Advancing cyber security. Cyber Security Academy



Similar documents
Cyber Security in the University of Oxford: Collaborating without Conforming?

UK Government Information Economy Strategy

Jyväskylä Cyber Security Ecosystem

Coaching Scotland A framework for sports coaching in Scotland

Symposium report. The recruitment and retention of nurses in adult social care

2. Cyber security research in the Netherlands

Australian Government Cyber Security Review

Asset Management. Enabling effective estates strategies >

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

Directors of Public Health in Local Government. Roles, Responsibilities and Context

Supporting retail markets. Executive summary

Small businesses: What you need to know about cyber security

Cybersecurity in the Commonwealth: Setting the Stage

Data Intensive Research Initiative for South Africa (DIRISA)

National Cyber Security Policy -2013

HMG Security Policy Framework

Small businesses: What you need to know about cyber security

Special administration regime for payment and settlement systems: summary of responses

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems

Managing educational change in the ICT discipline at the tertiary education level

Cyber Essentials Scheme

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Co-creation progress update and an invitation to respond. Overview of ideas from co-creation activities towards a Climate Ready UK...

Electric Energy and Power Panel Sessions

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

National Approach to Information Assurance

Heat Networks Delivery Unit

8970/15 FMA/AFG/cb 1 DG G 3 C

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government

Crown Prosecution Service, London Business Plan

FIRST ANNOUNCEMENT AND CALL FOR ABSTRACTS. 7th International Conference on Energy Efficiency in Domestic Appliances and Lighting (EEDAL 13)

9360/15 FMA/AFG/cb 1 DG G 3 C

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Call for Input: Supporting the development and adoption of RegTech

HR Fast Stream Graduate Programme

Annex B: Payment and Expenses for Governors

Electricity Market Reform:

Context. UK-lndia Education and Research Initiative (UKlERl)

A briefing on the evidence-based drug and alcohol treatment guidance recommendations on mutual aid

University Academic Fellow Surface Analysis and Surface Engineering in Tribology and Corrosion

Internet Governance and Cybersecurity Patrick Curry MACCSA

CIPFA key facts. A handy at a glance guide

Strategic Guidance for Community Planning Partnerships: Community Learning and Development

Developing Excellence in Leadership, Training and Science

The UK cyber security strategy: Landscape review. Cross-government

Section 139A Learning Difficulty Assessments Statutory Guidance. For local authorities

Faculty of Environment Institute for Transport Studies. University Academic Fellow Big Data and Transport Modelling

Training, Support and Development Standards for Foster Care

JOINT DIRECTOR OF PUBLIC HEALTH JOB DESCRIPTION

Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation

MEMORANDUM TO THE BUSINESS, INNOVATION AND SKILLS SELECT COMMITTEE. Post-Legislative Assessment of the Further Education and Training Act 2007

NHS Procurement Dashboard: Overview

Cloud (educational apps) software services and the Data Protection Act

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Business Plan 2012/13

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

CASE STUDIES ON CYBER SECURITY

Consultation on possible location of main site

Programme Specification and Curriculum Map for BA Criminology (Criminal Justice)

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

Residential rehabilitation: state of the sector in 2014 Report of a survey of providers and commissioners of residential services

Cyber Risk & Insurance

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

Addressing Cyber Risk Building robust cyber governance

Guidance on becoming an Accredited School Provider or an Accredited Schools Group in the secondary phase. Information on the accreditation system

POSITION DESCRIPTION: NURSING IN GENERAL PRACTICE (NiGP) PROGRAM DIRECTOR

Eligibility for an exemption from the costs of Contracts for Difference updated cost estimates

The Coalition s Policy to Help Problem Gamblers

Committees Date: Subject: Public Report of: For Information Summary

A Users Guide to the recast Late Payment Directive

EPN CONSULTING AS YOUR CONSULTANTS

Q&A: The Criminal Justice System

English language training for refugees in London and the regions

REGULATIONS LUISS BUSINESS SCHOOL. SECTION I Purpose and Scope

Transcription:

Advancing cyber security. Cyber Security Academy

An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity. We are working with our partners developing a dynamic technopole based in the South of England delivering global impact: Research World class, strategic project work contributing to a more secure cyberspace Cyberspace Innovation Applying research to provide solutions to real cyber security problems Education Delivering the next generations of cyber security professionals Training Keeping experienced professionals current and cyber security aware Outreach Ensuring schools and community engage in best cyber security practice We operate a tiered membership scheme enabling engagement for companies of all sizes. This, coupled with a policy of involving companies from across the spectrum of industrial sectors, ensures that the whole industrial and commercial community is included. Members of the Academy benefit from a multi-million pound shared research programme, consultancy from globally respected experts, access to educational programmes from a world-class university, recruitment and placement opportunities and CPD training for professionals and IT operatives. Companies are invited to join the Academy at the most appropriate level to their needs and means. We are delighted that we have already established partnerships with DSTL, Northrop Grumman and Roke Manor Research as our founding core members. Core partners 2 Part of CyberInvest Crown copyright 2015 You may re-use this information (not including logos) free of charge in any format or medium, und Open Government Licence. Visit www.nationalarchives.gov.uk/doc/open-government-licence, wr 3

