DOMAIN #1

Sensitive infrastructure protection

Sensitive infrastructure protection

Sensitive infrastructure protection pertains to the securing of assets and systems that are essential for the functioning of a society and economy. Examples include the provision of gas and oil, agriculture, and telecommunication. The security of sensitive infrastructure is a major concern, confirmed by recent events, in the context of social unrest, terrorist threats and even a pandemic. If this type of infrastructure is exposed to external threats, this will have major consequences for society as a whole.

Targeted end-users. Eg. safety director of vital importance and Seveso classified industrial facilities; airports; hospital infrastructure; operators (electricity, gas, telecom…).

Solutions. The solutions developed in this domain will have to integrate the following considerations: maintainability, acceptable price, foresight scanning, and interoperability with existing solutions.

DOMAIN #2

Disaster resilience

Disaster resilience

There is a need for instruments that facilitate improved prevention and preparedness in crises and natural disasters. The development of technologies for first and second responders, and where relevant for citizens, that increase societal resilience is the second focus-area of the SecurIT project. Innovative technologies can help detect, analyse, treat, and/or prevent major natural events. This domain focuses mainly on climate-related risks and extreme events, geological disasters such as wildfires, earthquakes, tsunamis, and pandemics.

Targeted end-users. Eg. first responders; cities and territories.

Solutions. The solutions developed in this domain will have to consider citizen involvement and acceptation and transparency. All solutions will also have to ensure the continuity of operations.

DOMAIN #3

Public spaces protection – major events

Public spaces protection – major events

The objective  is to develop innovative tools that create increasingly connected and protected cities in which the population takes on a more active role in serving the community. These solutions should integrate and consider state-of-the-art technologies like in Artificial Intelligence, Cloud computing, and Big Data.

Targeted end-users: Eg. cities and territories (security of public roads); train station; venues open to the public (eg: stadiums; concert zone etc.).

Solutions: The solutions developed in this domain will have to consider the legal constraints of personal data protection.

Download detailed list of Challenges with extra explanations and examples of applications

DOMAIN #1

Sensitive infrastructure protection

Sensitive infrastructure protection
Sub-domains Challenges and potential areas of needs
Cybersecurity 1. Development of cybersecurity solutions for sensitive infrastructure protection
Operations 2. Optimisation of communication networks and alert systems
Identification and access control 3. Development and optimization of identification and access control for rapid access in the site, all while ensuring that no one and nothing that enters poses a security risk
Zone security and perimeter protection 4. Development of solutions to detect and locate any intruders that have managed to penetrate the perimeter protection and barriers to block intrusions

DOMAIN #2

Disaster resilience

Disaster resilience
Sub-domains Challenges and potential areas of needs
Prior to crisis – prediction:

Risk knowledge and evaluation

5. Optimisation of prediction of disaster
During the crisis:

Communication and warning systems

6. Optimisation of communication and warning systems in case of disaster
After the crisis:

Post event analysis and recovery

7. Development of solutions for a better recovery

DOMAIN #3

Public spaces protection – major events

Public spaces protection – major events
Sub-domains Challenges and potential areas of needs
Detection and alert 8. Gather and manage real time information
Analysis 9. Analyse and extract pertinent and potentially crucial information as quickly as possible
Command and control (resource management) and decision-making support 10. Communication networks and post -event analysis
Data protection and cybersecurity – cybercrime 11. Detection
Download detailed list of Challenges with extra explanations and examples of applications