{"id":524,"date":"2024-04-24T08:44:34","date_gmt":"2024-04-24T06:44:34","guid":{"rendered":"https:\/\/cyber.ddev.site\/wp\/awards"},"modified":"2026-01-29T13:42:46","modified_gmt":"2026-01-29T12:42:46","slug":"awarded","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/awarded\/","title":{"rendered":"Awards"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle\">Your expertise in cyber security is needed! Research groundbreaking innovations for internal and external security! We have already identified the most pressing research questions for you: on the basis of needs, monitoring and trend, scenario and foresight analyses.    <br\/><br\/>We have thus identified the topics that could have disruptive potential in ten to 15 years&#8217; time. You are researching these topics with a technology readiness level of one to four (TRL 1-4).   <\/p>\n\n<p class=\"has-text-align-center is-style-subtitle\">Means: We finance and evaluate your innovation from the idea to the functioning laboratory test. Failure is possible. We know that. But we accept this risk. Innovative award procedures make this possible. For example, PreCommercial Procurement (PCP), a pre-commercial procurement procedure that the Cyberagentur is using on a large scale for the first time in Germany. With this in mind: Apply!      <\/p>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Filter the awards:<\/strong><\/h2>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n  <div class=\"ce-tender-list filterable\" data-filtersetstoragekey=\"tenderfilterset\" data-maxitems=\"3\" data-loadmorestep=\"3\">\n    <form class=\"ce-project-list__filter filterable-filter-form\" autocomplete=\"off\">\n  <div class=\"row\">\n    <div class=\"col-12 col-md\">\n      <label>Focal points\n        <select class=\"ce-project-list__filter__cat filterable-filter\" name=\"category\" aria-label=\"Filter by focus\" data-labelnoresult=\"No focal points found\" data-placeholder=\"Select filter\" multiple data-filterproperty=\"category\">\n          <option value='67'>Key technologies<\/option><option value='68'>Secure Society<\/option><option value='61'>Secure systems<\/option>\n        <\/select>\n      <\/label>\n    <\/div>\n  <\/div>\n  <div class=\"row\">\n    <div class=\"col-12 col-md\">\n      <label>Status\n        <select class=\"ce-project-list__filter__cat filterable-filter\" name=\"category\" aria-label=\"Filter by status\" data-labelnoresult=\"No status found\" data-placeholder=\"Select filter\" multiple data-filterproperty=\"state\">\n          <option value='72'>Planned Program<\/option><option value='70'>Call for tenders<\/option><option value='71'>Project phase<\/option><option value='69'>Completed<\/option>\n        <\/select>\n      <\/label>\n    <\/div>\n  <\/div>  \n  <div class=\"row\">\n    <div class=\"col-12 col-md\">\n      <div class=\"form-text-wrapper\">\n        <label>\n          <span class=\"label-text\">Suchen<\/span>\n          <input type=\"text\" class=\"ce-project-list__filter__text filterable-filter\" name=\"textfilter\" value=\"\">  \n        <\/label>\n      <\/div>\n    <\/div>\n  <\/div>    \n<\/form>\n    <div class=\"ce-tender-list__content filterable-content\">\n        <article class='project filterable-item' data-category=\"111\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/software-security-score-3s\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Software Security Score (3S)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: Innovative procurement in the form of the commissioning of basic research within the framework of the use of an innovative procurement instrument (pre-commercial procurement) in implementation of the Competitive Dialogue procedure Awarding body: Agentur f\u00fcr Innovation in der Cybersicherheit GmbHServices and products: Research and development of a comprehensive evaluation method for software securityTender scope: [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/software-security-score-3s\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"\" data-state=\"\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/research-platform-for-investigating-disinformation-in-virtual-reality-forschungsplattform-zur-untersuchung-von-desinformation-in-der-virtuellen-realitaet-found-vr\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Research Platform for Investigating Disinformation in Virtual Reality \/ Forschungsplattform zur Untersuchung von Disinformation in der virtuellen Realit\u00e4t [FoUnD-VR]<\/h2>\n    <\/a>\n    \n    <p class=\"excerpt filterable-text\">Description: The project aims to develop a platform (e.g. XR test environment) for researching disinformation in virtual environments and to implement it technically as a demonstrator. Virtual environments are understood as new digital spaces (Metaverse, Omniverse, Citiverse) that can be accessed via extended reality (VR, AR, XR), in which individuals interact with other people, organizations [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/research-platform-for-investigating-disinformation-in-virtual-reality-forschungsplattform-zur-untersuchung-von-desinformation-in-der-virtuellen-realitaet-found-vr\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"110\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/datenrekonstruktion-nach-gezielter-datenreduktion-in-schwierigen-kommunikationsumgebungen-mit-fokus-auf-bild-und-ton-ddk\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Data reconstruction after targeted data reduction in difficult communication environments with a focus on image and sound (DDK)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Cybersicherheit komplexer Systeme<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: Research and development of skills in data reconstruction after targeted data reduction in difficult communication environments with a focus on image and sound Awarding body: Agentur f\u00fcr Innovation in der Cybersicherheit GmbHServices and products: Research and development services and related consultingTender scope: EU member states, Switzerland, NATO member state or NATO partner, in particular [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/datenrekonstruktion-nach-gezielter-datenreduktion-in-schwierigen-kommunikationsumgebungen-mit-fokus-auf-bild-und-ton-ddk\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/schutzmassnahmen-fuer-quantentechnologie-gegen-zukuenftige-elektronische-kampffuehrung-position-navigation-timing-eloqa-pnt\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Protective measures for quantum technology against future electronic warfare &#8211; position, navigation, timing (EloQa-PNT)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The Cyberagentur aims to counter future threats in cyberspace at an early stage. Quantum sensor technology is expected to gain military relevance from 2035 and will be used for navigation, positioning and timing, among other things. The research project &#8220;Protective measures for quantum technology against future electronic warfare &#8211; position, navigation, timing&#8221; (EloQa-PNT) aims [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/schutzmassnahmen-fuer-quantentechnologie-gegen-zukuenftige-elektronische-kampffuehrung-position-navigation-timing-eloqa-pnt\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"111\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/zukuenftige-alternative-nachrichten-und-datenuebertragung-unter-erschwerten-rahmenbedingungen-faradayscher-kaefig-zander-f\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Future alternative message and data transmission under difficult conditions &#8211; Faraday cage (ZANDER-F)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: This call addresses the challenge of communication, detection and imaging through solid (conductive) barriers or Faraday cages. Communication and imaging through shielding materials is divided into five main application scenarios (A-E) below. The aim of the research call is to deliver a prototype (up to TRL 4) that, in the best case, has the [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/zukuenftige-alternative-nachrichten-und-datenuebertragung-unter-erschwerten-rahmenbedingungen-faradayscher-kaefig-zander-f\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"111\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/automated-threat-and-response-assessment-atara\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Automated Threat and Response Assessment (ATARA)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The research project &#8220;Automated Threat and Response Assessment&#8221; (ATARA) is a research project of the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur), which investigates the capabilities of artificial intelligence (AI) to automatically develop attack vectors, defense measures and suggestions for increasing resilience. This is based exclusively on publicly available information (OSINT). The aim [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/automated-threat-and-response-assessment-atara\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/holistische-evaluation-generativer-foundation-models-im-sicherheitskontext-hegemon\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Holistic Evaluation of Generative Foundation Models in the Security Context (HEGEMON)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The term foundation model describes complex neural networks that have been trained on large amounts of data and are characterized by a high degree of generality and versatility in their possible applications. For this purpose, the models have a large number of parameters (several hundred billion) that are learned during training. The implicit knowledge [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/holistische-evaluation-generativer-foundation-models-im-sicherheitskontext-hegemon\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/forensische-digitalisate-fd\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Forensic Digital Copies (FD)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim of the competition is to research and develop a new data format that enables all data relevant to an investigation to be brought together. This should enable data from different sources to validate and complement each other. Examples of this are location data from different sources, such as telecommunications surveillance and forensic [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/forensische-digitalisate-fd\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/sca4pqc-seitenkanalresistente-post-quanten-kryptologie\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">SCA4PQC &#8211; Side-channel resistant post-quantum cryptology<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The aim of the SCA4PQC program is to research countermeasures to side-channel attacks on asymmetric methods of post-quantum cryptography. This means that the (further) development of cryptosystems is being driven forward, which should not only be resistant to attacks by classical computers and quantum computers, but whose implementation should also withstand current and foreseeable [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/sca4pqc-seitenkanalresistente-post-quanten-kryptologie\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/audioforensik-forschung-und-entwicklung-forensischer-methoden-zur-gewinnung-von-ortsinformationen-aufo\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Audio