Dep Horizon
Dep Horizon
DIGITAL-ECCC-2025-DEPLOY-CYBER-08
DIGITAL-ECCC-2025-DEPLOY-CYBER-09
HORIZON-CL3-2025-02-CS-ECCC
Ivan Scannapiecoro
#CyberSec_ECCC
Senior Programme Officer
07/07/2025
Overview
▪ Policy Overview
DIGITAL-ECCC-2025-DEPLOY-CYBER-09
▪ Policy overview
✓ Topics overview
✓ Timetable and deadlines
✓ Topics presentation
✓ Specific topics conditions
✓ Awards criteria
✓ Budget categories and cost eligibility
Digital Europe Programme
The Digital Europe Programme will reinforce the EU’s critical digital capacities by focusing
on the key areas of artificial intelligence (AI), cybersecurity, advanced computing, data
infrastructure, the deployment of these technologies and their best use for sectors such as
energy, climate change and environment, manufacturing, mobility, agriculture and health.
The DEP will strengthen the preparedness and resilience of the key sectors and response
actions across the EU to defend against cyber threats.
Budget Overview
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PublicPQC EUR
15 000 000
• Transition to post-quantum Public Key Infrastructures
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC EUR
10 000 000
• Enhancing the NCC Network
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CyberHEALTH EUR
30 000 000
• Dedicated action to reinforcing hospitals and healthcare providers
DIGITAL-ECCC-2025-DEPLOY-CYBER-08
Timetable and deadlines
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PublicPQC
Transition to post-quantum Public Key Infrastructures
Objective
● tackle the challenges of an effective integration of PQC algorithms in Public Key Infrastructures
(PKIs), which offers efficient migration strategies and strong business continuity guarantees
Scope
Objectives
● support the operation of the NCCs and enable them to support the cybersecurity community,
including SMEs, for the uptake and dissemination of state-of-the-art cybersecurity solutions and
strengthen cybersecurity capacities. This could also be achieved by using Financial Support for Third
Parties (FSTPs).
● providing support for the uptake of EU cybersecurity technologies and products, commercialisation
and scale-up of the European cybersecurity start-up/SME ecosystem, in collaboration and
complementarity with the European and ongoing national and regional initiatives, such as accelerator
and incubation programmes and technology transfer programmes.
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC
Scope
The NCCs should carry out one or more of the following tasks:
✓ Act as contact points at the national level for the Cybersecurity ✓ Implement specific actions for which grants have been
Competence Community to support the ECCC in achieving its awarded by the ECCC, including through the provision of
objectives and missions. FSTP; Support the scaling-up of start-ups by finding other
funding to implement existing projects.
✓ Provide expertise and actively contributing to the strategic
✓ Promote and disseminate the relevant outcomes of the work
tasks of the ECCC
of the Network and the ECCC
✓ Promote, encourage and facilitate the participation of civil
✓ Assess requests for becoming part of the Cybersecurity
society and industry in cross-border projects and cybersecurity Competence Community by entities established in the same
actions funded through all relevant Union programmes. Member State as the NCC.
✓ Provide technical assistance to stakeholders by supporting ✓ Advocate and promote involvement in the activities arising
them in their application phase for projects managed by the from the ECCC, the Network of National Coordination Centres,
ECCC. and the Cybersecurity Competence Community.
✓ Seek to establish synergies with relevant activities at national, ✓ Support the Cybersecurity Competence Community
regional and local levels. registration (on platforms such as ATLAS) and contribute to
the development of suitable community management tools.
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC
Scope
In addition, the NCCs could also carry out one or more of the following tasks:
✓ Provide support to innovative ideas towards market- ✓ Organise periodic cybersecurity boot camps,
readiness. challenges, awareness campaigns and training courses
across Europe, specifically for SMEs or students.
✓ Promote cybersecurity awareness, best practices, and Organise periodic awareness raising campaigns and
careers in schools, universities, and community events. cyber exercises to enhance the security and resilience of
critical sectors as well as SMEs.
✓ Strengthen collaboration between institutions for
higher education, support activities in primary and ✓ Foster a community of cybersecurity professionals
secondary levels of education to increase cybersecurity who can share their experiences, challenges, and
awareness and hygiene. solutions.
