Funds for Companies

Grants and Resources for Sustainability

  • Subscribe for Free
  • Premium Support
  • Premium Sign in
  • Premium Sign up
  • Home
  • Funds for NGOs
    • Agriculture, Food and Nutrition
    • Animals and Wildlife
    • Arts and Culture
    • Children
    • Civil Society
    • Community Development
    • COVID
    • Democracy and Good Governance
    • Disability
    • Economic Development
    • Education
    • Employment and Labour
    • Environmental Conservation and Climate Change
    • Family Support
    • Healthcare
    • HIV and AIDS
    • Housing and Shelter
    • Humanitarian Relief
    • Human Rights
    • Human Service
    • Information Technology
    • LGBTQ
    • Livelihood Development
    • Media and Development
    • Narcotics, Drugs and Crime
    • Old Age Care
    • Peace and Conflict Resolution
    • Poverty Alleviation
    • Refugees, Migration and Asylum Seekers
    • Science and Technology
    • Sports and Development
    • Sustainable Development
    • Water, Sanitation and Hygiene (WASH)
    • Women and Gender
  • Funds for Companies
    • Accounts and Finance
    • Agriculture, Food and Nutrition
    • Artificial Intelligence
    • Education
    • Energy
    • Environment and Climate Change
    • Healthcare
    • Innovation
    • Manufacturing
    • Media
    • Research Activities
    • Startups and Early-Stage
    • Sustainable Development
    • Technology
    • Travel and Tourism
    • Women
    • Youth
  • Funds for Individuals
    • All Individuals
    • Artists
    • Disabled Persons
    • LGBTQ Persons
    • PhD Holders
    • Researchers
    • Scientists
    • Students
    • Women
    • Writers
    • Youths
  • Funds in Your Country
    • Funds in Australia
    • Funds in Bangladesh
    • Funds in Belgium
    • Funds in Canada
    • Funds in Switzerland
    • Funds in Cameroon
    • Funds in Germany
    • Funds in the United Kingdom
    • Funds in Ghana
    • Funds in India
    • Funds in Kenya
    • Funds in Lebanon
    • Funds in Malawi
    • Funds in Nigeria
    • Funds in the Netherlands
    • Funds in Tanzania
    • Funds in Uganda
    • Funds in the United States
    • Funds within the United States
      • Funds for US Nonprofits
      • Funds for US Individuals
      • Funds for US Businesses
      • Funds for US Institutions
    • Funds in South Africa
    • Funds in Zambia
    • Funds in Zimbabwe
  • Proposal Writing
    • How to write a Proposal
    • Sample Proposals
      • Agriculture
      • Business & Entrepreneurship
      • Children
      • Climate Change & Diversity
      • Community Development
      • Democracy and Good Governance
      • Disability
      • Disaster & Humanitarian Relief
      • Environment
      • Education
      • Healthcare
      • Housing & Shelter
      • Human Rights
      • Information Technology
      • Livelihood Development
      • Narcotics, Drugs & Crime
      • Nutrition & Food Security
      • Poverty Alleviation
      • Sustainable Develoment
      • Refugee & Asylum Seekers
      • Rural Development
      • Water, Sanitation and Hygiene (WASH)
      • Women and Gender
  • News
    • Q&A
  • Premium
    • Premium Log-in
    • Premium Webinars
    • Premium Support
  • Contact
    • Submit Your Grant
    • About us
    • FAQ
    • NGOs.AI
You are here: Home / Awards and Prizes / Request for Applications: Cyber Security Grand Challenge 2.0 (India)

Request for Applications: Cyber Security Grand Challenge 2.0 (India)

Deadline: 14 February 2025

The Cyber Security Grand Challenge (CSGC) is a collaborative endeavor between the Ministry of Electronics & Information Technology (MeitY) and the Data Security Council of India (DSCI).

The Cyber Security Grand Challenge stands as a testament to the commitment to fostering a culture of innovation and entrepreneurship within their nation. It plays a pivotal role in contributing to India’s ambition of becoming a global leader in the field of cybersecurity. CSGC acts as a catalyst, propelling their country closer to these ambitious goals.

Problem Statements

  • API Security
    • Development of an API security solution that detects anomalies, maintains data integrity, and automatically self-heals, in the context of enterprise environments and platforms like API Setu.
  • Data Security
    • Data security solutions to maintain security posture across diverse environments, detect anomalies, monitor and govern access and usage, and prevent data exfiltration.
  • Wearable Device Security and Privacy
    • Security and privacy solutions for smart, connected wearable devices.
  • Clone and Fake App Mitigation
    • Detecting and mitigating clone and fake apps.
  • AI for Threat Detection and Incident Response
    • Autonomous monitoring through AI-powered expertise for threat detection & incident response and for self-governed actions, including integration of the solution with advance security operations.
  • Securing Next-Generation Biometric Systems
    • Defending against vectors targeting next-generation biometric identification and authentication systems that withstand AI-powered threats.

Challenge Stages

  • Go-to-market stage: Develop and execute a Go-To-Market (GTM) strategy. This includes planning Proof of Concepts (PoCs), identifying market entry points, and preparing for a successful product launch. Compete for the grand prize by showcasing your solution’s impact and viabilility in the cybersecurity landscape.
  • Final product stage: With expert mentorship, refine and finalize your product by incorporating advanced features that are both market-relevant and cutting-edge. This stage ensures your solution is robust and ready for Real-World Application.
  • MVP stage: Gain mentorship and guidance to build a Minimum Viable Product (MVP). The goal is to create a prototype or initial version of your solution that demonstrates its core functionality and aligns with market needs.
  • Idea stage: Submit your innovative idea to address the Cybersecurity Grand Challenge problem statements. This stage focuses on identifying and articulating a novel solution to tackle pressing cybersecurity issues.

