SlideShare a Scribd company logo
1 of 1
Download to read offline
n March 2011 the UK Government
published its Plan for Growth,stressing
the urgent need to secure long-term
sustainable economic growth through a
renewed focus on exports.The Plan for
Growth was followed in November 2011 by
the UK Cyber Security Strategy.
The UK Cyber Security Strategy aims to
tackle cyber crime and make the UK one of
the safest places in the world to do business
online.This includes developing a strategy to
promote the capabilities of the UK cyber
security industry to international markets.
This promotion has involved exploiting
the domestic sector’s strengths,including its
support of technical innovation,skilled
workforce,sound legal and regulatory
environment,and incorporation of‘the
internet of things’in the economy.
All of these strengths were recognised by
the Economist Intelligence Unit,which
ranked the UK number one in its Cyber
Power Index.
Capitalising on this ranking,the UK
Government has continued work on its
£650 million National Security Strategy,
launched in 2010,by making its Cyber
Essentials accreditation mandatory for
certain government contracts and
establishing an Office of Cyber Security
and Information Assurance.This office
works to co-ordinate security measures
between different government
departments,as well as public and private
sector bodies.
To further co-ordinate engagement
between government and the supply base,
UKTrade & Investment (UKTI) formed the
Cyber Growth Partnership,composed of
representatives from academia,government
and industry.The Partnership works on
behalf of the wider sector to increase access
to the export market,develop the UK cyber
presence abroad and undertake a market
analysis campaign.
The market analysis campaign is currently
gathering feedback from UK Government
posts overseas – particularly those in Brazil,
India,the Gulf States and South East Asia – to
give an overview of their local and regional
drivers in cyber security,high-value projects
and export risks.
Meanwhile,UKTI is also working with
government stakeholders to develop
bilateral relationships and pursue cyber
export opportunities.This work will take the
form of trade trips,exhibitions and seminars
both in the UK and abroad.
UKTI events will showcase UK cyber
security solutions,such as network
surveillance,advisory services (including
cyber security accreditation schemes),
endpoint technologies (such as firewalls),
social media analytics,mobile device
security,encryption technologies,and cyber
security education.
These services have potential applications
in both defence and civil technologies,such
as intelligence gathering systems,
communications infrastructure,transport
infrastructure,energy smart metering,large
ICT systems,financial services systems and
research capabilities.
Explaining these opportunities,UKTI
Defence & Security Organisation (UKTI DSO)
Army Adviser for Cyber & Communications,
Lt ColTim Cooper,addressed the recent
Defence Procurement,Research,Technology
& Exportability (DPRTE) 2014 conference.
Lt Col Cooper said:“The UK is good at cyber
security;as a nation we have been doing it for
around 70 years – GCHQ and CESG have a
long history of its innovation.The Government
has structures in place that have matured over
time to support cyber security.
“Wehavesomeofthebestuniversitiesinthe
world–11ofwhicharerecognisedasCyber
CentresofExcellence–andtheytakethis
academicthinkingandtransformitinto
innovativeproducts,whichtheydevelopquickly.
“Wealsohavestrongpoliticalleadershipand
alegalframeworkthatsupportscybersecurity.”
Lt Col Cooper continued:“TheUKofferis
aboutAdvice,AccessandAssurance;providinga
tripleAratingofcybersecurity.Wewillprovide
advicetopeople,helpingthemrecognisethreats
inthecyberworld;provideaccesstoHMG
representativesandUKcompaniestocombat
thesethreats;andprovideassuranceschemesto
reducefuturerisks.”
F E A T U R E
20 MOD DCB :: 12 November 2014 :: Vol 12 No 22 :: www.contracts.mod.uk
UK Cyber Security Strategy:
promoting the next big export
The UK Government has set a national target of exporting £2 billion of cyber security goods and
services annually by 2016.This goal was established following publication of the UK Cyber Security
Strategy in 2011,which detailed a plan to capitalise on the country’s burgeoning cyber sector.
Here,MOD DCB features writer Julie Shennan takes a closer look at cyber security exports.
I
“The UK offer is about Advice,Access and Assurance;
providing a triple A rating of cyber security”
Lt ColTim Cooper,Army Adviser for Cyber & Communications,UKTI DSO
Further Information
For more information,visit:
www.techuk.org/cyber-growth-partnership

