Your SlideShare is downloading. ×
0
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Secure communications - CDE themed call launch 18 June 2013.

852

Published on

Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259 …

Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
852
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
54
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Secure CommunicationsCentre for Defence EnterpriseWing Commander Jim Pennycook
  • 2. Rapid technological change
  • 3. © Crown Copyright MOD 2011The aim of CDE
  • 4. © Crown Copyright MOD 2011Prove the value of novel, high-risk,high-potential-benefit research
  • 5. © Crown Copyright MOD 2011To enable development of cost-effective military capability advantage
  • 6. 19 June 2013Five key operating principlesunderpin the CDE model
  • 7. Engaging innovators
  • 8. 19 June 2013Accessible opportunity
  • 9. Sustaining incentives
  • 10. Minimising participation costs
  • 11. Compliance
  • 12. Intellectual property
  • 13. Two routes to funding
  • 14. Online bid submission
  • 15. Themed calls
  • 16. Dstl is part of theMinistry of DefenceCrown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECDE themed call programmeCountering insider threat attacks Call closes 27 Jun 2013Secure communications Call closes 22 Aug 2013Innovation in drug developmentprocessesCall launch 25 June 2013Enhancing military medical trainingand support for the medicCall launch 16 July 2013Novel solutions for emulating shipsignaturesCall launch 23 July 2013Register and further details at www.science.mod.uk under ‘Events and Calls’All call close at 17:00 hrs
  • 17. Defence Open Call
  • 18. Seeking the exceptional
  • 19. 4438proposals received
  • 20. 17%proposals funded
  • 21. £39Mcontracts awarded
  • 22. Exemplar project
  • 23. Fuel efficiency
  • 24. ‘Micro generators’
  • 25. © Crown Copyright MOD 2011Effective proposals
  • 26. Challenge, pace & exploitation
  • 27. The future of CDE
  • 28. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 29. Secure Communications
  • 30. Network and question
  • 31. Centre for Defence Enterprise01235 438445cde@dstl.gov.ukwww.science.mod.uk/enterprise
  • 32. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 33. Secure CommunicationsMilitary ContextSquadron Leader Mike LeamanUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  • 34. © Crown copyright 2013 Dstl19 June 2013MilitarycommunicationsUsableReliableDeployable
  • 35. © Crown copyright 2013 Dstl19 June 2013Future operatingenvironmentCongestedClutteredContestedConnectedConstrained
  • 36. © Crown copyright 2013 Dstl19 June 2013Short-noticeoverseasdeployments
  • 37. © Crown copyright 2013 Dstl19 June 2013Coalitionmulti-agencyoperations
  • 38. © Crown copyright 2013 Dstl19 June 2013Military „platforms‟Networking makes the wholemore effectivebut• capacity is limited• effective integration isessential
  • 39. © Crown copyright 2013 Dstl19 June 2013The userCapacity is limitedRisk-basedapproach
  • 40. © Crown copyright 2013 Dstl19 June 2013The UserCapacity is limited
  • 41. © Crown copyright 2013 Dstl19 June 2013MilitarycommunicationsUsableReliableDeployable
  • 42. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 43. Information SuperiorityJoint Forces CommandDr David Massey MEng MIETC4ISR Domain LeadProgramme and Delivery Directorate
  • 44. The Joint Forces CommandInformation Superiority account© Crown copyright 2013 Dstl19 June 2013Information Superiority includes:-– Command, Control, Information &Intelligence– Integrated Sensing– Assured Information Infrastructure– Decision Support for C4ISR (Command,Control, Communications, Computing, Intelligence,Surveillance and Reconnaissance)– Cyber– Defence Intelligence
  • 45. Benefits delivered by the account• Command & Control (C2) concepts• Improve Information & Intelligence• Provide knowledge and tools incyberspace• Provide enhanced and affordablesensor technologies© Crown copyright 2013 Dstl19 June 2013
  • 46. Upcoming requirements• Increased emphasis on information analysisand intelligence production• Continued emphasis on communications &networks• Reduced emphasis on sensors per se withfocus shifted to common sensor modalities• Experimentation and Decision Supportremain key• Cyber remains a priority© Crown copyright 2013 Dstl19 June 2013
  • 47. Challenges for the futureSupport the provision of anexpeditionary commandand inform capability thatis sufficiently sustainable,scalable and interoperable© Crown copyright 2013 Dstl19 June 2013
  • 48. Challenges for the futureAppropriate combination ofsensors/platforms,infrastructure and exploitationcapabilities to generate timelysituation awareness– Eg common architecturesbased on wideband multi-function radio frequency (RF)systems for manned andunmanned combat airsystems.© Crown copyright 2013 Dstl19 June 2013
  • 49. Challenges for the futureCyber situational awareness, defence andoperations including effects deliveredthrough computers, networks,electromagnetic (EM) spectrum andhuman influence.© Crown copyright 2013 Dstl19 June 2013
  • 50. Key elements of the account• Supports Joint Forces Command (JFC) Information Superiorityscience and technology needs. Incorporates:– C4ISR (Command, Control, Communications, Computing,Intelligence, Surveillance and Reconnaissance)– Cyber• Directly supports JFC Defence Authorities for C4ISR and Cyber,Defence Intelligence & other government departments• As a cross-cutting account, supports the needs of all Front LineCommands© Crown copyright 2013 Dstl19 June 2013
  • 51. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 52. Secure Communications CDE ThemedCallIntroductionHelen Carlton© Crown copyright 2013 Dstl19 June 2013
