Privacy Policy

This Privacy Notice informs you about how the INTACT Consortium (hereinafter referred to as the “Consortium,” “we,” “us,” or “our”) collects and processes information about you, particularly your personal data. We assure you that this Privacy and Personal Data Protection Policy (“Policy”) fully complies with EU Regulation 679/2016 (GDPR) and any other relevant legislation.

The processing of personal data, such as name, address, or email address, is always in line with the General Data Protection Regulation (GDPR) and applicable country-specific data protection regulations. Through this Policy, we aim to inform the general public and concerned individuals about the nature, scope, and purpose of the personal data we collect, use, and process. Additionally, this Policy outlines the rights of data subjects.

As the data controller, the INTACT Consortium has implemented numerous technical and organizational measures to ensure the comprehensive protection of personal data processed through this website. 

 

Useful Definitions

  • Personal Data: Any information relating to an identified or identifiable natural person (‘data subject’). This includes, but is not limited to, names, identification numbers, location data, or online identifiers.

  • Personal Data Breach: A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access to personal data.

  • Controller: The natural or legal person (in this case, the INTACT Consortium) that determines the purposes and means of processing personal data.

  • Processor: A natural or legal person that processes personal data on behalf of the controller.

  • Processing: Any operation performed on personal data, such as collection, storage, use, or deletion.

  • Third Party: Any natural or legal person outside the INTACT Consortium who may process personal data under the controller’s authority.

  • Consent: Freely given, specific, informed, and unambiguous agreement by the data subject to the processing of their personal data.

The Controller

For the INTACT Horizon Project, the INTACT Consortium acts as the Data Controller when determining the purposes and means of processing personal data.

 

Principles We Adhere To

We are committed to adhering to the following GDPR principles (Article 5):

  1. Lawfulness, Fairness, and Transparency: Personal data is processed lawfully, fairly, and transparently.
  2. Purpose Limitation: Data is collected for specified, explicit, and legitimate purposes.
  3. Data Minimization: Only necessary and relevant data is collected.
  4. Accuracy: Data is kept accurate and up-to-date.
  5. Storage Limitation: Data is retained only for as long as necessary.
  6. Integrity and Confidentiality: Data is processed securely to prevent unauthorized access or loss.
  7. Accountability: We demonstrate compliance with these principles.

 

Collection of Personal Data

The INTACT Consortium collects personal data for the purposes of research and project activities. This includes:

  • When you contact us directly or indirectly (e.g., via the project website, email, or social media).

  • When you subscribe to our newsletter or fill out project-related forms.

  • When you participate in project events, workshops, or surveys (with your consent).

  • When you use the INTACT platform or interact with our website.

We do not transfer personal data to third parties outside the INTACT Consortium unless required by law or with your explicit consent.

 

Minors’ Personal Data

We do not collect or process minors’ personal data without verifiable parental consent in cases when we are able to control it. For example, it is not possible to control information that is communicated to us online. In any event, if we find that we have collected any personal information from a minor without verifiable parental consent (in accordance with Article 8 of the Regulation), we will immediately delete the information from our records. If you believe we may have collected information from a minor, please contact us.

 

Categories of Data Subjects

The categories of data subjects include:

  • Project partners and collaborators.

  • Website visitors and platform users.

  • Newsletter subscribers.

  • Social media users.

  • Participants in project events or surveys.

 

Types of Personal Data Collected

We may collect and process the following types of personal data:

  • Contact details (name, email, phone number, address).

  • Occupational information (job title, organization).

  • Data related to project activities (e.g., survey responses, event attendance).

  • Website usage data (e.g., cookies, IP addresses).

  • Photos or videos from events (with consent).

 

Purposes of Processing & Legal Basis

Personal data is processed based on the following legal grounds (Article 6 GDPR):

  1. Consent: When you subscribe to our newsletter, participate in events, or provide explicit consent.
  2. Contractual Obligations: When processing is necessary for project-related agreements.
  3. Legal Obligations: To comply with legal or regulatory requirements.
  4. Legitimate Interests: To improve our services, manage incidents, or ensure project success.

 

Retention Period

We store personal data for as long as it is required by the respective processing purpose and any other permitted linked purpose always within the project’s scope on completion of the project the data shall be stored for a period of 5 years after the completion of the project and in accordance to requirements by the European Commission.

Cookies are stored depending on their nature as you may be informed in our cookies policy linked to the present policy (please see below).

Personal data you disclose to us as users are stored for until the completion of the project.

Data that may be needed for our legitimate interests as a Controller shall be kept until the reason for storing such data ceases.

Specifically, for the data we process based on your consent (as an example for marketing), these are kept from obtaining the consent until it is revoked or there is no longer need to store it.

Information that is no longer necessary is safely destroyed or anonymised. We limit access to your personal data to those partners who need to use it for the specific purpose.

 

Data Security

We implement technical and organizational measures to protect personal data, including:

  • Restricted access to authorized personnel.

  • Secure storage and transmission of data.

  • Regular monitoring and updates to our security systems.

 

Data Disclosure

Personal data may be disclosed to:

  • Supervisory or public authorities (if required by law).

  • Auditors, legal advisors, or insurance providers (under confidentiality agreements).

  • Project partners (only for project-related purposes).

 

Territorial Scope

All personal data is processed within the European Economic Area (EEA).

 

Your Rights as a Data Subject

You have the right to be informed, the right of access to your personal data, the rights of rectification and erasure (in cases it is permitted), the right to restriction of processing, the right to data portability, the right to object. If processing is based on your consent, you may withdraw it at any time.

The right to be informed is exercised through this privacy and personal data protection notification. In some cases, it is also mentioned in documents – forms we are using.

We inform you that we are not using software of decision making solely based on automated processing including profiling.

Right of access: you have the right to obtain from us confirmation as to whether or not your personal data is being processed as well as other relevant information, and, where that is the case, access to your personal data.

Right of rectification: you have the right of rectification of your inaccurate personal data as well as to have incomplete personal data completed by providing a supplementary statement.

Note: Since it is not possible for us to be aware of any changes to your personal data if you do not inform us, please help us keep your information accurate by informing us of any changes to your personal information we do process.

Right to erasure (‘right to be forgotten’); we have to answer such right when:

  • Your personal data is no longer necessary in relation to the purposes for which we collected it;
  • Withdraw your consent on which the processing is based and where there is no other legal basis for the processing;
  • Your personal data has been unlawfully processed;
  • Personal data has to be erased for compliance with a legal obligation we are subject to;
  • Personal data has been collected in relation to the offer of information society services.

We reserve the right to refuse this right if the processing is necessary for compliance with any legal obligation, we are subject to, or for reasons of public interest, or for the foundation and exercise or support of our legal claims (according to Article 17 § 3).

Right to restriction of processing; you have the right to restriction of processing when:

  • You contest the accuracy of your personal data for a period enabling us to verify the accuracy of the personal data;
  • The processing is unlawful and you oppose the erasure of the personal data and request the restriction of their use instead;
  • We no longer need your personal data for the purposes of the processing, but it is required by you for the establishment, exercise or defense of legal claims;
  • You objected to processing pending the verification whether our legitimate grounds override those of yours.

Right to data portability: You have the right to receive your data in a structured, commonly used and machine-readable format and under an explicit request such data to be transferred to both, you and another natural or legal person who will process it.

Right to object: you have the right to object to the processing of your data at any time when the reason for the processing relates to direct marketing.

In the event that you make such request in a written or electronic form regarding any of the above rights, we will assess your request and respond within one month of its receipt, either for its satisfaction or to provide you with objective reasons preventing it from being satisfied, or, given the complexity of the request and the number of requests at the given time, request an extension of response for a further two months period (according to Article 12.3 of the Regulation).

The exercise of your rights is free of charge. Where requests from you are manifestly unfounded or excessive, in particular because of their repetitive character, we may refuse to answer or charge you an administrative fee.

If you are dissatisfied with the use of your data by us, or our response after exercising your rights, you have the right to lodge a complaint with a supervisory authority.

 

Personal Data Breach

In the event of a breach of the security and integrity of the personal data processed, we will take the following measures (in accordance with Article 33 and 34 of the Regulation in case we are the Controller) and we will:

  • Assess it in order to implement the appropriate procedures needed to limit the breach;
  • Examine the extent of the breach and the sensitivity of the data included;
  • Evaluate the risk and its impact on your rights and freedoms;
  • Endeavour to reduce as much as possible the damage that is or may be caused;
  • Notify within a time limit of 72 hours of becoming aware of the breach, the National Personal Data Protection Authority, if required;
  • Assess the impact on your privacy and take appropriate measures to prevent the repeating of the incident.