More Related Content

What's hot

Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureFrancis Amaning
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff BullwinkelPaul van Heel
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
Recent eu data_initiatives_in_context_infographic
Recent eu data_initiatives_in_context_infographicRecent eu data_initiatives_in_context_infographic
Recent eu data_initiatives_in_context_infographicmarino54
 
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...Ambrose Ruyooka,PMP,CGEIT, CRISC
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information SecurityRoberto Reale
 
SC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to SecuritySC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to SecurityBigData_Europe
 
Cyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeCyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeDuncan Purves
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for ComeosBart Van Den Brande
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecurityBigData_Europe
 
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...KEBE Mbaye
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
20170601 - Digital festival presentation
20170601 - Digital festival presentation20170601 - Digital festival presentation
20170601 - Digital festival presentationBrussels Legal Hackers
 
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Swathi Young
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordCreative Commons Korea
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Press Release: International Conference at the Columbia University in New York
Press Release: International Conference at the Columbia University in New YorkPress Release: International Conference at the Columbia University in New York
Press Release: International Conference at the Columbia University in New YorkMICUS Management Consulting GmbH
 

What's hot (20)

Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
Gifec
GifecGifec
Gifec
 
Government Support for Investment in Digital Infrastructure
Government Support for Investment in Digital InfrastructureGovernment Support for Investment in Digital Infrastructure
Government Support for Investment in Digital Infrastructure
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff Bullwinkel
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
Recent eu data_initiatives_in_context_infographic
Recent eu data_initiatives_in_context_infographicRecent eu data_initiatives_in_context_infographic
Recent eu data_initiatives_in_context_infographic
 
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
A Policy Approach to ICT for Development_Uganda Presentation at eLearning Afr...
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information Security
 
SC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to SecuritySC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to Security
 
Cyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeCyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator Programme
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
The Cope Cyber Security Market https://smartdigitalplanet.files.wordpress.com...
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
20170601 - Digital festival presentation
20170601 - Digital festival presentation20170601 - Digital festival presentation
20170601 - Digital festival presentation
 
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Press Release: International Conference at the Columbia University in New York
Press Release: International Conference at the Columbia University in New YorkPress Release: International Conference at the Columbia University in New York
Press Release: International Conference at the Columbia University in New York
 

Viewers also liked

Lenovo Miix 2 10 (PITW112-R1) Certificate
Lenovo Miix 2 10 (PITW112-R1) CertificateLenovo Miix 2 10 (PITW112-R1) Certificate
Lenovo Miix 2 10 (PITW112-R1) CertificateAbner Sumalgy
 
DCB1305 - F1_Ploughshare
DCB1305 - F1_PloughshareDCB1305 - F1_Ploughshare
DCB1305 - F1_PloughshareJulie Shennan
 
Intuit Quickbooks Tutor in Houston, Texas
Intuit Quickbooks Tutor in Houston, TexasIntuit Quickbooks Tutor in Houston, Texas
Intuit Quickbooks Tutor in Houston, TexasCompusoftusa
 
Site web conception
Site web conceptionSite web conception
Site web conceptionStabl Web
 
YWPZA - Getting the Job
YWPZA - Getting the JobYWPZA - Getting the Job
YWPZA - Getting the JobAshton Maherry
 

Viewers also liked (10)

Lenovo Miix 2 10 (PITW112-R1) Certificate
Lenovo Miix 2 10 (PITW112-R1) CertificateLenovo Miix 2 10 (PITW112-R1) Certificate
Lenovo Miix 2 10 (PITW112-R1) Certificate
 
DCB1305 - F1_Ploughshare
DCB1305 - F1_PloughshareDCB1305 - F1_Ploughshare
DCB1305 - F1_Ploughshare
 
Intuit Quickbooks Tutor in Houston, Texas
Intuit Quickbooks Tutor in Houston, TexasIntuit Quickbooks Tutor in Houston, Texas
Intuit Quickbooks Tutor in Houston, Texas
 
