Building resilient cyber infrastructure across EU member states through innovative AI-driven threat intelligence, compliance automation, and collaborative defense mechanisms.
CYBER-BRIDGE addresses the growing cybersecurity challenges facing EU member states by establishing cross-border cooperation mechanisms, developing cutting-edge AI-powered security tools, and building capacity across critical infrastructure sectors.
Aligned with the NIS2 Directive, Cybersecurity Act, Cyber Resilience Act, and GDPR, our project delivers practical solutions for threat intelligence sharing, compliance automation, and collaborative incident response.
Five interconnected objectives driving CYBER-BRIDGE's mission to strengthen cross-border cybersecurity cooperation across the European Union.
CYBER-BRIDGE will develop and deploy a comprehensive threat intelligence sharing platform that enables seamless, secure exchange of cybersecurity information between participating organizations across EU member states. The platform will incorporate standardized data formats (STIX/TAXII), automated threat correlation, and privacy-preserving mechanisms to ensure both effectiveness and compliance with data protection requirements.
Organizations face increasing complexity in meeting EU cybersecurity regulations. CYBER-BRIDGE addresses this challenge by developing AI-powered compliance assessment tools that automatically analyze organizational security posture against regulatory requirements, identify gaps, and provide actionable remediation recommendations. The tools will support multiple frameworks including NIS2, the Cyber Resilience Act, and GDPR.
Critical infrastructure sectors including energy, healthcare, and transportation face sophisticated cyber threats that can impact essential services. CYBER-BRIDGE will deliver advanced vulnerability assessment and continuous monitoring capabilities specifically designed for operational technology (OT) and industrial control system (ICS) environments, enabling proactive identification and remediation of security weaknesses.
Effective cybercrime investigation requires sophisticated tools for monitoring criminal activities, attributing attacks, and conducting digital forensics. CYBER-BRIDGE will develop advanced dark web monitoring capabilities, threat actor profiling methodologies, and collaborative investigation tools that enable law enforcement and security teams to better understand and respond to cyber criminal activities.
Sustainable cybersecurity requires ongoing investment in human capital and knowledge sharing. CYBER-BRIDGE will establish comprehensive training programs utilizing cyber range environments, develop educational materials and curricula, and implement knowledge transfer mechanisms that ensure project outcomes benefit the broader European cybersecurity community beyond the consortium members.
A diverse consortium of 9 partners from 3 EU member states, combining expertise in cybersecurity, research, public administration, and critical infrastructure.
Our consortium brings together different types of organizations to ensure comprehensive coverage
Technology companies providing innovative cybersecurity solutions
Government agencies ensuring policy alignment
Academic institutions driving innovation
Energy sector operators providing validation
Six interconnected work packages structure the CYBER-BRIDGE project activities, from management and architecture to development, pilots, and dissemination.
Five real-world pilot deployments validating CYBER-BRIDGE solutions across diverse sectors: energy, software, public administration, law enforcement, and IoT.
Access deliverables, tools, and other outputs from the CYBER-BRIDGE project. Results are updated as the project progresses.
| ID | TITLE | WP | DUE | ACCESS | STATUS |
|---|---|---|---|---|---|
| D1.1 | Project Management Handbook | WP1 | M3 | Public | Planned |
| D1.2 | Data, Quality and Risk Management Plans | WP1 | M6 | Public | Planned |
| D1.3 | Ethics and Legal Guidelines | WP1 | M9 | Sensitive | Planned |
| D1.4 | Data Management Plan v2 | WP1 | M30 | Public | Planned |
| D2.1 | Detailed Scenarios and Use-Case Report | WP2 | M9 | Public | Planned |
| D2.2 | CYBER-BRIDGE System Design and Architecture | WP2 | M12 | Public | Planned |
| D3.1 | Compliance Tracking Tools for CRA and NIS2 | WP3 | M12 | Public | Planned |
| D3.2 | AI-Enhanced Compliance Assistant Report | WP3 | M15 | Public | Planned |
| D3.3 | Penetration Testing and Dark Web Tools Alignment | WP3 | M18 | Public | Planned |
| D4.1 | Platform Requirements for Compliance Verification | WP4 | M15 | Sensitive | Planned |
| D4.2 | CYBER-BRIDGE User Dashboard Development Report | WP4 | M18 | Sensitive | Planned |
| D4.3 | Threat Detection Tool Integration Report | WP4 | M20 | Sensitive | Planned |
| D5.1 | Pilot Demonstration and Feedback Report | WP5 | M25 | Public | Planned |
| D5.2 | Realistic cybersecurity exercises in Cyber Range | WP5 | M26 | Sensitive | Planned |
| D5.3 | Penetration Testing and Performance Evaluation Report | WP5 | M32 | Sensitive | Planned |
| D6.1 | Dissemination, Communication and Exploitation Strategy and Planning | WP6 | M6 | Public | Planned |
| D6.2 | Dissemination and communication outreach and Stakeholder Engagement and Training Outcomes | WP6 | M35 | Public | Planned |
| D6.3 | Market Analysis, Exploitation, and Policy Recommendations | WP6 | M34 | Public | Planned |
Key exploitable results that will be made available as the project progresses
AI-powered tool for automated NIS2 and CRA compliance assessment
Cross-border threat intelligence sharing platform with STIX/TAXII support
Advanced vulnerability assessment tool for critical infrastructure
Monitoring and analysis tool for dark web threat intelligence
Comprehensive security testing and penetration testing toolkit
Training platform for cybersecurity exercises and simulations
CYBER-BRIDGE is committed to open science principles. Public deliverables and research outputs will be made freely available under appropriate licenses. We follow EU guidelines for open access to scientific publications and research data.
All public deliverables and scientific papers freely accessible
Research data is Findable, Accessible, Interoperable, and Reusable
Selected project tools released under open source licenses
Stay informed about the latest developments, events, and milestones from the CYBER-BRIDGE project.
Interested in CYBER-BRIDGE? Get in touch with our team to learn more about collaboration opportunities, pilot participation, or general inquiries.
I-ELINK
Bucharest, Romania
We welcome inquiries from organizations interested in cybersecurity collaboration, potential pilot participants, and stakeholders seeking to learn more about CYBER-BRIDGE outcomes and best practices.