In the event we are the processor, we will inform the Controller as soon as possible.

 

Links to Other Websites

Our website may contain links to third-party sites. We are not responsible for their privacy practices. Please review their privacy policies before providing any personal data.

 

Cookies

For details on how we use cookies, please refer to our Cookies Policy.

 

 

Contact details with the Data Protection Authority

Additional information and terminology for the Regulation can be found at https://eur-lex.europa.eu/legal-content/EL/TXT/?uri=celex%3A32016R0679.

 

Contact Us

If at any time you want to contact us or make a request regarding your rights or any other matter relating to the protection of personal data you may contact the project’s email. 

 

Policy Updates

This Policy is effective as of 13/03/2025  and will be reviewed periodically. Updates will be posted on our website.
Last Updated: 13/03/2025

Short Description

Lancaster University is a leading research institution located in the northwest of England, known for its strong academic reputation and innovative research across various disciplines. It is recognized for its commitment to providing high-quality education, fostering interdisciplinary collaboration, and driving impactful research that addresses global challenges. With a diverse community of students, researchers, and staff, Lancaster University excels in fields such as science, engineering, social sciences, humanities, and business, offering a vibrant environment for learning and discovery. The university is also highly regarded for its contributions to industry partnerships and its commitment to sustainability and social responsibility.

Organization's Role in INTACT

In the INTACT project, ULANCS leads Task 3.1, focusing on defining unified Security-to-Everything Key Performance Indicators (KPIs) and heterogeneity sensing models. They develop mathematical methods that balance various performance metrics such as security, quality of service (QoS), energy consumption, and other factors. ULANCS collaborates with partners like NCSRD and AEGIS to build analytical tools that capture the runtime heterogeneity of IoT-to-Cloud networks. These models, encoded as Python applications, track the performance dynamics of different devices and network configurations. ULANCS also trains partners to parameterize these models for specific use cases, contributing to the project’s overall goal of optimizing security and resource management in complex systems.

https://www.lancaster.ac.uk/

This will close in 0 seconds

Short Description

AEGIS IT Research is a company focused on advancing research and development in the field of information technology, with an emphasis on cybersecurity, data protection, and AI-driven solutions. AEGIS conducts cutting-edge research in areas such as network security, threat detection, and the application of AI and machine learning to enhance security protocols. Their work includes developing innovative tools and methodologies for securing digital infrastructures, improving data privacy, and addressing emerging challenges in the rapidly evolving IT landscape. Through collaboration with industry partners, AEGIS contributes to the development of advanced cybersecurity technologies and solutions for various sectors.

Organization's Role in INTACT

AEGIS leads Task 3.2 in the INTACT project, where they are responsible for developing the Predictive Threat Intelligence Engine. This engine predicts and optimizes the distribution of Security Probes and Twinning Agents across the IoT-to-Cloud continuum, considering factors like computing resources, energy constraints, and end-user preferences. AEGIS utilizes game-driven optimization models, specifically multi-player Blotto/Stackelberg competitive game logic, to predict infrastructure defense capabilities and threats while optimizing resources for security purposes. They also lead the assessment of the game's feasibility, complexity, and prediction accuracy, working closely with other project partners to integrate the engine into real-world infrastructures.

https://aegisresearch.eu

This will close in 0 seconds

Short Description

The "Ygionomiki Periferia Thessalias & Stereas Elladas" (Health Region of Thessaly and Sterea Hellas) is a governmental organization in Greece responsible for overseeing and coordinating healthcare services across the Thessaly and Sterea Ellada regions. It works to improve public health by managing healthcare facilities, implementing health policies, and ensuring access to quality healthcare for residents. The organization focuses on the development of regional health systems, promoting preventive care, and enhancing the efficiency of healthcare delivery in the region, in alignment with national health strategies.

Organization's Role in INTACT

5YPE is involved in the INTACT project, contributing primarily to the development and implementation of cybersecurity solutions for critical infrastructure sectors. They are responsible for integrating and testing the project's technologies in real-world environments, such as healthcare, telecommunications, and transportation. 5YPE is specifically engaged in tasks related to the interactive dashboard, security service repository, and providing essential infrastructure for validating and demonstrating the cybersecurity solutions in pilot use cases. Their work ensures that the developed technologies meet the needs of the project’s stakeholders while adhering to data privacy, security, and ethical guidelines.

https://www.dypethessaly.gr/

This will close in 0 seconds

Short Description

Digital for Planet is a company focused on leveraging digital technologies to create innovative solutions that address environmental and sustainability challenges. The company uses data analytics, artificial intelligence (AI), and other digital tools to drive sustainable practices across various industries, helping businesses reduce their environmental impact and optimize resource management. By fostering the integration of cutting-edge technology with eco-friendly strategies, Digital for Planet aims to support the transition toward a more sustainable, low-carbon future.

