CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

Size: px
Start display at page:

Download "CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0"

Transcription

1 CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

2 CYBERSECURITY Research and innovation for a more secure Britain 82 million of current EPSRC investments in research 96 Research projects 27 billion lost through cyber crime 82 billion UK s Internet-related market 6% of the UK s GDP is enabled by the Internet and this is set to grow 93% of large corporations and 76% of small businesses reported a cyber breach in the last year The RCUK Global Uncertainties Programme brings together the activities of the UK s in response to global security challenges to help governments, businesses and societies to better predict, detect, prevent and mitigate threats to society. One such challenge is cybersecurity and EPSRC is taking the lead in investing in research and training to help ensure the UK s citizens, communities and businesses are safe and have the confidence to get the most from cyberspace. Key drivers UK society is increasingly dependent on IT networks. Everything from energy, water, banking and shopping involves use of the Internet or other connected computer systems. More than three quarters of households in the UK now have internet access. It is estimated that there are 2.4 billion users on the Internet across the globe. As mobile devices, especially smartphones, become the norm for internet access and as computers become embedded in everyday devices such as cars and televisions and increasingly communicate via the internet the risks we face will alter and expand in unpredicted and unexpected ways. Reliance on cyberspace creates opportunities for the unscrupulous. Of the 27 billion lost through cyber crime in billion was lost Over the last decade the threat to national security and prosperity from cyber attacks has increased exponentially. Over the decades ahead this trend is likely to continue to increase in scale and sophistication, with enormous implications for the nature of modern conflict. We need to be prepared as a country to meet this growing challenge, building on the advanced capabilities we already have. David Cameron, Prime Minister by individuals (fraud and ID theft) and 21 billion to industry (theft of intellectual property, customer data, price sensitive information). In addition to crime, there are also threats from malicious computer code disrupting government systems, both deliberately and accidentally, and the use of cyber techniques by one nation to bring about political or economic pressure on another. Research will be needed to understand the threats and risks we face, and devise suitable protection, mitigation and adaptation strategies. Opportunities For over 20 years EPSRC has been supporting research and training underpinning cybersecurity. We work in collaboration with other Research Councils and in partnership with key government agencies including GCHQ, CPNI and Dstl. As a result the UK has the world-class research base needed to meet cyber threats and enhance our security. We have expertise in computing, mathematics and the sociological and psychological disciplines that shed light on human behaviour and enable us to build systems which are better designed and easier to use. The UK has attracted many companies involved with the cybersecurity area including multinationals such as Hewlett-Packard, Thales, and Microsoft. These companies and many others actively engage with the UK research community. A safe and resilient IT infrastructure is necessary to ensure that the UK remains a desirable place for businesses to operate. Research Council investment in research and training helps to maintain this position.

