To create a dialogue between Cyber Security customers and innovative Cyber Security technology providers,
ITEA has established the Cyber Security Advisory Board.
This Advisory Board will serve its members to share immediate needs to experts of technologies in the ITEA
Community, receive advice on the innovation and digital technology trends regularly, validate and shape any
potential Cyber Security products that are being developed in an ITEA project, access the newest products that are
developed in ITEA projects and discuss issues with other Cyber Security customers.
This Advisory Board will serve the ITEA Community to understand the urgent needs of Cyber Security, validate their
potential products that are developed in ITEA projects and their features at an early stage and exploit their
products to Cyber Security customers at the end of an ITEA project
The aim of the CySAB portal is to bring the Cyber Security challenges and innovative Cyber Security-related solutions
of the CySAB members and the ITEA Community together in one place.
The ITEA CySAB meets twice a year: one meeting focuses on sharing the needs and challenges of the customers, and the
second meeting focuses on sharing Cyber Security innovations resulting from the ITEA RD&I Community. The
challenges shared in the first meeting are gathered in a report:
Find an overview of all Cyber security-related news in the news overview.
Cyber Security solutions e-Catalogue
If you wish to promote your Cyber security products / services that (partly) result from an ITEA project on this portal, please fill in the following form and send it to mathijs.van.dijk@itea4.org.
CASPer
CASPer is a set of tools and databases supporting MiCA, DORA and other cryptocurrency-related regulations across EU. CASPer contains a reputation database of well-known cryptocurrency asset service providers, which can be used to check their legal status, used IBAN accounts, blockchain activity, etc. By the end of DEFRAUDify project, CASPer will also include a risk-scoring system to perform due diligence on cryptocurrency transactions, addresses and clusters.
CASPer
Description
CASPer is a set of tools and databases supporting MiCA, DORA and other cryptocurrency-related regulations across EU. CASPer contains a reputation database of well-known cryptocurrency asset service providers, which can be used to check their legal status, used IBAN accounts, blockchain activity, etc. By the end of DEFRAUDify project, CASPer will also include a risk-scoring system to perform due diligence on cryptocurrency transactions, addresses and clusters.
Targeted customers
Banks
FinTech companies
Cryptocurrency service providers
Referenced customers
So far none but let’s hope that DEFRAUDify partner Bunq will adopt it
COINOMON (COIN MONitoring tool) is software which enables its user to conduct cryptocurrency forensics. COINOMON combines the functionality of a blockchain explorer, a linkage analysis system and a curated database of (meta)data from the cryptocurrency ecosystem.
Unique features compared to the products by competition:
1) on-premises installation;
2) free API for integration with other tools/services;
3) OSINT and network intelligence enhancing information about address/cluster (meta)data.
COINOMON
Description
COINOMON (COIN MONitoring tool) is software which enables its user to conduct cryptocurrency forensics. COINOMON combines the functionality of a blockchain explorer, a linkage analysis system and a curated database of (meta)data from the cryptocurrency ecosystem.
Unique features compared to the products by competition:
on-premises installation;
free API for integration with other tools/services;
OSINT and network intelligence enhancing information about address/cluster (meta)data.
More than 80% of Internet traffic is now encrypted. This is a positive development for end users and organizations, providing them with data privacy. Encrypted traffic renders much of the existing tool-chains for cybersecurity useless as the ability to examine traffic contents is lost.
This solution allows to detect cyber-attacks hiding in encrypted traffic. Specifically, this solution covers:
• Detect rogue IoT devices
• Detect cyberattacks
ENTA Solution
Description
More than 80% of Internet traffic is now encrypted. This is a positive development for end users and organizations, providing them with data privacy. Encrypted traffic renders much of the existing tool-chains for cybersecurity useless as the ability to examine traffic contents is lost.