Organization's role in INTACT

Digital for Planet (D4P) is leading two key tasks in the INTACT project. In Task 1.4, D4P focuses on identifying and ensuring compliance with ethical and legal requirements, particularly around data protection, management, and privacy, as well as adhering to frameworks like GDPR and AI regulations. They will develop a comprehensive Data Management Plan (DMP) to guide these efforts. In Task 6.1, D4P assesses the social impact of the INTACT technology, ensuring that the developed cybersecurity solutions are ethical, human-centric, and aligned with societal values. This involves gathering feedback from stakeholders and society to measure the project's impact on user experience, trust, and acceptability.

https://digital4planet.org

This will close in 0 seconds

Short Description

K3Y is a technology company focused on providing innovative cybersecurity and data protection solutions. With expertise in areas like identity management, secure authentication, and data encryption, K3Y aims to offer robust security measures for businesses and individuals. The company’s solutions are designed to address the growing challenges of digital security in an increasingly interconnected world, ensuring that organizations can protect their sensitive data and systems from evolving cyber threats.

Organization's Role in INTACT

K3Y is leading Task 4.3 in the INTACT project, focusing on developing Explainable AI (XAI) tools and human-factor awareness systems. They are creating an Assistant Virtual Agent (AVA) to enhance human-machine communication within the INTACT Dashboard, providing users with clear, simplified explanations of complex cybersecurity decisions. Additionally, K3Y is integrating cognitive AI and speech technologies to improve user awareness and guidance in building and assessing cybersecurity scenarios. They are also collaborating on the development of a CyberRange platform to emulate attack-defense scenarios, enabling users to test and simulate security models in a virtualized environment.

https://k3ylabs.com

This will close in 0 seconds

Short Description

UBITECH is a key participant in the INTACT project, contributing to the development of advanced AI-enabled solutions for cybersecurity and system optimization. They focus on integrating state-of-the-art technologies, including machine learning and reinforcement learning, to enhance intrusion detection systems (IDS) and penetration testing services. UBITECH plays a pivotal role in building tools and services that improve the realism of security simulations and provide valuable insights into system vulnerabilities. Their expertise supports the creation of robust and adaptable security frameworks that help safeguard IoT, Edge, and Cloud infrastructures within the project.

Organization's Role in INTACT

UBITECH plays a central role in the INTACT project by leading key tasks related to the development and operation of advanced testbeds for cybersecurity and predictive threat intelligence. They are responsible for creating and deploying a lab-based programming testbed (Task 2.4) to facilitate early-stage experimentation with distributed IoT-to-Cloud processes, zero-trust computing models, and AI-driven threat intelligence tools. Additionally, UBITECH is responsible for preparing the TRL7 operational testbed (Task 5.1) by integrating the outcomes from all partners and continuously upgrading their MAESTRO platform to support the unification of tools, data integration, and testing. This work ensures that all developments can be thoroughly tested, refined, and documented to support the project's objectives in enhancing cybersecurity and predictive defense mechanisms.

https://ubitech.eu/

This will close in 0 seconds

Short Description

Axon Logic is a technology company specializing in providing advanced solutions for the digital transformation of businesses. They focus on integrating cutting-edge technologies, including AI and machine learning, into various industries to enhance efficiency, improve decision-making, and optimize processes. Axon Logic’s expertise spans across developing software platforms, implementing data analytics solutions, and creating customized tools that address specific business challenges. Their innovative approach helps organizations harness the full potential of their data and technology infrastructure.