3 Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and the rule of law, enhance prosperity, national security and a strong society. Francis Maude, Minister for the Cabinet Office Research for the future Governments cannot deliver a safer online world. We need to work closely with industry to ensure that safe infrastructure and services can be provided to the public and share information and skills. James Brokenshire, the Minister for Crime & Security. 1 Good cybersecurity requires longterm, underpinning research of the highest quality that can keep pace with the changing environment. For example, in a 900,000 project at the University of Bristol researchers are addressing cloud computing (the ubiquitous, on demand network access to shared computing resources). In particular they are using their expertise in cryptography to find cost-effective, secure ways of accessing data. A strong connection with users to ensure relevance and encourage takeup is an important component of our support. More than 200 collaborators work with the research community we support. They represent organisations in national and local government, law enforcement, civil engineering, ICT, transport, defence and aerospace. Priorities for the future cyber crime: countering the financial and social damage. For example, with total funding of 30m over five years from EPSRC, TSB, InvestNI, Queens University Belfast and industry collaborators, the Centre for Secure Information Technologies (CSIT) brings together research specialist in complementary fields such as data encryption, network security systems and intelligent surveillance technology. Other collaborators include: Altera, BAE Systems, Cisco, Q1Labs and Thales as well as government agencies such as the Home Office, GCHQ, CESG, CPNI and Dstl. EPSRC have worked closely with GCHQ to recognise 11 UK universities as Academic Centres of Excellence in Cyber Security Research (ACE-CSRs) and have also partnered with them to identify two Research Institutes in strategically important subject areas within cybersecurity. Skills for the future Businesses, whether users or systems providers, need access to a skilled workforce able not only to work to minimise the risks, but also to design and implement new more resilient systems. EPSRC s innovative postgraduate training programmes global threats, cyber war, ethics, regulation, policy and legality: understanding the complexity and countering the threats. human factors and usable security: understanding human behaviour as a route to improving the security of systems. risk identification, reduction, mitigation and management: looking at emerging uses of the Internet and the risks associated with them. secure management and use of data: looking at better ways of storing and sharing data as well as considering ethical and legal issues. making systems more resilient: investigating ways to protect infrastructure against malicious attacks. understanding and monitoring systems and networks: understanding system behaviour so abnormal activity can be identified. are providing the next generation of researchers with the skills required. Two Centres for Doctoral Training (CDTs) in cybersecurity have been established jointly by EPSRC and BIS to provide the next generation of researchers with the advanced skills which are so important to the UK s online future. The Oxford University Centre for Doctoral Training in Cyber Security will cover some of the most pressing cyber security challenges our society faces today. The focus is on four key themes: the security of Big Data cyber-physical security effective systems verification and assurance real-time security These themes link to many existing research strengths at Oxford, and extend their horizon into areas where technology is rapidly emerging and raising pressing cyber security concerns. The projects undertaken at the Centre for Doctoral Training in Cyber Security at Royal Holloway will be driven by the problems faced by businesses and government. Among the range of topics they will investigate are: provably-secure ciphersystems and protocols systems engineering and security analysis trusted and trustworthy platforms organisational processes and socio-technical systems Between them the two Centres will graduate more than 60 PhD students over seven years, making a significant contribution to UK capability in this essential area. Every CDT student s training lasts for four years. It involves both masters-level education in a range of subjects addressing key areas of relevance to cyber security and a challenging and original research project. 1 speech at the launch of the International Cyber Security Protection Alliance 5 July 2011

4 PIONEERING A DIGITAL FUTURE s UK Digital Economy Programme PIONEERING A LOW CARBON FUTURE TECHNOLOGY FOR A SUSTAINABLE ECONOMY case Study 03 tunable starch for GreeN CheMistrY 10 years ago PhD research in the University of York s Green Chemistry Centre of Excellence led to the discovery of new high surface area forms of starch. These are useful in applications from chromatography to catalysis. These new materials have remarkable properties which can be tuned from starch-like to carbon-like. Named Starbons (registered trade name), they are the subject of several patent applications and are sold commercially for laboratory use worldwide. Continued EPSRC support is allowing their use in a number of processes including effluent treatment in the pharmaceutical industry as well as studies on process optimisation, scale-up trials and further applications with the chemical industry. Brian Trenbirth, Technical Director of Contract Chemicals a user of the Starbon technology says that they will be delighted to transfer Starbon technology from laboratory through pilot to full scale production. This innovative technology will enable us to diversify our business portfolio thus helping the company to expand. EPSRC is the main UK government agency for funding high-quality basic, strategic and applied research and related postgraduate training in engineering and the physical sciences, to help the nation exploit the next generation of technological change. It invests more than 800 million a year in a broad range of subjects from mathematics to materials science, and from information technology to structural engineering. August 2010 BUSINESS INFRASTRUCTURE INFRASTRUCTURE SUPPORTING THE FUTURE manufacturing ThE future Economic growth made in Britain s UK Energy Programme Issue 2 PIONEERING SKILLS TO BUILD BRITAIN S FUTURE DElIVErIng WITH business Harnessing world-class knowledge for growth and prosperity The RCUK Global Uncertainties Programme brings together the activities of the UK Research Councils in response to global security challenges: poverty (including the effects of inequality & injustice), conflict, transnational crime, environmental stress and terrorism. The programme will help governments, businesses and societies to better predict, detect, prevent and mitigate threats to security. The (EPSRC) leads on the Cybersecurity strand of the RCUK Global Uncertainties Programme. MANUFACTURING ISSUE 2.0 Global production of cement is set to double to over five billion tonnes/year by But the type most commonly used today has a heavy environmental price accounting for five percent of manmade CO2 emissions. Novacem s cement is carbon-negative absorbing CO2 from the atmosphere during manufacture. This is because it isn t limestone based, requires low process temperatures and contains carbon-negative additives. The company has received additional venture funding through the Royal Society Enterprise Fund and is seeking further commercial sponsorship to take the process through to manufacture. d Physical Sciences and Biological uncil (ESRC), the logy Facilities SKILLS engineering and Physical Sciences research council DIGITAL ECONOMY EPSRC funding has played a key role in developing both a new, carbon-negative cement and its manufacturing process. The development is spearheaded by Novacem, a spin-out company from Imperial College London and is also supported by the Technology Strategy Board and the London Development Agency. CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN GREEN TECHNOLOGY Other statements in the series: CYBERSECURITY CeMeNt set to reduce CArBoN emissions ENERGY case Study 04 INFRASTRUCTURE ng and Physical Sciences Council Other statements in the series