✓ Build stronger partnerships with established SMEs, tech ✓ Support and encourage the uptake of cybersecurity
educational policy goals in national (cybersecurity)
companies, and government agencies to develop and
strategies.
distribute software tools and services that assist in early
threat detection, actor identification, and threat evolution ✓ Promote safer digital behaviours and more youth
monitoring. considering cybersecurity careers.
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC
Scope
The action will support pilot projects bringing together regional and/or national clusters associations of
hospitals/healthcare providers and cybersecurity service providers. The pilot projects will:
• define the state of preparedness of clusters of hospitals and healthcare providers in the EU, to be able to
assess their needs; prepare an overview of the state-of-the-art cybersecurity solutions and resources
needed for hospitals and healthcare providers to meet the scope of the action.
• develop technical plans, tailored to the needs of representative hospitals and healthcare provider
• conduct a demo implementation of these technical plans to demonstrate their effectiveness in
operations at the stakeholders’ sites.
• serve as demonstration projects and provide cybersecurity education and training to the staff,
enhancing awareness and ensuring best practices in safeguarding sensitive healthcare information.
• undertake wide dissemination activities of best practices across the EU
DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CyberHEALTH
• Consortium composition:
• For topic DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CYBERHEALTH - minimum 2 independent
applicants (beneficiaries; not affiliated entities) from at least 2 eligible countries.
• For topic DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PUBLICPQC, submissions from consortia, despite
not mandatory, is strongly advised.
DIGITAL-ECCC-2025-DEPLOY-CYBER-08
Specific cost eligibility conditions
o Personnel costs:
• average personnel costs (unit cost according to usual cost accounting practices) : Yes
• SME owner/natural person unit cost : Yes
o Travel costs:
• Travel and subsistence unit costs : No (only actual costs)
• eligible only in EU and EEA countries
o Equipment costs:
• depreciation (for topic DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC)
• depreciation + full cost for listed equipment (for topics DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PublicPQC
and DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CyberHEALTH)
o Other cost categories: costs for financial support to third parties allowed for grants:
• for topic DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC: maximum amount per third party EUR 100 000;
amounts of more than 60 000 EUR per third party are necessary because the nature of the actions under
this call is such that their objectives would otherwise be impossible or overly difficult to achieve;
DIGITAL-ECCC-2025-DEPLOY-CYBER-08
Type of grant
o Budget-based mixed actual cost grant: actual costs, with unit cost and flat-rate elements
• costs that were actually incurred for your project (NOT the budgeted costs)
• For unit costs and flat-rates, the amounts calculated as explained in the Grant Agreement can be
charged
DIGITAL-ECCC-2025-DEPLOY-CYBER-08
Awards criteria
(…) With the aim of creating a secure and trustworthy digital environment,
Cluster 3 will invest in cybersecurity R&I to strengthen the EU’s resilience,
protect its infrastructures, and improve its ability to cope with cyber incidents.
Expected impacts:
• Support the EU’s technological capabilities by investing in cybersecurity research and innovation to further
strengthen its leadership, strategic autonomy, digital sovereignty and resilience;
• Help protect its infrastructures and improve its ability to prevent, protect against, respond to, resist, mitigate, absorb,
accommodate and recover from cyber and hybrid incidents, especially given the current context of geopolitical change;
• Support European competitiveness in cybersecurity and European strategic autonomy, by protecting EU products
and digital supply chains, as well as critical EU services and infrastructures (both physical and digital) (…);
• Encourage the development of the European Cybersecurity Competence Community;
• Particular attention will be given to SMEs (…)by promoting security and privacy ‘by design’ in existing and emerging
technologies.
