Basque Digital Innovation Hub
Basque Digital Innovation Hub
Basque Digital Innovation Hub

Basque Digital Innovation Hub

The BDIH is a connected network of advanced manufacturing assets and services. A place for training, research, testing and validation available to companies whose objective is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of Industry 4.0.

BDIH Members

In order to offer this support, a network of public-private collaboration has been created: universities, technology centres, business R&D units, international networking, etc. A connected network of assets composed of infrastructures, laboratories, facilities, software, and innovative and excellent scientific-technological capabilities in the advanced manufacturing environment.

The Basque Digital Innovation Hub is co-owned by R&D Centres, Vocational Training Centres and Universities and supported by regional public institutions. It is internationally connected with other European HUBs. We will direct the digitalisation of SMEs in the Basque Country towards the most knowledge-intensive and high-value manufacturing activities.

tecnalia
lortek
ideko
ceit
gaiker
ikerlan
Cidetek
Tekniker
Nanogune
Vicomtech
Bcam
Basque Cyber Security Center
Energi gune
Universidad de Mondragón
Polymat
Universidad del País Vasco
Inmovalia
Tknika
IMH Incress
Gaia Cluster
Goierri
Azterlan
Ormazabal
Cluster Energía
aic
CFAA
Bioef
Bioaraba
Biocruces
Biodonostia
leartiker
DeustoTech
Achucarro

BDIH nodes

8 areas of specialisation in which we classify knowledge and technology.

  • Cybersecurity
  • Data-driven Solutions
  • Medical devices and digital health
  • Additive manufacturing
  • Advanced materials
  • Smart and connected machines
  • Digital electricity grids
  • Flexible robotics

Cybersecurity node

Cybersecurity node laboratories

The BDIH cybersecurity node is composed of 5 organisations and 7 laboratories distributed in the 3 historical territories. The laboratories are used to foster entrepreneurship and innovation, with a special focus on projects such as smart-grid, automation, blockchain, product testing/certification, etc.

BCAM

BCAM

(Bilbao)

Tecnalia

Tecnalia

(Zamudio)

Tecnalia

Tecnalia

(Vitoria - Gazteiz)

Ikerlan

Ikerlan

(Arrasate)

Vicomtech

Vicomtech

(Donostia / San Sebastián)

INNOVALIA

INNOVALIA

(Zamudio)

Fields of application of the BDIH

BDIH services are organised in different fields of application depending on the area of work where the use of the assets is focused. In the cybersecurity node, we have defined five application areas: risk and threat identification, asset protection, attack detection, attack response and asset recovery.

Develop an organisational understanding to manage cybersecurity risks to people, systems, assets, data and capabilities. Understanding business context, resources that support critical functions, and related cybersecurity risks enables an organisation to focus and prioritise its efforts in a manner consistent with its risk management strategy and business needs.

The following services are used for the identification of threats and risks:

  • Blockchain training.
  • Cybersecurity training for connected and autonomous vehicles.
  • Cybersecurity functional test environment.
  • Industrial cybersecurity training for security operators and ethical hackers.
  • Cyber range training.
  • Testing and demonstration environment for new security products.
  • Testing and demonstration environment for new cyber range products.
  • Cybersecurity test environment and product and/or process demonstration in a controlled environment.
  • Practical cybersecurity training.
  • Product certification.
  • Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.
  • IT/OT testing environment to test new network or processing equipment in a controlled, realistic and high-stress environment.
  • Testing and demonstration environment in a context of IT/OT convergence to validate the operation of specialised components in industrial cybersecurity.
  • Multi-domain cyber range.
  • Big Data Analytics for cybersecurity.
  • Industrial network analysis IEC 62264.
  • Cybersecurity assessment of industrial components and systems.

Develop and implement appropriate security measures to ensure delivery of services. Asset protection includes the ability to limit or contain the impact of a potential cybersecurity incident.