5 CASE STUDY 01 Riding with the White hats A major issue in cyber security is staying ahead of attackers and ensuring that new systems are not vulnerable targets. This is where White hats come in (the term comes from Hollywood westerns where the good guys wear the white hats). The White hats help security companies to find weaknesses that could be exploited. Andy King from the University of Kent used EPSRC funding to spend nine months working with White hats at security firm Portcullis to link his academic computer science research with real threats and vulnerabilities. His work revealed a weakness: the process relies on humans finding the errors. As he says The reasoning is if they can t find the errors then no one else can, but that doesn t mean those errors are not there and cannot be found so it makes sense to automate the process. Andy is now devising computer-based tools that will accelerate the discovery of security flaws. These tools will automate the time-consuming and labour-intensive tasks that have to be undertaken when searching for vulnerabilities. The project will develop programme analysis techniques that will automatically recover information about the behaviour of a programme, and then present it in a digestible form to the White hat. CASE STUDY 02 Protecting children online Recent years have seen a rapid rise in the number and use of online social networks. These pose two significant risks in terms of child exploitation by paedophiles: preying on children via chat rooms and web-based communities; and distributing and sharing child abuse media. The Isis project led by Professor Awais Rashid of Lancaster University working in collaboration with Swansea and Middlesex Universities is using the expertise of the team in monitoring, natural language analysis, child protection and ethics to develop a toolkit with 94% accuracy in identifying masquerading adults. The team has helped law enforcement agencies identify those posing as children or using multiple identities to groom their victims. It has also worked with pupils helping them understand online risks. The research has also developed a methodology to identify and mitigate ethical misuses of powerful policing tools. The results form the basis of guidelines for building and developing ethical monitoring solutions. The team s research has featured in over 18 countries and is already being exploited. Isis Forensics Ltd, a spin-out company, has licensed the Language Analysis Software that has been developed by Lancaster University staff within the Isis project.

6 Academic Centres of Excellence in Cyber Security Research (ACE-CSRs) In a national partnership with BIS, the Centre for the Protection of National Infrastructure (CPNI), GCHQ, the Office of Cyber Security and Information Assurance (OCSIA) and RCUK, EPSRC has recognised 11 UK universities as ACE-CSRs, they are: Imperial College London, Lancaster University, Newcastle University, Queen s University Belfast, Royal Holloway, University of London, University of Bristol, University of Birmingham, University of Cambridge, University of Oxford, University of Southampton, University College London. These 11 centres conduct world-leading research and training activities which will ultimately help protect the UK s citizens, businesses, infrastructure and government from cyber threats by extending knowledge and enhancing skills in cyber security. The ACE-CSR scheme is one of a number of initiatives outlined in the UK Government s National Cyber Security Strategy. The Strategy describes how Government is working with academia and industry to make the UK more resilient to cyber attacks. Each ACE-CSR receives a support grant from EPSRC to help them to work with partners in the private, public and third sectors. EPSRC-GCHQ Cyber Research Institutes Two academic Research Institutes have been established jointly by EPSRC and GCHQ to tackle some of the UK s most pressing cybersecurity challenges. Through these Institutes we are supporting more than 10m of collaborative research activity which is inspired by real world, cutting edge, security issues. The Research Institute in the Science of Cyber Security is a virtual organisation involving seven universities. Its Director is Professor Angela Sasse of University College London. It brings together leading academics in the field of cybersecurity including social scientists, mathematicians and computer scientists from across the UK. Its research programme will help to answer two common questions faced by any organisation interested in enhancing its security: how secure are we, and how do we make better security decisions? The Research Institute in Automated Programme Analysis and Verification is led by Professor Philippa Gardner of Imperial College London. Its partners across six leading UK universities will investigate new ways of automatically analysing computer software to reduce its vulnerability to cyber threats.its outputs will provide businesses, individuals and government with additional confidence that software will behave in a secure fashion when installed on operational networks.