  • 53. Assured Information Infrastructure• Objective– provide science and technology support to MOD to enable therealisation of a continuously evolving single, logical,reconfigurable, resilient information infrastructure across UKand deployed, fixed and mobile elementsUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  • 54. Assured Information Infrastructure• The right information, to the right person, in the rightform, at the right time, to support the best decision toinitiate effective action© Crown copyright 2013 Dstl19 June 2013
  • 55. Military vs commercial© Crown copyright 2013 Dstl19 June 2013TimeTechnologyProgressUNCLASSIFIED
  • 56. The challenge• How can MOD harness civilian advances– reduced size, weight, power– open standards– increased bandwidth, data rate• In areas such as– personal communications– personal computing– non radio frequency (RF) communications– automotive communications© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 57. The challenge• Against military constraints– security– assurance– integration– interoperabilityUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  • 58. What we want• Innovative exploitation of commercial-off-the-shelf(COTS) technology• Novel approaches to securing informationinfrastructures• Technology that is inherently small, lightweight and lowpower• Proposals that show how improvements will bemeasured and demonstrated• Practical demonstrations set in a military context© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 59. What we don‟t want• Solutions that offer no significant defence and securitybenefit• Technology watch / horizon scanning• Paper-based studies, roadmaps or technologyprediction• Impractical solutions or ones requiring internalchanges to COTS• New encryption algorithms© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 60. Exploitation• Planned route for exploitation next financial year is viaresearch programme• Ideally an exploitation route to military equipment© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 61. C4ISR Secure InformationInfrastructure Services (CSIIS)• Framework through which aII research is conducted• Flexible and fluid consortium led by a Prime• Duration three years• Research areas– Communications and Networks– Information Assurance– Knowledge and Information Management• Start date November 2013UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  • 62. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 63. Image is public sector information licensed under the Open Government Licence v1.0© Crown copyright 2013 Dstl19 June 2013Challenge 1Securing Commercial-off-the-shelf(COTS) TechnologyTrevor Benjamin
  • 64. Scope• Networks and Information Infrastructure– wireless, wired, optical– networking components– user terminal devices– server systems andcloud technologyUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Image is public sector information licensed under the Open Government Licence v1.0
  • 65. Issues• Major problem – SECURITY• Mismatch - civil and military security risks and requirements• Issues– implementation standards and quality– strength of security functionality– assurance levels– accreditationUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  • 66. Constraints• Commercial off the shelf (COTS)• Enhanced and strengthened security• Unmodified COTS• Capable of evaluation and accreditation• Solutions might include:– separate and novel security devices– add-on security enhancements– wrap-around security barriers© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 67. Example 1 – Bring your own device• Benefits of BYOD for MOD• Work with MOD infrastructure• Strategic, deployedand coalition systems• BYOD that:– hinder malicious attack– protect information from compromise© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  • 68. Example 2 – Novel cryptography• Greater MOD use of civil & plain-text communications• Cryptography close to edge• Seeking cryptography solutions– at user device– embedded in applications• Device and system issues– key management– identity management– how to do cyber defence© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDDo not propose new encryption algorithmssolutions should use standards-based or government-defined algorithms
  • 69. Example 3 – Mobile wireless systems• Wireless is a key enabler for military operations– currently bespoke radio devices• COTS could provide:– ease of use– smaller size, weight and power– cheaper solutions– training savings– simpler logistics• Need to enhance security, robustness, ruggedness© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  • 70. Example 4 – Host-based protection• Paradigm shift– move security away from supporting infrastructure– host based and information based security• Infrastructure more generic• Users more responsible for security• Need novel concepts:– to enable this change based on COTS– in security functionality and placement© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  • 71. Human factors• The biggest security threat is people!– work-around security functionality– undermine original purpose• Consider the people issues• Need novel approaches to– human factors of security solutions– people, culture and information security– improved socio-technical systems– human-computer interactions for system security components© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  • 72. Summary• Securing COTS– in MOD communications and information infrastructures– match protection mechanisms to military risks• Novel approaches to military security– using COTS without internal modification– capable of high assurance and being part of accredited systems• Examples might include:– “Bring your own device” security– edge cryptographic protection– secure mobile wireless systems– host and information based protection• Consider human factors– relationship between people and information security– improved socio-technical security systems– better human-security interfacing© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 73. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 74. Challenge 2Mission-Configurable SystemsSimon Baker© Crown copyright 2013 Dstl19 June 2013