The Cyber Security Academy is a focal point of expertise and will become the hub of a vibrant community of high value companies and institutions. These Centres of Excellence form the backbone of the UK s world leading cyber security research. It is crucial for academia to work closely with industry and ensure the UK benefits fully from this knowledge and expertise on cyber security. Rt Hon David Willets MP speaking as Minister for Universities and Science Department for Business, Innovation and Skills Driving innovation and delivering significant value, the academy is nationally recognised and will exercise global influence. World-class academic staff engaged in research, teaching, training, outreach and consultancy are supported by a professional team focusing on innovation, technology transfer, and opportunities with industry. The Cyber Security Academy is based at the Academic Centre of Excellence for Research in Cyber Security (ACE-CSR) at the University of Southampton and provides a vibrant and innovative environment for member companies. Academic staff members and postdoctoral researchers will work interactively with members on agreed research themes in a shared research consortium scheme. A doctoral training centre is planned with a substantial annual intake of PhD students. Cyber Security Academy Innovation Joint Research Knowledge Transfer Consulting Education Internships Recruitment University ACE-CSR Industry Knowledge Joint Bids Outreach Community Impact Industrial Spin-offs Spin-ins The Academy will provide a stream of cyber security professionals at all levels of qualification; will train the existing workforce through an industry-relevant CPD program in Cyber Security and will promote public engagement and schools outreach. Policy and direction is set by the Strategy Board which is the highest governance body in the Academy. All core members have a seat on this board ensuring full involvement in the direction of research and the overall strategy of the Academy. An external Advisory Board will connect the Academy to its government, economy industry and society stakeholders, act as an advocate for it, and regularly review its activities. Contact us today to join the Cyber Security Academy or request more information. Citizen - Privacy - Anonymity - Impersonation - Identity - Surveillance Government - Cybercrime - egovernment - Data anonymisation towards a secure cyberspace Infrastructures - Power grid - Communications - Transport network - IoT - CPS Economy - Cyber risk - Financial networks - Cryptocurrencies Contact Professor Vladimiro Sassone Director, Cyber Security Academy Email: vsassone@soton.ac.uk Twitter:@v_sassone @cybsecsoton Tel: +44 (0) 23 8059 9009 Ged Powell Business Manager, Cyber Security Academy Email: g.a.powell@soton.ac.uk Tel: +44 (0) 23 8059 8382 5

Our work Secure Federated Data Clouds The H2020 SUNFISH Project ( 4.5m) partners include the UK and Italian governments. SUNFISH focusses on the secure sharing of information in federated heterogeneous private clouds, and aims at developing the middleware to federate data clouds belonging to different public sector entities whilst maintaining the required security levels. UK Government Working with the government to investigate the cyber security of the Internet-of-Things, of the UK Smart Metering Implementation Programme as well as the effectiveness of cyber security essential controls. We have established solid working relationships with several agencies including the Foreign and Commonwealth Office, the Information Commissioner s Office, the National Audit Office and the National Crime Agency. We ideated and promoted a series of workshops and the Southampton Cybercrime Symposium to provide the first common forum between cyber law enforcement, the College of Policing and academia. Human-agent collectives The ORCHID project ( 5.5m) seeks to understand, build, and apply human-agent collectives to symbiotically interleave human and computer systems with a view to realising our tremendous potential whilst avoiding the pitfalls that come with dependence. Open linked data The Open Date Institute ( 10m) catalyses the evolution of open data culture to create economic, environmental, and social value. Among other things, it investigates privacy and anonymisation of open linked data. Software Verification and validation Verification and validation in cyberspace research has delivered the ADVANCE project is developing a unified tool-based framework for automated formal verification and validation of cyber-physical systems. Many-core technology The PRiME project ( 5.6M) focuses on many-core technology and its profound implications on the energy efficiency, dependability and reliability of future embedded systems. Risk management strategy We were awarded a `Certificate of Excellence by TSB for developing real-time models to strengthen risk management strategy, a project with London Capital Group. Provenance Our research on provenance research is thriving and opening up in new directions, including provenance anonymisation, summarisation and analytics, with services being exposed to the community through the University s portal. Key areas of expertise and specialism Our core research expertise includes: analysis and design of trustworthy software; bio- and cybermetrics; cyber identity; cyber risk analysis; cyber criminology; data privacy; international cyber law; provenance and trust; safety- and-security by design; secure embedded systems; secure web technologies; security of cyber-physical systems and internet-ofthings; security of critical infrastructures, transport networks, and power grid. 6 7

www.southampton.ac.uk/csa cybsec@southampton.ac.uk +44 (0)23 8059 9009 8