ITEA Cyber Security Advisory Board
To create a dialogue between Cyber Security customers innovative Cyber Security technology providers,
ITEA has established the Cyber Security Advisory Board.
This Advisory Board will serve its members to share immediate needs to experts of technologies in the ITEA
Community, receive advice on the innovation and digital technology trends regularly, validate and shape any
potential Cyber Security products that are being developed in an ITEA project, access the newest products that are
developed in ITEA projects and discuss issues with other Cyber Security customers.
This Advisory Board will serve the ITEA Community to understand the urgent needs of Cyber Security, validate their
potential products that are developed in ITEA projects and their features at an early stage and exploit their
products to Cyber Security customers at the end of an ITEA project
The aim of the CySAB portal is to bring the Cyber Security challenges and innovative Cyber Security-related solutions
of the CySAB members and the ITEA Community together in one place.
By clicking on the buttons above, you will be redirected directly to this part of the
website.
Participating CySAB organisations
Members
Cyber Security challenges
The ITEA CySAB meets twice a year: one meeting focuses on sharing the needs and challenges of the customers, and the
second meeting focuses on sharing Cyber Security innovations resulting from the ITEA RD&I Community. The
challenges shared in the first meeting are gathered in a report:
Latest Cyber Security-related news
Find an overview of all Cyber security-related news in the news overview.
Cyber Security solutions e-Catalogue
CASPer
CASPer is a set of tools and databases supporting MiCA, DORA and other cryptocurrency-related regulations across EU. CASPer contains a reputation database of well-known cryptocurrency asset service providers, which can be used to check their legal status, used IBAN accounts, blockchain activity, etc. By the end of DEFRAUDify project, CASPer will also include a risk-scoring system to perform due diligence on cryptocurrency transactions, addresses and clusters.
- Description
CASPer is a set of tools and databases supporting MiCA, DORA and other cryptocurrency-related regulations across EU. CASPer contains a reputation database of well-known cryptocurrency asset service providers, which can be used to check their legal status, used IBAN accounts, blockchain activity, etc. By the end of DEFRAUDify project, CASPer will also include a risk-scoring system to perform due diligence on cryptocurrency transactions, addresses and clusters.
- Targeted customers
- Banks
- FinTech companies
- Cryptocurrency service providers
- Referenced customers
So far none but let’s hope that DEFRAUDify partner Bunq will adopt it
- Conditions of use
open-source
- Contact email
- vesely@netsearch.cz
- ITEA related project(s)
- 18007 DEFRAUDify
- Websites
- https://www.netsearch.cz/products/casper
COINOMON
COINOMON (COIN MONitoring tool) is software which enables its user to conduct cryptocurrency forensics. COINOMON combines the functionality of a blockchain explorer, a linkage analysis system and a curated database of (meta)data from the cryptocurrency ecosystem.
Unique features compared to the products by competition:
1) on-premises installation;
2) free API for integration with other tools/services;
3) OSINT and network intelligence enhancing information about address/cluster (meta)data.
- Description
COINOMON (COIN MONitoring tool) is software which enables its user to conduct cryptocurrency forensics. COINOMON combines the functionality of a blockchain explorer, a linkage analysis system and a curated database of (meta)data from the cryptocurrency ecosystem.
Unique features compared to the products by competition:
- on-premises installation;
- free API for integration with other tools/services;
- OSINT and network intelligence enhancing information about address/cluster (meta)data.
- Targeted customers
- Law enforcement agencies
- Banks
- Regulatory entities
- Referenced customers
Unnamed law enforcement agencies
- Conditions of use
proprietary license
- Contact email
- vesely@netsearch.cz
- ITEA related project(s)
- 18007 DEFRAUDify
ENTA Solution
More than 80% of Internet traffic is now encrypted. This is a positive development for end users and organizations, providing them with data privacy. Encrypted traffic renders much of the existing tool-chains for cybersecurity useless as the ability to examine traffic contents is lost.
This solution allows to detect cyber-attacks hiding in encrypted traffic. Specifically, this solution covers:
• Detect rogue IoT devices
• Detect cyberattacks
- Description
More than 80% of Internet traffic is now encrypted. This is a positive development for end users and organizations, providing them with data privacy. Encrypted traffic renders much of the existing tool-chains for cybersecurity useless as the ability to examine traffic contents is lost.