forensics &#8211; research and development of forensic methods for obtaining location information (AuFo)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The &#8220;Audio Forensics&#8221; (AuFo) research project aims to analyze low-quality audio data with regard to the recording location. For example, a characterization of the room can be mapped to a unique digital fingerprint using partial room acoustic parameters, which can potentially provide investigative clues within criminal prosecution proceedings. For example, a room can be [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/audioforensik-forschung-und-entwicklung-forensischer-methoden-zur-gewinnung-von-ortsinformationen-aufo\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"70\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/mobile-infrastructure-situation-orientation-for-mobile-autonomous-systems-moin-lamas\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Mobile Infrastructure &#8211; Situation Orientation for Mobile Autonomous Systems (MoIn-LaMAS)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Call for tenders<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description: The aim of the project is to research and develop novel methods for generating a multifactorial situation picture for deployment scenarios in which large-scale communication and navigation services are not available (e.g. blocking of Global Navigation Satellite Systems (GNSS)). This should help to enable mobile ad-hoc communication infrastructure in the future by allowing unmanned [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/mobile-infrastructure-situation-orientation-for-mobile-autonomous-systems-moin-lamas\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/digital-authentication-through-new-biometric-procedures-aubi\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Digital Authentication Using Novel Biometric Methods (AuBi)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The main objective of the project is to research and develop non-classical biometric methods for the secure digital authentication of persons &#8211; this includes authentication here and subsequently throughout the document. Novel biometric methods that are user-friendly and secure are to be researched. The focus is on continuous authentication through behavioral biometrics, stimulus-induced biometrics [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/digital-authentication-through-new-biometric-procedures-aubi\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/damage-by-cybercrime\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Damage caused by cybercrime<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim of procurement in the project &#8220;Damage caused by cybercrime&#8221; (SCK) is to develop a model, including metrics and methodologies for the holistic recording of material and immaterial damage caused by cybercrime. The model should systematically, reproducibly and verifiably record the various types and extent of damage caused by cybercrime (short, medium and [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/damage-by-cybercrime\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/side-channel-attacks-with-quantum-sensors-sca-qs\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Side-Channel Attacks with Quantum Sensing (SCA-QS)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The research project &#8220;Side-channel attacks with quantum sensors&#8221; (SCA-QS) aims to identify potential new attack vectors on microchips using quantum sensors. In principle, quantum sensors (QS) have the potential to measure physical parameters with higher resolution, sensitivity or otherwise better. The suitability of different physical quantum sensor approaches for side channel attacks (SCA) on [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/side-channel-attacks-with-quantum-sensors-sca-qs\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"69\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/umsetzung-eines-vertrauenskonzepts-fuer-eine-nachhaltige-informations-und-medienarchitektur-venim\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Implementation of a trust concept for a sustainable information and media architecture (VeNIM)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Completed<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The Cyberagentur is planning research activities on the development and implementation of a holistic trust architecture for multimedia content (audio, image, video and text) in the field of cyber-resilient society. The aim is to answer fundamental questions about the design and requirements of such an architecture. This should make it possible to verify and [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/umsetzung-eines-vertrauenskonzepts-fuer-eine-nachhaltige-informations-und-medienarchitektur-venim\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/future-cybercrime-zck\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">future cybercrime (zCK)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The call for proposals &#8220;Research on future cybercrime&#8221; (zCK), which is a research and development measure, is divided into two sub-projects (TP). The aim of procurement in the first sub-project (SP1) is to identify and analyze patterns in the field of cybercrime, which will make it possible to detect global developments at an early [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/future-cybercrime-zck\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"111\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Trusted