{"id":34827,"date":"2025-04-11T12:08:55","date_gmt":"2025-04-11T12:08:55","guid":{"rendered":"https:\/\/direc.dk\/next-generation-cyber-security-call-for-proposals\/"},"modified":"2025-06-10T08:05:34","modified_gmt":"2025-06-10T08:05:34","slug":"next-generation-cyber-security-call-for-proposals","status":"publish","type":"page","link":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/","title":{"rendered":"Next Generation Cyber Security: Call for proposals"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"34827\" class=\"elementor elementor-34827 elementor-34449\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cae0cee e-flex e-con-boxed e-con e-parent\" data-id=\"cae0cee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-561f775 elementor-widget__width-initial e-transform e-transform elementor-widget elementor-widget-text-editor\" data-id=\"561f775\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-13,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:143,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-57,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:392,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>THE DEADLINE FOR APPLICATIONS HAS PASSED<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be1756b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"be1756b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Next generation Cybersecurity <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c10d81a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c10d81a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">- call for proposals<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea7d47 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"eea7d47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How can we develop competitive cyber companies by utilizing Denmark&#8217;s strong research ecosystem?<\/p>\n<p>DIREC and the National Defence Technology Centre (NFC) welcome project proposals for innovative cyber projects with a high impact potential.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74cfc48 elementor-widget elementor-widget-spacer\" data-id=\"74cfc48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-fdcca37 e-con-full e-grid e-con e-child\" data-id=\"fdcca37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9913774 elementor-widget elementor-widget-image\" data-id=\"9913774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/elementor\/thumbs\/DIREC_logo_2023_bla-q3vvrymvpza42h9y6m204uw6uv7r1vlmb1unu2evb4.png\" title=\"DIREC_logo_2023_bla\u030a\" alt=\"DIREC_logo_2023_bla\u030a\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5194587 elementor-widget elementor-widget-image\" data-id=\"5194587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/elementor\/thumbs\/Untitled-design-13-r4cbmo8v588s9u4x7b91ofpw5po76bv0gtop1pcqv4.png\" title=\"Untitled design (13)\" alt=\"Untitled design (13)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4884162 elementor-widget elementor-widget-image\" data-id=\"4884162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/elementor\/thumbs\/Untitled-design-14-e1744626948649-r4ccwitgib0al3jdh4pxav7baboqmtvo3r9brldfcw.png\" title=\"Untitled design (14)\" alt=\"Untitled design (14)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d9dcfe elementor-widget elementor-widget-image\" data-id=\"7d9dcfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/elementor\/thumbs\/IndustriensFond_logo_BLACK_RGB-r45ges3mxj9v89ryynlsag3m0cbsixfet9yx5793ao.png\" title=\"IndustriensFond_logo_BLACK_RGB\" alt=\"IndustriensFond_logo_BLACK_RGB\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2926529 e-flex e-con-boxed e-con e-parent\" data-id=\"2926529\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f416ba0 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f416ba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A strong collaboration between research and industry<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b7f54f elementor-widget elementor-widget-text-editor\" data-id=\"3b7f54f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 20px;\"><em>DIREC, the National Defence Centre (NFC) and Security Tech Space (STS) have launched an ambitious initiative \u2013 supported by the Danish Industry Foundation \u2013 to strengthen the competitiveness of Danish SMEs in the cybersecurity sector. The initiative aims to bridge the gap between SMEs and Denmark&#8217;s leading research and innovation environments, contributing to the development of unique high-tech cybersecurity solutions with global potential.<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4648a44 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4648a44\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Call for project prosals<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a8e13d elementor-widget elementor-widget-text-editor\" data-id=\"6a8e13d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"whitespace-pre-wrap break-words\">To achieve the goals of the initiative, we call for interesting project proposals within three specific cybersecurity themes where Denmark has promising companies and\/or strong research and innovation environments.<\/p><br><p class=\"whitespace-pre-wrap break-words\">Highly advanced solutions will differentiate the strengths of small and medium sized enterprises (SME) in a competitive market while contributing to greater European technological independence.<\/p><br><p class=\"whitespace-pre-wrap break-words\">The goals of the project are to:<\/p><br><ol class=\"[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal space-y-1.5 pl-7\">\r\n<li class=\"whitespace-normal break-words\">Support the development of unique high-tech cybersecurity solutions.<\/li>\r\n<li class=\"whitespace-normal break-words\">Strengthen digital security for the state, including the defense, private companies, and public organizations.<\/li>\r\n<li class=\"whitespace-normal break-words\">Contribute to greater technological independence, especially in developing critical security services.<\/li>\r\n<li class=\"whitespace-normal break-words\">Advance global cybersecurity research and educate young researchers who, after the project&#8217;s completion, can contribute specialized expertise to Danish companies.<\/li>\r\n<li class=\"whitespace-normal break-words\">Strengthen the Danish cybersecurity ecosystem, making it easier for SMEs to find relevant collaboration partners.<\/li>\r\n<li class=\"whitespace-normal break-words\">Create a knowledge platform that fosters new structures and collaboration models, enabling Denmark to effectively leverage new knowledge and handle complex challenges such as cybersecurity.<\/li>\r\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5d32017 e-con-full e-flex e-con e-child\" data-id=\"5d32017\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a20590a elementor-widget elementor-widget-n-accordion\" data-id=\"a20590a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1690\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1690\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Theme 1: Development, implementation, and verification of software, protocols and systems <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1690\" class=\"elementor-element elementor-element-f52bbcf e-con-full e-flex e-con e-child\" data-id=\"f52bbcf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f38779 elementor-widget elementor-widget-text-editor\" data-id=\"9f38779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How do we create secure software systems that make it difficult to hack and attack digital solutions?<\/p>\n<p>This area will focus on tools and techniques for verifying the security of software during the development process, so that security becomes a fundamental property of digital solutions. Especially for solutions that are intended as dual-use solutions with both commercial and defense applications, it is important to be able to guarantee security properties of the developed solutions.