This solution allows to detect cyber-attacks hiding in encrypted traffic. Specifically, this solution covers:
• Detect rogue IoT devices
• Detect cyberattacks
Targeted customers
Security Operation Centres (SOCs)
Large enterprises with internal Cybersecurity department
IT Integrators (IT Consulting companies)
Referenced customers
ENTA Solution will be available by the end of the project, that is by 2025
FirmwareCheck is a tool for automated dynamic security analysis of firmware images generated by buildroot. Running in a CI-pipeline, it allows developers to identify security risks while developing IoT-firmware. FirmwareCheck emulates firmware using QEMU. Firmware is scanned for typical IoT security issues including:
- Outdated components (CVEs)
- Open (debug) ports
- Default passwords or anonymous logins
- Processes running as root
- Executables that can be used to get a reverse shell on a device
FirmwareCheck
Description
FirmwareCheck is a tool for automated dynamic security analysis of firmware images generated by buildroot. Running in a CI-pipeline, it allows developers to identify security risks while developing IoT-firmware. FirmwareCheck emulates firmware using QEMU. Firmware is scanned for typical IoT security issues including:
Outdated components (CVEs)
Open (debug) ports
Default passwords or anonymous logins
Processes running as root
Executables that can be used to get a reverse shell on a device
Irdeto Keys & Credentials is a managed security service for the complete lifecycle of trusted identities, secrets, and secured firmware for connected embedded products. It provides long-term security rooted in silicon for devices such as set-top boxes, routers, engine control units, smart grid modules, and medical devices. A flexible, scalable, and customizable solution is provided with cloud services, on-prem installations and dedicated physical keying centres with staffed personnel.
Irdeto Keys & Credentials
Description
Irdeto Keys & Credentials is a managed security service for the complete lifecycle of trusted identities, secrets, and secured firmware for connected embedded products. It provides long-term security rooted in silicon for devices such as set-top boxes, routers, engine control units, smart grid modules, and medical devices. A flexible, scalable, and customizable solution is provided with cloud services, on-prem installations and dedicated physical keying centres with staffed personnel.
PRIGM, a high-throughput Hardware Security Module, integrated with high-performance secure IoT gateways and secure authentication tokens present a hardware-based cyber-physical resilience solution stack. The solutions create point-to-point security between any node pairs in a cyber-physical system.
PRIGM Hardware-based cyber resilience solution
Description
PRIGM, a high-throughput Hardware Security Module, integrated with high-performance secure IoT gateways and secure authentication tokens present a hardware-based cyber-physical resilience solution stack. The solutions create point-to-point security between any node pairs in a cyber-physical system.
Targeted customers
Data centres, HPCs, cloud providers
Financial institutions, banks
Cyber-physical and autonomous system integrators
Referenced customers
The certification and contracting phase is still ongoing with 3 customers from the automotive, ICT and logistics domains.
Find an overview of all Cyber Security-related solutions in the solutions
overview.
ITEA Cyber Security projects
Safety and Security is one of the main challenges of ITEA and therefore there are many ITEA projects solving
different Safety and Security challenges, including Cyber Security. Below you can find more information about these
Cyber Security-related ITEA projects:
The Global Cyber Conference (GCC) is a leading international cybersecurity and privacy event gathering an audience of senior cybersecurity stakeholders, decision-makers, public authorities, and academia. It provides key decision-makers a networking and learning platform to gain a shared understanding of what needs to be done to strengthen cyber resilience.
For an overview of all Cyber Security-related events, go to the full event
list.
Part of a bigger story
The ultimate goal is of the Cyber Security Advisory Board is to create a dialogue between Cyber Security customers
and new Cyber Security technology developers
As outcome of the CySAB meetings a Cyber Security challenges report will be written, that will be shared with
the ITEA RD&I Community.
The ITEA Community will pick up the challenges and create project ideas and corresponding project that will be
shared in the ITEA Project idea tool. CySAB members are invited to check out these ideas and join those of their
interest as use case providers.
These Cyber Security-related project ideas and their corresponding consortia can be further defined during the
ITEA Project Outline (PO) Preparation Days in September. CySAB members are invited to particpate in this event.
Cyber Security-related project proposals can be submitted in the upcoming ITEA Call for projects in November.
Successful Cyber Security-related proposals will receive a label in March of the next year and could be funded
and start by the end of that year.
Are you interested in the Cyber Security Advisory Board?