The following services are used for asset protection:

  • Blockchain training.
  • Testing and demonstration environment for the use of blockchain in improving business.
  • Testing and demonstration environment for new products with blockchain.
  • Cybersecurity training for connected and autonomous vehicles.
  • Simulation of real communications between control centres and electrical substations for cyber-attacks.
  • Simulation of real communications between control centres and electrical substations for cyber-defence.
  • Cyber range training.
  • Testing and demonstration environment for new security products.
  • Testing and demonstration environment for new cyber range products.
  • Cybersecurity testing environment and product and/or process demonstration in a controlled environment.
  • Practical cybersecurity training.
  • Vulnerability and penetration testing.
  • Communications robustness testing.
  • Functional security testing.
  • Implementation testing.
  • Product certification.
  • PKI infrastructure: Digital certificate management.
  • Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.
  • Testing and demonstration environment in a context of IT/OT convergence to validate the operation of specialised components in industrial cybersecurity.
  • Industrial cybersecurity training for security operators and ethical hackers in the context of IT/OT convergence of specific information systems.
  • Data analytics for cybersecurity.
  • Development of optimisation and Big Data applications robust to attacks.
  • Multi-domain cyber range.
  • Big Data Analytics for cybersecurity.
  • Industrial network analysis IEC 62264.
  • Cybersecurity assessment of industrial components and systems.

Develop and implement appropriate tools to determine the nature and extent of cyber-attacks on an entity. Attack detection includes the timely discovery of cybersecurity incidents.

The following services are used for the detection of attacks:

  • Blockchain training.
  • Testing and demonstration environment for the use of blockchain in improving business.
  • Testing and demonstration environment for new products with blockchain.
  • Cybersecurity training for connected and autonomous vehicles.
  • Simulation of real communications between control centres and electrical substations for cyber-attacks.
  • Industrial cybersecurity training for security operators and ethical hackers.
  • Cyber range training.
  • Testing and demonstration environment for new security products.
  • Testing and demonstration environment for new cyber range products.
  • Cybersecurity testing environment and product and/or process demonstration in a controlled environment.
  • Practical cybersecurity training.
  • Vulnerability and penetration testing.
  • Communications robustness testing.
  • Functional security testing.
  • Implementation testing.
  • Product certification.
  • IT/OT testing environment to test new network or processing equipment in a controlled, realistic and high-stress environment.
  • Industrial cybersecurity training for security operators and ethical hackers in the context of IT/OT convergence of specific information systems.
  • Data analytics for cybersecurity.
  • Multi-domain cyber range.
  • Big Data Analytics for cybersecurity.
  • Cybersecurity assessment of industrial components and systems.

Develop and implement appropriate measures to effectively mitigate detected cybersecurity incidents. Attack response supports the ability to contain the impact of a potential cybersecurity incident.

The following services are used for attack response:

  • Blockchain training.
  • Simulation of real communications between control centres and electrical substations for cyber-defence.
  • Industrial cybersecurity training for security operators and ethical hackers.
  • Cyber range training.
  • Testing and demonstration environment for new security products.
  • Testing and demonstration environment for new cyber range products.
  • Cybersecurity testing environment and product and/or process demonstration in a controlled environment.
  • Practical cybersecurity training.
  • Testing and demonstration environment in a context of IT/OT convergence to validate the operation of specialised components in industrial cybersecurity.
  • Industrial cybersecurity training for security operators and ethical hackers in the context of IT/OT convergence of specific information systems.
  • Data analytics for cybersecurity.
  • Multi-domain cyber range.
  • Big Data Analytics for cybersecurity.

 

Develop and implement appropriate action plans to recover from a cyber-attack and restore the capabilities or services that have been affected by it. Asset recovery enables a timely recovery to normal operations to reduce the impact of a cybersecurity incident.

The following services are used for asset recovery:

  • Blockchain training.
  • Testing and demonstration environment for the use of blockchain in improving business.
  • Testing and demonstration environment for new products with blockchain.
  • Cyber range training.
  • Testing and demonstration environment for new security products.
  • Testing and demonstration environment for new cyber range products.
  • Cybersecurity testing environment and product and/or process demonstration in a controlled environment.
  • Practical cybersecurity training.
  • Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.
  • IT/OT testing environment to test new network or processing equipment in a controlled, realistic and high-stress environment.
  • Multi-domain cyber range.
  • Industrial network analysis IEC 62264.