IT ecosystem &#8211; Proven cyber security (\u00d6vIT)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/research-and-development-of-forensic-methods-for-auditing-artificial-intelligence-forensic-intelligent-systems-fis\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Research and development of forensic methods for auditing artificial intelligence &#8220;Forensics of intelligent systems&#8221; (FIS)<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim of the competition is to research and develop forensic methods for auditing artificial intelligence in order to proactively empower the German state and its organs with legal certainty and procedures for the field of AI, which affects all levels of society. The aims are thus scientific and technological progress to address problems [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/research-and-development-of-forensic-methods-for-auditing-artificial-intelligence-forensic-intelligent-systems-fis\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Encrypted Computing 2<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/robust-and-secure-machine-learning-rsml-research-and-development-of-approaches-to-robust-and-secure-machine-learning-for-security-and-defense-relevant-operational-systems\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Robust and Secure Machine Learning (RSML); research and development of approaches to robust and secure machine learning for security and defense-related operational systems<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim of the competition is to research and develop new approaches to increase the robustness and security of neural AI approaches in the context of application systems in the domains of internal and external security. The research and development activities should address the question of whether, how and to what extent safety and [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/robust-and-secure-machine-learning-rsml-research-and-development-of-approaches-to-robust-and-secure-machine-learning-for-security-and-defense-relevant-operational-systems\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/mobile-quantum-computer-quantum-processors-for-mobile-use-in-defense-and-security-applications\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Mobile quantum computer &#8211; Quantum processors for mobile use in defense and security applications<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim is to build and demonstrate the functionality of a reproducible and programmable quantum computer that is both high-performance and mobile, compact, lightweight, energy-efficient and robust in the face of changing environmental conditions. The focus is on the overall system, including all peripheral devices required for operation. One aim is therefore to integrate [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/mobile-quantum-computer-quantum-processors-for-mobile-use-in-defense-and-security-applications\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/existence-threatening-risks-from-cyber-and-information-space-high-security-in-security-critical-and-defense-relevant-scenarios\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Existential risks from the cyber and information space &#8211; high security in security-critical and defense-relevant scenarios<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The aim of the PCP is to develop new capabilities for operational cyber security in order to prepare the authorities in the field of internal and external security in Germany for future threats in the digital space. These capabilities focus on problems and issues within the pillars of prevention, detection, response and attribution of [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/existence-threatening-risks-from-cyber-and-information-space-high-security-in-security-critical-and-defense-relevant-scenarios\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"111\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/alternative-computer-architecture-ara-preliminary-study\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Alternative computer architecture (ARA) &#8211; preliminary study<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description New types of information storage are also being considered as part of the alternative computer architectures project. As there are a large number of architectures, the &#8220;Alternative computer architectures&#8221; project has been divided into two parts: Part I &#8211; Preliminary study: A first part will be a preliminary study in which a framework will [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/alternative-computer-architecture-ara-preliminary-study\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"68\" data-state=\"71\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/sichere-neuronale-mensch-maschine-interaktion\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Safe neural human-machine interaction<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Secure Society<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description The project is based on the objective of making human-machine interaction (HMI) beneficial and safe for the citizens of the Federal Republic of Germany at an early stage in terms of cyber security. The tender will be awarded in a negotiated procedure with a competitive tender and aims at the multi-phase research and development [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/sichere-neuronale-mensch-maschine-interaktion\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"69\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/erstellung-einer-uebersicht-und-machbarkeitsstudie-zur-encrypted-computing-compass\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Creation