SciTransfer
InfraStress · Project

Stress-Testing System That Protects Industrial Plants Against Combined Cyber and Physical Attacks

digitalPilotedTRL 7

Imagine your factory has security cameras, firewalls, and alarm systems — but none of them talk to each other. A hacker could disable your cameras while someone physically breaks in, and no single system would see the full picture. InfraStress built an integrated stress-testing platform that lets plant operators simulate combined cyber and physical attacks on their facilities before real attackers do. Think of it like a fire drill, but for hackers and saboteurs hitting your plant at the same time — tested across 5 real industrial sites in Europe.

By the numbers
5
Real-world pilot sites tested
27
Consortium partners
11
Countries represented
5
SIPS operators involved in testing
17
Industry partners in consortium
9
SMEs in consortium
TRL7
Target technology readiness level
The business problem

What needed solving

Industrial plants face an increasing risk of coordinated attacks that combine cyber intrusions with physical breaches — but most facilities rely on separate, disconnected security systems that cannot see the full picture. A hacker disabling sensors while an intruder enters physically creates blind spots that no single system catches. Operators need a way to test their defenses against these combined scenarios before real attackers exploit the gaps.

The solution

What was built

The project built an integrated stress-testing platform for critical industrial sites that combines cyber and physical threat detection, situational awareness, threat intelligence, and resilience assessment — all tailored per site. It also delivered a collective intelligence platform for knowledge sharing among critical infrastructure protection communities, validated through 5 real-world pilot evaluations.

Audience

Who needs this

Oil & gas refinery and petrochemical plant operatorsPower generation and electricity grid operatorsWater treatment and distribution utilitiesChemical manufacturing facilities with hazardous materialsPort authorities and transport hub operators managing sensitive cargo
Business applications

Who can put this to work

Oil & Gas
enterprise
Target: Refinery or petrochemical plant operators

If you are a refinery operator dealing with the growing threat of coordinated cyber-physical attacks on your control systems and perimeter — this project developed an integrated stress-testing platform validated across 5 real-world pilot sites that lets you simulate combined attack scenarios and identify vulnerabilities before they are exploited. The system was advanced from TRL4 to TRL7, meaning it is near-deployment ready.

Energy & Utilities
enterprise
Target: Power grid operators and energy utilities

If you are a utility company responsible for power generation or distribution and worried about cascading failures from coordinated attacks — this project built situational awareness tools that combine cyber threat detection with physical security monitoring into a single operational picture. With 5 SIPS operators directly involved in testing, the solutions are designed for real operational environments.

Water & Waste Management
mid-size
Target: Water treatment and distribution companies

If you are a water utility managing critical treatment plants where a security breach could affect public health — this project developed threat intelligence and resilience assessment methods specifically tailored to sensitive industrial sites. The 27-partner consortium included 17 industry players, ensuring the tools address real operational constraints, not just academic theory.

Frequently asked

Quick answers

What would this cost to implement at our facility?

The project data does not include specific pricing or licensing costs. However, as an Innovation Action that advanced solutions from TRL4 toward TRL7 with a strong go-to-market vision, the consortium planned commercial exploitation. Contact the coordinator Engineering Ingegneria Informatica SPA for pricing details.

Can this scale to protect multiple sites across different countries?

Yes — the system was designed and tested across 5 real-world pilot sites in 11 different countries. The consortium's 27 partners span diverse operational environments, which means the platform was built to handle varying regulatory and infrastructure contexts across Europe.

Who owns the intellectual property and how is it licensed?

IP is held by the consortium members, led by Engineering Ingegneria Informatica SPA (Italy). As an EU-funded Innovation Action, exploitation plans were required. Based on available project data, specific licensing terms would need to be discussed directly with the coordinator.

How does this integrate with our existing security systems?

InfraStress was specifically designed to address the fragmentation of existing security solutions. It provides integrated cyber and physical threat detection with combined situational awareness, meaning it layers on top of your current systems rather than replacing them. The user-driven approach ensured solutions are usable and compatible with real operational setups.

What kind of threats can this actually detect?

The system handles combined cyber-physical threats — simultaneous digital intrusions and physical security breaches that individually might go unnoticed. It includes cyber and physical threat detection, integrated situational awareness, and threat intelligence, all tailored to sensitive industrial plants and sites.

Is this compliant with EU critical infrastructure regulations?

The project directly addresses the EU Work Programme call SU-INFRA01-2018-2019-2020 on critical infrastructure protection. It was designed with regulatory compliance in mind, including continuity of operations and minimizing cascading effects on the environment, other critical infrastructures, and nearby citizens.

How long would deployment take?

The project ran from June 2019 to September 2021 and advanced solutions from TRL4 toward TRL7. Based on available project data, 5 pilot evaluations were completed, suggesting the system is validated but may require site-specific configuration for full deployment. Timeline would depend on your facility's complexity.

Consortium

Who built it

This is a serious industrial consortium: 27 partners across 11 countries with 63% industry participation (17 out of 27) — well above average for EU security projects. The presence of 5 actual sensitive industrial plant operators as end users means the technology was tested by the people who would actually buy it, not just built in a lab. Engineering Ingegneria Informatica SPA, the coordinator, is one of Italy's largest IT companies — not a startup that might vanish. With 9 SMEs also involved, there is likely a mix of specialized security vendors who could offer components commercially. The 3 universities and 5 research organizations provided the scientific backbone, but this consortium was clearly designed for market impact.

How to reach the team

Engineering Ingegneria Informatica SPA (Italy) — one of Italy's largest IT services companies. Reach their innovation or security division for commercial inquiries.

Next steps

Talk to the team behind this work.

SciTransfer can connect you directly with the InfraStress consortium partners best suited to your infrastructure protection needs. We identify which specific tools and partners match your facility type.