Digital Innovation Hub NOSC-UA

Trusted, Interoperable Cybersecurity Data Space

Creating a comprehensive platform for collecting, recording, sharing and analyzing cyber incident information between public, private and research organizations across Europe and beyond.

The Cybersecurity Crisis

Europe faces an unprecedented surge in cyberattacks with devastating financial and reputational consequences

Explosive Growth in Attacks

46.5%

EU countries targeted in H1 2023

Growth from 9.8%

to 46.5%

Source: ENISA Financial Threat Landscape 2024

Economic Impact

$15.6T

Expected global cost by 2029

Business reputation at stake
Non-reporting results in regulatory fines

Scalability Crisis

Increasing incidents need systematic approach

Poor Coordination

Lack of coordination between market players

Fragmented Data

Closed or fragmented incident data

Slow Response

Delayed response to emerging threats

Our Comprehensive Solution

A SaaS platform serving as Trust Anchor in the Cybersecurity Data Space ecosystem

For Data Providers (Organizations)
Report incidents conveniently and on time, avoiding regulatory fines
STIX 2.1 format compatibility with NGSI-LD standards
AI-powered insights to prevent future incidents
For Data Consumers (Regulators)
International register for quick threat response
Complete regulatory control and oversight
Granular permissions for selected participants
How It Works
Four-step process for secure incident reporting and analysis
1

Organization Registration

User registers organization as Data Provider in the system

2

Incident Submission

Submit incident in STIX 2.1 format, fully compatible with NGSI-LD

3

Processing & Classification

System processes, classifies, anonymizes and notifies related parties

4

Blockchain Recording

Data hashed and recorded on Solana blockchain, NFT created with metadata, reporters have public proof of reporting on time.

Cybersecurity Data Space Illustration

Powered by FIWARE

Built on Europe's leading open-source platform for smart solutions, ensuring interoperability, scalability, and compliance with European digital standards.

Context Broker

Real-time context information management for cyber incident data

  • • NGSI-LD API compliance
  • • Real-time data synchronization
  • • Unification of the reporting data model
  • • Subcription to threat alarms
Keyrock Identity Management

Secure authentication and authorization for all participants

  • • OAuth 2.0 & OpenID Connect
  • • Role-based access control to sensitive data

FIWARE Integration Benefits

Subscription to sector-specific alarms and alerts
European data sovereignty compliance
Seamless integration with existing systems
Open-source transparency and security
Rapid scalability across Europe
Future-proof architecture

Secured by Blockchain

Leveraging Solana's high-performance blockchain for immutable incident records, ensuring data integrity and creating verifiable audit trails.

Solana Blockchain

High-speed, low-cost blockchain for incident data hashing

  • • 65,000+ transactions per second
  • • Sub-second finality
  • • Minimal transaction costs
  • • Energy-efficient consensus
Anchor Framework

Secure smart contract development for data integrity

  • • Type-safe smart contracts
  • • Automated security checks
  • • Rust-based development
  • • Built-in testing framework
Metaplex NFTs

NFT metadata for incident report verification

  • • Immutable metadata storage
  • • Verifiable incident records
  • • Automated NFT creation
  • • Cross-platform compatibility

Blockchain Implementation

Data Integrity Process

1
Incident data is processed and anonymized
2
Data hash is generated using cryptographic algorithms
3
Hash is recorded immutably on Solana blockchain
4
NFT created with incident metadata for verification

Key Benefits

Immutable audit trail for all incidents
Cryptographic proof of data integrity
Transparent and verifiable records
Decentralized trust mechanism
Regulatory compliance documentation

Complete Technology Stack

GAIA-X / IDSA

European data exchange standards with guaranteed data sovereignty

  • • Data sovereignty compliance
  • • Federated data spaces
  • • Trust framework integration
AI Modules

Automatic detection of anomalies, trends, and potential threats

  • • Pattern recognition
  • • Predictive analytics
  • • Threat intelligence
Visualization Tools

