If you are an airport operator dealing with growing cyber threats to flight systems, baggage handling, and passenger data — this project developed a federated cyber-range that lets your security team practice defending against realistic attack scenarios specific to aviation infrastructure. The platform uses threat intelligence gathered from the dark web to keep training scenarios current, and includes econometric models to estimate the real financial impact of a breach on your operations.
Cyber-Attack Training Platform for Aviation, Energy Grid and Maritime Companies
Imagine a flight simulator, but instead of training pilots, it trains your cybersecurity team to fight off hackers. FORESIGHT built a network of realistic practice environments — cyber-ranges — where security professionals can rehearse defending airports, power grids, and shipping systems against the latest attack techniques. The platform even scrapes the dark web to learn what hackers are planning next, so training stays ahead of real threats. It also helps companies figure out how much a cyber-attack would actually cost them, so they can invest in the right defenses.
What needed solving
Critical infrastructure operators in aviation, energy, and maritime face escalating cyber threats but have no safe way to train their teams against realistic attack scenarios. Traditional security training uses outdated, static exercises that don't reflect how modern hackers actually operate — leaving teams underprepared when a real attack hits. Companies also struggle to quantify the financial impact of cyber-risks, making it hard to justify the right level of security investment.
What was built
FORESIGHT built a federated cyber-range platform — a network of interconnected simulation environments where cybersecurity teams can practice defending aviation, power grid, and naval systems against realistic, dynamically-generated attack scenarios. The platform includes dark web threat intelligence gathering for up-to-date scenarios, econometric models for calculating cyber-risk costs, and professional training curricula linked to certification programs. The project produced 22 deliverables across these capabilities.
Who needs this
Who can put this to work
If you are a power grid operator worried about attacks on your smart grid infrastructure and IoT-connected devices — this project built simulation environments that replicate your operational technology landscape so your team can train on cross-domain attack scenarios combining IT and OT threats. The platform was developed with 11 industry partners across 9 countries, bringing real-world operational knowledge into the training scenarios.
If you are a shipping company or port authority facing increasing digitization of vessel systems and port infrastructure — this project created dynamic training scenarios that mirror real maritime cyber threats, from GPS spoofing to cargo management system attacks. The risk analysis tools help you estimate recovery costs and select the most affordable security measures for your specific maritime environment.
Quick answers
What would this cost to implement at our organization?
The project's EU contribution is not disclosed in the available data. As an Innovation Action with 24 partners, the total investment was substantial. Licensing or subscription costs for the cyber-range platform would need to be discussed directly with the consortium — pricing likely depends on the number of users, domains covered, and whether you need a dedicated or shared training environment.
Can this scale to cover our entire organization across multiple sites?
Yes — the platform was specifically designed as a federated cyber-range, meaning multiple separate training environments can be networked together. This architecture supports cross-domain and hybrid scenarios combining aviation, smart grid, naval, and IoT domains, which suggests it can handle multi-site, multi-division enterprise deployments.
Who owns the intellectual property and can we license it?
The consortium of 24 partners across 9 countries jointly developed the platform. IP ownership is governed by the EU grant agreement, typically shared among contributing partners. Licensing arrangements would need to be negotiated with the coordinator (KENTRO MELETON ASFALEIAS, Greece) or the specific partners who developed the components you need.
Does this meet industry cybersecurity regulations and certification requirements?
The project explicitly developed training curricula linked to professional certification programs. This suggests alignment with established cybersecurity standards. The platform also includes risk analysis tools designed to help organizations select security measures that meet compliance requirements in aviation, energy, and maritime sectors.
How long does it take to set up and start training?
Based on available project data, the platform supports the creation of dynamic training scenarios that adapt to current threat intelligence. The project ran for 3.5 years (2019-2023) and produced 22 deliverables. Deployment timelines would depend on the complexity of your infrastructure and the domains you need simulated.
Can this integrate with our existing security tools and infrastructure?
The federated architecture was designed to extend the capabilities of existing cyber-ranges, not replace them. The platform supports cross-domain and hybrid scenarios including IoT integration, which suggests compatibility with diverse technology stacks. The 11 industry partners in the consortium likely ensured the platform works with real-world enterprise environments.
Is there ongoing support and threat intelligence updates?
The platform includes cyber-threat intelligence gathering from the dark web to continuously update training scenarios based on forecasted attack trends. However, with the project closed as of March 2023, ongoing support would depend on whether consortium partners have commercialized the platform or offer it as a service.
Who built it
This is a strong, industry-heavy consortium with 24 partners across 9 countries — well above the average EU project size, reflecting the complexity of building a cross-domain cybersecurity platform. With 11 industry partners making up 46% of the consortium and 6 SMEs on board, this was clearly built with commercial viability in mind, not just academic research. The coordinator is a Greek security research center (KENTRO MELETON ASFALEIAS), and the geographic spread across AT, BG, CY, DE, EE, EL, FR, LU, and UK covers major European cybersecurity markets. The 8 universities and 4 research organizations provided the scientific depth, while the industry majority ensured the platform addresses real operational needs in aviation, energy, and maritime.
- KENTRO MELETON ASFALEIASCoordinator · EL
- THE UNIVERSITY COURT OF ABERTAY UNIVERSITYparticipant · UK
- ELEKTROENERGIEN SISTEMEN OPERATOR EADparticipant · BG
- UNIVERSITY OF PORTSMOUTH HIGHER EDUCATION CORPORATIONparticipant · UK
- INCITES CONSULTING SAparticipant · LU
- ETHNIKO KENTRO EREVNAS KAI TECHNOLOGIKIS ANAPTYXISparticipant · EL
- EUROPEAN DYNAMICS ADVANCED INFORMATION TECHNOLOGY AND TELECOMMUNICATION SYSTEMS SAthirdparty · EL
- ATHENS INTERNATIONAL AIRPORT S.A.participant · EL
- ELECTRODISTRIBUTION GRID WEST ADparticipant · BG
- AIRBUS CYBERSECURITY SASparticipant · FR
- INSTITUT PO OTBRANAparticipant · BG
- EUROPEAN DYNAMICS LUXEMBOURG SAparticipant · LU
- UNIVERSITY OF PLYMOUTHparticipant · UK
- MINDS & SPARKS GMBHparticipant · AT
- CYBEXER TECHNOLOGIESparticipant · EE
- SHEFFIELD HALLAM UNIVERSITYparticipant · UK
- UNIVERSITY OF PELOPONNESEparticipant · EL
- INNOVATIVE ENERGY AND INFORMATION TECHNOLOGIES LTDparticipant · BG
- ANOIKTO PANEPISTIMIO KYPROU (OPEN UNIVERSITY OF CYPRUS)participant · CY
- THALESparticipant · FR
- CYBERCRIME RESEARCH INSTITUTE GMBHparticipant · DE
- ECOLE NAVALEparticipant · FR
- UNIVERSITY OF STRATHCLYDEparticipant · UK
The coordinator is KENTRO MELETON ASFALEIAS (Greece). SciTransfer can facilitate an introduction to discuss licensing, pilot programs, or partnership opportunities.
Talk to the team behind this work.
Want to explore how FORESIGHT's cyber-range technology could strengthen your organization's security posture? SciTransfer can connect you with the right consortium partners for your specific domain — contact us for a tailored briefing.