HORIZON-CL3-2025-02-CS-ECCC
HORIZON-CL3-2025-02-CS-ECCC-01
EUR
40 000 000
Generative AI for Cybersecurity applications
HORIZON-CL3-2025-02-CS-ECCC-02 EUR
23 550 000
• New advanced tools and processes for Operational Cybersecurity
HORIZON-CL3-2025-02-CS-ECCC-03 EUR
• Privacy Enhancing Technologies 11 000 000
HORIZON-CL3-2025-02-CS-ECCC-04 EUR
• Security evaluations of Post-Quantum Cryptography (PQC) primitives 4 000 000
HORIZON-CL3-2025-02-CS-ECCC-05 EUR
• Security of implementations of Post-Quantum Cryptography algorithms 6 000 000
HORIZON-CL3-2025-02-CS-ECCC-06 EUR
• Integration of Post-Quantum Cryptography (PQC) algorithms into high-level protocols 6 000 000
HORIZON-CL3-2025-02-CS-ECCC
Timetable and deadlines
Expected outcome
● Projects will develop technologies, tools, processes that reinforce cybersecurity using AI
technological components, in particular Generative AI, in line with relevant EU policy, legal
and ethical requirements
Scope
Proposals addressing expected outcome a) Proposals addressing expected outcome b)
(a) (i) Advanced threat and anomaly detection (b) (i) Development of tools powered by
and analysis
Generative AI that analyse and facilitate the
(a) (ii) Adaptive security measures Application of the national and EU regulation
in digital systems, in particular the Artificial
(a) (iii) Enhanced authentication and access Intelligence Act, the Directive on measures for
control. a high common level of cybersecurity across
the Union (NIS2) and the Cyber Resilience Act.
Scope
Proposals are expected to demonstrate the developed frameworks, tools, services, and processes
through pilot implementations involving the participation of relevant national cybersecurity
authorities and/or essential and important entities as defined in NIS2, implemented with the
participation of leading European cybersecurity industry. Proposals should consider the impact of
forthcoming legislation, in particular the Cyber Resilience Act.
Real world applications and the usability of the solutions developed should feature predominately
in the proposals.
HORIZON-CL3-2025-02-CS-ECCC-02
Expected outcome
Proposals should address at least one of the following expected outcomes:
○ innovative European cybersecurity start-ups and SMEs with a proven track-record in cybersecurity innovation at EU
level,
○ European start-ups and SMEs that can demonstrate established operational cooperation with relevant National
Cybersecurity Authorities,
○ European start-ups and SMEs that have received equity investments by national,
Scope
Consortia are encouraged to propose solutions that can improve the usability and effectiveness of
different Privacy-enhancing technologies (PETs) in realistic environment and to investigate their
integration within common European data spaces. The inclusion of agile schemes designed in a
modular way to support the transition to post-quantum PETs and the design, improvement and
security analysis of quantum-resistant PETs is welcome, in light of the advances of quantum
technologies.
Proposals should also focus on enhancing the usability, scalability, and dependability of secure
and PETs within supply chains, while seamlessly integrating with existing infrastructures and
conventional security protocols. They should also accommodate the diversity in data types and
models across various organizations, undergoing validation and pilot runs within authentic data
environments. Adherence to data regulations, notably GDPR, is paramount.
HORIZON-CL3-2025-02-CS-ECCC-03
Expected outcome
Projects’ results are expected to contribute to some or all of the following outcomes:
✓ Development of robust, scalable, and reliable ✓ Contribution towards the advancement of GDPR-
technologies to uphold privacy within federated and compliant European data spaces for digital services and
secure data sharing frameworks, as well as in the research, such as those on health data, aligning with
processing of personal and industrial data, integrated DATA Topics of Horizon Europe Cluster 4.
into real-world systems.
✓ Development of privacy enhancing technologies and
✓ Development of privacy preserving approaches for data solutions, to benefit the requirements of citizens and
sharing solutions, including privacy-preserving cyber companies, including small and medium-sized
threat information sharing, and in collaborative enterprises (SMEs).
computations involving sensitive data.
✓ Development of blockchain-based and decentralized
✓ Integration of privacy-by-design at the core of software privacy-enhancing technologies, to preserve data
and protocol development processes, with attention to confidentiality, integrity, and the authenticity of
ensure that cryptographic building blocks and transactions and digital assets. Possible combination of
implementations of privacy-enhancing digital signatures
blockchain with other technologies, such as federated
and user-authentication schemes are crypto-agile and
learning, will need to address the data's security and
modular, to facilitate a transition towards post-quantum
cryptographic algorithms. privacy shared through such networks while ensuring
that their connected devices are trusted.
