Published on | 11 months ago
Programmes Security Cybersecurity Defence NATO-EDAIn two weeks' time, DIANA will share it's second call for innovative technology companies working on solutions that could change the world.
Last year, there were answering more than 1300 innovators with ground-breaking deep technologies across three dual-use Challenges. 44 companies joined the pilot cohort, accelerating their businesses while increasing their networks across the Alliance. Check out what a few of these innovators had to say about DIANA in the video (https://lnkd.in/gdWM-w-3): Water Linked VanWyn Inc. IONATE Astrolight GaltTec REVOBEAM
More information:
With the countdown begun, DIANA hopes you consider joining them to tackle some of the world's most complex and pressing technological challenges. Together, we can help create a more peaceful and resilient global future!
We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.