Technology (DLT) to ensure the trustworthiness of the platform.

TUDelft

The Hellenic Telecommunications Organisation S.A. (OTE), part of Deutsche Telekom Group, is the leading telecom provider in Greece. OTE operates advanced Network Management and Security Operations Centers (NMC & SOC), with strong expertise in threat detection, incident response, and IT security.

Role: OTE operates as the Pilot Provider for the Telecommunications sector (WP6). They demonstrate the platform’s scalability by showcasing how CIPHER streamlines alert management and automates threat detection in a high-volume carrier environment.

OTE

F6S is the leading global network and platform for application management and growth in the commercial, corporate, government, and university innovation spaces. With over 1.5 million tech startups and 2.7 million entrepreneurs, F6S delivers billions in funding to startups annually. F6S tracks emerging trends across industries with insights based on internal expertise and its strong network of project partners, corporates, universities, and startups.

Role: F6S is the designated Leader of WP7 (Open Calls), managing the distribution of cascade funding to third parties and all the communication. Additionally, they contribute their community building expertise to support the dissemination efforts (WP8).

F6S

Avantix, an Atos business, specialises in developing advanced solutions for critical systems across air, land, and maritime domains. With deep technology expertise in Electronic Intelligence (ELINT) and Communication Intelligence (COMINT), they bring years of experience in wireless protocol security to the consortium.

Role: In CIPHER project, Avantix leads the development of vulnerability assessment agents and automated penetration testing. Their primary focus is on automating the testing of wireless protocols to identify and secure potential entry points in critical infrastructures.

Avantix

Interactive4D is a French studio specialising in the design and development of serious games, gamified e-learning tools, and interactive simulations. They have extensive experience in creating educational tools for cybersecurity awareness (such as “Beware!” and “Cyber Crime”), aiming to modify behaviors and improve preparedness through immersive learning experiences.

Role: Interactive4D leads the project’s Dissemination, Exploitation, and Community Engagement work package. They are responsible for the project’s communication strategy, the development of the official Guidebook, and ensuring that CIPHER’s research results are successfully transitioned into sustainable, market-ready applications

Interactive 4D