Key Highlights

  • Focus on Entrepreneurship:
    • Special emphasis on attracting more entrepreneurs.
    • Recognition for professors and institutions offering exceptional support to students’ journeys in CSGC.
  • Expanded Recognition for Startups:
    • 06 startups at the idea stage will be qualified for each problem statement.
    • Total of 36 startups recognized at the idea stage (3X increase compared to CSGC 1.0).
  • Introduction of a New Stage:
    •  Go-To-Market stage to the existing stages (Idea, MVP, and Final Stage).
  • Mentorship Support:
    • Technical and business mentorship will be provided throughout the journey to help startups mature into successful ventures.
  • Commitment to Innovation:
    • Aims to elevate India’s standing in cybersecurity.
    • Inspires a new generation of cybersecurity leaders through enhanced support and opportunities.

Funding Information

  • Cyber Security Grand Challenge 2.0 offers a total prize fund of INR 6.85 Crores, distributed across multiple stages:
    • ₹ 1.75 cr
      • 1 cr to 1st Prize Winner
      • 50 lacs to 2nd Prize Winner
      • 25 lacs to 3rd Prize Winner
    • ₹ 1.50 cr
      • 25 lacs each to 1 startup of every problem statement
    • ₹ 1.80 cr
      • 10 lacs each to 3 startups of every problem statement
    • ₹ 1.80 cr
      • 5 lacs each to 6 startups of every problem statement.

For more information, visit DSCI.

NSRCEL announces Women Startup Program (India)

ADOPT Facilitator Support Grant Program (Round 2) – UK

CFPs: Visibility and Validation of Innovations for Service Delivery Programme

Open Innovation Challenge 2025: People First

Startup Deep Tech Ventures Lab Program (Malaysia)

Submissions open for Cyber Startup Challenge 2025

RFPs: Emerging Directions in Fault-Tolerant Quantum Computing in Canada

Apply for Bindzu Youth Fund (South Africa)

Call for Applications: GreenPitch Challenge 2025 (South Africa)

Generative AI for Virtual Worlds: Advanced Technologies for Better Performance and Hyper Personalised and Immersive Experience

Quantum Computing – Complementing the Quantum Computing FPAs with the Development of a Technology Agnostic Software Stack

CFAs: Preparing the Advancement of the State of the Art of Submarine Cable Infrastructures

Request for Applications: Fostering Innovative and Compliant Data Ecosystems

Request for Proposals: Core Technologies for Virtual Worlds

Call for Proposals: Software Engineering for AI and Generative AI

Fifth REINFORCING Open Call on “Responsible Digitalization”

Call for Applications: Supporting Women Farmers Program (Ukraine)

Apply for MUSE Accelerator Program

RFPs: Assessment Methodologies for General Purpose AI Capabilities and Risks

Call for Proposals: GenAI for Africa Programme

Request for Proposals: Empowering AI/Generative AI along the Cognitive Computing Continuum

CFPs: Advanced Sensor Technologies and Multimodal Sensor Integration for Multiple Application Domains

Call for Proposals: International Cooperation in Semiconductors

Call for Applications: TECHBITE Energy Incubation Program (Thailand)

NSRCEL announces Women Startup Program (India)

ADOPT Facilitator Support Grant Program (Round 2) – UK

CFPs: Visibility and Validation of Innovations for Service Delivery Programme

Open Innovation Challenge 2025: People First

Startup Deep Tech Ventures Lab Program (Malaysia)

Submissions open for Cyber Startup Challenge 2025

RFPs: Emerging Directions in Fault-Tolerant Quantum Computing in Canada

Apply for Bindzu Youth Fund (South Africa)

Call for Applications: GreenPitch Challenge 2025 (South Africa)

Generative AI for Virtual Worlds: Advanced Technologies for Better Performance and Hyper Personalised and Immersive Experience

Quantum Computing – Complementing the Quantum Computing FPAs with the Development of a Technology Agnostic Software Stack

CFAs: Preparing the Advancement of the State of the Art of Submarine Cable Infrastructures

Request for Applications: Fostering Innovative and Compliant Data Ecosystems

Request for Proposals: Core Technologies for Virtual Worlds

Call for Proposals: Software Engineering for AI and Generative AI

Terms of Use
Third-Party Links & Ads
Disclaimers
Copyright Policy
General
Privacy Policy

Contact us
Submit a Grant
Advertise, Guest Posting & Backlinks
Fight Fraud against NGOs
About us

Terms of Use
Third-Party Links & Ads
Disclaimers
Copyright Policy
General
Privacy Policy

Premium Sign in
Premium Sign up
Premium Customer Support
Premium Terms of Service

©FUNDSFORNGOS LLC.   fundsforngos.org, fundsforngos.ai, and fundsforngospremium.com domains and their subdomains are the property of FUNDSFORNGOS, LLC 140 Broadway 46th Floor, New York, NY 10005, United States.   Unless otherwise specified, this website is not affiliated with the abovementioned organizations. The material provided here is solely for informational purposes and without any warranty. Visitors are advised to use it at their discretion. Read the full disclaimer here. Privacy Policy. Cookie Policy.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}