SlideShare a Scribd company logo
1 of 31
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Understand and interact
with cyberspace
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
The strategic and military context
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Strategic context
‘Cyber security has been assessed as one
of the highest priority national security risks
to the UK’
‘a transformative programme for cyber
security which addresses threats from
states, criminals and terrorists’
‘to derive huge economic and social
value from a vibrant, resilient and
secure cyber space’
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Cyber threat
Cyber space is contested every day, every hour, every
minute, every second. I can vouch for that from the
displays in our own operations centre of minute-by-minute
cyber attempts to penetrate systems around the world.
Sir Iain Lobban, GCHQ Director
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Cyber in defence
• Falls under Joint Forces Command
(JFC)
• JFC is the lead for the defence
cyber programme
• JFC is the key sponsor for the
cyber science and technology
programme managed by Dstl
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Programme-level objective
Accessible tools and technical expertise to identify
the different cognitive elements of situational
awareness, including visualisation and perception,
decision making, and communication
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
What does defence mean by
‘situational awareness’ and
‘understanding’?
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Situational awareness for improved
decision making
What might happen?
What is happening?
What has happened?
10 July 2015
Increasing
difficulty
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
The cyber
environment
As important as land,
sea, air and space
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Technical context
innovative and novel approaches to human interaction with
cyberspace to increase military situational awareness
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Competition overview
Approaches to human interaction with cyberspace to enhance
military understanding:
know what is happening, why it is happening, what will happen
next, and to understand the impact in the real world
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Military cyber human interaction
Rapidly convey the cyberspace situation and associated
analysis to the military decision maker
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Military cyber understanding
Provides MOD with the ability to understand the effect of
cyber activity on a military mission
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Military cyber understanding
Enables MOD to defend its digital assets and ensures
freedom of action in cyberspace
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Interacting and understanding cyber
Should enable a military commander to:
• understand the impact of cyberspace
events on the MOD mission
• understand the status of cyber-dependent systems
• direct the collection and analysis of intelligence
• make effective decisions with analytical evidence to
provide greater mission success
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Types of system
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Technical challenges
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Technical challenge detail
• visualisation of data within cyberspace including physical/virtual
data manipulation and augmented reality
• engaging with and manipulating vast volumes of data with multi-
media human-machine interfaces
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Solutions should:
10 July 2015
Allow the military user to interact with the dataset in real
time by customising visualisation functions as required
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Technical challenge detail
• user interfaces and user-centred design
• support to decision making through automated techniques that
help the operator assimilate relevant cyber information
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Solutions should:
Provide visualisation of an
evolving situation with
projections of future impacts
on military assets and
missions
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Technical challenge detail
• Providing improved cyber understanding to
• increase the speed of military responses to cyber activity
• assess evolving risk and opportunities for mitigation
• optimise cyber response actions.
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Solutions should:
Provide the military context of
the cyber component to the
commander
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
What we want
• Supplier presentations during November 2015
• Proof-of-concept demonstrations during February 2016
• Must complete by end of March 2016
• Phase-2 proposal delivered after the demonstration
We will provide a Dstl technical partner
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
What we don’t
want:
• no clear benefit of visualisation for the decision maker
• no explanation of how the solution will add significant
value to the decision making process
• solutions restricted in scope to a subset of cyberspace
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Constraints
• Dstl will not provide data or infrastructure for testing,
development, refinement or demonstration of solutions
• Specific military ‘decisions’ are at your discretion
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Exploitation
• Collaboration with other partners is encouraged
• Additional funding of up to £500,000 is available to mature
the most successful CDE projects in financial year 2016
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Summary
• We need new ways to:
• enable the human operator to visualise the cyber situation
• understand the nature and military context of cyber events
• optimise response actions by predicting future cyber events
10 July 2015
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Competition timescales
• 3 September 2015 Competition closes at 5pm
• Mid-October 2015 Contract placement initiated and feedback provided
• 31 March 2016 Proof-of-concept research complete
From 1:30pm onwards
Face-to-face meetings with the cyber project team
At 2:25pm
Bruce Hardie presents ‘creating effective CDE proposals - what’s important
and where does it go?’
10 July 2015
Additional CDE interaction today
10 July 2015
Dstl/PUB89283
© Crown copyright 2015 Dstl
Q&A
DSTLCySA@dstl.gov.uk
10 July 2015
Innovation Network event
9 July 2015

More Related Content

Similar to 9 July 2015: Understand and interact with cyberspace themed competition

From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...
From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...
From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...Clipperton Finance
 
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Defence and Security Accelerator
 
Defence and Security Accelerator - DASA
Defence and Security Accelerator - DASADefence and Security Accelerator - DASA
Defence and Security Accelerator - DASAKTN
 
European Utility Week 2015: OMNETRIC Group Overview
European Utility Week 2015: OMNETRIC Group Overview European Utility Week 2015: OMNETRIC Group Overview
European Utility Week 2015: OMNETRIC Group Overview OMNETRIC
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityDeloitte United States
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Sam Lakkundi
 
CIPFA Presentation - Security in a Virtualised Environment
CIPFA Presentation - Security in a Virtualised EnvironmentCIPFA Presentation - Security in a Virtualised Environment
CIPFA Presentation - Security in a Virtualised EnvironmentChris Kenny
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
Dstl Academic Engagement (Prof. Tom McCutcheon)
Dstl Academic Engagement (Prof. Tom McCutcheon)Dstl Academic Engagement (Prof. Tom McCutcheon)
Dstl Academic Engagement (Prof. Tom McCutcheon)scirexcenter
 
2. martin nash checkit story
2. martin nash   checkit story2. martin nash   checkit story
2. martin nash checkit storyChris Hill
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
KnowNow Introduction to application
KnowNow Introduction to applicationKnowNow Introduction to application
KnowNow Introduction to applicationDavid Patterson
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemWilliam Roberts
 
5G - Enabled Road and Rail Transport Trials in the West Midlands
5G - Enabled Road and Rail Transport Trials in the West Midlands5G - Enabled Road and Rail Transport Trials in the West Midlands
5G - Enabled Road and Rail Transport Trials in the West MidlandsKTN
 
SMi Group's Global MilSatCom 2017
SMi Group's Global MilSatCom 2017SMi Group's Global MilSatCom 2017
SMi Group's Global MilSatCom 2017Dale Butler
 
Big Data London Meetup on Customer Experience
Big Data London Meetup on Customer ExperienceBig Data London Meetup on Customer Experience
Big Data London Meetup on Customer ExperienceChristos Hadjinikolis
 

Similar to 9 July 2015: Understand and interact with cyberspace themed competition (20)

From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...
From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...
From Data Centers to Cloud Services, Inside the Backbone of a New Economy - C...
 
13 January 2015: Enduring challenge briefings
13 January 2015: Enduring challenge briefings 13 January 2015: Enduring challenge briefings
13 January 2015: Enduring challenge briefings
 
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
Defence and Security Accelerator - DASA
Defence and Security Accelerator - DASADefence and Security Accelerator - DASA
Defence and Security Accelerator - DASA
 
European Utility Week 2015: OMNETRIC Group Overview
European Utility Week 2015: OMNETRIC Group Overview European Utility Week 2015: OMNETRIC Group Overview
European Utility Week 2015: OMNETRIC Group Overview
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national security
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
 
WIPAC Monthly - September 2023
WIPAC Monthly - September 2023WIPAC Monthly - September 2023
WIPAC Monthly - September 2023
 
CIPFA Presentation - Security in a Virtualised Environment
CIPFA Presentation - Security in a Virtualised EnvironmentCIPFA Presentation - Security in a Virtualised Environment
CIPFA Presentation - Security in a Virtualised Environment
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
Dstl Academic Engagement (Prof. Tom McCutcheon)
Dstl Academic Engagement (Prof. Tom McCutcheon)Dstl Academic Engagement (Prof. Tom McCutcheon)
Dstl Academic Engagement (Prof. Tom McCutcheon)
 
2. martin nash checkit story
2. martin nash   checkit story2. martin nash   checkit story
2. martin nash checkit story
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
Cloud by dev
Cloud by devCloud by dev
Cloud by dev
 
KnowNow Introduction to application
KnowNow Introduction to applicationKnowNow Introduction to application
KnowNow Introduction to application
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
5G - Enabled Road and Rail Transport Trials in the West Midlands
5G - Enabled Road and Rail Transport Trials in the West Midlands5G - Enabled Road and Rail Transport Trials in the West Midlands
5G - Enabled Road and Rail Transport Trials in the West Midlands
 
SMi Group's Global MilSatCom 2017
SMi Group's Global MilSatCom 2017SMi Group's Global MilSatCom 2017
SMi Group's Global MilSatCom 2017
 
Big Data London Meetup on Customer Experience
Big Data London Meetup on Customer ExperienceBig Data London Meetup on Customer Experience
Big Data London Meetup on Customer Experience
 

More from Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

More from Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 
CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

9 July 2015: Understand and interact with cyberspace themed competition

  • 1. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Understand and interact with cyberspace
  • 2. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl The strategic and military context
  • 3. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Strategic context ‘Cyber security has been assessed as one of the highest priority national security risks to the UK’ ‘a transformative programme for cyber security which addresses threats from states, criminals and terrorists’ ‘to derive huge economic and social value from a vibrant, resilient and secure cyber space’
  • 4. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Cyber threat Cyber space is contested every day, every hour, every minute, every second. I can vouch for that from the displays in our own operations centre of minute-by-minute cyber attempts to penetrate systems around the world. Sir Iain Lobban, GCHQ Director 10 July 2015
  • 5. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Cyber in defence • Falls under Joint Forces Command (JFC) • JFC is the lead for the defence cyber programme • JFC is the key sponsor for the cyber science and technology programme managed by Dstl
  • 6. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Programme-level objective Accessible tools and technical expertise to identify the different cognitive elements of situational awareness, including visualisation and perception, decision making, and communication
  • 7. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl What does defence mean by ‘situational awareness’ and ‘understanding’?
  • 8. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Situational awareness for improved decision making What might happen? What is happening? What has happened? 10 July 2015 Increasing difficulty
  • 9. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl The cyber environment As important as land, sea, air and space 10 July 2015
  • 10. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Technical context innovative and novel approaches to human interaction with cyberspace to increase military situational awareness
  • 11. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Competition overview Approaches to human interaction with cyberspace to enhance military understanding: know what is happening, why it is happening, what will happen next, and to understand the impact in the real world
  • 12. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Military cyber human interaction Rapidly convey the cyberspace situation and associated analysis to the military decision maker 10 July 2015
  • 13. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Military cyber understanding Provides MOD with the ability to understand the effect of cyber activity on a military mission 10 July 2015
  • 14. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Military cyber understanding Enables MOD to defend its digital assets and ensures freedom of action in cyberspace 10 July 2015
  • 15. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Interacting and understanding cyber Should enable a military commander to: • understand the impact of cyberspace events on the MOD mission • understand the status of cyber-dependent systems • direct the collection and analysis of intelligence • make effective decisions with analytical evidence to provide greater mission success
  • 16. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Types of system 10 July 2015
  • 17. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Technical challenges
  • 18. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Technical challenge detail • visualisation of data within cyberspace including physical/virtual data manipulation and augmented reality • engaging with and manipulating vast volumes of data with multi- media human-machine interfaces 10 July 2015
  • 19. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Solutions should: 10 July 2015 Allow the military user to interact with the dataset in real time by customising visualisation functions as required
  • 20. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Technical challenge detail • user interfaces and user-centred design • support to decision making through automated techniques that help the operator assimilate relevant cyber information 10 July 2015
  • 21. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Solutions should: Provide visualisation of an evolving situation with projections of future impacts on military assets and missions 10 July 2015
  • 22. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Technical challenge detail • Providing improved cyber understanding to • increase the speed of military responses to cyber activity • assess evolving risk and opportunities for mitigation • optimise cyber response actions. 10 July 2015
  • 23. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Solutions should: Provide the military context of the cyber component to the commander 10 July 2015
  • 24. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl What we want • Supplier presentations during November 2015 • Proof-of-concept demonstrations during February 2016 • Must complete by end of March 2016 • Phase-2 proposal delivered after the demonstration We will provide a Dstl technical partner
  • 25. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl What we don’t want: • no clear benefit of visualisation for the decision maker • no explanation of how the solution will add significant value to the decision making process • solutions restricted in scope to a subset of cyberspace 10 July 2015
  • 26. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Constraints • Dstl will not provide data or infrastructure for testing, development, refinement or demonstration of solutions • Specific military ‘decisions’ are at your discretion 10 July 2015
  • 27. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Exploitation • Collaboration with other partners is encouraged • Additional funding of up to £500,000 is available to mature the most successful CDE projects in financial year 2016 10 July 2015
  • 28. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Summary • We need new ways to: • enable the human operator to visualise the cyber situation • understand the nature and military context of cyber events • optimise response actions by predicting future cyber events 10 July 2015
  • 29. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Competition timescales • 3 September 2015 Competition closes at 5pm • Mid-October 2015 Contract placement initiated and feedback provided • 31 March 2016 Proof-of-concept research complete From 1:30pm onwards Face-to-face meetings with the cyber project team At 2:25pm Bruce Hardie presents ‘creating effective CDE proposals - what’s important and where does it go?’ 10 July 2015 Additional CDE interaction today
  • 30. 10 July 2015 Dstl/PUB89283 © Crown copyright 2015 Dstl Q&A DSTLCySA@dstl.gov.uk 10 July 2015

Editor's Notes

  1. Thank you Jim for the introduction. I’m Alex Barnett the Understand and Interact with Cyberspace CDE competition technical lead. In support of this competition launch today I have Ben Parish, Cyber Situational Awareness Capability Advisor, Steve Barrington, Cyber Situational Awareness Principal Technical Authority, Andy Cole, Cyber Situational Awareness Project Manager and Clive Brooker, who has been my partner in crime in pulling together the technical detail of this competition and the requirements document. In a moment I will hand over to Lt Col Clive Cook to provide the military context of the competition and then I’ll be back to talk you through the technical detail. I would appreciate it if you could hold any questions until the very end of the presentation.
  2. Good morning, I am Lt Col Clive Cook and I provide military advice to the Dstl cyber science and technology programme. Before we get into the more detailed technical requirements, I have been asked to provide the strategic and military context for this Centre for Defence Enterprise competition.
  3. In 2010, the last government conducted a national security review, which resulted in the publication of a new National Security Strategy. This placed cyber as one of four Tier 1 security threats to the United Kingdom and on a par with international terrorism, an inter-state military crisis and a major natural disaster or accident. Specifically, the cyber threat was defined as: Hostile attacks upon UK cyberspace and large scale cyber crime. 2010 also saw the publication of the Strategic Defence and Security Review. This announced the investment of £650M over four years as part of the National Cyber Security Programme. This programme included provision of additional funding for the Ministry of Defence in order to meet a number of defined change objectives which were later detailed in the UK Cyber Security Strategy.
  4. Since 2010, the reasons for including cyber as a Tier 1 threat have become clearer and we have all become increasingly aware of the cyber threat to the UK and its national interests. This quote from the last Director of Government Communications Headquarters sums up the cyber threat succinctly: Cyberspace is contested every day, every hour, every minute, every second. I can vouch for that from the displays in our own operations centre of minute-by-minute cyber attempts to penetrate systems around the world. This quote also indicates the importance of our area of interest today; understanding and interacting with Cyberspace.
  5. Within the Ministry of Defence, responsibility for all aspects of cyber operations falls to Joint Forces Command or JFC. The development of current military cyber capability is managed within the Defence Cyber Programme by the C4ISR Joint User. Longer term planning of future capabilities is conducted by another part of JFC and its remit includes the sponsorship of the cyber science and technology research. All our research objectives can be linked to the JFC Cyber Capability Management Plan.
  6. One of our current research objectives is: The provision of accessible tools and technical expertise to identify the different cognitive elements of situational awareness including visualisation and perception, decision-making and communication.
  7. Before going further, I’d like to give you the definitions used by the Ministry of Defence for Situational Awareness and Understanding. Situational Awareness is defined as: The ability to identify trends and linkages over time, and to relate these to what is happening and not happening Similarly, Understanding is defined as: The perception and interpretation of a particular situation in order to provide the context, insight and foresight required for effective decision-making. Note that the linkage between the two definitions is provided by defining insight as the combination of situational awareness and analysis. Situational Awareness (JDP 2-00 Understanding and Intelligence Support to Joint Operations) Understanding definition (JDP 04 Understanding) Understanding Situational awareness + analysis = Comprehension (Insight) Comprehension + judgement = Understanding (Foresight) Situational Awareness +
  8. Looking at situational awareness another way, it is far easier to attain if some time delay is tolerated. Providing situational awareness in near real-time is considerably harder and enhancing the capability further by including predictive features more complex still. The ability to show what might happen is particularly valuable in a military context as it provides a degree of foresight and therefore aids understanding, resulting in improved decision-making.
  9. Finally, I’d like to emphasise that the UK’s military doctrine now recognises cyber as a distinct environment on a par with land, sea, air and space. The cyber environment cannot be separated from the other environments if cyber operations are to be conducted effectively in a joint framework as part of plans executed at military strategic, operational and tactical levels of command. Furthermore, this requirement means that situational awareness and understanding must link all these environments and provide a coherent view of past, present and possible futures. I will now hand over to my colleagues who will provide you with more detailed information about the requirements for this competition.
  10. Thank you Clive, I think that very effectively sums up the military context and motivation for this work. I strongly feel that we have the opportunity to forge new ground here at the forefront of emerging capability in cyberspace. That in itself means that I am reluctant to overly bound the challenge area too tightly, for fear of restricting the potential scope of your proposals. I am therefore drawing strongly on published military doctrine, all of which is described and linked in the published competition document, although this doctrine is still evolving, it provides an agreed frame of reference for our research. I’ll now present the technical context of the competition and the nature of the challenges we want to address.
  11. The Ministry of Defence Cyber Science and Technology Programme aims to enhance the UK’s operational freedom of action and satisfy national security objectives in a more effective and affordable way by exploiting the cyber environment through the development, test and validation of cyber capabilities. We want really innovative research proposals that draw on all elements of cyberspace to improve human interaction and understanding. “Understanding” in cyberspace is the ability to project into the future (to achieve foresight); what is happening, why is it happening and what will happen next, and most importantly to understand the impact in the real world. How do we capitalise on advances in big data, analytics and sense making to enhance cyber understanding? What novel approaches for data interaction could replace the traditional human-computer interface?
  12. Military decisions occur at a rapid pace, often under stressful conditions. The traditional human-computer interface, the monitor, keyboard and mouse, remains a bottle-nexk in analysis throughput. Analysts need to have access to tools and systems that are tailored to the function that they are performing, the decision that they are supporting and the conditions that they are in. I believe that we are being presented with too many software options that are tailored to existing software and hardware platforms, rather than developing new software and hardware solutions that may radically alter the options for interacting in this new environment. We need to identify revolutionary approaches, rather than the evolutionary upgrades and gradual developments that are in danger of leaving military commanders overloaded with data and information that reduces their decision making effectiveness rather than strengthening it.
  13. Providing the ability to understand the effect of a cyber event on the mission is crucial to making well-informed decisions. We want to ensure that cyberspace is an enabler for military operations and this requires us to offer ways of working that integrate it into standard practice. This means that our analysts must have access to the information that they need, quickly and effectively, in order to inform a commander of the most pertinent information to integrate with the information they get from other traditional domains. Are all my systems operating at full capacity? Can I rely on all my assets? Do I need to initiate remedial action in anticipation of potential loss or degradation of capability?
  14. To provide the best support for these decisions, the research programme is looking to identify the best techniques, software and technology to enables the MOD to defend its digital assets and ensure freedom of action.
  15. Current military information processing and sense-making in the cyber domain is a human-intensive process with a high cognitive burden. This process doesn’t scale easily with increased data volume. Being able to rapidly convey the cyberspace situation and associated analysis to the military commander, analyst and decision maker becomes a real challenge. To ensure that solutions are most effective in this respect, capability to improve interaction and understanding in cyberspace for the military commander requires the following aspects: Conveying the impact of activity in cyberspace relevant to the mission being undertaken is crucial, otherwise it is impossible for a commander to make fully informed decisions and to appreciate the consequence of their decisions and actions. In an unfamiliar or less-intuitive domain such as cyberspace, the status of all cyber-dependent systems will play a vital part in mission assurance. A commander or analyst should be in a position to appreciate their information requirements and therefore be clear what is required to underpin their decisions. Ultimately, improved interaction and understanding should result in the ability for more effective decision making which results in greater mission success.
  16. To put this challenge into context, we are dealing with a large and varied array of digital systems in cyberspace, with many business functions. The systems range from office-like computer infrastructure to large, complex platforms, often heavily dependent on legacy systems, radio frequency and constrained bandwidth communications with high latency. I can’t stress enough that our requirements go way beyond CND, although are systems rely on a communications network backbone that covers 70+ countries 1200 UK Sites 225,000 Users And is largely dependent on commercial infrastructure. There are gaps in our ability to link cyber events, data and information, physical military systems and military missions together and present these succinctly and effectively to military decision makers. I’d now like to take you through the technical challenge areas in more detail. So, I’m interested in the following areas:
  17. I want you to keep in mind the following questions: How is my mission impacted by events in cyberspace? How is my mission being supported by cyberspace? How can visualisation techniques and tools be applied to the many parts of this process to enable the information to be communicated in a clear and effective manner? Can I understand the key risks in cyberspace as they apply to my mission in order to take proactive steps? Technical proposals should address the following challenging requirements of the competition
  18. The potential volume of data and information available from the large number of cyber activities occurring becomes very large. Being able to rapidly convey the cyberspace situation and associated analysis to the military commander, analyst and decision maker will therefore become a real challenge. An important aspect of this competition is about seeking approaches to improve the analysis and presentation of large volumes of data and information to support decision making. A desired route to achieve this is through new visualisation methods that allow engagement and manipulation of the data and information streams with advanced human-machine interfaces.
  19. In isolation, cyber activities may not be easily recognised as threats but in combination, or in specific context, the relevance of the activity may be better understood and result in effective action being taken. As a stretch objective, maintaining the ability to delve into and manipulate the complete dataset and raw unstructured data would be beneficial to achieving greater mission assurance and agility.
  20. Analysts need to have access to tools and systems that are tailored to the function that they are performing; the decision that they are making; and the conditions that they are in. We want to see proposals that have user-centred design at their core and provide efficient means of conveying meaning and context with an appropriate level of automation that reduces operator burden but still retains the provenance of the underlying information sources.
  21. Processing the raw data produced by the array of MOD’s digital systems into meaningful, actionable information is a largely automated task, but with a high degree of human intervention and assurance. Also, the filtering and subsequent understanding of the impact of that information on military operations is still a manually intensive task. For a manually intensive task, the information presented to the user is generally very poorly processed and lacks mission focus and prioritisation. Being able to see how cyber activity and events of relevance are unfolding, in context, and how they are likely to impact mission goals, is a high priority area for this research programme.
  22. We want methods to increase military operators’ understanding of cyberspace in order to increase the operational tempo, achieve good risk awareness and mitigation options in order to provide an optimised response to situations as they unfold. Better understanding of the cyber situation, supported by visualisation of a situation as it develops over time, should enable likely projections of the future situation and assessment of future impacts on military assets and missions
  23. Communication is an important element of the decision-making process. Common methods of communication to achieve understanding include visual, verbal and written presentation, or military orders. The context may be tactical, operational or strategic and the user may be a non-technical generalist. At the strategic and operational level vision determines campaign design including how resources are allocated and the operational priorities. At the tactical level vision provides the ability for local commanders to make decisions without the need to constantly refer to seniors for approval; this in turn improves the speed of operation.