Organization's Role in INTACT

Axon Logic is leading Task 4.4 in the INTACT project, focusing on the development of an interactive dashboard and an Open Security Service Repository (OSSR). The task involves building a next-generation dashboard that integrates Human-in-the-Loop (HITL) options, enhanced by decentralized autonomous organization (DAO) protocols, to allow users to configure their service requirements, resolve system issues, and make optimal decisions across computing, security, and energy concerns. Additionally, Axon Logic is responsible for creating the OSSR, which will store and provide online access to INTACT's security and twinning services. This repository will be accessible via the dashboard and support seamless integration into Edge or Core infrastructures. Through these contributions, Axon Logic is enabling a user-friendly platform that combines explainable AI, security, and operational efficiency for both technical and non-technical users.

https://www.axonlogic.gr/

This will close in 0 seconds

Short Description

Montimage is a leading company specializing in advanced cybersecurity solutions, focusing on the development of tools and services for monitoring, analyzing, and securing complex network systems. With expertise in network traffic analysis, anomaly detection, and risk management, Montimage provides innovative solutions that help organizations protect their digital infrastructure from emerging cyber threats. The company combines deep technical knowledge with cutting-edge research in areas such as artificial intelligence, machine learning, and eBPF technology to deliver scalable, real-time security solutions for businesses across various industries.

Organization's Role in INTACT

Montimage leads Task 3.4 in the project, focusing on the development of an AI-enabled Attack Emulator integrated within the INTACT Toolbox. This emulator leverages deep learning techniques, including Generative Adversarial Networks (GANs), to train Intrusion Detection Systems (IDSs) and simulate realistic attack scenarios such as zero-day exploits, Advanced Persistent Threats (APTs), and Man-in-the-Middle (MITM) attacks. The emulator also includes configurable traffic models to replicate legitimate network activity across IoT, Edge, and Cloud environments. Additionally, Montimage contributes to the integration of AI-powered Penetration Testing services, enhancing simulation realism with a Modified Network Graph Model (MNPT) that incorporates social engineering elements. The outcomes of these efforts are key deliverables for the project.

https://www.montimage.com/

This will close in 0 seconds

Short Description

The Technical University of Crete (TUC) is a prominent academic institution located in Chania, Greece, known for its strong emphasis on research and innovation in various fields, including computer science, engineering, and information technology. TUC is recognized for its contributions to cutting-edge research in areas such as cybersecurity, AI, and IoT, with a focus on interdisciplinary approaches and real-world applications. The university collaborates with industry partners, government bodies, and international research projects, aiming to advance knowledge and technology while addressing societal challenges.

Organization's Role in INTACT

TUC (Technical University of Crete) plays a key role in the INTACT project, contributing to the development of security models, predictive threat intelligence, and AI-driven visualization tools. It is responsible for creating holistic KPI trade-offs and predictive models to optimize security in IoT-to-Cloud environments. TUC also helps build the Explainable AI (XAI) system, supporting human-machine interaction through the Assistant Virtual Agent (AVA) and integrating security features into the INTACT dashboard. Additionally, TUC participates in implementing real-world proof of concepts and assessing the societal and ethical impacts of the technology.

https://www.tuc.gr/el/archi

This will close in 0 seconds

Short Description

Pasiphae Lab operates as a research unit within the Electrical and Computer Engineering Department of the Hellenic Mediterranean University, situated in Heraklion, Crete, Greece. Established formally in 2003 as an extension of the Multimedia, Networks, and Communications Laboratory, Pasiphae Lab embodies a comprehensive mission encompassing academic, research, and development pursuits. In more detail, under the leadership of the Principal Investigator, Prof. Evangelos Markakis, the lab specializes in state-of-the-art research within the domain of Computer Networks, including Cybersecurity and Emergency Communications Networks. Aligned with the Digital European Strategy, our research endeavours focus on developing innovative digital solutions in the field. Additionally, with its robust track record in both EU-funded and national projects, Pasiphae Lab has played multifaceted roles ranging from software and application development to technical coordination. Finally, Pasiphae Lab actively engages in standardization activities with the European Telecommunications Standards Institute (ETSI) and the European Agency for Cybersecurity (ENISA). Its participation in their Task forces is geared towards updating guidelines for Emergency Communications Network Resilience and Preparedness and addressing security considerations in Fog and Edge Computing within the 5G ecosystem, respectively.

