Security

DefTech Forges

For the defense of tomorrow: Innovation creates security.

Where speed meets impact for defense & security

The DefTech Forges, initiated by TechHUB SVI, offer a unique opportunity to actively participate in the future of security and defense technologies - hands-on, collaborative and with real impact. Leading players from industry, research and consumers work in interdisciplinary teams on real problems and develop innovative solutions. These innovations are not only tested, but also put into practice.

Making technologies tangible

Instead of just discussing ideas, we put technologies into practice: from the initial concept idea to the development of prototypes and their use under real conditions - accompanied by experts, supported by strong partners and embedded in a real operational environment at Erding Air Base.

The aim is to jointly create solutions that close real capability gaps and quickly find their way into implementation.

22.04 - 22.05.2026

  • Submit application form via "Apply now" button. Note: Please edit and submit the form together with all team participants.
  • Confirmation of registration for the DefTech Forges via e-mail with upload link for application presentation + NDA
  • Upload of all completed, signed NDAs and the application presentation

22.05 - 08.06.2026

  • Confirmation of acceptance or rejection
  • Verification of all team members
  • Final admission

15.06.2026

  • Start of the DefTech Forges

Interested teams can apply for a challenge during the tendering phase by submitting a short application.

  • Minimum age 18 years
  • Participant nationality compared with the list of countries
  • In the case of organizations: Management level and shareholders compared with the list of countries; no locations in countries on the list of countries
  • NDA (will be sent via email)
  • Max. 5-page application presentation (in PDF format):
    • Team
      • Team name + contact person,
      • Members (name, role, core competence, history or rough CV)
      • Relevant experience & possible references (e.g. comparable industry projects, hackathons, other challenges)
    • Solution concept
      • Description of the solution (architecture / approach, central technology)
      • Degree of innovation (TRL)
      • Sketch / diagram if applicable
      • State of development (idea / concept / prototype / product)
    • Feasibility & roadmap
      • How will the solution be implemented?
      • Planned progress within the forge (scalability / market potential)
      • Resources required (data / hardware / test scenarios)
    • Impact & added value
      • Why is this team particularly suitable? (Combination of skills and implementation experience; access to relevant stakeholders / markets; ...)

DefTech Forges and Challenges

Each Forge bundles specific challenges from the defense and security sector that have been defined together with stakeholders from the field.

The focus is on challenges with high application potential, in which innovative solutions are developed and taken forward.

Military Space

Challenge giver:

Contact person at deltaVision:

Julien Maurandy, Senior System Architect

Contact person:

Sven Rochier
Innovation network Security, Project Manager, Bayern Innovativ GmbH, Nuremberg

Initial situation:

deltaVision is a German start-up based in Munich and an established supplier of propulsion system components. Building on this expertise, the company is developing the Dynamic space Operations VEhicle (DOVE) - a platform for the flexible and rapid positioning of payloads in orbit.
DOVE is designed as a dual-use system and addresses both civil and security-relevant applications in the context of the German space security strategy.

The platform offers, among other things:

  • Modular payload interfaces and exchange of payloads in orbit
  • Compatibility with European launcher systems (e.g. Ariane, Vega, RFA One)
  • High orbital mobility (>4 km/s ΔV)
  • Refueling capability in orbit
  • RPOD capability (Rendezvous, Proximity Operations & Docking)

Performance data for payloads:

  • Up to 5 payloads
  • Up to 1000 kg total mass (max. 300 kg per payload)
  • ~2000 W electrical power
  • ~2000 W thermal dissipation
  • Customizable downlink capacity and position control accuracy

Problem definition:

deltaVision does not develop the payloads itself and is therefore looking for external partners. We are looking for concepts for innovative payloads that can be operated on DOVE. Participants should:

  • Define an existing or own use case
  • Derive end user requirements as hypotheses
  • Design a suitable payload

The development process is iterative - adjustments to the platform are also possible in order to maximize the benefits.