<\/p>\n<p>The theme will also look at new security solutions that potentially will make software robust against attacks from quantum computers. Finally, the theme will examine challenges in organizational implementation of security in companies and support simulation, testing and training in, for example, sandbox environments for universities and companies.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1691\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1691\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Theme 2: Monitoring of critical digital infrastructure <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1691\" class=\"elementor-element elementor-element-739c203 e-flex e-con-boxed e-con e-child\" data-id=\"739c203\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a97f308 elementor-widget elementor-widget-text-editor\" data-id=\"a97f308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Critical infrastructure represents a particularly vulnerable type of system, as an attack against this type of infrastructure has the potential to cause significant damage.<\/p>\n<p>This theme will look at technologies to monitor Denmark&#8217;s critical infrastructure to protect it against hybrid attacks. This can include monitoring of the physical environment around critical infrastructure installations or monitoring of the digital critical infrastructure, for example through the use of AI.<\/p>\n<p>The theme also includes monitoring of threats and attacks to create &#8220;situational awareness,&#8221; including collection and presentation of &#8216;cyber threat intelligence&#8217;. Projects may address monitoring connections to contingency plans before, during, and after an attack.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1692\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1692\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Theme 3: Security in AI systems <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1692\" class=\"elementor-element elementor-element-c34cac3 e-con-full e-flex e-con e-child\" data-id=\"c34cac3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-070fd8d elementor-widget elementor-widget-text-editor\" data-id=\"070fd8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI requires constant exchange of data, for example through prompts or video feeds. It is often difficult for companies to control where data flows and who has access. This poses a security risk for many companies regarding espionage and leakage of personally sensitive information.<\/p>\n<p>This theme will look at how technologies can be developed to secure data when using AI systems.<\/p>\n<p>At the same time, the theme will explore how AI creates new vulnerabilities, for example, cybercriminals increasingly use AI for sophisticated attacks such as deepfakes and adaptive malware. Securing AI systems and responsibly implementing AI in cybersecurity is therefore crucial to maximize the potential in dual-use solutions and create robust protection of the common digital infrastructure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f60772 elementor-widget elementor-widget-spacer\" data-id=\"2f60772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75af995 elementor-widget elementor-widget-text-editor\" data-id=\"75af995\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The focus of the projects should be threefold:<\/p>\n<p>a) Strengthen the competitiveness of small and medium-sized enterprises in Denmark through close collaboration with a university or a Danish knowledge institution (GTS institutes, RTO).<\/p>\n<p>b) Create novel research that introduces innovative approaches to working with cybersecurity or addresses relevant challenges with high impact potential.<\/p>\n<p>c) Has the potential to improve cybersecurity in Denmark and Europe.<\/p>\n<p>\u00a0<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9478611 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9478611\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Two types of projects: Catalyst &amp; Explore<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe33a0a elementor-widget elementor-widget-text-editor\" data-id=\"fe33a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 20px;\">We call for proposals within two types of projects:<\/p>\n<ol style=\"font-size: 20px; background-color: #ffffff;\">\n<li style=\"font-size: 20px;\"><span style=\"font-weight: bolder;\">Catalyst projects:<\/span>\u00a0Large projects of up to 2 million DKK, focusing on research addressing mature problems with a clear understanding of the innovation and research needed.<\/li>\n<li style=\"font-size: 20px;\"><span style=\"font-weight: bolder;\">Explore projects:<\/span>\u00a0Small, agile projects with budgets of up to 400.000 DKK, aimed at exploring new research-inspired development ideas or establishing\u00a0 new research collaborations.<\/li>\n<\/ol>\n<div style=\"font-size: 20px;\">\u00a0<\/div>\n<p style=\"font-size: 20px;\">All universities and GTS institutes can apply for funding. A project needs at least one small or medium-sized enterprise as a partner. Additional partners are welcome, especially potential customers with significant cybersecurity needs.<\/p>\n<div style=\"font-size: 20px;\">The budget for this call is 15 million DKK.<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-271e0f5 elementor-widget elementor-widget-spacer\" data-id=\"271e0f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-4aa2381 e-flex e-con-boxed e-con e-parent\" data-id=\"4aa2381\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04538a1 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"04538a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Applications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5d064cd e-flex e-con-boxed e-con e-parent\" data-id=\"5d064cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba5bb40 elementor-widget elementor-widget-text-editor\" data-id=\"ba5bb40\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Applications must be submitted via <a href=\"mailto:info@nfc.dk\">info@nfc.dk. <\/a><\/p>\n<p>Please mark the email <strong>&#8220;Application Submission \u2013 Next Generation Cybersecurity Call 2025&#8221;<\/strong>.<\/p>\n<p>Download the following templates for the application:\u00a0\u00a0<\/p>\n<ul>\n<li><a href=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Project-proposal-template-cybersecurity.docx\">Application template<\/a>\u00a0<\/li>\n<li><a href=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/2.-Budget-Template-Next-Gen-Cyber-v.-3.1.xlsx\">Budget template (version 3.1)<\/a><\/li>\n<\/ul>\n<p>Budget template v.3.0 has been updated to reflect the overhead of RTOs.<\/p>\n<p>We expect a final proposal to have a length of 4-7 pages excluding references (2400 characters pr page).<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b6fb1c1 e-flex e-con-boxed e-con e-parent\" data-id=\"b6fb1c1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad476ea animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ad476ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Call for Catalyst projects<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0984468 elementor-widget elementor-widget-text-editor\" data-id=\"0984468\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Catalyst projects are joint projects between at least one research partner and an SME.<\/p>\n<p>The research partner can get up to 2 million DKK in funding and the project can run up to two years.<\/p>\n<p>The aim is to demonstrate how research from universities and knowledge partners can be actively utilized by an SME to create and develop innovative user-focused cybersecurity products.\u00a0<\/p>\n<p>The project targets partnerships that have a clearly identified problem, a link to a specific research need, and a plan for a long-term collaboration.