Organization's Role in INTACT

HMU is responsible for leading the scientific dissemination and communication activities in the INTACT project. They will develop the IOSP Portal to ensure effective communication of the project results to the scientific, business, and public communities. HMU will also oversee the creation of a dissemination strategy, manage the project website and social media outreach, and coordinate the submission of research papers to conferences and journals. Additionally, HMU will organize events to promote the project's outcomes and advocate for the broader benefits of EU-funded research.

https://www.hmu.gr

This will close in 0 seconds

Short Description

The National Centre for Scientific Research "Demokritos" holds a prominent position as the leading research institution in Greece. Established in July 1961, initially focused on nuclear research, Demokritos has evolved into an expansive interdisciplinary research center. It comprises a dedicated team of approximately 180 esteemed researchers occupying tenured and tenure-track positions, complemented by over 500 research personnel engaged in diverse projects funded primarily by State Funds, the European Union, and Private Industries. Noteworthy achievements include adept management of numerous FP6/FP7/H2020 projects centered around 5G, virtualization, and cloud technologies. The NCSRD proudly hosts its advanced experimental 5G infrastructure in collaboration with Vodafone, alongside the innovative GOLD innovation space (i-Space) and an incubator fostering start-up and SME growth within the Lefkippos Technology Park.

Organization's Role in INTACT

NCSRD is leading Task 5.3, which focuses on implementing and validating the identified Pilot Use Case (PUC) scenarios for the INTACT project. NCSRD will oversee the testing, implementation, and performance analysis of each PUC, ensuring that they meet the defined Key Performance Indicators (KPIs) and objectives. The task involves validating individual PUC deployments, such as automated risk validation, threat monitoring, and attack-defence forecasting. Additionally, NCSRD will contribute to a Smart City scenario that cross-correlates data dynamics across multiple verticals. Their role ensures that INTACT is successfully integrated into diverse IoT-to-Cloud environments across different sectors.

https://www.demokritos.gr/

This will close in 0 seconds

Short Description

Fraunhofer is actively involved in the project, particularly in the development of use case scenarios, key performance indicators (KPIs), and business models for various vertical sectors. As part of Task 2.2, Fraunhofer coordinates the efforts of all partners to assess actors, requirements, assumptions, event flows, and expected outcomes for the Pilot Use Cases (PUCs), ensuring they meet the needs of stakeholders while considering data privacy, energy consumption, and security policies. Furthermore, Fraunhofer leads the planning and execution of PUC validation scenarios in Task 5.2, ensuring that all demonstrations are conducted in real-world network environments and comply with relevant EU regulations and safety standards. Their contributions are critical in defining the validation roadmap and ensuring the alignment of technical and business objectives throughout the project.

Organization's Role in INTACT

Fraunhofer is leading Task 4.1, focusing on the development of IoT-to-Cloud security replication and Twinning tools. They are responsible for creating Twinning Agents, which include a virtual sensor module that models device components and a dynamic behavior module that models device mobility and connectivity. These modules will use Structural Machine Learning (SML) and Kinematic Machine Learning (KML) algorithms to train models for device behavior. Additionally, Fraunhofer will build the INTACT Digital Twinning Databases, which will replicate and analyze the dynamic and structural elements of IoT-to-Cloud networks. These databases will be integrated into end-user environments, dynamically updated, and utilized to assess security in the project’s Pilot Use Cases (PUCs).

https://www.fraunhofer.de/

This will close in 0 seconds

Short Description

SBA Research is a leading Austrian research institution specializing in applied cybersecurity, privacy, and data protection. It is dedicated to advancing knowledge and innovation in the field of information security by conducting cutting-edge research in areas such as cryptography, secure communications, privacy-preserving technologies, and secure software development. SBA Research collaborates with both academic institutions and industry partners to tackle emerging cybersecurity challenges and provide practical solutions. The institution also offers consulting and training services to organizations, helping them enhance their security posture and comply with data protection regulations. SBA Research plays a pivotal role in developing advanced tools and methodologies that address complex cybersecurity issues, contributing to the overall security and resilience of critical infrastructure and digital systems.

Organization's Role in INTACT

SBA Research leads Task 4.2, focusing on developing a Zero-Trust Distributed Computing Framework for the project. They are responsible for designing and integrating security processes across hardware, system, and application levels within the Digital Twins architecture. SBA Research utilizes cutting-edge technologies such as Physically Unclonable Functions (PUF) and DDAG DID mechanisms to secure data and systems, ensuring robust identity, privacy, and resilience. Additionally, they contribute to the creation of an SDN/NFV Cybersecurity Orchestrator, which manages cybersecurity incidents and optimizes resource allocation across IoT, Edge, and Cloud environments, ensuring the security and operational efficiency of the system.

