The Cybersecurity area is aligned with the i2CAT’s R&D Strategy of leading innovation in emergent technologies. It has two dimensions: the Catalan Cybersecurity Agency and Cybersecurity Innovation Lab. 

Cyber-threat management and response

Going forward in Security Orchestration, Automation and Response (SOAR) augmented with Security Information and next generation Event Management (SIEM) platforms. 

RISK Assessment and Management

Developing new functionalities and business models integrating technologies such as Artificial Intelligence, Robot Process, Automation on Risk assessment and management processes. 

User-centric security practices and tools 

Exploring and defining new ways to empoderate users and manage their privacy under sovereign data and identity platforms of the future.

Research Challenges

Risk Assessment and Management

Security Analytics is a data science backed cloud native platform that predicts, detects and prevents breaches. A risk-prioritized proactive analytic model gives you a comprehensive contextual view of user and entity behaviors to mitigate the most serious security threats in your environment before internal or external cyberattacks can inflict damage.


  • Machine Learning Based Behavior Analytics
  • Threat Modeling Automation
  • Security as a Service (SaaS)


  • Active Risk-Response Systems
  • Intelligent Threat Hunting
  • Analytics-driven cloud SIEM and Intelligent SOAR

Research Topics  

Cyber Security as a Service

Security Orchestration, Automation and Response (SOAR) augmented with Security Information and Event Management (SIEM)

Risk Assessment and Management 

Predictions and active response 

Privacy Enhancing Technologies

Privacy is a basic human right. A wave of emerging privacy regulations are reflective of the growing public awareness of this fact, and provide granular rights to individuals with respect to data protection, data access, data deletion and breach notifications. Governments and organizations are challenged to efficiently comply with these new regulations and honor privacy rights of their citizens and users

Data Security, Privacy and Identity Management

Data anonymization