<\/p>\n<p><b><strong>Requirements<\/strong> \u00a0 <br \/><\/b><\/p>\n<ul>\n<li>All projects must involve collaboration between at least <strong>one knowledge institution and one SME<\/strong>. Other companies can join the project, and it is especially beneficial to include a potential customer facing a relevant cybersecurity challenge.<\/li>\n<li>The project must address one of the themes specified in the introduction.\u00a0<\/li>\n<li><span style=\"background-color: transparent;\">Each project will run for <\/span><strong style=\"background-color: transparent;\">2 years<\/strong><span style=\"background-color: transparent;\"> and typically involve a postdoc or research assistant working with a senior researcher.<\/span><\/li>\n<li><span style=\"background-color: transparent;\">The company does not require co-funding, but the strategic relevance and plan for collaboration will be an evaluation criterion.<\/span><\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d19653 elementor-widget elementor-widget-text-editor\" data-id=\"0d19653\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Applications must be submitted no later than May 30, 2025.<\/p>\n<p><strong style=\"text-align: var(--text-align);\">Budget:<\/strong><span style=\"text-align: var(--text-align);\"> Up to 2 million DKK.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-f5e6bc9 e-flex e-con-boxed e-con e-parent\" data-id=\"f5e6bc9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7dba0 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ed7dba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Call for Explore projects<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1bb2c4 elementor-widget elementor-widget-text-editor\" data-id=\"a1bb2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore projects are joint projects between at least one research partner and an SME.<\/p>\n<p>The research partner can get up to 400.000 DKK in funding.<\/p>\n<p>The aim is to showcase for research from universities and knowledge partners can be actively used by a SME to create and develop novel cybersecurity products.\u00a0<\/p>\n<p>Where catalyst projects are large, more extensive projects, explore projects are targeted companies and researchers interested in exploring a new relation or a new product idea.<\/p>\n<p><strong style=\"font-weight: bold;\">Requirements<\/strong><b> \u00a0 <br \/><\/b><\/p>\n<ul>\n<li>All projects must involve collaboration between at least <strong>one knowledge institution and one SME<\/strong>. Other companies can join the project, and it is especially beneficial to include a potential customer with a relevant cybersecurity problem.<\/li>\n<li>The project must address one of the themes specified in the introduction.\u00a0<\/li>\n<li>The company does not require co-funding, but the strategic relevance and plan for collaboration will be an evaluation criteria.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-406ef5c elementor-widget elementor-widget-text-editor\" data-id=\"406ef5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Applications must be submitted no later than May 30, 2025.<\/p><br><p><strong style=\"text-align: var(--text-align);\">Budget:<\/strong><span style=\"text-align: var(--text-align);\"> Up to 400.000 DKK.<\/span><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c38c2b9 e-flex e-con-boxed e-con e-parent\" data-id=\"c38c2b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3714037 elementor-widget elementor-widget-heading\" data-id=\"3714037\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Evaluation Criteria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-92c3ee1 e-con-full e-flex e-con e-child\" data-id=\"92c3ee1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-783d911 elementor-widget elementor-widget-n-accordion\" data-id=\"783d911\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1260\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1260\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Excellence \u2013 Quality in research, teaching, and innovation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1260\" class=\"elementor-element elementor-element-96ce460 e-con-full e-flex e-con e-child\" data-id=\"96ce460\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-018805d elementor-widget elementor-widget-text-editor\" data-id=\"018805d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Ambitious and clear objectives.<\/li>\n<li>The probability of a breakthrough with high gain reflects the risk.<\/li>\n<li>A clear description of the methods used.<\/li>\n<li>State-of-the-art and excellence of the question(s) investigated as well as the excellence of the solution and its method(s).<\/li>\n<li>Competences of the team.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1261\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1261\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Value creation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1261\" class=\"elementor-element elementor-element-2a0fe97 e-flex e-con-boxed e-con e-child\" data-id=\"2a0fe97\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e45ddb9 elementor-widget elementor-widget-text-editor\" data-id=\"e45ddb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Value creation for and impact on the international research community.<\/li>\n<li><span style=\"background-color: transparent;\">Value creation for Danish society, the beneficiaries, and the partners, including innovation and commercial potential.<\/span><\/li>\n<li><span style=\"background-color: transparent;\">Qualification of excellent researchers needed by universities to serve the societal demands, including maturation of early-stage researchers.<\/span><\/li>\n<li>Demonstrate DIREC&#8217;s objective of bringing partners (researchers, companies, or public organisations) together in the Danish ecosystem.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1262\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1262\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Implementation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1262\" class=\"elementor-element elementor-element-d59a503 e-con-full e-flex e-con e-child\" data-id=\"d59a503\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c48561e elementor-widget elementor-widget-text-editor\" data-id=\"c48561e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>A clear, shared vision by the partners and actions undertaken to ensure the partners\u2019 ownership.<\/li>\n<li>A multi-organizational dream team with necessary competencies, qualifications, resources, and time allocation. Diversity and experience create synergy among the participants.<\/li>\n<li>Economic efficiency by resource optimization. Efficient decision-making processes.<\/li>\n<li>Interdependencies between tasks and results.<\/li>\n<li>Relevant legal, ethical, and regulatory aspects.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1263\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1263\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Collaboration <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1263\" class=\"elementor-element elementor-element-c6a8292 e-con-full e-flex e-con e-child\" data-id=\"c6a8292\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-daf91ac elementor-widget elementor-widget-text-editor\" data-id=\"daf91ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Evaluation will be based on how closely the project is collaborating with business.<\/li>\n<li>Does the project describe how to ensure continuous collaboration? Is there a plan for regular meetings and workshops? Does the researcher plan to spend time with external partners?<\/li>\n<li>What kind of deliverables will the external partner deliver? Prototypes, reports, organizing sessions or workshops, or similar deliverables?<\/li>\n<li>What is the plan for using external partner resources in the project? Is there a plan for how to use company data to guide research? Does the company provide access to test facilities? Does the external partner provide access to key users for input and testing of research prototypes?