IDUNN | A Cognitive Detection System for Cybersecure Operational Technologies

Summary
Data is becoming the core engine of businesses. Data allows extracting, exchanging and sharing value out of the myriad of production and service chains that are no longer under a centralised distribution. As a result, an IT and OT convergence based on the integration of multiple ICT systems will transform market dynamics that present specific security challenges in a context of ever-accelerating change in terms of the threat landscape, attack surface, ecosystems, solutions and regulation.

IDUNN’s main objective will focus on adding this trust ingredient to any business by making its ICT systems resilience to cyber-attacks. To achieve that, IDUNN will create a security shield in the form of tools, methodologies, microservices and initial standards compatible with any ICT supply chain. IDUNN will demonstrate a secure Continuity Plan for ICT based organisations by creating and validating a unique Cognitive Detection System for Cybersecure Operational Technologies. Faced with a possible incident, IDUNN will know how to act quickly to alleviate it, and in turn generate a cognitive learning process, which reduces human intervention and provides forecasting capabilities. In this respect, IDUNN will be capable of learning to protect themselves from new threats since they are constantly updated. IDUNN project will develop a complete integrated solution, modular and adaptative to different scenarios. Only when ICT systems behave securely, digital trust will be achieved.

The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all, (iv) will have a crucial impact in the productivity of any businesses that make use of these secured ICT chains by ensuring that all technologies, services, and tools are defined to guarantee the continuation of the business, providing reasonable effective security and trust for the daily operations.
Results, demos, etc. Show all and search (22)
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/101021911
Start date: 01-09-2021
End date: 31-08-2024
Total budget - Public funding: 5 158 995,00 Euro - 4 514 407,00 Euro
Cordis data

Original description

Data is becoming the core engine of businesses. Data allows extracting, exchanging and sharing value out of the myriad of production and service chains that are no longer under a centralised distribution. As a result, an IT and OT convergence based on the integration of multiple ICT systems will transform market dynamics that present specific security challenges in a context of ever-accelerating change in terms of the threat landscape, attack surface, ecosystems, solutions and regulation.

IDUNN’s main objective will focus on adding this trust ingredient to any business by making its ICT systems resilience to cyber-attacks. To achieve that, IDUNN will create a security shield in the form of tools, methodologies, microservices and initial standards compatible with any ICT supply chain. IDUNN will demonstrate a secure Continuity Plan for ICT based organisations by creating and validating a unique Cognitive Detection System for Cybersecure Operational Technologies. Faced with a possible incident, IDUNN will know how to act quickly to alleviate it, and in turn generate a cognitive learning process, which reduces human intervention and provides forecasting capabilities. In this respect, IDUNN will be capable of learning to protect themselves from new threats since they are constantly updated. IDUNN project will develop a complete integrated solution, modular and adaptative to different scenarios. Only when ICT systems behave securely, digital trust will be achieved.

The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all, (iv) will have a crucial impact in the productivity of any businesses that make use of these secured ICT chains by ensuring that all technologies, services, and tools are defined to guarantee the continuation of the business, providing reasonable effective security and trust for the daily operations.

Status

SIGNED

Call topic

SU-DS02-2020

Update Date

27-10-2022
Images
No images available.
Geographical location(s)