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

Professor John McCanny CBE FRS FREng

Professor John McCanny CBE FRS FREng Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion

More information

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------ WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 3 RD DECEMBER 2012 Minister for the Cabinet Office and Paymaster General: Progress on the UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes

More information

Information Security in the undergraduate curriculum

Information Security in the undergraduate curriculum Information Security in the undergraduate curriculum Chris Mitchell Royal Holloway, University of London www.isg.rhul.ac.uk/~cjm 1 Background I Some years ago, computer hacking was mainly done for fun.

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Advancing cyber security. Cyber Security Academy

Advancing cyber security. Cyber Security Academy Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

More information

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

UK s new Research Institute investigates the science of cybersecurity

UK s new Research Institute investigates the science of cybersecurity UK s new Research Institute investigates the science of cybersecurity Government Communications Headquarters (GCHQ) How do we know when we are secure enough? How do we decide how best to spend our precious

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

The UK Cyber Security Strategy Protecting and promoting the UK in a digital world

The UK Cyber Security Strategy Protecting and promoting the UK in a digital world The UK Cyber Security Strategy Protecting and promoting the UK in a digital world November 2011 3 Contents Introduction by the Rt Hon Francis Maude MP, Minister for the Cabinet Offce Executive summary

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

A specification for security-minded building information modelling, digital built environments and smart asset management

A specification for security-minded building information modelling, digital built environments and smart asset management Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Cybercrime in the Automotive Industry How to improve your business cyber security

Cybercrime in the Automotive Industry How to improve your business cyber security Cybercrime in the Automotive Industry How to improve your business cyber security Robert Morbin, Project Co-ordinator, SMMT Simon Kendall, Cyber Security, Department for Business, Innovation and Skills

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Pol 24/15 Appendix 2. National Policing Fraud Protect Strategy

Pol 24/15 Appendix 2. National Policing Fraud Protect Strategy National Policing Fraud Protect Strategy Draft prepared by the National Police Coordinator for Economic Crime V2.1 February 2015 1 PROTECTING THE COMMUNITY FROM FRAUD Introduction: This is the draft National

More information

Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems

Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems Faculty of Engineering School of Electronic and Electrical Engineering University Academic Fellow Smart Energy Systems With a vision and drive to develop a prestigious internationally competitive research

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

The Global Cyber Security Capacity Centre

The Global Cyber Security Capacity Centre The Global Cyber Security Capacity Centre There is no future that does not involve cyberspace, so understanding how to ensure effective cyber security to protect our assets and provide for people s needs

More information

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011)

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) A summary of information received from numerous Careers Services regarding codes, code-breaking

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

STRATEGIC POLICING REQUIREMENT

STRATEGIC POLICING REQUIREMENT STRATEGIC POLICING REQUIREMENT Briefing to the Police and Crime Panel Assistant Chief Constable James Vaughan WHAT IS IT? Issued by Home Secretary as part of her statutory duty Outlines national threats

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation

More information

Connecting things. Creating possibilities. A point of view

Connecting things. Creating possibilities. A point of view Connecting things. Creating possibilities. A point of view Is the next technological revolution already here? The Internet of Things is already transforming our daily lives, our health, education and businesses.

More information

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS CALL FOR EXHIBITORS 10% DISCOUNT FOR FIRST TIME EXHIBITORS* INTRODUCING THE CYBER ZONE Get ready to really showcase your products and services to a specific and vetted audience in a distinctive, dedicated

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Secure Thinking Bigger Data. Bigger risk?