<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1264\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1264\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Portfolio perspective <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-1264\" class=\"elementor-element elementor-element-1e082d4 e-con-full e-flex e-con e-child\" data-id=\"1e082d4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14592d8 elementor-widget elementor-widget-text-editor\" data-id=\"14592d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The board of DIREC and the steering committee will amongst the best projects use a portfolio perspective to ensure broad involvement of companies, addressing different challenges and a broad involvement of research environments.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-67173be e-flex e-con-boxed e-con e-parent\" data-id=\"67173be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a93285 elementor-widget elementor-widget-heading\" data-id=\"7a93285\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Evaluation Panel<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-124eb46 elementor-widget elementor-widget-text-editor\" data-id=\"124eb46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The evaluation panel will play a central role in assessing and recommending the research and innovation projects that receive support.\u00a0Additionally, the panel will function as a strategic advisory board and will be involved continuously to ensure the relevance, market proximity, and strategic direction of the Next Generation Cybersecurity project.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-29ffdff e-flex e-con-boxed e-con e-parent\" data-id=\"29ffdff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-23fef4e e-con-full e-flex e-con e-child\" data-id=\"23fef4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-003ebb2 eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"003ebb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-003ebb2\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/David-Basin.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Dr. David Basin<\/h2><h3 class=\"eael-team-member-position\">Professor, ETH Z\u00fcrich<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Dr. David Basin is a Professor for Information Security at ETH Zurich and an affiliated faculty at INSAIT, in Sofia Bulgaria. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He has been Editor-in-Chief of ACM Transactions on Privacy and Security (2015-2020) and is Editor-in-Chief of Springer-Verlag's book series in Information Security and Cryptography. He serves on various management and scientific advisory boards and has founded three security companies. He is a fellow of the ACM and IEEE.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-6eb6b02 e-con-full e-flex e-con e-child\" data-id=\"6eb6b02\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9998c1 eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"f9998c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-f9998c1\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/John-Henriksen_2.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">John Henriksen<\/h2><h3 class=\"eael-team-member-position\">EVP and CEO, TDC Erhverv<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">John leads the strategic development and growth of the business. With over 25 years of experience at TDC, he has previously held several senior positions, including Senior Vice President for \"Customer First\" and Vice President for Business &amp; Partner Sales. John has developed a deep understanding of the Danish business telecommunications market and is a prominent figure in digital infrastructure and customer experiences. He also serves on the boards of DI Digital and IT-Branchen, and has previously been chairman of Cloudeon and TDC MobilCenter, among others.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-7828a2e e-con-full e-flex e-con e-child\" data-id=\"7828a2e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4d4ef eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"7e4d4ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-7e4d4ef\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Sarah-Aalborg.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Sarah Aalborg<\/h2><h3 class=\"eael-team-member-position\"> member of the Danish Cyber Security Council<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Sarah is the former Chief Information Security Officer at Tivoli and one of the country's most inspiring profiles in information security, risk management and employee behavior. She is also a member of the Danish Cyber Security Council. With over 20 years of experience from DSB, Novozymes and Oticon, she brings a unique combination of deep technical insight and behavioral design to the table - always with a focus on solutions that make a real difference. Sarah is the author of the book Secure by Choice, which provides a practical and innovative approach to creating a strong safety culture. She was nominated for CISO of the Year in 2023.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-380299c e-flex e-con-boxed e-con e-parent\" data-id=\"380299c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-bf15683 e-con-full e-flex e-con e-child\" data-id=\"bf15683\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e78989a eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"e78989a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-e78989a\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Alex-Mathar.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Alex Mathar<\/h2><h3 class=\"eael-team-member-position\">Major and Senior officer, the Danish Armed Forces<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Alex Mathar is currently serving as Head of Operations Center East, Cyber Division, at the Danish Defence Acquisition and Logistics Organization (DALO). With more than 20 years of experience spanning operational, diplomatic, and strategic roles\u2014including deployments to Kosovo, Iraq, and Afghanistan\u2014Alex now primarily focuses on cyber strategy, innovation, and enhancing collaboration between defence, technology, and industry.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-4d25637 e-con-full e-flex e-con e-child\" data-id=\"4d25637\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5054e3d eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"5054e3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-5054e3d\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Haya-Schulmann.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Dr. Haya Schulmann<\/h2><h3 class=\"eael-team-member-position\">Professor, Goethe University <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Prof. Dr. Haya Schulmann is a professor in the Department of Computer Science at Goethe University Frankfurt am Main and holds a LOEWE top professorship. She is a member of the Board of Directors of the National Research Center for Applied Cybersecurity ATHENE, where she represents Goethe University. At ATHENE, she coordinates the research area Analytics Based Cybersecurity (ABC).<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c40a1b8 e-con-full e-flex e-con e-child\" data-id=\"c40a1b8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1370a11 eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"1370a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-1370a11\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Michael_Thiessmeier.