New advanced tools and processes for Operational Cybersecurity
The HORIZON-CL3-2025-02-CS-ECCC-02 call, part of Horizon Europe, aims to bolster the EU's cybersecurity capabilities through the development of advanced tools and processes. This funding opportunity is crucial for enhancing the Union’s strategic autonomy and resilience against evolving cyber and hybrid threats, ensuring a more secure online environment for all. Projects will focus on practical, impactful innovations for operational cybersecurity.
Who is Funded for Operational Cybersecurity
The HORIZON-CL3-2025-02-CS-ECCC-02 funding program targets legal entities from EU Member States and Associated Countries, focusing on strengthening the Union's operational cybersecurity and digital sovereignty. The program aims to enhance collective capabilities against cyber and hybrid threats, support European competitiveness in cybersecurity, and foster the European Cybersecurity Competence Community, particularly by promoting the active involvement of innovative SMEs.
What is Funded in Operational Cybersecurity
This funding call focuses on developing advanced frameworks, tools, and services for operational cybersecurity, addressing the increasing complexity of cyber threats. Projects should cover various aspects from threat intelligence to incident response and remediation, with a strong emphasis on real-world applicability and pilot implementations within critical sectors. Financial support is provided as lump sum grants, covering eligible costs for innovation actions.
Type and Scope of Cybersecurity Funding
The HORIZON-CL3-2025-02-CS-ECCC-02 program provides funding in the form of grants, specifically lump sum grants, designed to support innovation actions in cybersecurity. Projects are expected to receive between 4.5 million and 6 million Euros, contributing to a total estimated budget of 23.55 million Euros for this topic in 2025. The program is part of Horizon Europe, which runs until the end of 2027.
Conditions and Requirements for Cybersecurity Projects
Applicants to the HORIZON-CL3-2025-02-CS-ECCC-02 call must adhere to specific legal, administrative, and operational conditions, including strict eligibility rules related to country of establishment and control. Collaboration is a key aspect, with expectations for consortia involving diverse entities. All projects must comply with relevant EU legislation on cybersecurity and ensure real-world applicability and usability of their solutions.
Application Procedure for Operational Cybersecurity Grants
The application process for HORIZON-CL3-2025-02-CS-ECCC-02 involves a single-stage submission via the Funding & Tenders Portal, with a specific deadline of 12 November 2025. Evaluation and award procedures follow standard Horizon Europe guidelines, with detailed criteria for assessment and transparent communication of decisions.
Legal Basis of the Cybersecurity Funding Program
The HORIZON-CL3-2025-02-CS-ECCC-02 funding program is legally grounded in the Horizon Europe framework, specifically authorized by a European Commission Decision for its 2025 Work Programme. Its implementation is further shaped by key EU regulations on cybersecurity and financial management, with all official texts made publicly accessible through the Funding & Tenders Portal.
Similar Programs
Funding Overview
Funding Status:
Open
Maximum Amount:
6,000,000 €
Allocated Budget:
23,550,000 €
Deadline:
12.11.2025
Open Until:
31.12.2027
Award Channel:
Framework Programme Call
Region:
EU Member States, Associated Countries
Sectors:
Information and Communication Technology, Research and Development, Software Development, Healthcare, Energy Production and Supply, Transportation and Logistics, Water and Waste Management, Financial Technology, Other
Application Type:
Consortium Required
Funding Stages:
Applied Research, Experimental Development, Prototyping, Pilot Testing, Product Development, Process Optimization
Funding Provider
Program Level:
European Union
Funding Body:
European Commission
Managed By:
European Cybersecurity Competence Centre (ECCC)
Website: