SlideShare a Scribd company logo
1 of 9
Download to read offline
Matt Lewis, CEO.
Project4 TechnologiesLtd
www.project4-technologies.co.uk
• Established in 2014 following successful CDEbid focused on physical Insider
Attacks
• Technology focused organisation born out of adesire to build and advance
technologiesof the future acrossarange of subject areas
• Working with professionalsfromacademiaand industry to take conceptsfrom
theory to reality
• Working with the Centre for Defence Enterprise (CDE)and the Defence Science
and Technology Laboratory (Dstl)
• Two CDEfunded programmesto date
๏ Cyber - Detecting Insider Attacks
๏ Preventing Physical Insider Attacks
Project4 TechnologiesLtd
Background
• Successfully won competition under the CDEcall ‘Cyber
Defence: Securing against the Insider Threat’
• Coventry University Computer Science and Behavioural
Psychology unitsworked in support assub contractors
• Utilise behaviour displayed through ‘Digital Pattern of Life’
• Develop analysismethod and bespoke algorithmsto detect
insider’s
• Development of bespoke Graphical User Interface (GUI)to
display and manage risk
Cyber Insider Attacks
CDEFunded Cyber Programme
Demonstrator
Cyber Insider AttacksProgramme
• Focused on understanding ausersdigital
Pattern of Life (PoL), both Typical and Atypical
• Dedicated research element focused on
understanding howthese typesof attack occur
• Defining relevant PoLbehaviours
• Answering the question “Can we detect the
tell?”
• Prototype, Bayesian based algorithmcapable
of detecting defined behavioursfor onward
analysis
• Developed Graphical User Interface (GUI)
capable of displaying and classifying potential
insider attack occurrences
• IPsolely owned by Project4 TechnologiesLtd
• Prototype completed to TRL4
• Ready for future development
• Potential for Defence and Commercial application
• Expandable to other market verticalssuch asfraud, IP
protection and health care
• Complete Project4 offering could be fully available in
2016 following future development and exploitation
• We require both investment and technical expertise to
progressthe innovation
Project4 Technologies
Cyber Insider AttacksProgramme
CDEFunded Physical Insider AttacksSimulator
• Successfully won competition under the CDEcall
‘Countering Insider Threat Attacks’
• Focused on detecting physical insider attacks
• Creating potential real life situationsfor the user based on
psychological profiling of attack vectors
• Utilisation of Coventry University Psychology and
Behavioural Sciencesexpertise
• Use of realistic Avatarsand animation to display key
characteristicsasper our findings
• Designed to operate on tablet or mobile device
• Creation of aSemi-immersive learning experience
• Providing amore ‘entertainment’ based learning
experience
Physical Insider Attacks
• Expandable to avariety of learning requirements
• Additional environments
• Statistical datacollection for:
• Compliance monitoring
• Training needsanalysis
• Skillsgapsidentification
• Ability to formpart of initial training aswell as
continuouslearning and Personal Development Reviews
• Providing arapidly up-dateable platformfor both
threats, risksand locations
• Using familiar technology and game play to increase skill
and risk identification
Developing acrossarange of scenariosand end users
CDEFunded Physical Insider AttacksSimulator
CDEFunded Physical Insider AttacksSimulator
• Simulator designed to be apersonal issue
companion device
• Unlimited learning areas- platforming
• Envisage major opportunitiesfor
expansion in all areasof security sector,
especially where the use of fixed simulator
technology iseither impractical or unable
to dynamically adapt to change
• Currently developing opportunitieswithin
the lawenforcement environment
• Interested in working with partners
• Desire to work with national and
international military organisations
• IPsolely owned by Project4 Technologies
Ltd
Physical Insider Attacks
CDE Marketplace: Project 4 Technologies

More Related Content

Similar to CDE Marketplace: Project 4 Technologies

Cyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfCyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfisha bajpai
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersLife Cycle Engineering
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Ethical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfEthical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfisha bajpai
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfisha bajpai
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareM. Ariel Evans
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
Mobi sir presentation
Mobi sir presentationMobi sir presentation
Mobi sir presentationG Srinivasan
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
GDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxGDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxAhmedEssam402
 
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.EXCELLENCE ACADEMY a number 1 academy in Chandigarh.
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.digionam24
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 

Similar to CDE Marketplace: Project 4 Technologies (20)

Cyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfCyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdf
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
9 September 2014: Project4 Technologies Ltd
9 September 2014: Project4 Technologies Ltd 9 September 2014: Project4 Technologies Ltd
9 September 2014: Project4 Technologies Ltd
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Ethical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfEthical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdf
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshare
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
Mobi sir presentation
Mobi sir presentationMobi sir presentation
Mobi sir presentation
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
GDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxGDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptx
 
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.EXCELLENCE ACADEMY a number 1 academy in Chandigarh.
EXCELLENCE ACADEMY a number 1 academy in Chandigarh.
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 

More from Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

More from Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

CDE Marketplace: Project 4 Technologies

  • 1. Matt Lewis, CEO. Project4 TechnologiesLtd www.project4-technologies.co.uk
  • 2. • Established in 2014 following successful CDEbid focused on physical Insider Attacks • Technology focused organisation born out of adesire to build and advance technologiesof the future acrossarange of subject areas • Working with professionalsfromacademiaand industry to take conceptsfrom theory to reality • Working with the Centre for Defence Enterprise (CDE)and the Defence Science and Technology Laboratory (Dstl) • Two CDEfunded programmesto date ๏ Cyber - Detecting Insider Attacks ๏ Preventing Physical Insider Attacks Project4 TechnologiesLtd Background
  • 3. • Successfully won competition under the CDEcall ‘Cyber Defence: Securing against the Insider Threat’ • Coventry University Computer Science and Behavioural Psychology unitsworked in support assub contractors • Utilise behaviour displayed through ‘Digital Pattern of Life’ • Develop analysismethod and bespoke algorithmsto detect insider’s • Development of bespoke Graphical User Interface (GUI)to display and manage risk Cyber Insider Attacks CDEFunded Cyber Programme
  • 4. Demonstrator Cyber Insider AttacksProgramme • Focused on understanding ausersdigital Pattern of Life (PoL), both Typical and Atypical • Dedicated research element focused on understanding howthese typesof attack occur • Defining relevant PoLbehaviours • Answering the question “Can we detect the tell?” • Prototype, Bayesian based algorithmcapable of detecting defined behavioursfor onward analysis • Developed Graphical User Interface (GUI) capable of displaying and classifying potential insider attack occurrences • IPsolely owned by Project4 TechnologiesLtd
  • 5. • Prototype completed to TRL4 • Ready for future development • Potential for Defence and Commercial application • Expandable to other market verticalssuch asfraud, IP protection and health care • Complete Project4 offering could be fully available in 2016 following future development and exploitation • We require both investment and technical expertise to progressthe innovation Project4 Technologies Cyber Insider AttacksProgramme
  • 6. CDEFunded Physical Insider AttacksSimulator • Successfully won competition under the CDEcall ‘Countering Insider Threat Attacks’ • Focused on detecting physical insider attacks • Creating potential real life situationsfor the user based on psychological profiling of attack vectors • Utilisation of Coventry University Psychology and Behavioural Sciencesexpertise • Use of realistic Avatarsand animation to display key characteristicsasper our findings • Designed to operate on tablet or mobile device • Creation of aSemi-immersive learning experience • Providing amore ‘entertainment’ based learning experience Physical Insider Attacks
  • 7. • Expandable to avariety of learning requirements • Additional environments • Statistical datacollection for: • Compliance monitoring • Training needsanalysis • Skillsgapsidentification • Ability to formpart of initial training aswell as continuouslearning and Personal Development Reviews • Providing arapidly up-dateable platformfor both threats, risksand locations • Using familiar technology and game play to increase skill and risk identification Developing acrossarange of scenariosand end users CDEFunded Physical Insider AttacksSimulator
  • 8. CDEFunded Physical Insider AttacksSimulator • Simulator designed to be apersonal issue companion device • Unlimited learning areas- platforming • Envisage major opportunitiesfor expansion in all areasof security sector, especially where the use of fixed simulator technology iseither impractical or unable to dynamically adapt to change • Currently developing opportunitieswithin the lawenforcement environment • Interested in working with partners • Desire to work with national and international military organisations • IPsolely owned by Project4 Technologies Ltd Physical Insider Attacks