SPARTA has a strong community building sense and we are always looking for people wanting to take part in this unique set of actors at the intersection of scientific excellence, technological innovation, and societal sciences.
Do you want to join us? See how
You can join SPARTA with two different ways, as an Associate or as a Friend.
- Provide input to the SPARTA Roadmap
- Access to limited ressources
- Late information on roadmap output
- No necessary commitment
We are Spartans
They are already Spartans. SPARTA brings together a unique set of actors at the intersection of scientific excellence, technological innovation, and societal sciences in cybersecurity.
Joanneum Research contributes to the development of next generation cybersecurity technologies like sophisticated network and security scanning tools.
Technikon contributes to the CCN organization and assessment and supports the continuous improvement and networking of the governance.
UNamur contributes to all the tasks that require legal expertise in the field of privacy and, more specifically, data protection, in particular by assessment of data protection and other ICT regulatory issues.
CESNET develops new network security approaches, especially resilience of network against attacks. It validates the governance structure by joint research, development and evaluation tasks.
Brno University of Technology serves as the technological competence center in the Czech Republic with a focus on privacy-enhancing cryptologic technologies for IoT networks and on cybersecurity training and education.
CZ.NIC reflects its own rich experience gained both from the operation of the national security team CSIRT.CZ and the development of unique security by design hardware.
Fortiss increases the awareness of the Bavarian and German industry to security concerns, increasing the security of their products, by proposing and demonstrating techniques and methodologies.
Fraunhofer-Gesellschaft is leading Ethical, Legal and Societal Aspects (ELSA) of cybersecurity according to the contemporary approach of responsible research and innovation. It is also leading the task on (internal) governance assessment and recommendations.
SAP performs research on the security of software supply chains, in particular the use of Open Source Software. It contributes to certification methodologies for large-scale, dynamic software environments.
Technische Universitat Munchen develops tools and mechanisms to increase the security of software components on different layers. In addition to these research focused efforts, TUM also leads the SPARTA committee.
Universitat Konstanz contributes capabilities in development of visualizations and visual analytics techniques as well as the involvement of experts and their domain knowledge.
University of Tartu is active in several fields related to cryptographic protocols, security engineering, business process management, programming languages, network coding and software engineering, and distributed system development.
KEMEA is strongly involved in cybersecurity scenario/use-cases building, pilot testing, educational workshop organization and execution, evaluation analysis and validation activities.
Demokritos contributes risk tools in the cyber physical domain and will contribute to the Vertical 1 in the CAPE Program, introducing the risk assessment mode of interconnected systems to the manufacturing and IoT domain.
Eurecat is a contributor to some of the tasks or programs related to the following domains: threat intelligence, artificial intelligence techniques for cybersecurity, embedded devices cybersecurity.
Indra develops tools, techniques and algorithms for the stages of prevention, detection, mitigation and protection. Indra will offer these results to the business community and public entities.
Tecnalia takes part in the development and implementation of the SPARTA cybersecurity roadmap covering its areas of competence as well as industrial challenges in sectors like the energy, automotive, transport and health.
Vicomtech leads the task related to the establishment of the SPARTA Joint Competence Centre Infrastructure. In addition to working on machine-learning techniques, it has a leading role in Innovation Management.
ANSSI contributes to the elaboration of the R&D roadmap, the training program, and the impact study of the technical programs on certification capacities of the SPARTA Network.
IMT leads the CAPE program and provides access to its research platforms in order to carry out research and demonstration work. It contributes to education programs and training support materials.
Inria delivers research through its research teams and provide training of PhD students. It will provide access to its research platforms and security laboratories as part of its contribution to the work on research and demonstrators.
Thales contributes to the T-SHARK and SAFAIR programs, as well as exploitation, certification, and dissemination efforts.
Yes We Hack connects organizations or projects with European ethical hackers community, strengthening cooperation to improve the common good.
CINI leads the HAII-T program and brings expertise in a number of key research areas, including formal modeling and automatic analysis of security-critical components, protocols and systems, vulnerability-tolerance techniques, and more.
CNIT brings contibutions in three main areas: network monitoring and intrusion detection, network infrastructure security architectures and solutions, and security protocols for data communication and dissemination.
CNR is directing SPARTA's partnership efforts and contributes to the community building and research activities.
ISCOM contributes to the impact study of programs on certification capabilities, the definition of the training framework, and the monitoring and assessment of project results.
Leonardo contributes to the design and implementation of the whole SPARTA platform, and to the component integration and platform testing activities.
Kauno Technologijos Universitetas contributes to the research activities of the cybersecurity threat intelligence, of the network and IoT. It also contributes to the training of information technology and cybersecurity professionals.
L3CE coordinates the implementation of the T-SHARK program, and takes responsibility for the development of the cybersecurity skills framework model.
The general Jonas Zemaitis Academy of Lithuania is involved in full-spectrum cyber-security awareness and threats.
Mykolo Romerio Universitetas participates in implementation of programs and activities by addressing relevant legal challenges, in particular, privacy and data protection issues.
Luxembourg Institute of Science and Technology develops cognitive effective visual syntax for security risk management, and specify key components of an orchestration framework for Intelligent Infrastructures.
Security made in Lëtzebuerg participates in the organisation of the cybersecurity competence network, relaying training and awareness resources and platforms, and leading the exploitation and IPR management activities.
Université de Luxembourg contributes to the development of research advancements in the project, including resilience mechanisms in the HAII-T program, and automated detection and remediation in the CAPE program.
Latvijas Mobilais Telefons participates in the T-SHARK program by testing and validating results from the viewpoint of a service provider.
Naukowa I Akademicka siec Komputerowa provides CERT and NISM experience, and investigates novel methods for large-scale malware analysis monitoring attacks through honeypot networks and countering botnet activity.
Polish Platform for Homeland Security focuses on cybercrime expertise, cooperation with LEA, training employees of public and private institutions, and increasing cybersecurity awareness.
Instituto de novas Technologies leads SPARTA's dissemination and communication activities, including the engagement of Europe's Outermost Regions, and gender and diversity issues. It will engage in the T-SHARK program.
Instituto Superior Tecnico covers a wide range of cyber security disciplines, including crypto algorithms, protocol verification, software security, distributed systems security, cyber hacking and hardware security.