https://www.sba-research.org/

This will close in 0 seconds

Short Description

Airbus CyberSecurity is a dedicated division within Airbus focused on providing advanced cybersecurity solutions for critical industries, including aerospace, defense, and government sectors. With a strong emphasis on protecting sensitive information and infrastructure, Airbus CyberSecurity specializes in threat detection, incident response, data protection, and securing IT/OT convergence for both civilian and military applications. Their solutions leverage cutting-edge technology in areas like threat intelligence, encryption, and cyber resilience to protect against evolving cyber threats. Through a combination of robust cybersecurity expertise and innovative solutions, Airbus CyberSecurity safeguards national and industrial assets, ensuring operational continuity and security across high-stakes environments.

Organization's Role in INTACT

In Task 3.3, Airbus leads the development of two automated threat analysis engines as part of the INTACT Toolbox. These engines will utilize probe-based distributed models for real-time threat detection and analysis across various software and firmware systems. The first engine will focus on firmware image unpacking and classification, using advanced AI unpacking tools like FRAK and radare2, combined with binary analysis methods. The second engine will enable continuous inspection of control- and application-plane traffic using distributed probes and AI-driven security processes. Additionally, the engines will assess the security of open-source software runtimes, particularly focusing on IoT-to-Cloud adoption risks such as ransomware and attacks on containerized environments. The engines will integrate both static and dynamic analysis methods to improve the efficiency and accuracy of threat detection. Static analysis will involve call-graph representations and lazy data structures for firmware and data flow extraction, while dynamic analysis will incorporate advanced techniques such as taint checking, AI fuzzing, and symbolic execution to enhance speed and precision. Both engines will be deployed as Kubernetes pods, ensuring scalability and adaptability, with the flexibility to incorporate additional methods from ongoing partner work. The expected outputs are detailed reports on the engine development and functionality (D3.3, D3.4).

https://cyber.airbus.com/en

This will close in 0 seconds

Short Description

AVL List GmbH is a global leader in the development, simulation, and testing of powertrain systems, including combustion engines, electric drives, batteries, and software for automotive and industrial applications. Headquartered in Graz, Austria, AVL List GmbH is renowned for its expertise in propulsion technologies, vehicle systems, and advanced mobility solutions, focusing on electrification, autonomous driving, and connected systems. With a strong commitment to innovation and sustainability, AVL collaborates with automotive manufacturers and industrial partners worldwide to optimize performance, reduce environmental impact, and accelerate the transition to sustainable and efficient transportation solutions.

Organization's Role in INTACT

For the project, AVL List GmbH leads the specification and planning of Pilot Use Case (PUC) scenarios and demonstrations to validate the solutions across critical sectors. In Task 2.2, AVL defines use case scenarios, KPIs, and business models, collaborating with partners to assess requirements, actor interactions, and expected outcomes tailored to specific industry needs in sectors such as Telcos, Health, Transportation, and Nuclear Safety. In Task 5.2, AVL orchestrates the PUC demonstration and validation planning, creating realistic scenarios that reflect the unique network environments and hardware setups of stakeholders. Each scenario is designed to rigorously test the solutions, aligning with EU regulatory principles, including GDPR and DNSH, while adhering to health and safety standards.

https://www.avl.com/en

This will close in 0 seconds

Short Description

Thales Group is a global technology leader focused on building a safer, more secure world across critical sectors such as aerospace, defense, transportation, and digital security. Known for its advanced expertise in cybersecurity, artificial intelligence, and secure communications, Thales delivers innovative solutions that protect data, enhance connectivity, and drive digital transformation. With a commitment to innovation, Thales plays a vital role in safeguarding sensitive information, powering intelligent transportation systems, enabling secure air traffic management, and supporting defense and space operations worldwide. Their work bridges technology with societal needs, fostering resilience and security for a rapidly evolving world.

