Projects

CICERO

Secure AI
UEBA

CICERO is a group formed by 5 leading technology centres in the field of information technologies with extensive experience in cybersecurity technologies.

CICERO logo

At CICERO we work in the field of cybersecurity, contributing to advance in technologies for identification, protection, detection, response and recovery from cyberthreats.

The massive adoption of information and telecommunications technologies is changing the way we relate and interact.

This has caused, in addition to multiple benefits, an increase in the risks associated with the adoption of new technologies, mainly those generated by threats to information security or cyber threats that jeopardise growth, sustainability and way of life.

This explains the need to maintain the same pace of innovation in cybersecurity in order to adopt new technologies without exceeding an acceptable level of risk, as well as to address new threats.

By investing in technologies, organisations must make a proportionate investment in cybersecurity to ensure that the risks associated with their implementation do not destroy the expected benefits.

This duality of cybersecurity, both as an essential technology to protect our society and to ensure digital autonomy, and as a growing market, make it so important for most governments to make it a priority objective.

The consortium is made up of GRADIANT, CEIT, FIDESOL, I2CAT and ITCL, with the aim as an essential technology to protect our society and to guarantee digital autonomy.

CICERO partners will enhance technology transfer through the following research areas:

Identification

The main objective is to help organizations to understand the threats and vulnerabilities to which they are exposed and to improve their risk management with this information. Key here are technologies that enable cyberintelligence to be obtained, such as the honeypotsThe company has also developed new technologies for the identification of vulnerabilities, and risk analysis methodologies.

Protection

Early detection of cybersecurity events for the defense of organizations’ information systems. Due to the increasing digitalization of activities and processes in companies, the main challenge is to develop technologies that allow the detection of suspicious events in the increasingly complex systems and data networks. Technologies based on the massive processing of information, its correlation and statistical analysis are key to guarantee the adequate detection of events.

Detection

The main objective is to help organizations to improve the robustness of their information systems and data networks against cyber-attacks. In this function, we emphasize technologies to improve security in network protocols and the implementation of these protocols, which improve security in cyber-physical systems and access control. It is also essential to guarantee protection in new data network paradigms, such as the virtualization of network functions.

Response and recovery

In the event of a cybersecurity incident, a rapid, coordinated and informed response is essential to ensure resilience, i.e. that the organization’s information systems and data networks recover to a known, expected and secure state. This requires research into orchestration technologies, rapid reconfiguration of data networks using software-defined networks to isolate and contain compromised systems, and forensic analysis to determine the impact of the cybersecurity incident.