ITEA is the Eureka Cluster on software innovation
ITEA is the Eureka Cluster on software innovation
CySAB header

ITEA Cyber Security Advisory Board

To create a dialogue between Cyber Security customers and innovative Cyber Security technology providers, ITEA has established the Cyber Security Advisory Board.

This Advisory Board will serve its members to share immediate needs to experts of technologies in the ITEA Community, receive advice on the innovation and digital technology trends regularly, validate and shape any potential Cyber Security products that are being developed in an ITEA project, access the newest products that are developed in ITEA projects and discuss issues with other Cyber Security customers.

This Advisory Board will serve the ITEA Community to understand the urgent needs of Cyber Security, validate their potential products that are developed in ITEA projects and their features at an early stage and exploit their products to Cyber Security customers at the end of an ITEA project

The aim of the CySAB portal is to bring the Cyber Security challenges and innovative Cyber Security-related solutions of the CySAB members and the ITEA Community together in one place.

By clicking on the buttons above, you will be redirected directly to this part of the website.

Participating CySAB organisations



Tomasz Grabowski

Armengaud Innovate GmbH

Eric Armengaud


Ömer Faruk Tuna

Ford Otosan

Safa Çalışkan

Koç Finansman A.Ş

Zühal Dilek Ataman

PAL Robotics

Francesco Ferro


Johan Tenggren

Siemens AG

Andres Gonzalez Guilarte

Signify Netherlands B.V.

Sandeep Kumar

Turkcell Teknoloji

Emin Islam Tatli

Vitarex Studio Ltd

Gabor Gulyas

Cyber Security challenges

The ITEA CySAB meets twice a year: one meeting focuses on sharing the needs and challenges of the customers, and the second meeting focuses on sharing Cyber Security innovations resulting from the ITEA RD&I Community. The challenges shared in the first meeting are gathered in a report:

Latest Cyber Security-related news

Find an overview of all Cyber security-related news in the news overview.

Cyber Security solutions e-Catalogue

If you wish to promote your Cyber security products / services that (partly) result from an ITEA project on this portal, please fill in the following form and send it to
CASPer is a set of tools and databases supporting MiCA, DORA and other cryptocurrency-related regulations across EU. CASPer contains a reputation database of well-known cryptocurrency asset service providers, which can be used to check their legal status, used IBAN accounts, blockchain activity, etc. By the end of DEFRAUDify project, CASPer will also include a risk-scoring system to perform due diligence on cryptocurrency transactions, addresses and clusters.
COINOMON (COIN MONitoring tool) is software which enables its user to conduct cryptocurrency forensics. COINOMON combines the functionality of a blockchain explorer, a linkage analysis system and a curated database of (meta)data from the cryptocurrency ecosystem.
Unique features compared to the products by competition:
1) on-premises installation;
2) free API for integration with other tools/services;
3) OSINT and network intelligence enhancing information about address/cluster (meta)data.
ENTA Solution
More than 80% of Internet traffic is now encrypted. This is a positive development for end users and organizations, providing them with data privacy. Encrypted traffic renders much of the existing tool-chains for cybersecurity useless as the ability to examine traffic contents is lost.

This solution allows to detect cyber-attacks hiding in encrypted traffic. Specifically, this solution covers:
• Detect rogue IoT devices
• Detect cyberattacks
FirmwareCheck is a tool for automated dynamic security analysis of firmware images generated by buildroot. Running in a CI-pipeline, it allows developers to identify security risks while developing IoT-firmware. FirmwareCheck emulates firmware using QEMU. Firmware is scanned for typical IoT security issues including:
- Outdated components (CVEs)
- Open (debug) ports
- Default passwords or anonymous logins
- Processes running as root
- Executables that can be used to get a reverse shell on a device
Irdeto Keys & Credentials
Irdeto Keys & Credentials is a managed security service for the complete lifecycle of trusted identities, secrets, and secured firmware for connected embedded products. It provides long-term security rooted in silicon for devices such as set-top boxes, routers, engine control units, smart grid modules, and medical devices. A flexible, scalable, and customizable solution is provided with cloud services, on-prem installations and dedicated physical keying centres with staffed personnel.
PRIGM Hardware-based cyber resilience solution
PRIGM, a high-throughput Hardware Security Module, integrated with high-performance secure IoT gateways and secure authentication tokens present a hardware-based cyber-physical resilience solution stack. The solutions create point-to-point security between any node pairs in a cyber-physical system.

Find an overview of all Cyber Security-related solutions in the solutions overview.

ITEA Cyber Security projects

Safety and Security is one of the main challenges of ITEA and therefore there are many ITEA projects solving different Safety and Security challenges, including Cyber Security. Below you can find more information about these Cyber Security-related ITEA projects:

For an overview of all Smart City-related projects, go to the full project list.

Cyber Security events

Cyber Security & Cloud Expo Europe 2024

Cyber Security & Cloud Expo Europe 2024

01-02 October 2024
NLD, Amsterdam

Cyber Security & Cloud Expo is the leading event for Zero Trust, Threat Detection & Response, Training, Talent & Culture, Identity & Access Management, Application Security, and Data Security.

Global Cyber Conference (GCC)

Global Cyber Conference (GCC)

26-27 November 2024
CHE, Zürich

The Global Cyber Conference (GCC) is a leading international cybersecurity and privacy event gathering an audience of senior cybersecurity stakeholders, decision-makers, public authorities, and academia. It provides key decision-makers a networking and learning platform to gain a shared understanding of what needs to be done to strengthen cyber resilience.

For an overview of all Cyber Security-related events, go to the full event list.

Part of a bigger story

The ultimate goal is of the Cyber Security Advisory Board is to create a dialogue between Cyber Security customers and new Cyber Security technology developers

ITEA Call timeline

Are you interested in the Cyber Security Advisory Board?

Contact us at!