User-friendly dashboards for analytics, statistics, and reporting

  • • Real-time dashboards
  • • Custom reporting
  • • Interactive analytics
Access Control

Unified system for authentication and policy-based access

  • • Multi-factor authentication
  • • Role-based permissions
  • • Audit logging
STIX 2.1 Format

Industry-standard format fully compatible with NGSI-LD

  • • Structured threat information
  • • Interoperability standard
  • • Machine-readable format
Permission System

Selected participants get different access permissions to data

  • • Granular access control
  • • Data classification levels
  • • Participant verification

Target Audience & Participants

Critical Infrastructure Operators

Essential services and infrastructure providers

  • • Energy sector operators
  • • Transportation networks
  • • Financial institutions
  • • Healthcare systems

IT Companies

Technology service providers and software companies

  • • Managed service providers
  • • Software development firms
  • • Cloud service providers
  • • Cybersecurity vendors

State Authorities

Government agencies and regulatory bodies

  • • CERT organizations
  • • SSSCIP (State Service)
  • • SSU (Security Service)
  • • Cyber police units

Incident Response Centers

Specialized cybersecurity response teams

  • • National CERTs
  • • Sectoral response teams
  • • Private incident responders
  • • International cooperation bodies

Universities & Research

Academic and research institutions

  • • Cybersecurity research labs
  • • Academic institutions
  • • Think tanks
  • • Innovation centers

International Organizations

Cross-border cooperation entities

  • • ENISA
  • • EU agencies
  • • NATO cyber centers
  • • Regional partnerships

Business Model & Traction

Private Sector

€500

per year subscription

1,000

target clients

€500K ARR

Public Sector

€100K

GovTech procurement

5

government bodies

€500K ARR

API Access

TBD

3rd party providers

scalable revenue

Growth

R&D Funding

€+

Grants & collaborative R&D

EU

funding programs

Support

Current Traction
Partnership agreement with NOSC-UA DIH
LOI with Crystal Intelligence on cryptocurrency incident mapping
Submission to Solana Breakout Hackathon
Participation in Kumekathon
Investment Opportunity

€2M

Project Valuation

€200K

Pre-seed round

10% allocation (SAFT)

Strategic Opportunities

European Integration

Cooperation with leading European digital initiatives

• FIWARE Foundation
• GAIA-X Association
• European Digital Innovation Hubs (EDIHs)
• CyberSec4Europe project
• ENISA collaboration
• Horizon Europe program
• Digital Europe initiative
• EU4DigitalUA partnership
Ukraine Advantage

Unique position in the global cybersecurity landscape

Cyberfront as key zone of modern warfare
Ukraine as ideal 'laboratory ground' for innovation
Real-world testing environment for cybersecurity solutions
Market Timing

Perfect window for European digital infrastructure integration

Rising demand for cybersecurity data sharing
New EU regulations requiring incident reporting
Growing need for interoperable solutions

Leadership Team

Cybersecurity Data Space Illustration

Kyrylo Gorokhovskiy

Chief Executive Officer

Strategic leadership and business development expertise. Driving partnerships with European digital initiatives and government relations for cybersecurity data space implementation.

Ivan Volkov Profile

Ivan Volkov

Chief Technology Officer

Technical architecture and platform development leadership. Expert in FIWARE, blockchain technologies, and European data space standards implementation.

Cybersecurity Data Space Illustration

Ivan Lysenko

Cybersecurity Analyst

Threat analysis and security expertise. Specializing in incident classification, STIX 2.1 format implementation, and cybersecurity intelligence analysis.

Get In Touch

Ready to Secure Europe's Cyber Future?

Join the revolution in cybersecurity data sharing. Whether you're an organization looking to enhance your incident reporting capabilities, a regulator seeking better oversight, or an investor interested in the future of European cybersecurity infrastructure.