This solution allows to detect cyber-attacks hiding in encrypted traffic. Specifically, this solution covers:
• Detect rogue IoT devices
• Detect cyberattacks
- Targeted customers
- Security Operation Centres (SOCs)
- Large enterprises with internal Cybersecurity department
- IT Integrators (IT Consulting companies)
- Referenced customers
ENTA Solution will be available by the end of the project, that is by 2025
- Conditions of use
Service
- Contact email
- lredondo@mtp.es
- ITEA related project(s)
- 20020 ENTA
- Websites
- https://project-enta.com/
FirmwareCheck
FirmwareCheck is a tool for automated dynamic security analysis of firmware images generated by buildroot. Running in a CI-pipeline, it allows developers to identify security risks while developing IoT-firmware. FirmwareCheck emulates firmware using QEMU. Firmware is scanned for typical IoT security issues including:
- Outdated components (CVEs)
- Open (debug) ports
- Default passwords or anonymous logins
- Processes running as root
- Executables that can be used to get a reverse shell on a device
- Description
FirmwareCheck is a tool for automated dynamic security analysis of firmware images generated by buildroot. Running in a CI-pipeline, it allows developers to identify security risks while developing IoT-firmware. FirmwareCheck emulates firmware using QEMU. Firmware is scanned for typical IoT security issues including:
- Outdated components (CVEs)
- Open (debug) ports
- Default passwords or anonymous logins
- Processes running as root
- Executables that can be used to get a reverse shell on a device
- Targeted customers
- Providers/vendors of IoT Systems
- Security consulting companies
- Conditions of use
Open source: Apache 2.0 License
- Contact email
- office@otaris.de
- Websites
- https://github.com/OTARIS/FirmwareCheck
Irdeto Keys & Credentials
Irdeto Keys & Credentials is a managed security service for the complete lifecycle of trusted identities, secrets, and secured firmware for connected embedded products. It provides long-term security rooted in silicon for devices such as set-top boxes, routers, engine control units, smart grid modules, and medical devices. A flexible, scalable, and customizable solution is provided with cloud services, on-prem installations and dedicated physical keying centres with staffed personnel.
- Description
Irdeto Keys & Credentials is a managed security service for the complete lifecycle of trusted identities, secrets, and secured firmware for connected embedded products. It provides long-term security rooted in silicon for devices such as set-top boxes, routers, engine control units, smart grid modules, and medical devices. A flexible, scalable, and customizable solution is provided with cloud services, on-prem installations and dedicated physical keying centres with staffed personnel.
- Targeted customers
- Communication Service Providers
- Automotive and Railway Device Manufacturers
- Medical Device Manufacturers
- Referenced customers
- Charter Communications
- Knorr-Bremse GmbH
- CharIN e. V.
- Conditions of use
Managed Service
- Contact email
- K&C@irdeto.com
- ITEA related project(s)
- 17005 SCRATCh
- Websites
- https://irdeto.com/connected-transport/keys-credentials/
PRIGM Hardware-based cyber resilience solution
PRIGM, a high-throughput Hardware Security Module, integrated with high-performance secure IoT gateways and secure authentication tokens present a hardware-based cyber-physical resilience solution stack. The solutions create point-to-point security between any node pairs in a cyber-physical system.
- Description
PRIGM, a high-throughput Hardware Security Module, integrated with high-performance secure IoT gateways and secure authentication tokens present a hardware-based cyber-physical resilience solution stack. The solutions create point-to-point security between any node pairs in a cyber-physical system.
- Targeted customers
- Data centres, HPCs, cloud providers
- Financial institutions, banks
- Cyber-physical and autonomous system integrators
- Referenced customers
- The certification and contracting phase is still ongoing with 3 customers from the automotive, ICT and logistics domains.
- Reference H2020 projects: Critical-Chains, Safety4Rails, Valu3S
- Conditions of use
PRIGM-as-a-Service over cloud
Hardware solution stack that can be deployed in any cyber-physical system
Licensing & consultancy
- Contact email
- alper.kanak@erarge.com.tr
- ITEA related project(s)
- 13016 C³PO
- 16026 BIMy
- 18008 TIoCPS
- Websites
- https://www.prigm.com.tr/
Find an overview of all Cyber Security-related solutions in the solutions
overview.
ITEA Cyber Security projects
Safety and Security is one of the main challenges of ITEA and therefore there are many ITEA projects solving
different Safety and Security challenges, including Cyber Security. Below you can find more information about these
Cyber Security-related ITEA projects:
For an overview of all Smart City-related projects, go to the full project list.
Cyber Security events
26-27 September 2023
NLD, Amsterdam
Cyber Security & Cloud Expo Europe will cover the impact the latest technologies have on many industries including manufacturing, transport, supply chain, government, legal sectors, financial services, energy, utilities, insurance, healthcare and retail.
For an overview of all Cyber Security-related events, go to the full event
list.
Part of a bigger story
The ultimate goal is of the Cyber Security Advisory Board is to create a dialogue between Cyber Security customers
and new Cyber Security technology developers
- As outcome of the CySAB meetings a Cyber Security challenges report will be written, that will be shared with
the ITEA RD&I Community.
- The ITEA Community will pick up the challenges and create project ideas and corresponding project that will be
shared in the ITEA Project idea tool. CySAB members are invited to check out these ideas and join those of their
interest as use case providers.
- These Cyber Security-related project ideas and their corresponding consortia can be further defined during the
ITEA Project Outline (PO) Preparation Days in September. CySAB members are invited to particpate in this event.
- Cyber Security-related project proposals can be submitted in the upcoming ITEA Call for projects in November.
- Successful Cyber Security-related proposals will receive a label in March of the next year and could be funded
and start by the end of that year.
Are you interested in the Cyber Security Advisory Board?
Contact us at info@itea4.org!