Up to \u20ac120,000 per project<\/strong><\/p>\n[\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” locked=”off” global_colors_info=”{}”]<\/p>\n
Click Here to Apply<\/h3>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp1″ _builder_version=”4.26.0″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” link_option_url=”https:\/\/www.f6s.com\/dynamic-risk-analysis-dra-assessment\/apply” link_option_url_new_window=”on” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset2″ box_shadow_color=”RGBA(255,255,255,0)” global_colors_info=”{}” border_color_all__hover=”#8B68EE” border_color_all__hover_enabled=”on|hover” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”on|hover” transform_styles__hover_enabled=”on|hover” transform_scale__hover=”105%|105%” transform_scale__hover_enabled=”on|hover” transform_translate__hover_enabled=”on|desktop” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2025\/01\/2.Risk-Assessment.png” title_text=”2.Risk-Assessment” align=”center” _builder_version=”4.26.0″ _module_preset=”default” height=”220px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n
Topic 2 | Advanced Risk Assessment Using the Dynamic Risk Analysis (DRA) functionality<\/h3>\n [\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
This topic invites applicants to perform a comprehensive risk assessment leveraging CyberSecDome’s Dynamic Risk Analysis (DRA) tool. Projects should focus on evaluating interdependencies among assets, quantifying potential threat impacts, and providing detailed insights into system vulnerabilities. Proposals should include a comprehensive list of assets to be tested, methodologies for dynamic analysis, and actionable recommendations for risk mitigation.<\/p>\n
Up to \u20ac35,000 per project<\/strong><\/p>\nMultiple Applications Allowed\u00a0<\/span><\/strong><\/p>\n[\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” locked=”off” global_colors_info=”{}”]<\/p>\n
Click Here to Apply<\/h3>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp1″ _builder_version=”4.26.0″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” link_option_url=”https:\/\/www.f6s.com\/incident-investigation-response\/apply” link_option_url_new_window=”on” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset2″ box_shadow_color=”RGBA(255,255,255,0)” global_colors_info=”{}” border_color_all__hover=”#8B68EE” border_color_all__hover_enabled=”on|hover” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”on|hover” transform_styles__hover_enabled=”on|hover” transform_scale__hover=”105%|105%” transform_scale__hover_enabled=”on|hover” transform_translate__hover_enabled=”on|desktop” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2025\/01\/3.Incident-Investigation.png” title_text=”3.Incident-Investigation” align=”center” _builder_version=”4.26.0″ _module_preset=”default” height=”220px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n
Topic 3 | Comprehensive Incident Investigation and Response<\/h3>\n [\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
This topic addresses the end-to-end process of incident investigation and response, from log capture and intrusion detection to automated incident analysis and mitigation. Proposals should demonstrate integration of multiple CyberSecDome functionalities, such as SIEM, Prophecy, FVT, and adaptive response mechanisms. Projects should also provide feedback mechanisms for continuous system improvement.<\/p>\n
Up to \u20ac55,000 per project<\/strong><\/p>\nMultiple Applications Allowed\u00a0<\/span><\/strong><\/p>\n[\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” locked=”off” global_colors_info=”{}”]<\/p>\n
Click Here to Apply<\/h3>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp1″ _builder_version=”4.26.0″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” link_option_url=”https:\/\/www.f6s.com\/ai-powered-penetration-testing\/apply” link_option_url_new_window=”on” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset2″ box_shadow_color=”RGBA(255,255,255,0)” global_colors_info=”{}” border_color_all__hover=”#8B68EE” border_color_all__hover_enabled=”on|hover” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”on|hover” transform_styles__hover_enabled=”on|hover” transform_scale__hover=”105%|105%” transform_scale__hover_enabled=”on|hover” transform_translate__hover_enabled=”on|desktop” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2025\/01\/4.Penetration-Testing.png” title_text=”4.Penetration-Testing” align=”center” _builder_version=”4.26.0″ _module_preset=”default” height=”220px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n
Topic 4 | AI-Driven Automated Penetration Testing<\/h3>\n [\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
This topic seeks proposals that focus on testing CyberSecDome’s automated penetration testing functionalities. Applicants will evaluate AI-driven attack modeling and simulation tools, validating their ability to identify vulnerabilities and assess system resilience. Proposals should include clear testing plans and agreement to operate within CyberSecDome’s controlled infrastructure environment.<\/p>\n
Up to \u20ac20,000 per project<\/strong><\/p>\nMultiple Applications Allowed\u00a0<\/span><\/strong><\/p>\n[\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” locked=”off” global_colors_info=”{}”]<\/p>\n
Click Here to Apply<\/h3>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ module_id=”wp1″ _builder_version=”4.26.0″ _module_preset=”default” width=”70%” max_width=”1920px” custom_margin=”80px||80px||true|false” custom_padding=”2%|2%|2%|2%|true|true” link_option_url=”https:\/\/www.f6s.com\/security-dataset-creation-for-ai-tools\/apply” link_option_url_new_window=”on” border_width_all=”2px” border_color_all=”#000000″ box_shadow_style=”preset2″ box_shadow_color=”RGBA(255,255,255,0)” global_colors_info=”{}” border_color_all__hover=”#8B68EE” border_color_all__hover_enabled=”on|hover” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”on|hover” transform_styles__hover_enabled=”on|hover” transform_scale__hover=”105%|105%” transform_scale__hover_enabled=”on|hover” transform_translate__hover_enabled=”on|desktop” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”][et_pb_column type=”1_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”http:\/\/sites.itml.gr:9988\/wp-content\/uploads\/2025\/01\/5.Tool-Training.png” title_text=”5.Tool-Training” align=”center” _builder_version=”4.26.0″ _module_preset=”default” height=”220px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.23″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” global_colors_info=”{}”]<\/p>\n
Topic 5 | Generation of Security-Related Datasets for AI-Enhanced Tools Training<\/h3>\n [\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
This topic focuses on the generation of security-related datasets through simulation of cyber-attack scenarios. Proposals should describe methods for creating high-quality datasets covering a broad spectrum of threats and vulnerabilities. These datasets will contribute to the training and validation of AI models within CyberSecDome. Projects must ensure datasets are comprehensive, anonymized, and compliant with ethical and legal standards.<\/p>\n
Up to \u20ac10,000 per project<\/strong><\/p>\nMultiple Applications Allowed\u00a0<\/span><\/strong><\/p>\n[\/et_pb_text][et_pb_text _builder_version=”4.26.0″ _module_preset=”default” header_3_font=”|600|||||||” locked=”off” global_colors_info=”{}”]<\/p>\n
Click Here to Apply<\/h3>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
CyberSecDome Open Call Application PageTopics for Round 1:Round 1 of the CyberSecDome Open Call focuses on specific cybersecurity challenges and use cases that align with the project\u2019s overarching goals. Applicants are invited to submit proposals addressing one or more of the following topics. Each topic reflects a critical area of cybersecurity, providing an opportunity for […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1835","page","type-page","status-publish","hentry"],"yoast_head":"\n
Open Call Application page - CyberSecDome<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n