✓ Development of privacy enhancing technologies for the
users of constrained devices. ✓ Investigating the usability and user experience of
privacy-enhancing technologies and exploring ways to
design systems that are both secure and user-friendly.
HORIZON-CL3-2025-02-CS-ECCC-03
Scope
Proposals on the assessment of the security of post-quantum primitives, via studies focused on
eventual quantum algorithms with demonstrable speed-up, eventually also in combination with AI,
or on solely AI-based approaches, are welcome. The security of lattice and code-based PQC
algorithms may be prioritized, but tackling other mathematical problem classes is not excluded. As
the unprecedented computational power of quantum computing can greatly enhance AI
capabilities, combination of different approaches may also be considered.
Projects should lead to identification of vulnerabilities of current post-quantum cryptographic
building blocks and to practical recommendations for parameters for the design of post-
quantum cryptosystems with improved security against quantum attacks and future advances in
code-breaking and AI.
HORIZON-CL3-2025-02-CS-ECCC-04
Expected outcome
Projects’ results are expected to contribute to some or all of the following outcomes:
✓ Breakthroughs in understanding the quantum ✓ Establishment of environments testing the
hardness of various mathematical problem robustness of cryptosystems regarding quantum
classes that underpin the security of current and attackers;
future post-quantum cryptosystems;
✓ AI-based approaches to help discovering
✓ New quantum algorithms with significant quantum vulnerabilities of lattice-based or other
speed-up for lattice-based, code-based, and mathematical problem-classes;
potentially other mathematical problem-classes;
✓ Cryptanalysis results;
✓ Improved implementation of quantum algorithms
✓ Parameter suggestions to create a robust set of
using high-level quantum programming languages
cryptographic building blocks for post-quantum
to solve mathematical problems forming the core of
cybersecurity and design of post-quantum
cryptosystems;
cryptosystems with improved security against
quantum or AI-based attacks.
HORIZON-CL3-2025-02-CS-ECCC-04
Scope
Proposals are welcome on developing solutions that protect against implementation attacks, at
reasonable costs and minimizing the loss of performance while maintaining the required security, as
well as on the analysis of new attacks or combinations of attacks, also powered by the use of AI,
for security-by-design approaches when designing Post Quantum Cryptographic systems.
Activities can also lead to the development of testing methodologies and frameworks for
automated security evaluations for correctness and resistance to remote side-channel attacks for
regular software and for correctness and resistance to a broad range of implementation attacks for
embedded software and hardware.
HORIZON-CL3-2025-02-CS-ECCC-05
Expected outcome
Projects’ results are expected to contribute to some or all of the following outcomes:
Scope
Activities should target one or multiple relevant high-level protocols and produce their
post-quantum versions.
Typically, this can be achieved through combining current and post-quantum solutions for
backward compatibility. Atypical solutions with equivalent security are also welcome.
HORIZON-CL3-2025-02-CS-ECCC-06
Expected outcome
• Clarity and pertinence of the project’s • Credibility of the pathways to achieve • Quality and effectiveness of the work
objectives, and the extent to which the the expected outcomes and impacts plan, assessment of risks, and
proposed work is ambitious, and goes specified in the work programme, and appropriateness of the effort assigned
beyond the state-of-the-art. the likely scale and significance of the to work packages, and the resources
contributions due to the project. overall.
• Soundness of the proposed
methodology, including the underlying • Suitability and quality of the measures • Capacity and role of each participant,
concepts, models, assumptions, inter- to maximize expected outcomes and and extent to which the consortium as
disciplinary approaches, appropriate impacts, as set out in the a whole brings together the necessary
consideration of the gender dimension dissemination and exploitation plan, expertise.
in research and innovation content, including communication activities.
and the quality of open science
practices including sharing and
management of research outputs and
engagement of citizens, civil society
and end users where appropriate.
HORIZON-CL3-2025-02-CS-ECCC
References
o Horizon Europe Programme website :
[Link]
open-calls/horizon-europe_en
o HORIZON-CL3-2025-02-CS-ECCC Call:
[Link]
Help!
Q&A
Follow us
cybersec_eccc cybersec_eccc
cybersec_eccc CyberECCC