ECCC Seeks Independent Experts for Digital Europe and Horizon Europe Cybersecurity Programs

EU Cybersecurity Centre Opens Call for Experts to Oversee Billions in Digital Funding

INFORMATIONAL
May 19, 2026
3m read
Policy and ComplianceRegulatorySecurity Operations

Related Entities

Other

Digital Europe ProgrammeHorizon EuropeEU Cyber Solidarity Act

Full Report

Executive Summary

The European Cybersecurity Competence Centre (ECCC), the European Union's main body for pooling investment in cybersecurity, has issued a public call for expressions of interest for independent experts. Announced on May 18, 2026, the initiative aims to build a robust database of qualified professionals to assist in the evaluation and oversight of projects funded by the EU's flagship programs, Digital Europe and Horizon Europe. This move is part of the EU's broader strategy to bolster its digital sovereignty and resilience by strategically investing billions of Euros into cybersecurity research, innovation, and infrastructure deployment. The ECCC is seeking individuals with diverse expertise across the cybersecurity spectrum to ensure that EU funds are allocated effectively and that funded projects deliver on their objectives.


Regulatory Details

The call for experts is a critical operational component of the ECCC's mandate to manage and direct the EU's cybersecurity funding. The selected experts will perform two primary functions:

  1. Evaluation of Proposals: Experts will be tasked with reviewing and scoring applications for funding submitted under the Digital Europe and Horizon Europe programs. This involves assessing the technical merit, innovation, potential impact, and feasibility of proposed projects against the criteria set out in the work programs.
  2. Project Monitoring: For projects that receive funding, experts will act as monitors or reviewers, assessing their progress, technical outputs, and adherence to contractual obligations. This ensures accountability and helps guide projects toward successful outcomes.

The call is continuous and will remain open for the duration of the EU's 2021-2027 Multi-annual Financial Framework. However, the ECCC has set a deadline of June 15, 2026, for applicants who wish to be considered for the imminent evaluation cycles.


Affected Organizations

This initiative directly involves the European Cybersecurity Competence Centre (ECCC) and the broader European Commission apparatus responsible for the Digital Europe and Horizon Europe programs. The experts will be drawn from a wide range of organizations across the EU, including:

  • Academic and research institutions
  • Private sector companies (from startups to large enterprises)
  • National cybersecurity agencies and public bodies
  • Non-profit organizations and industry associations

Compliance Requirements

To be considered, applicants must register on the EU's official Funding & Tenders Opportunities Portal and declare their expertise. The key requirements for applicants are:

  • A high level of expertise and professional experience in one or more cybersecurity domains.
  • A minimum of five years of relevant professional experience.
  • Independence and a commitment to impartiality, with a requirement to declare any potential conflicts of interest.

Expertise is sought in a broad range of fields, including but not limited to:

  • Cybersecurity research and innovation
  • Threat intelligence and incident response
  • Cryptography
  • Network and information security
  • Security engineering and architecture
  • Data protection and privacy
  • Digital policy, law, and ethics
  • Critical infrastructure protection
  • AI and cloud security

Impact Assessment

This initiative is a key step in professionalizing the EU's cybersecurity funding process. By creating a large, diverse pool of external experts, the ECCC aims to:

  • Enhance Decision Quality: Ensure that funding decisions are based on merit and expert evaluation, rather than purely bureaucratic processes.
  • Promote Innovation: Identify and support the most promising and innovative cybersecurity projects from across the Union.
  • Strengthen the Ecosystem: Foster a pan-European community of cybersecurity professionals and build capacity within the member states.
  • Ensure Accountability: Provide robust, independent oversight for billions of Euros in public spending, ensuring that funds are used effectively to enhance the EU's collective digital security.

This effort is aligned with other major EU legislative acts, such as the EU Cyber Solidarity Act, which mandates the creation of a European Cybersecurity Alert System. The experts selected through this call will play a direct role in building the technological and human capabilities needed to realize these strategic goals.

Timeline of Events

1
May 18, 2026
The ECCC announces the call for independent experts.
2
May 19, 2026
This article was published
3
June 15, 2026
Deadline for experts to register to be considered for upcoming evaluations.

Timeline of Events

1
June 15, 2026

Deadline for experts to register to be considered for upcoming evaluations.

2
May 18, 2026

The ECCC announces the call for independent experts.

Sources & References

ECCC seeks cybersecurity experts for major funding programmes
European Cybersecurity Competence Centre (cybersecurity-centre.europa.eu)
Call for Expressions of Interest
European Cybersecurity Competence Centre (cybersecurity-centre.europa.eu)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ECCCEuropean UnionCybersecurityPolicyFundingDigital EuropeHorizon Europe

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.