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Michael Thiessmeier<\/h2><h3 class=\"eael-team-member-position\"> Co-founder and Executive Director, NAIC ISAO<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Michael is Co-Founder and Executive Director of the U.S National AI and Cybersecurity Information Sharing and Analysis Organization (NAIC ISAO) and President of Cyber Eagle. Michael leads efforts in fostering international cooperation and developing strategies to leverage AI for cybersecurity enhancements. Michael has startup and scale up experience from Silicon Valley, where he has led public exits valued at $1.6 billion and $260 million. He also played a critical role during the PlayStation 4 launch at Sony. He was a U.S. delegate and co-editor to the ISO and has help shaped 40 leading information security standards globally, including significant work on ISO 27034.  <\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-d199d54 e-flex e-con-boxed e-con e-parent\" data-id=\"d199d54\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-ca4e8a8 e-con-full e-flex e-con e-child\" data-id=\"ca4e8a8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87d6278 eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"87d6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-87d6278\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Shaun-Reardon.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Shaun Reardon<\/h2><h3 class=\"eael-team-member-position\"> Principal Consultant, Cyber Security Division, DNV<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Shaun has worked across diverse cyber security domains including IT, systems administration, penetration testing, security management, risk and industrial systems cyber security. Prior to moving to Norway, he was a police detective officer at Scotland Yard for over 26 years working in units including counter-terrorism, international organised crime, the UK National Hi-Tech Crime Unit and intelligence. He specialised in cyber investigations and digital forensics and was the lead cyber forensic investigator in the 2006 plot to blow up 7 transatlantic airliners. He headed cyber operations  for the 2012 London Olympics and led the maritime and CBRN response teams.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-bcf388c e-con-full e-flex e-con e-child\" data-id=\"bcf388c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c568f3b eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"c568f3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-c568f3b\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/Emil-Hansen.png\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Emil Hansen<\/h2><h3 class=\"eael-team-member-position\"> CTO, Cryptomathic<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">Emil  has over 15 years of development and managerial experience in IT, with a strong focus on security and cloud infrastructure. Emil empowers the development of a secure digital future by leading Cryptomathic\u2019s technical teams across four diverse product lines: Payment, Mobile Application Security, Digital Identities and Signatures, and Key Management. Emil is tirelessly articulating the need for cryptographic agility in the transition to quantum resilient cryptography, also known as Post Quantum Cryptography (PQC)<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-6fc4e02 e-con-full e-flex e-con e-child\" data-id=\"6fc4e02\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fab7a1f eael-team-align-left elementor-widget elementor-widget-eael-team-member\" data-id=\"fab7a1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-team-member.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t<div id=\"eael-team-member-fab7a1f\" class=\"eael-team-item eael-team-members-circle \">\n\t\t<div class=\"eael-team-item-inner\">\n\t\t\t<div class=\"eael-team-image\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/06\/Simon-Simonsen_lille.jpg\" alt=\"\">\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t<div class=\"eael-team-content\">\n\t\t\t\t<h2 class=\"eael-team-member-name\">Simon Simonsen<\/h2><h3 class=\"eael-team-member-position\">Lead specialist, systematic<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"eael-team-text\">With experience from CrowdStrike, Danske Commodities, and currently serving as Lead Specialist at Systematic, Simon understands what it takes for organizations and governments to stay ahead of adversaries. He has a strong track record in building teams and IT infrastructure that align with business goals and give security teams a home-court advantage. His experience spans roles as a subject matter expert in securing infrastructure, providing observability, and supporting product development for IT and security teams\u2014up to board-level reporting on cyber risk and mitigation strategies. Currently, he focuses on leveraging LLM technology and agentic AIs to enhance workflows within cybersecurity disciplines such as detection engineering, data science, infrastructure hardening, and developer support tooling.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2366c0f e-flex e-con-boxed e-con e-parent\" data-id=\"2366c0f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-52ae4da e-con-full e-flex e-con e-child\" data-id=\"52ae4da\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-300462d elementor-widget elementor-widget-heading\" data-id=\"300462d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FREQUENTLY ASKED QUESTIONS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e59bc1 elementor-widget elementor-widget-n-accordion\" data-id=\"3e59bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6530\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6530\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What types of overhead costs should we factor in? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6530\" class=\"elementor-element elementor-element-0ef5fb0 e-con-full e-flex e-con e-child\" data-id=\"0ef5fb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8bd675 elementor-widget elementor-widget-text-editor\" data-id=\"c8bd675\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Universities may include overhead costs at a fixed rate of 44%, which will be automatically calculated in the budget template.<\/li>\n<li>For RTOs (GTS institutes), the applicable overhead rate should follow the specific agreement negotiated with the Danish Industry Foundation (Industriens Fond).<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6531\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6531\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is the expected length of the project proposal? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6531\" class=\"elementor-element elementor-element-4291f3a e-flex e-con-boxed e-con e-child\" data-id=\"4291f3a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5245b36 elementor-widget elementor-widget-text-editor\" data-id=\"5245b36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The final proposal is expected to be 4\u20137 pages in length, excluding references.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6532\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6532\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How are IP rights handled during the project?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6532\" class=\"elementor-element elementor-element-209a2d7 e-con-full e-flex e-con e-child\" data-id=\"209a2d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cfdec2 elementor-widget elementor-widget-text-editor\" data-id=\"1cfdec2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DIREC can provide existing templates for collaboration agreements, such as those used in PhD partnerships. Intellectual property (IP) rights will need to be negotiated directly between the participating project partners, allowing for flexible and case-specific arrangements.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6533\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6533\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can only cybersecurity companies participate as partners?