Goal of the Challenge:

  • Development of initial payload concepts with reliable performance data
  • Feedback on platform requirements and interfaces
  • Insights into the operational concept (ConOps)
  • Strengthening payload development in Germany
  • Identification of potential partners
  • Derivation of future further developments of DOVE

Added value:

  • Access to an innovative orbital service platform
  • Opportunity to help shape future space infrastructure
  • Positioning in the growing dual-use space market
  • Networking with an up-and-coming new space company

Technical and operational requirements:

  • Payload compatible with DOVE interfaces and power budgets
  • Consideration of mass, energy and thermal limits
  • Concept based on current technological capabilities
  • Focus on realistic and scalable applications

Missiles & Munitions

Challenge giver:

Contact person at MBDA:

Christoph Müller, Head of Hypersonic Solutions

Michael Wiedemann, TecTrainee

Benjamin Wilkosz, Chief Engineer

Contact at Bayern Innovativ:

Sven Rochier
Innovation network Security, Project Manager, Bayern Innovativ GmbH, Nuremberg

Initial situation:

Offensive hypersonic weapon systems offer great potential for effective, long-range missions. Germany already has a very good starting point thanks to intensive space and defense technology research as well as demonstrator programs and funding from the BAAINBw. Thanks to its experience with hypersonic technologies and demonstrator programs, MBDA Germany is closely networked with various players in the Bundeswehr ecosystem.

Problem definition:

The central challenge is not only to develop technologies, but also to drive forward technology maturation and development programs in parallel. As this area has so far been rather closed and risk-averse, MBDA Germany wants to use the HI² Challenge to open up the area of technology maturation in particular to new market participants, such as start-ups and SMEs. Innovative technologies are to be further developed at an early stage and later integrated into specific programs.

Target:

Early identification of high-performing technology companies and targeted integration of disruptive sub-systems in a structured technology maturation process for hypersonic weapon systems by 2030.

Added value:

  1. Administrative screening and contact surface of start-ups and medium-sized companies with the R&T landscape of the Bundeswehr and the industrial integrator MBDA Germany
  2. Identification of innovative but high-risk technological solutions in the following areas:
    • GNSS-robust navigation and structure-integrated antennas
    • ITAR-free energy supply
    • Mechanical-thermal-logical integration of novel IMUs
    • Innovative sensor integration
    • Cryptographic communication technology over long distances

Technical and operational requirements:

TRL: 3 - 5

The aim is to be able to present demonstrators of the respective sub-systems after the HI² Challenge TRL 5. Following agreement with the Bundeswehr, a roadmap should be available on how these technologies can be brought to TRL 6 so that they can then be integrated into a development program.

Unmanned Systems

Contact person:

Porträt von Patrick Albrecht
Patrick Albrecht
Innovation network Security, Project Manager, Bayern Innovativ GmbH, Munich

Problem definition:

  • High complexity in the detection of ground-based threats
  • Limited comparability of technical solutions under operational conditions
  • Lack of standards for assessment, situation picture integration and ground truth
  • Lack of reliable performance data for users and developers

Target:

Autonomous and semi-autonomous systems should demonstrate their performance under identical framework conditions.

Added value:

The benefits of Valkyrie Grid lie in the combination of real-world testing, digital situational awareness integration, objective metrics and visible demonstration impact.
For technology providers, this results in reliable proof of performance and increased visibility.

Technical and operational requirements:

  • Technological maturity level from TRL 5
  • The system must already be technologically validated and be able to be demonstrated in a relevant environment.
  • Suitability for detecting and classifying ground-based threats
  • Capability for situation picture and evaluation integration
  • Willingness to participate in the standardized test format
  • Participants must accept defined interfaces, security specifications and evaluation logic.
  • Participation as a company or consortium
  • Contributions from sensor technology, platform, AI, command and control software and data fusion are expressly desired

Cyber Protection

Challenge provider / organization:

Contact person:

Dr.-Ing. Christoph Petroll, Technical Government Director, Laboratory for Autonomous Systems and Robotics

Contact at Bayern Innovativ:

Bianca Sum
Innovation network Digitization, Project Manager, Bayern Innovativ GmbH, Munich

Initial situation & problem definition:

Standard drone communication (control links & telemetry) has historically prioritized range and low latency over security. Low-cost software-defined radios (SDR) and open source protocols with varying levels of documentation (e.g. MAVLink, CRSF) have drastically lowered the barrier to entry for signal manipulation. Furthermore, UAVs have various sensors to record the environment, which in turn can provide a vector for attack.