APTB457A 6 & 10KG
APTB457A 6 & 10KGAPTB457A 6 & 10KG
APTB457A 6 & 10KG
 
Mmorpg sur xbox 360
Mmorpg sur xbox 360Mmorpg sur xbox 360
Mmorpg sur xbox 360
 
Medicos.pdf diana
Medicos.pdf dianaMedicos.pdf diana
Medicos.pdf diana
 
Dimas jan 2016
Dimas jan 2016Dimas jan 2016
Dimas jan 2016
 
LeeHSJ15.1
LeeHSJ15.1LeeHSJ15.1
LeeHSJ15.1
 
Site web conception
Site web conceptionSite web conception
Site web conception
 
YWPZA - Getting the Job
YWPZA - Getting the JobYWPZA - Getting the Job
YWPZA - Getting the Job
 

Similar to dcb1222 - Feature3

uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2Elisha Quaye
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy- Mark - Fullbright
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egyptsvito
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of SpainMiguel A. Amutio
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)Gry Helene Stavseng
 
Borrador 2 Documento Conpes - Seguridad Digital
Borrador 2 Documento Conpes - Seguridad Digital Borrador 2 Documento Conpes - Seguridad Digital
Borrador 2 Documento Conpes - Seguridad Digital Urna de Cristal
 
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...DITAustria
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Unveiling the Ministry of Interior MQ.docx
Unveiling the Ministry of Interior MQ.docxUnveiling the Ministry of Interior MQ.docx
Unveiling the Ministry of Interior MQ.docxGoldensun1
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Invest Northern Ireland
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Digital innovations -Empowering digital ecosystems and startups
Digital innovations -Empowering digital ecosystems and startups Digital innovations -Empowering digital ecosystems and startups
Digital innovations -Empowering digital ecosystems and startups Soren Gigler
 

Similar to dcb1222 - Feature3 (20)

uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
Ict vision
Ict visionIct vision
Ict vision
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egypt
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of Spain
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Borrador 2 Documento Conpes - Seguridad Digital
Borrador 2 Documento Conpes - Seguridad Digital Borrador 2 Documento Conpes - Seguridad Digital
Borrador 2 Documento Conpes - Seguridad Digital
 
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...
UK Tech Night 18th June 2018: Andrew Elwick: Tech Trends & UK Business Opport...
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Unveiling the Ministry of Interior MQ.docx
Unveiling the Ministry of Interior MQ.docxUnveiling the Ministry of Interior MQ.docx
Unveiling the Ministry of Interior MQ.docx
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gar...
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Digital innovations -Empowering digital ecosystems and startups
Digital innovations -Empowering digital ecosystems and startups Digital innovations -Empowering digital ecosystems and startups
Digital innovations -Empowering digital ecosystems and startups
 

More from Julie Shennan

Budget 2016: Infrastructure Investment
Budget 2016: Infrastructure Investment Budget 2016: Infrastructure Investment
Budget 2016: Infrastructure Investment Julie Shennan
 
Budget 2016: SME Agenda
Budget 2016: SME AgendaBudget 2016: SME Agenda
Budget 2016: SME AgendaJulie Shennan
 
BI Insight - Dec-Jan
BI Insight - Dec-JanBI Insight - Dec-Jan
BI Insight - Dec-JanJulie Shennan
 
DCB1306 - F2_Reveal Media-2
DCB1306 - F2_Reveal Media-2DCB1306 - F2_Reveal Media-2
DCB1306 - F2_Reveal Media-2Julie Shennan
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure InvestmentJulie Shennan
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure InvestmentJulie Shennan
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure InvestmentJulie Shennan
 

More from Julie Shennan (9)

DCB1422 - F2_Gasket
DCB1422 - F2_GasketDCB1422 - F2_Gasket
DCB1422 - F2_Gasket
 
Budget 2016: Infrastructure Investment
Budget 2016: Infrastructure Investment Budget 2016: Infrastructure Investment
Budget 2016: Infrastructure Investment
 
Budget 2016: SME Agenda
Budget 2016: SME AgendaBudget 2016: SME Agenda
Budget 2016: SME Agenda
 
BI Insight - Dec-Jan
BI Insight - Dec-JanBI Insight - Dec-Jan
BI Insight - Dec-Jan
 
DCB1306 - F2_Reveal Media-2
DCB1306 - F2_Reveal Media-2DCB1306 - F2_Reveal Media-2
DCB1306 - F2_Reveal Media-2
 
dcb1212_feature1
dcb1212_feature1dcb1212_feature1
dcb1212_feature1
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure Investment
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure Investment
 