  • 75. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Introduction• Military C4ISR (Command, Control,Communications, Computing, Intelligence,Surveillance and Reconnaissance) systems– tend to be stove-piped– making changes is complicated, time consumingand expensive
  • 76. © Crown copyright 2013 Dstl19 June 2013Revised needsCourtesy of ISAF Media
  • 77. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013• Rapidly support changing operationalrequirements• Work effectively within the Combined, Joint,Intergovernmental, Inter-agency, Multi-national(CJIIM) context• Front Line Commands have some flexibility toestablish their “fight tonight” initial capabilities
  • 78. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013The challenge• Innovative solutions to help MOD address the adoptionof a flexible and open systems approach across theC4ISR Domain• Demonstrate potential impact of different approaches tothe delivery of mission-configurable C4ISR capability,including the applications and information services
  • 79. Example 1 – Cloud computing• Cloud computing, open information services,virtualisation• Demonstrate how new systems could manage– the loss of information services/communications bearers• provision of a useful level of local services to the affectedusers– reconfiguration of services for new tasks and networkchanges© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 80. Example 2 – Access management• Management and monitoring of access to informationservices at different levels of trust© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 81. Example 3 – Operating pictures• Users want to define their operating pictures, butmission-critical information must not be masked oromitted© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  • 82. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Information sharing• Information needs to be shared acrossorganisational boundaries• Need to share information services withpartners at different levels of trust
  • 83. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Summary• adaptable solutions• management of applications and services• federate with other MOD systems and with externalorganisations systems• achieve improved resilience, security andinteroperability• exhibit graceful degradation
  • 84. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  • 85. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECentre for Defence EnterpriseSubmitting a Successful ProposalJono ByrneCentre for Defence Enterprise (CDE)
  • 86. Maximising your chances
  • 87. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  • 88. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  • 89. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  • 90. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Read availableinformationStart with –Quick Start Guideplus other CDE manuals –Account Manual, UserManual, TechnologyApplication ManualKnow what is available
  • 91. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  • 92. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Developing a CDE proposal
  • 93. Dstl is part of theMinistry of DefenceValue from technologyInnovativeconceptFuturecapabilityProof ofconcept Incremental development
  • 94. The essentials
  • 95. Description
  • 96. minsAssessment
  • 97. Not an exam
  • 98. MOD Performance Assessment FrameworkFive criteria:Operational relevanceLikelihood of exploitationBuilds critical S&T capability to meet UKneedsScientific quality/innovationScience, innovation and technology risk
  • 99. Commercial tab
  • 100. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Government-furnished X
  • 101. Health and safety
  • 102. Ethics
  • 103. Unclassified
  • 104. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASEProposal health check
  • 105. Claim of future benefit
  • 106. Contribution to future benefit
  • 107. Logical programme of work
  • 108. Generation of evidence
  • 109. Demonstration of progress
  • 110. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASEBased on a claim of future benefitContribution to realisation of future benefitLogical programme of workEvidential outcomesDemonstration of progress towards goalHealth check
  • 111. Early birds
  • 112. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012This call closes:Thursday 22 August 2013At17:00 hrsDeadline
  • 113. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECentre for Defence Enterprisecde@dstl.gov.ukwww.science.mod.uk/enterpriseCall process queries
  • 114. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012dstlsecurecommscde@dstl.gov.ukCall technical queries
  • 115. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012www.science.mod.ukEvents and Calls > Current calls for proposals> Secure communicationsWebinar: 20 June 12:30-13:30Register onlineFurther information
  • 116. Network and question
  • 117. 15-minute slotsEncourage those who have not workedwith us beforeBook at registration desk over lunchName, organisation, which challengeSurgery sessions
  • 118. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda

×