TOPIC : Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe.
|Publication date:||14 October 2015|
|Types of action:||IA Innovation action|
|DeadlineModel: Planned opening date:||single-stage 01 March 2017||Deadline:||24 August 2017 17:00:00|
|Types of action:||IA Innovation action|
|DeadlineModel: Planned opening date:||single-stage 15 March 2016||Deadline:||25 August 2016 17:00:00|
|Time Zone : (Brussels time)|
Topic DescriptionSpecific Challenge:
Disruptions in the operation of our countries’ infrastructure may put at risk the functioning of our societies and their economies. Such disruptions may result from many kinds of hazards and physical and/or cyber-attacks on installations and systems. Recent events demonstrate the increased interconnection among the impact of hazards, of the two kinds of attacks and, conversely, the usefulness for operators to combine cyber and physical security-solutions to protect installations of the critical infrastructure of Europe: A comprehensive, yet installation-specific approach is needed to secure the integrity of existing or future, public or private, connected and interdependent installations. Since the global financial crisis has imposed unprecedented budgetary restrictions on both the public and private sectors, new security solutions must be more efficient and cost-effective than the ones currently available.Scope:
Proposals should focus on one of the following critical infrastructures: Water Systems, Energy Infrastructure (power plants and distribution), Transport Infrastructure and means of transportation, Communication Infrastructure, Health Services, Financial Services.
Proposals should cover: prevention, detection, response, and in case of failure, mitigation of consequences (including novel installation designs) over the life span of the infrastructure, with a view to achieving the security and resilience of all functions performed by the installations, and of neighbouring populations and the environment. They should not only address in details all aspects of both physical (e.g. bombing, plane or drone overflights and crashes, spreading of fires, floods, seismic activity, space radiations, etc.) and cyber threats and incidents, but also systemic security management issues and the combinations of physical and cyber threats and incidents, their interconnections, and their cascading effects. Innovative methods should be proposed for sharing information with the public in the vicinity of the installations, and the protection of rescue teams, security teams and monitoring teams.
Only the installations not covered in 2016 will remain eligible in 2017. A list of topics that remain eligible in 2017 will be published in due time in the section "Topic Conditions & Documents" for this topic on the Participant Portal.
The participation of SMEs is strongly encouraged.
In line with the EU's strategy for international cooperation in research and innovation international cooperation is encouraged, and in particular with international research partners involved in ongoing discussions and workshops, with the European Commission. Legal entities established in countries not listed in General Annex A and international organisations will be eligible for funding only when the Commission deems participation of the entity essential for carrying out the action.
The outcome of the proposal is expected to lead to development up to Technology Readiness Level (TRL) 7; please see part G of the General Annexes.
Indicative budget: The Commission considers that proposals requesting a contribution from the EU of € 8million would allow this topic to be addressed appropriately. Nonetheless this does not preclude the submission and selection of proposals requesting other amounts.
A maximum of one project will be selected per critical infrastructure listed in the “Scope” section of this topic over the 2016-2017 period.Expected Impact:
- State-of-the-art analysis of physical/cyber detection technologies and risk scenarios, in the context of a specific critical infrastructure.
- Analysis of both physical and cyber vulnerabilities of a specific critical infrastructure, including the combination of both real situation awareness and cyber situation awareness within the environment of the infrastructure.
- Innovative (novel or improved), integrated, and incremental solutions to prevent, detect, respond and mitigate physical and cyber threats to a specific Critical Infrastructure.
- Innovative approaches to monitoring the environment, to protecting and communicating with the inhabitants in the vicinity of the critical infrastructure.
- In situ demonstrations of efficient and cost-effective solutions.
- Security risk management plans integrating systemic and both physical and cyber aspects.
- Tools, concepts, and technologies for combatting both physical and cyber threats to a specific critical infrastructure.
- Where relevant, test beds for industrial automation and control system for critical infrastructure in Europe, to measure the performance of critical infrastructure systems, when equipped with cyber and physical security protective measures, against prevailing standards and guidelines
- Test results and validation of models of a specific critical infrastructure against physical and cyber threats.
- Establishment and dissemination throughout the relevant user communities of specific models for information sharing on incidents, threats and vulnerabilities with respect to both physical and cyber threats.
- Convergence of safety and security standards, and the pre-establishment of certification mechanisms.
Contributions to relevant sectorial frameworks or regulatory initiatives.
Topic conditions and documents
Please read carefully all provisions below before the preparation of your application.
Please note that this topic is planned to be opened also in 2017 with an indicative opening date of 01/03/2017 and an indicative deadline of 24/08/2017, subject to a separate financing decision for 2017.
- List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
Note also that a number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects (follow the links to China, Japan, Republic of Korea, Mexico, Russia, Taiwan).
- Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme, with the following exceptions: at least 2 operators of the chosen type of critical infrastructure operating in 2 countries must be beneficiaries (possibly, but not necessarily: coordinator) of the grant agreement and should be directly involved in the carrying out of the tasks foreseen in the grant. The participation of industry able to provide security solutions is required.
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
3.1 Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Submission and evaluation process: Guide to the submission and evaluation process
- Indicative timetable for evaluation and grant agreement:
Information on the outcome of single-stage evaluation: maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
- Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Specific provisions and funding rates
Standard proposal template
Standard evaluation form
H2020 General MGA -Multi-Beneficiary
Annotated Grant Agreement
- Additional provisions:
Horizon 2020 budget flexibility
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply.
Financial support to Third Parties – where a topic description foresees financial support to Third Parties, these provisions apply.
- Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
- Additional documents:
H2020 Work Programme 2016-17: Introduction
H2020 Work Programme 2016-17: Secure societies – protecting freedom and security of Europe and its citizens
H2020 Work Programme 2016-17: Dissemination, Exploitation and Evaluation
H2020 Work Programme 2016-17: General Annexes
Legal basis: Horizon 2020 - Regulation of Establishment
Legal basis: Horizon 2020 Rules for Participation
Legal basis: Horizon 2020 Specific Programme
To access the Electronic Submission Service of the topic, please select the type of action that is most relevant to your proposal from the list below and click on the 'Start Submission' button. You will then be asked to confirm your choice of the type of action and topic, as these cannot be changed in the submission system. Upon confirmation you will be linked to the correct entry point.
To access existing draft proposals for this topic, please login to the Participant Portal and select the My Proposals page of the My Area section.
|Type of Action||Innovation action [IA]|
|Topic||Prevention, detection, response and mitigation of the combination of physical and cyber threats to the critical infrastructure of Europe. - CIP-01-2016-2017|
|Guidance on proposal submission:||H2020 online manual|
H2020 Online Manual your online guide on the procedures from proposal submission to managing your grant.
Participant Portal FAQ – Submission of proposals.
National Contact Points (NCP) - contact your NCP for further assistance.
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
IT Helpdesk- contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
Ethics – for compliance with ethical issues, see the Participant Portal and Science and Society Portal
European IPR Helpdesk assists you on intellectual property issues
CEN and CENELEC, the European Standards Organisations, advise you how to tackle standardisation in your project proposal. Contact CEN-CENELEC Research Helpdesk at email@example.com.
The European Charter for Researchers and the Code of Conduct for their recruitment
Partner Search Services help you find a partner organisation for your proposal