Apply

Join us at Station F!

Each acceleration is based on technological challenges in order to meet Thales and its customers' stakes in cybersecurity with the right startups. Find out here the challenges for the batch 3, starting in June 2019.
 

CHALLENGE 1

KNOWING AND TACKLING THE MEANS AND WAYS THE ATTACKERS

Improve our knowledge of the cyber risks by using advanced and usable threat intelligence.

Improve our ability to understand the behavior and the means of attackers through malicious activities detection and analysis.

 

 

Types of solutions we are looking for: 
Maintain continuous security. Malware detection and malware analysis. AI and/or ML based threat intelligence. Behavior based malicious activity detection. Deception tools. Adversarial ML. Automated security testing, Reduce the likelihood of attacks by deluding the attackers…

 

 

 

CHALLENGE 2

CYBERSECURITY BY DESIGN

Improve our cybersecurity transformation by assisting system architects and operators with secure and automated configuration tools, and  developers with secure code generation.

Anticipate vulnerabilities caused by code breaches and threats on the tools.

 

Types of solutions we are looking for: 
System configuration Inventory. Vulnerability identification and assessment. Automated risks analysis. Secure architecture modelling. Production of robust code to avoid producing vulnerable code. Security of the code production chain and secure production tools. DevSecOps. Data obfuscation..
 

CHALLENGE 3

SECURITY TRAINING AND DRILLING

Improve our security training and drilling in order to be prepared when attacks happen and to more quickly counter the current threats.

 

Types of solutions we are looking for: 
Cyber-range components and services. Crisis management exercises. Red and blue teams’ challenges. Security awareness..
 

CHALLENGE 4

MASSIVE & HETEROGENEOUS IOT CYBERSECURITY

The industry is now preparing for the wave of "massive IoT", with billions of devices, and the majority of these being low footprint. These devices are expected to be very efficient in terms of cost, bandwidth and energy consumption.

Operating across a variety of environments, networks and aggregation levels, IoT devices are often deployed at places where risks evolve differently and network conditions and types are varying.

 

 

Types of solutions we are looking for:
End to end protection from IT to embedded systems, Protection of embedded systems (in cars, land vehicles, ships, aircrafts, devices…),
Collaborative and distributed security functions, access authorization combined with fleet management, Solutions allowing deployment and onboarding of IoT devices in an efficient way, Solutions supporting end-to-end security across multiple connectivity and service providers to provide economies of scale, Solutions securing communication Devices/Infrastructure/service providers/mobile operators..
 

CHALLENGE 5

Adaptive cloud security and identity management

The shift to cloud has deeply changed the application landscape with elasticity and service availability as main drivers. Security must be center stage again to avoid the recurring data leakage and system disruption flourishing stories. It starts with managing securely identities and access rights in cloud environments.

 

Types of solutions we’re looking for:  
Identity and Access Management. Virtualisation security and containers security. Data protection in a multitenant environment. Solutions to secure gateways in a cloud environment. Application level security when the infrastructure can not be trusted. Global context analysis on how a system or an application is used. Self-protection of an application / system adapting the perimeter security (authentication) and service access security (authorization). Master security of Edge cloud and of edge AI to allow data processing and storage in confidence. Perform self-adaptation of authentication and authorization protection based on user and system behaviors, anomaly detection…
 

CHALLENGE 6

LEGACY AND OT SYSTEMS CYBERSECURITY 

Besides massives IoT deployment, existing IT/OT systemes needs also to be duly protected. Operated in complex and demanding environments, sometimes with safety concerns, these systems require specific, non-intrusive cybersecurity measures.

Legacy systems also need to keep up with emerging cyber threats, without in-depth refactoring.

 

Types of solutions we are looking for: 
Gathering performance and security statistics. Secured Health and Usage Monitoring Systems. Non-intrusive assessment of the local security situation. Detection of jamming events. OT probes and OT threat detection. Detection in embedded systems, embedded IoCs, Providing the right information to non-specialists.

 

 

 

CHALLENGE 7

Joker

Surprise us with amazing & very promising solutions which doesn't fit with previous challenges.

 

Types of solutions we’re looking for:
Any kid of very innovative technologies allowing to solve cybersecurity issues.