of an overview and feasibility study for the Encrypted Computing Compass<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Completed<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Description Service in the form of the creation of a framework for &#8220;Encrypted Computing&#8221; with ontology, categorization of the possible applications, evaluation of performance and security as well as the application-related comparison of the processes. Offer deadline 22.11.2021 Contracting authority: Agentur f\u00fcr Innovation in der Cybersicherheit GmbHServices and products: Research and developmentTender scope: NationalAward procedure: [&hellip;]<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/erstellung-einer-uebersicht-und-machbarkeitsstudie-zur-encrypted-computing-compass\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article>  <article class='project filterable-item' data-category=\"67\" data-state=\"69\" style=\"display:none\">\n    <a href='https:\/\/www.cyberagentur.de\/en\/tenders\/framework-fuer-cybersicherheit-in-bci-anwendungen\/'>\n      <h2 class=\"wp-block-heading has-text-align-left filterable-text\">Framework for cybersecurity in BCI applications<\/h2>\n    <\/a>\n      <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Focus:<\/span>\n    <span class='property__value'>Key technologies<\/span>\n<\/li><li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Completed<\/span>\n<\/li>\n  <\/ol>\n    <p class=\"excerpt filterable-text\">Type and scope of service: Procurement law advice and process managementType of procedure: Negotiated award without a call for competitionPerformance period: 01.04.2022 &#8211; 30.06.2022Contractor: NeuroMentum AI GmbH, Freiburg im Breisgau, Sonnenbergstra\u00dfe 28, 79117 Freiburg<\/p>\n    \n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-6 wp-block-buttons-is-layout-flex\">\n      <div class=\"wp-block-button is-style-simple\">\n          <a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/framework-fuer-cybersicherheit-in-bci-anwendungen\/\">Learn more<\/a>\n      <\/div>\n    <\/div>\n  <\/article> \n    <\/div>\n    <div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex wp-block-buttons--loadmore\">\n        <div class=\"wp-block-button\">\n          <button class=\"wp-block-button__link wp-element-button\">Show more awards<\/button>\n        <\/div>\n    <\/div> \n  <\/div>","protected":false},"excerpt":{"rendered":"<p>Your expertise in cyber security is needed! Research groundbreaking innovations for internal and external security! We have already identified the most pressing research questions for you: on the basis of needs, monitoring and trend, scenario and foresight analyses. We have thus identified the topics that could have disruptive potential in ten to 15 years&#8217; time. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-524","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Awards - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/awarded\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Awards - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Your expertise in cyber security is needed! Research groundbreaking innovations for internal and external security! We have already identified the most pressing research questions for you: on the basis of needs, monitoring and trend, scenario and foresight analyses. We have thus identified the topics that could have disruptive potential in ten to 15 years&#8217; time. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/awarded\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:42:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/awarded\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/awarded\\\/\",\"name\":\"Awards - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-24T06:44:34+00:00\",\"dateModified\":\"2026-01-29T12:42:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/awarded\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/awarded\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/awarded\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Awards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Awards - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/awarded\/","og_locale":"en_GB","og_type":"article","og_title":"Awards - Cyberagentur","og_description":"Your expertise in cyber security is needed! Research groundbreaking innovations for internal and external security! We have already identified the most pressing research questions for you: on the basis of needs, monitoring and trend, scenario and foresight analyses. We have thus identified the topics that could have disruptive potential in ten to 15 years&#8217; time. [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/awarded\/","og_site_name":"Cyberagentur","article_modified_time":"2026-01-29T12:42:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/awarded\/","url":"https:\/\/www.cyberagentur.de\/en\/awarded\/","name":"Awards - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-24T06:44:34+00:00","dateModified":"2026-01-29T12:42:46+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/awarded\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/awarded\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/awarded\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Awards"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=524"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/524\/revisions"}],"predecessor-version":[{"id":6238,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/524\/revisions\/6238"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}