OG: Development/strengthening/efficiency of capabilities to prevent, identify, analyse and respond to cybersecurity incidents to ensure the security of IT & C infrastructures owned by the Romanian Intelligence Service. The Cyberint National Center has been designated to act as the Operational Center for Response to Cyber Security Incidents (CERT-SRI) for the Romanian Intelligence Service, with the mission of preventing and responding to cybersecurity incidents affecting the functioning of the Service’s IT systems. In order to respond to cybersecurity incidents affecting the operation of the beneficiary’s own IT systems, in accordance with the obligations of the CERT entity within the institution – Cyberint National Center, investments are needed to increase the level of cybersecurity in the context of new threats and security risks. The Cyberint National Center has the central role in the national system of protection of IT infrastructures&C of national interest against threats from cyberspace, through which the infrastructures of organisations that are included in the list of stakeholders involved in the Digital Agenda for Romania 2020 are secured, as institutions that manage/coordinate/ensure services and actions in support of life events activities, while also having responsibilities in the implementation of strategic development lines and lines of action (SC2. Developing national capacities for cybersecurity risk management and response to cyber incidents under a national programme). The beneficiary, through its own units and structures, contributes to ensuring the security of the National Cybersecurity System (SNSC). The implementation of the project involves updating and adapting to current security requirements the solutions within the networks owned by the Romanian Intelligence Service, as well as the implementation of new solutions and technologies that ensure an increased detection and analysis capability of unknown threats to traditional detection solutions. Ensuring its own security and improving response capacity ensures the viability of the entire system protected by the applicant. The technical solution involves the creation of an architecture based on terminal-oriented security technologies, for which security policies can be granularised according to the need, precisely the areas where there is a successful cyberattack can be identified, so operational measures can be taken to eliminate the consequences or containment in order to investigate. The implementation of specific software solutions as well as integration with existing applications will take place in the following stages: requirements analysis, design, implementation, testing and commissioning. The overall objective will be achieved as a result of the implemity