  24. We want a successful proposal to articulate clearly how the new techniques and methodologies proposed offer improvement over current techniques and what military cyber problem will be addressed. We are looking for outcomes that include a demonstration and a realistic exploitation route, rather than just a report. Phase 1 suppliers will be required to participate in two key events: At the first event, in November this year, the suppliers will be required to share highlights from their planned outputs with Dstl and all the other phase 1 suppliers. The format will be an initial presentation from each supplier (duration 1 day) followed by time for networking and exploring potential future collaboration. The event will take place at or near a Dstl site. Shortly before the end of phase 1 (February 16), suppliers will be invited to demonstrate their project outputs to only Dstl and MOD stakeholders, prior to formal delivery to Dstl taking place. The emphasis at this one day event will be on demonstration and not presentation. Suppliers will need to provide all the tools and data necessary to conduct the demonstration. The event will take place at or near a Dstl site.
  25. This is not the first Cyber-based CDE competition, or indeed the first that supports military decision making. Our specific interest is in the way that the information, analysis or intelligence in cyberspace is conveyed to the military decision maker and how it can support and improve military decision making. We don’t want visualisation for the sake of it – what value does it add? We also don’t want to have solutions that are restricted to a subset of cyberspace, such as intrusion detection or data mining.
  26. To avoid us creating delays in your research from Dstl dependencies, and to ensure that you have the full freedom to offer novel solutions that we may have no concept of at this stage, we won’t be providing data sets or the hardware necessary for your research and demonstrations. It may sound trite, but I want you to be as inventive as possible – on our part, that means that as long as you have presented a clear link to the military relevance of your proposal, we will likely accept a very large range of potential data sources. The specific cyber events or activities themselves are not the primary concern of the challenge area. Bear in mind though that mixed-source data (such as SCADA instructions with system status logs and communications traffic) is going to be at the top of our priority list. I also won’t be describing a constrained, explicit set of decisions or military operators for you to aim at. This may surprise some of you given the focus this competition places on support the decision maker, but the simple fact is that in this exciting, new and developing area the specific decision makers and military commanders haven’t all been defined and appointed yet – and so by being proscriptive we may inadvertently miss the ideas with the biggest “wow-factor”. As long as you can show the military relevance of your proposal of course.
  27. We are also interested in proposals that look to collaborate and partner with other like-minded organisations. Whilst a proposal can be from a single small- to -medium sized enterprise or academic institution, we would like to encourage collaboration among parties that may have similar ideas and also collaboration with, but not limited to, existing MOD suppliers to increase the likelihood of exploitation. In the past, academic institutions that have partnered with industry suppliers have been particularly successful at having their proposals funded and exploited by the MOD. I would like to emphasis that collaboration must occur under a single lead supplier for the purposes of contracting with Dstl. Our aspiration is to mature the best solutions as an integrated component of wider cyber situational awareness and understanding capability, to avoid generating data and information overload of our own making. A total budget of £500,000 will be made available for phase 2 which will be allocated across the best of the phase 1 projects. Funding allocation will be determined through a Dstl decision conference following the phase 1 demonstrations Cyber situational awareness and understanding is a recognised MOD requirement managed through the C4ISR capability and we expect that innovative concepts funded through this competition will be exploited through this route and aligned to capability generation for delivery of cyber SA.
  28. In summary, we want cutting edge human-machine interfaces for cyberspace to provide increased understanding of the relevance of cyber events to the military through clear presentation of their linkage to military effect
  29. You have until the 3rd of September to submit proposals for this competition, and I’m told that the server gets very busy as 5 o’clock approaches! We aim to have all successful proposals on contract in October for completion by the end of our financial year, in March. Demonstrations should therefore occur in February. I’m almost done, hopefully with plenty of time to answer any burning questions but do bear in mind that our part in today’s proceedings doesn’t end here – the project team will be on hand over lunchtime for informal discussions and I’ve been asked to provide a shameless plug for our 1:1 sessions this afternoon – talk to any CDE representative to book a place if you have specific questions about the competition. Later this afternoon, our stalwart of CDE, Bruce Hardie will be giving a masterclass on creating an effective proposal.
  30. Holding slide. [NEXT]