Concrete problem:

Insufficiently secured UAS are subject to risks of disrupting operational use through signal jamming, the manipulation of navigation data (spoofing) or the unauthorized takeover of system control (hijacking). Commercially available systems do not fully consider hardening against attacks and offer gateways for manipulation.

Goal of the Challenge:

Two approaches will be taken:

  • Team Red: Identification of vulnerabilities in the standard setups. The aim is to disrupt communication, intercept/falsify telemetry data or infiltrate commands in order to take control of the flight controller.
  • Team Blue: Hardening the existing system. The aim is to develop and implement mechanisms such as secure encryption, robust authentication or anti-jamming routines without disrupting operational use.
    The solutions developed are presented and validated from the table-top setup to flights under real conditions.

Added value:

  • Disclosure of vulnerabilities: Gaps in existing systems should be uncovered and the consequences for operational use assessed
  • Real-world applicability: Software patches and security concepts resulting from this can flow directly back into industry and open source projects (ExpressLRS, Ardupilot, PX4, etc.).
  • Promoting innovation: The Aurora Challenge sees itself as a practical catalyst in the field of cyber-physical systems. The aim is to further develop concepts for securing existing systems as well as for drone defense. The solutions introduced enhance security and expand the operational field of application.

Technical and operational requirements:

From TRL 0

Contact person from Nokia:

Georg Geiger, Senior Knowledge Architect AI/ML
Substitute: Dr. Marco Hoffmann, Program Manager

Contact person at Rohde & Schwarz:

Bernd Nagelrauf, Product Manager C-UAS

Contact at Bayern Innovativ:

Bianca Sum
Innovation network Digitization, Project Manager, Bayern Innovativ GmbH, Munich

Initial situation & problem definition:

Critical infrastructures and high-value targets (air defense, radar stations, etc.) are increasingly threatened by unknown or hostile unmanned systems (UxS). Early detection and effective neutralization of such threats are therefore essential and of great national interest. In addition to the possible use of effectors (artillery, jammers, high-energy lasers), a further and (cost) efficient defense must be identified and integrated into an anti-drone solution.

In addition, the targeted development of national expertise in this field of technology is of central importance in order to sustainably protect Germany against hostile activities.

Scenario:
Protection of a critical infrastructure (e.g. Bundeswehr property) against drone attacks; due to structural, operational and security-related restrictions, the use of conventional jamming systems or kinetic effectors is only possible to a limited extent or not at all

  • Reliable detection of unknown UxS in the operational area using cellular and complementary approaches
    • Detection of drones in the cellular network
    • Detection of drones using the cellular network (e.g. ICAS, JCAS)
    • Supplementary detection of non-cellularly connected systems (e.g. FPV/"dark" drones) using network-based and external methods
  • Interception and analysis of communication links of unknown UxS
    • Interception of cellular and non-cellular radio and data traffic (e.g. control and video connections)
    • Extraction of relevant information (e.g. control commands, telemetry, video data)
    • Analysis, decoding and, if necessary, decryption of this information
  • Development and evaluation of procedures for taking over and neutralizing UxS
    • Development of options for taking over control (collaborative and non-collaborative drones)
    • AI-based generation and adaptation of takeover mechanisms
    • Manipulation of communication links (cellular and non-cellular), in particular
      • Feeding misinformation or targeted control of the system
      • Takeover of control and transfer to a safe state (e.g. safe-spot landing)
    • Impairment of guidance by:
      • Manipulation of video signals (e.g. FPV/"dark" drones)
      • Combination with other influencing measures
  • Integration of alternative influence vectors
    • Influencing navigation systems (e.g. GNSS-related measures such as spoofing)
    • Combination of interventions in communication and navigation systems for effective neutralization
  • Protection of own UxS and systems in the cellular environment
    • Protection against external communication interference and takeover attempts
    • Protection of communication through post-quantum cryptography (PQC)
    • Integration of physical layer security (PLS)
  • Protection against AI-based attacks and protection of own AI systems against manipulation and deception

Goal of the Challenge:

  • Research into mechanisms for detecting and neutralizing unknown or hostile unmanned systems (UxS) in the operational environment, in particular using cellular and network-based communication infrastructures
  • Research into mechanisms for taking over, influencing or controlled neutralization of hostile UxS, including cyber and communication-based approaches for taking over control and influencing sensor technology (e.g. video or control data)
  • Research into mechanisms to protect own UxS from external communication interference, takeover attempts and AI-based attacks
  • Implementation of the developed protection and effective mechanisms in an overall radio-based system (e.g. 5G campus network)
  • Demonstration and evaluation of both functional directions (attack/neutralization and protection) in a realistic radio network

Added value:

  • Protecting critical infrastructure (KRITIS) such as energy and water supplies, telecommunications networks, transportation hubs, government buildings, armed forces properties and industrial facilities from hostile unmanned systems (UxS) that have significant potential for physical damage, sabotage, espionage and information loss
  • Providing a holistic, efficient and scalable drone defence solution that includes early detection as well as neutralization and/or takeover of UxS, thus enabling an end-to-end chain of protection for critical infrastructure
  • Combination of modern key technologies, in particular
    • AI-supported detection, analysis and decision support
    • network-based sensor technology and communication infrastructures (e.g. 5G campus networks)
    • Modular and scalable countermeasures for adaptive defense against different types of UxS

Technical and operational requirements:

Approaches in the field of cellular network infrastructures (e.g. 5G/6G-based detection, communication, manipulation and protection mechanisms): TRL 6 and above

Other technologies and processes outside the cellular network context (e.g. alternative radio links, GNSS-based processes, FPV/video or sensor systems): open (TRL 0)

Timeline

22.04. - 22.05.2026

Application phase for the individual challenges

Apply now!

15./16.06.2026

Start of the Forges

Kick-off webinar per challenge, getting to know the mentors

June - Sept. 2026

Concept & development phase

During this period, the teams work on their solutions, further develop existing approaches and develop concepts, prototypes or demonstrators. At the same time, they receive needs-based keynote speeches from experts that are geared towards the respective stages of development.

14./15.09.2026

Bootcamp at Erding Air Base

Presentation of interim results, feedback from mentors and experts

16./17.09.2026

Defense TechDays:

Exchange with leading players in the defense innovation ecosystem

07.12. - 11.12.2026

Final Round

Presentation of the final results to the Selection Board made up of industry representatives, users, technology experts and investors

The best teams then go straight into implementation - with strong partners at their side.

FAQs

The DefTech Forges are an innovation format for the rapid development, testing and demonstration of new technological solutions in the security and defense context. The format represents a further development of classic challenges and hackathons and aims to not only discuss technology conceptually, but also to make it tangible and demonstrate it practically on site and then implement and scale it.

The format aims to develop technological solutions for specific security-related challenges, test prototypes and implement them together with strong partners.

The DefTech Forges are organized by Bayern Innovativ's TechHUB SVI in cooperation with partners from industry, research and civil and military users.

The challenges come from various technological areas, e.g. unmanned systems, cyber & resilience, robotics, space and homeland security.

Several teams work in parallel on defined challenges. Over the course of several months, they develop solutions, present interim results and refine their approaches until the final evaluation.

No - the DefTech Forges are deliberately designed to be open to all industries. The decisive factor is not your background, but your idea, your know-how and your contribution to solving the challenge. Interdisciplinary teams and new perspectives are expressly encouraged.

A forge can extend over a period of several months to around a year and comprises various development and presentation phases.

A team can consist of a group of students, a consortium of representatives from different companies or employees of a company who come together to form a team.

Participants benefit from access to experts, mentoring, networking, visibility and the opportunity to further develop their solutions together with partners.

The provision of technical equipment and access to data, software and infrastructure will be clarified and agreed with all participants in the kick-off webinar.

The forges combine digital collaboration with face-to-face events, including at Erding Air Base.

Successful solutions are further developed together with the respective partners and can be transferred into concrete applications. Inclusion in the TechHUB SVI network; alumni network; matchmaking with industry partners.

Contact us

Katrin Goerges
Innovation network Security, Project Manager, Bayern Innovativ GmbH, Munich