Secure Thinking Bigger Data. Bigger risk? Secure Thinking Bigger Data. Bigger risk? MALWARE HACKERS REPUTATION PROTECTION RISK THEFT There has always been data. What is different now is the scale and speed of data growth. Every day we create 2.5

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting: 14 January 2015, 13:00 Portions

More information

Innovation in Electricity Networks

Innovation in Electricity Networks OPPORTUNITIES IN ENERGY SG2 Innovation in Electricity Networks physical & digital network security Contents Introduction... 1 Innovation in electricity networks... 1 The smart grid opportunity... 2 Physical

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

Edital Faperj n.º 38/2014 RCUK CONFAP RESEARCH PARTNERSHIPS CALL FOR PROJECTS

Edital Faperj n.º 38/2014 RCUK CONFAP RESEARCH PARTNERSHIPS CALL FOR PROJECTS Edital Faperj n.º 38/2014 RCUK CONFAP RESEARCH PARTNERSHIPS CALL FOR PROJECTS Research Councils UK (RCUK) (http://www.rcuk.ac.uk/) and the Brazilian Council of State Funding Agencies (CONFAP) (www.confap.org.br;

More information

Central Sponsor for Information Assurance. A National Information Assurance Strategy

Central Sponsor for Information Assurance. A National Information Assurance Strategy Central Sponsor for Information Assurance A National Information Assurance Strategy A NATIONAL INFORMATION ASSURANCE STRATEGY i Foreword Information and communications technology is changing the way that

More information

Technology Strategy Board (TSB) Future Cities Demonstrator

Technology Strategy Board (TSB) Future Cities Demonstrator Technology Strategy Board (TSB) Future Cities Demonstrator The Technology Strategy Board (TSB) Future Cities Demonstrator is a UK government initiative, which started in January 2013 and is due to conclude

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Data Analytics, Management, Security and Privacy (Priority Area B)

Data Analytics, Management, Security and Privacy (Priority Area B) PRIORITY AREA B: DATA ANALYTICS, MANAGEMENT, SECURITY AND PRIVACY ACTION PLAN Data Analytics, Security and Privacy (Priority Area B) Context Data is growing at an exponential rate; information on the web

More information

Crime and Policing newsletter: March 2013

Crime and Policing newsletter: March 2013 Page 1 of 5 Home Office Part of: Crime and Policing newsletter: March 2013 Crime and Policing newsletter: March 2013 Published 2 April 2013 The March edition of the newsletter. HMIC review On 12 March

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

University Academic Fellow Surface Analysis and Surface Engineering in Tribology and Corrosion

University Academic Fellow Surface Analysis and Surface Engineering in Tribology and Corrosion Faculty of Engineering School of Mechanical Engineering University Academic Fellow Surface Analysis and Surface Engineering in Tribology and Corrosion With a vision and drive to develop a prestigious internationally

More information

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials 5th August 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

Partnerships for Success. Science and Technology Business Partnerships with Lancaster University

Partnerships for Success. Science and Technology Business Partnerships with Lancaster University Partnerships for Success Science and Technology Business Partnerships with Lancaster University What are you looking for? 04 12 08 16 business challenge? SOLUTIONS What is your 06 GAIN COMPETITIVE ADVANTAGE

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Delivery Plan 2014 15

Delivery Plan 2014 15 Delivery Plan 2014 15 Foreword Recorded crime levels have fallen considerably over the last five years but we have also seen changes to the patterns of crime. The delivery plan demonstrates our commitment

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review Our vision is to help the nation spend wisely. We

More information

What do Birmingham postgraduates do?

What do Birmingham postgraduates do? 1 What do Birmingham postgraduates do? College of and Physical Sciences What do Birmingham postgraduates do? School of Computer Science First destinations of postgraduates Analysis of first employment

More information

TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with

TEASER INVESTOR DECK 500k SEIS+EIS ROUND. In partnership with TEASER INVESTOR DECK 500k SEIS+EIS ROUND In partnership with Cyberlytic created Cyber Threat Profiler, a software solution that complements existing network security components to provide real-time risk

More information