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6533\" class=\"elementor-element elementor-element-3dbe5d8 e-con-full e-flex e-con e-child\" data-id=\"3dbe5d8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89165ba elementor-widget elementor-widget-text-editor\" data-id=\"89165ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No. The call requires participation from at least one SME (small or medium-sized enterprise), but it does not need to be a cybersecurity company. In fact, it is especially encouraged to include potential customers with significant cybersecurity needs.<\/p>\n<p>Companies from sectors such as energy, health, finance, or manufacturing are welcome if they face cybersecurity issues.<\/p>\n<p>The SME&#8217;s role can be:<\/p>\n<p>A cybersecurity developer, working closely with researchers.<\/p>\n<p>A customer or end user with relevant cybersecurity challenges, providing real-world problems and test environments.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6534\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6534\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can we apply for funding for an existing project? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6534\" class=\"elementor-element elementor-element-87815da e-con-full e-flex e-con e-child\" data-id=\"87815da\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3068f0d elementor-widget elementor-widget-text-editor\" data-id=\"3068f0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes, but only if the project aligns with the goals and requirements of the call.<\/p>\n<p>Specifically, the project must:<\/p>\n<ul>\n<li>Involve active collaboration between a Danish university or knowledge institution and an SME.<\/li>\n<li>Address one of the three cybersecurity themes: software\/systems, monitoring of critical infrastructure, or AI security.<\/li>\n<li>Deliver research-driven innovation with high impact potential.<\/li>\n<li>Demonstrate a clear link between the research activities and the SME&#8217;s needs.\u00a0<\/li>\n<li>Be aligned with the designated project types \u2014 <em>Catalyst<\/em> (up to 2M DKK) or <em>Explore<\/em> (up to 400k DKK).<\/li>\n<\/ul>\n<p>If your existing project meets these conditions, and particularly if it can show that further research or development will take place during the funding period, it is eligible for funding.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6535\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6535\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the reporting requirements?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6535\" class=\"elementor-element elementor-element-fc69ad7 e-flex e-con-boxed e-con e-child\" data-id=\"fc69ad7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90b59fd elementor-widget elementor-widget-text-editor\" data-id=\"90b59fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Each sub-project (Catalyst and Explore projects) is required to submit a status report at least twice annually to the project\u2019s management group, which comprises representatives from DIREC, NFC, and potentially other relevant stakeholders. <\/p>\n<p>These reports must provide a comprehensive overview of project progress, emerging challenges, and next steps in the project timeline.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6536\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6536\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can I use the project funding to further grow my existing company?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6536\" class=\"elementor-element elementor-element-59e271e e-flex e-con-boxed e-con e-child\" data-id=\"59e271e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7147db elementor-widget elementor-widget-text-editor\" data-id=\"c7147db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes, but only indirectly and within the scope of the project goals. The funding is awarded to the research partner (university or GTS institute), not directly to your company.\u00a0<\/p>\n<p>Your company, as the SME partner, benefits by:\u00a0<\/p>\n<ul>\n<li>Collaborating closely with top researchers to solve a cybersecurity challenge.\u00a0<\/li>\n<li>Co-developing or testing innovative cybersecurity solutions.\u00a0<\/li>\n<li>Gaining access to talent, facilities, or prototypes that can lead to commercial products or services.\u00a0<\/li>\n<li>Strengthening your network and credibility within the cybersecurity ecosystem.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>However, the funding cannot be used to cover your company\u2019s general operating costs, salaries, or commercial activities unrelated to the project. The value to your company comes from the strategic collaboration and innovation, not direct from financial support.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6537\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6537\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can a foreign company obtain a Danish CVR number to qualify as a Danish SME and participate in a research project? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6537\" class=\"elementor-element elementor-element-3b2de43 e-flex e-con-boxed e-con e-child\" data-id=\"3b2de43\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eaf1ed7 elementor-widget elementor-widget-text-editor\" data-id=\"eaf1ed7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A foreign company may obtain a Danish CVR number and be considered a Danish SME if the following conditions are met:<\/p>\n<ul>\n<li>The company establishes genuine operations in Denmark, such as setting up a Danish subsidiary that actively engages in development work and plays a meaningful role as a partner in the project.<\/li>\n<li>There is a strategic rationale for placing activities in Denmark, such as access to local research environments, testing facilities, or market opportunities.<\/li>\n<li>The entity registered under the Danish CVR number meets the formal criteria for an SME (e.g., number of employees, turnover) and operates as an independent legal entity with substantive activity in Denmark.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Establishing a CVR number will not be considered acceptable for project participation if:<\/p>\n<ul>\n<li>It is solely a formal or symbolic measure to gain access to funding reserved for Danish SMEs, without real activity, staff, or presence in Denmark.<\/li>\n<li>The entity fails to demonstrate meaningful collaboration with the research institution or other project partners.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6538\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6538\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can a researcher establish a start-up to apply for project funding? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6538\" class=\"elementor-element elementor-element-fcf3d10 e-flex e-con-boxed e-con e-child\" data-id=\"fcf3d10\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb3d90 elementor-widget elementor-widget-text-editor\" data-id=\"5cb3d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A researcher may establish a start-up to seek funding if the following criteria are met:<\/p>\n<ul>\n<li>The start-up is formally registered with a Danish CVR number and operates as an independent SME with actual business activity (e.g., development, operations, partnerships).<\/li>\n<li>A clear plan exists for how the start-up will contribute to the project, for example through access to test environments, data, technological expertise, or market channels.<\/li>\n<li>The researcher maintains a clear distinction between their academic role and their role as a business owner\/partner, for example by delegating university responsibilities to other team members within the project.<\/li>\n<li>Any potential conflicts of interest are addressed transparently and proactively, in compliance with university guidelines on spin-outs and academic entrepreneurship.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>A start-up would not be acceptable if:<\/p>\n<ul>\n<li>The start-up is established solely to qualify as an SME and receive funding, without real activity, personnel, or development plans.