Organization's Role in INTACT

For the project, Thales Group plays a pivotal role in technical management, quality assurance, and DevSecOps/ML-Ops specification to ensure the secure and effective development of the Toolbox. As the lead for Task 1.2, Thales coordinates technical activities to maintain coherence, monitor progress, and manage deliverables across all work packages, addressing any issues arising during testing and demos. In Task 2.3, Thales contributes to the specification of advanced DevSecOps and ML/Data-Ops methods, integrating AI-enabled security into each development phase. By employing their Cybels suite on the CyberRange training platform, Thales supports vulnerability analysis, risk mitigation, and privacy compliance training, ensuring robust, high-quality project deliverables and secure outcomes.

https://www.thalesgroup.com/en

This will close in 0 seconds

Short Description

Inlecom is a leading company specializing in innovative digital solutions for complex industry challenges, with a focus on transport, logistics, and supply chain optimization. They provide expertise in areas such as artificial intelligence, cybersecurity, data analytics, and digital transformation. Inlecom's solutions integrate cutting-edge technology to enhance operational efficiency, compliance, and sustainability, serving both private and public sector clients. By leveraging research and collaboration, Inlecom helps organizations navigate digital transformation, improve decision-making, and address regulatory and environmental challenges.

Organization's role in INTACT

In the project, Inlecom's Commercial Pathways are responsible for overseeing key coordination and quality management aspects to ensure smooth project execution. Their role includes: administrating financial and organizational management, steering technical activities in line with the project plan, and upholding scientific standards. They are tasked with identifying risks and managing contingency strategies, ensuring adherence to EU and national regulations on legal, ethical, and gender-related issues. Additionally, Inlecom represents the project in external assemblies, supports consortium communication, and maintains a secure internal repository for project developments, reports, and data, fostering a cohesive and well-documented project environment.

https://inelecom.ie

This will close in 0 seconds

Short Description

BEYOND Semiconductors is a company that specializes in the design and development of advanced semiconductor technologies. Focused on innovation, the company provides cutting-edge solutions for a wide range of industries, including automotive, telecommunications, and consumer electronics. BEYOND Semiconductors is known for its expertise in developing high-performance, energy-efficient semiconductor products that enable next-generation technologies. Their work supports the advancement of systems in areas such as connectivity, computing, and sensing, contributing to the ongoing evolution of modern electronics and the digital transformation of various sectors.

Organization's Role in INTACT

In this project, the partners are collaboratively developing advanced cybersecurity tools and frameworks. They are building a lab testbed for experimentation with IoT-to-Cloud processes, predictive threat intelligence engines, and zero-trust computing models. Key tasks include creating automated threat analysis engines, AI-driven attack-defense emulation, and integrating security measures at hardware, system, and application levels. The project also focuses on optimizing resource allocation, enhancing threat detection, and ensuring privacy and security across distributed IoT, Edge, and Cloud environments. This collaboration aims to strengthen cybersecurity capabilities through cutting-edge AI, game theory, and zero-trust frameworks.

https://www.beyondsemi.com/

This will close in 0 seconds

Short Description

Siemens S.R.L. is a company specializing in digital industries, smart infrastructure, and research and development. Focused on innovation, the company provides advanced technological solutions across various sectors, including industrial automation, energy, and healthcare. Siemens S.R.L. is known for its expertise in developing intelligent, sustainable, and efficient systems that drive digital transformation. Their work supports the advancement of industries by integrating cutting-edge technologies in connectivity, automation, and smart solutions, contributing to the modernization of infrastructure and the evolution of smart ecosystems.

Organization's Role in INTACT

Siemens plays a crucial role in INTACT, focusing on DevSecOps, IoT-to-Cloud security, and market standardization. In Task 2.3, Siemens, together with UBI, coordinates partners to integrate cybersecurity and IT solutions using UBI’s MAESTRO Platform. This involves embedding AI-enabled security processing into software development, ensuring compliance with security and privacy standards such as GDPR, conducting vulnerability analysis, and implementing AI security/privacy testing. Additionally, Siemens helps monitor software risks and security compliance.

In Task 4.1, Siemens contributes to IoT security replication and digital twinning by integrating its SIPROTEC platform into the INTACT Digital Twinning Databases. These databases model IoT-to-Cloud networks dynamically, utilizing Structural Machine Learning (SML) and Kinematic Machine Learning (KML) algorithms to assess device behavior and enhance security.

For Task 6.4, Siemens leads the market analysis and standardization efforts, conducting SWOT and PESTLE analyses to evaluate the market potential of INTACT’s technologies. They identify potential market shares, explore opportunities for new market creation, and engage with relevant organizations and standardization bodies to promote INTACT’s cybersecurity and AI innovations. Overall, Siemens serves as both a technical and strategic leader, ensuring secure AI-driven DevOps, IoT security replication, and the successful market adoption of INTACT’s outcomes.

https://www.siemens.com/

This will close in 0 seconds