News

Draft Cluster 3 Work Programme 25 - publicly available

Published on | 6 months ago

Programmes Security

It is expected that the Commission would launch the pre-publication of the Main Work Programmes (WP) 2025 at the end of this month. In the comitology register* the recent draft of WP Cluster 3 of April 2025 can already be consulted. Be aware that availability of documents in the register can change suddenly.

The comitology register contains a list of all comitology committees, as well as background information and documents relating to the work of each committee (including the Programme Committees)

 

 

myOverview - sign up for personalised information

We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).

Stay informed about what matters to you. By signing up, you can opt in for e-mail notifications and get access to a personalised dashboard that groups all news updates and event announcements in your domain(s).

Only for stakeholders located in Flanders

Latest News

1743 articles available search in articles 

Testimonial

image of EITHOS - European Identity Theft Observatory System

EITHOS - European Identity Theft Observatory System

The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.