Scottish Infrastructure Investment
Scottish Infrastructure InvestmentScottish Infrastructure Investment
Scottish Infrastructure Investment
 

dcb1222 - Feature3

  • 1. n March 2011 the UK Government published its Plan for Growth,stressing the urgent need to secure long-term sustainable economic growth through a renewed focus on exports.The Plan for Growth was followed in November 2011 by the UK Cyber Security Strategy. The UK Cyber Security Strategy aims to tackle cyber crime and make the UK one of the safest places in the world to do business online.This includes developing a strategy to promote the capabilities of the UK cyber security industry to international markets. This promotion has involved exploiting the domestic sector’s strengths,including its support of technical innovation,skilled workforce,sound legal and regulatory environment,and incorporation of‘the internet of things’in the economy. All of these strengths were recognised by the Economist Intelligence Unit,which ranked the UK number one in its Cyber Power Index. Capitalising on this ranking,the UK Government has continued work on its £650 million National Security Strategy, launched in 2010,by making its Cyber Essentials accreditation mandatory for certain government contracts and establishing an Office of Cyber Security and Information Assurance.This office works to co-ordinate security measures between different government departments,as well as public and private sector bodies. To further co-ordinate engagement between government and the supply base, UKTrade & Investment (UKTI) formed the Cyber Growth Partnership,composed of representatives from academia,government and industry.The Partnership works on behalf of the wider sector to increase access to the export market,develop the UK cyber presence abroad and undertake a market analysis campaign. The market analysis campaign is currently gathering feedback from UK Government posts overseas – particularly those in Brazil, India,the Gulf States and South East Asia – to give an overview of their local and regional drivers in cyber security,high-value projects and export risks. Meanwhile,UKTI is also working with government stakeholders to develop bilateral relationships and pursue cyber export opportunities.This work will take the form of trade trips,exhibitions and seminars both in the UK and abroad. UKTI events will showcase UK cyber security solutions,such as network surveillance,advisory services (including cyber security accreditation schemes), endpoint technologies (such as firewalls), social media analytics,mobile device security,encryption technologies,and cyber security education. These services have potential applications in both defence and civil technologies,such as intelligence gathering systems, communications infrastructure,transport infrastructure,energy smart metering,large ICT systems,financial services systems and research capabilities. Explaining these opportunities,UKTI Defence & Security Organisation (UKTI DSO) Army Adviser for Cyber & Communications, Lt ColTim Cooper,addressed the recent Defence Procurement,Research,Technology & Exportability (DPRTE) 2014 conference. Lt Col Cooper said:“The UK is good at cyber security;as a nation we have been doing it for around 70 years – GCHQ and CESG have a long history of its innovation.The Government has structures in place that have matured over time to support cyber security. “Wehavesomeofthebestuniversitiesinthe world–11ofwhicharerecognisedasCyber CentresofExcellence–andtheytakethis academicthinkingandtransformitinto innovativeproducts,whichtheydevelopquickly. “Wealsohavestrongpoliticalleadershipand alegalframeworkthatsupportscybersecurity.” Lt Col Cooper continued:“TheUKofferis aboutAdvice,AccessandAssurance;providinga tripleAratingofcybersecurity.Wewillprovide advicetopeople,helpingthemrecognisethreats inthecyberworld;provideaccesstoHMG representativesandUKcompaniestocombat thesethreats;andprovideassuranceschemesto reducefuturerisks.” F E A T U R E 20 MOD DCB :: 12 November 2014 :: Vol 12 No 22 :: www.contracts.mod.uk UK Cyber Security Strategy: promoting the next big export The UK Government has set a national target of exporting £2 billion of cyber security goods and services annually by 2016.This goal was established following publication of the UK Cyber Security Strategy in 2011,which detailed a plan to capitalise on the country’s burgeoning cyber sector. Here,MOD DCB features writer Julie Shennan takes a closer look at cyber security exports. I “The UK offer is about Advice,Access and Assurance; providing a triple A rating of cyber security” Lt ColTim Cooper,Army Adviser for Cyber & Communications,UKTI DSO Further Information For more information,visit: www.techuk.org/cyber-growth-partnership