<\/li>\n<li>There is no clear and transparent distinction between the researcher\u2019s academic role and entrepreneurial role, and the project&#8217;s roles and responsibilities remain ambiguous.<\/li>\n<li>The project circumvents public funding rules, for instance if financial resources effectively return to the same individual.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6539\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6539\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can an SME seek support to scale up its existing activities through research funding? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" role=\"region\" aria-labelledby=\"e-n-accordion-item-6539\" class=\"elementor-element elementor-element-b024c32 e-flex e-con-boxed e-con e-child\" data-id=\"b024c32\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c25ba43 elementor-widget elementor-widget-text-editor\" data-id=\"c25ba43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An SME may seek support to scale up its existing activities if:<\/p>\n<ul>\n<li>The company collaborates with research partners to develop genuinely new outcomes.<\/li>\n<li>The project contains a clear research and innovation component rather than being an extension of business-as-usual development.<\/li>\n<li>The SME participates as an active partner in collaboration with knowledge institutions and contributes relevant resources or expertise (e.g., test environments, data, case studies).<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Funding is not appropriate if:<\/p>\n<ul>\n<li>It is used solely to expand commercial activities without innovative content or meaningful research collaboration.<\/li>\n<li>The project effectively serves as disguised support for ongoing product development that lacks new research contributions.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cabbed5 e-flex e-con-boxed e-con e-parent\" data-id=\"cabbed5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e175dbe elementor-grid-2 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e175dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;2&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-35140 post type-post status-publish format-standard has-post-thumbnail hentry category-previous-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/qa-session-cybersecurity-call\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity-300x169.jpg\" class=\"attachment-medium size-medium wp-image-35133\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity-300x169.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity-1024x576.jpg 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity-768x432.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity-1536x864.jpg 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2025\/05\/QandA-cybersecurity.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<div class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/qa-session-cybersecurity-call\/\" >\n\t\t\t\tQ&#038;A session \u2013 Cybersecurity call\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p><b>19. maj 2025<\/b><br \/>\nOnline session<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/direc.dk\/da\/qa-session-cybersecurity-call\/\" aria-label=\"Read more about Q&#038;A session \u2013 Cybersecurity call\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e6896d7 e-flex e-con-boxed e-con e-parent\" data-id=\"e6896d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-864802e e-con-full e-flex e-con e-child\" data-id=\"864802e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4caac18 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4caac18\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f16dc8 elementor-widget elementor-widget-text-editor\" data-id=\"8f16dc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you have further questions, feel free to contact us.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-acd6b6d e-con-full e-flex e-con e-child\" data-id=\"acd6b6d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16eafa6 eael-fg-card-content-align-left elementor-widget elementor-widget-eael-filterable-gallery\" data-id=\"16eafa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;photo_gallery&quot;:&quot;yes&quot;}\" data-widget_type=\"eael-filterable-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style id=\"eael-fg-inline-css-16eafa6\">@media only screen and (max-width: 2399px) {\n\t\t\t\t\t.elementor-element.elementor-element-16eafa6 .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 33.333333333333%;\n\t\t\t\t\t    }\n\t\t\t\t\t}@media only screen and (max-width: 1024px) {\n\t\t\t\t\t.elementor-element.elementor-element-16eafa6  .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 50%;\n\t\t\t\t\t    }\n\t\t\t\t\t}@media only screen and (max-width: 767px) {\n\t\t\t\t\t.elementor-element.elementor-element-16eafa6  .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 100%;\n\t\t\t\t\t    }\n\t\t\t\t\t}<\/style>        <div id=\"eael-filter-gallery-wrapper-16eafa6\" class=\"eael-filter-gallery-wrapper\" data-layout-mode=\"card\" data-breakpoints=\"{&quot;mobile&quot;:{&quot;label&quot;:&quot;Mobil enhed, vertikal&quot;,&quot;value&quot;:767,&quot;default_value&quot;:767,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:true},&quot;mobile_extra&quot;:{&quot;label&quot;:&quot;Mobil enhed, horisontal&quot;,&quot;value&quot;:880,&quot;default_value&quot;:880,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;tablet&quot;:{&quot;label&quot;:&quot;Tablet Portrait&quot;,&quot;value&quot;:1024,&quot;default_value&quot;:1024,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:true},&quot;tablet_extra&quot;:{&quot;label&quot;:&quot;Tablet Landscape&quot;,&quot;value&quot;:1200,&quot;default_value&quot;:1200,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;laptop&quot;:{&quot;label&quot;:&quot;B\\u00e6rbar computer&quot;,&quot;value&quot;:1366,&quot;default_value&quot;:1366,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;widescreen&quot;:{&quot;label&quot;:&quot;Widescreen&quot;,&quot;value&quot;:2400,&quot;default_value&quot;:2400,&quot;direction&quot;:&quot;min&quot;,&quot;is_enabled&quot;:false}}\" data-default_control_key=\"0\" data-custom_default_control=\"1\">\n                    <div class=\"eael-filter-gallery-container eael-filter-gallery-grid\" data-images-per-page=\"\" data-total-gallery-items=\"2\" data-nomore-item-text=\"\" data-is-randomize=\"no\" data-settings=\"{&quot;grid_style&quot;:&quot;grid&quot;,&quot;popup&quot;:&quot;buttons&quot;,&quot;duration&quot;:500,&quot;gallery_enabled&quot;:&quot;yes&quot;,&quot;video_gallery_yt_privacy&quot;:&quot;&quot;,&quot;control_all_text&quot;:null,&quot;mobile_scroll_to_top&quot;:&quot;&quot;,&quot;mobile_scroll_offset&quot;:0,&quot;post_id&quot;:34827,&quot;widget_id&quot;:&quot;16eafa6&quot;}\" data-search-all=\"\" data-gallery-items=\"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\" data-init-show=\"100\">\n            <div class=\"eael-filterable-gallery-item-wrap eael-cf-thomas-riisgaard-hansen\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" width=\"300\" height=\"208\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/03\/ThomasRiisgaardHansen_Press3-300x208.jpg\" class=\"attachment-medium size-medium wp-image-4726\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/03\/ThomasRiisgaardHansen_Press3-300x208.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/03\/ThomasRiisgaardHansen_Press3-768x533.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/03\/ThomasRiisgaardHansen_Press3.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><div class=\"gallery-item-caption-wrap card-hover-bg caption-style-hoverer \">\n                            <div class=\"gallery-item-buttons\"><\/div>\n                        <\/div><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h2 class=\"fg-item-title\">Thomas Riisgaard Hansen<\/h2><div class=\"fg-item-content\"><p><strong>Director<br \/>DIREC<\/strong><\/p>\n<p><a href=\"mailto:thomas.r.hansen@direc.dk\">thomas.r.hansen@direc.dk<\/a><br \/>+45 29 40 33 97<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap eael-cf-aleksander-moos\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" width=\"300\" height=\"224\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Skaermbillede-2025-04-10-kl.-13.17.04-300x224.png\" class=\"attachment-medium size-medium wp-image-34696\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Skaermbillede-2025-04-10-kl.-13.17.04-300x224.png 300w, https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Skaermbillede-2025-04-10-kl.-13.17.04.png 721w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><div class=\"gallery-item-caption-wrap card-hover-bg caption-style-hoverer \">\n                            <div class=\"gallery-item-buttons\"><\/div>\n                        <\/div><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h2 class=\"fg-item-title\">Aleksander Moos<\/h2><div class=\"fg-item-content\"><p><strong>Advisor<br \/>\nNational Defence Technology Centre<\/strong><\/p>\n<p><a href=\"mailto:aleksander.moos@alexandra.dk\">aleksander.moos@alexandra.dk<\/a><\/p>\n<p>+45 22 18 82 07<\/p>\n<\/div><\/div><\/div><\/div><\/div>        <\/div>\n                <\/div>\n        \n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>THE DEADLINE FOR APPLICATIONS HAS PASSED Next generation Cybersecurity &#8211; call for proposals How can we develop competitive cyber companies by utilizing Denmark&#8217;s strong research ecosystem? DIREC and the National Defence Technology Centre (NFC) welcome project proposals for innovative cyber projects with a high impact potential. A strong collaboration between research and industry DIREC, the [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":34629,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-34827","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Next Generation Cyber Security: Call for proposals - DIREC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Generation Cyber Security: Call for proposals - DIREC\" \/>\n<meta property=\"og:description\" content=\"THE DEADLINE FOR APPLICATIONS HAS PASSED Next generation Cybersecurity &#8211; call for proposals How can we develop competitive cyber companies by utilizing Denmark&#8217;s strong research ecosystem? DIREC and the National Defence Technology Centre (NFC) welcome project proposals for innovative cyber projects with a high impact potential. A strong collaboration between research and industry DIREC, the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/\" \/>\n<meta property=\"og:site_name\" content=\"DIREC\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T08:05:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Next-generation-AI-17-1024x576.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data1\" content=\"24 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/\",\"name\":\"Next Generation Cyber Security: Call for proposals - DIREC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Next-generation-AI-17.png\",\"datePublished\":\"2025-04-11T12:08:55+00:00\",\"dateModified\":\"2025-06-10T08:05:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Next-generation-AI-17.png\",\"contentUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Next-generation-AI-17.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/next-generation-cyber-security-call-for-proposals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/direc.dk\\\/da\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Next Generation Cyber Security: Call for proposals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#website\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/\",\"name\":\"DIREC\",\"description\":\"Digital Research Centre Denmark\",\"publisher\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/direc.dk\\\/da\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#organization\",\"name\":\"DIREC\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/DIREC_logo_2023_bla.png\",\"contentUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/DIREC_logo_2023_bla.png\",\"width\":2786,\"height\":786,\"caption\":\"DIREC\"},\"image\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Next Generation Cyber Security: Call for proposals - DIREC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/","og_locale":"da_DK","og_type":"article","og_title":"Next Generation Cyber Security: Call for proposals - DIREC","og_description":"THE DEADLINE FOR APPLICATIONS HAS PASSED Next generation Cybersecurity &#8211; call for proposals How can we develop competitive cyber companies by utilizing Denmark&#8217;s strong research ecosystem? DIREC and the National Defence Technology Centre (NFC) welcome project proposals for innovative cyber projects with a high impact potential. A strong collaboration between research and industry DIREC, the [&hellip;]","og_url":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/","og_site_name":"DIREC","article_modified_time":"2025-06-10T08:05:34+00:00","og_image":[{"url":"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Next-generation-AI-17-1024x576.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimeret l\u00e6setid":"24 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/","url":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/","name":"Next Generation Cyber Security: Call for proposals - DIREC","isPartOf":{"@id":"https:\/\/direc.dk\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/#primaryimage"},"image":{"@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/#primaryimage"},"thumbnailUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Next-generation-AI-17.png","datePublished":"2025-04-11T12:08:55+00:00","dateModified":"2025-06-10T08:05:34+00:00","breadcrumb":{"@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/#primaryimage","url":"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Next-generation-AI-17.png","contentUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2025\/04\/Next-generation-AI-17.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/direc.dk\/da\/next-generation-cyber-security-call-for-proposals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/direc.dk\/da\/"},{"@type":"ListItem","position":2,"name":"Next Generation Cyber Security: Call for proposals"}]},{"@type":"WebSite","@id":"https:\/\/direc.dk\/da\/#website","url":"https:\/\/direc.dk\/da\/","name":"DIREC","description":"Digital Research Centre Denmark","publisher":{"@id":"https:\/\/direc.dk\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/direc.dk\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/direc.dk\/da\/#organization","name":"DIREC","url":"https:\/\/direc.dk\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/direc.dk\/da\/#\/schema\/logo\/image\/","url":"https:\/\/direc.dk\/wp-content\/uploads\/2021\/02\/DIREC_logo_2023_bla.png","contentUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2021\/02\/DIREC_logo_2023_bla.png","width":2786,"height":786,"caption":"DIREC"},"image":{"@id":"https:\/\/direc.dk\/da\/#\/schema\/logo\/image\/"}}]}},"dynamic_page_title":"","dynamic_page_description":"","dynamic_page_partners":"","dynamic_page_scientific_impact":"","dynamic_page_people":"","dynamic_page_project_period":"","dynamic_page_funding":"","dynamic_page_publications":"","dynamic_page_cover_image":"","_links":{"self":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/34827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/comments?post=34827"}],"version-history":[{"count":3,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/34827\/revisions"}],"predecessor-version":[{"id":36051,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/34827\/revisions\/36051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/media\/34629"}],"wp:attachment":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/media?parent=34827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}