SlideShare a Scribd company logo
Stephen Rhodes
Assistant Director, Cyber Security
Digital Economy Unit
UK Cyber Security Strategy
Our vision
Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and
secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and
the rule of law, enhance prosperity, national security and a strong society.
Our objectives
Objective 1:
The UK to tackle cyber crime
and be one of the most secure
places in the world to do
business in cyberspace
Objective 2:
The UK to be more resilient to
cyber attacks and better able to
protect our interests in
cyberspace
Objective 3:
The UK to have helped shape
an open, stable and vibrant
cyberspace which the UK public
can use safely and that
supports open societies
Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber
security objectives
BIS CYBER ACTIVITIES
• Raising business awareness of the threats (and
opportunities) through guidance, campaigns and annual
breaches survey
• Encouraging action on cyber security by business (e.g.
Cyber Essentials)
• Strengthening UK’s cyber security skills
• Strengthening UK’s cyber security research and innovation
capability
• Supporting growth of the UK cyber security sector
• Delivered in partnership with other departments, agencies
and external partners, funded by National Cyber Security
Programme
Cyber security sector growth agenda
• The cyber security industry in the UK is worth £6 billion and
employs around 40,000 people
• UK Cyber security exports in 2013 were £1040M (up 22%
from 2012’s £850M. On track to reach the Government
target of £2 billion by 2016.
• Cyber Growth Partnership (CGP) - joint initiative between
industry, academia and government, aimed at boosting the
UK’s global market position in cyber security products and
services.
Cyber Growth Partnership
• Main government-industry body for growing the cyber
security sector. Co-chaired by a government Minister and
CEO of BT.
• Industry led activities
• Emphasis on exporting: identifying target markets for
special attention (currently USA, Saudi, Malaysia, Qatar);
Best of British consortia development
• Supplier to Government Scheme.
• Export Risk Guidance
• Cyber showcase facility
CYBER GROWTH PARTNERSHIP
• SME Growth Projects announced last September.
• The appointment of a cluster development
representative who will provide support and
guidance to help establish cyber clusters in areas
of the UK where there is a concentration of cyber
businesses, drawing on the success of the
Malvern cluster.
• Cyber Connect UK
CYBER CONNECT UK
• Identify and Map all Cyber Companies in the UK
• Cyber Connect Portal: www.techuk.org/cyber-connect-uk
• "Access to Finance" Events
• Conduct Industry Consultation Exercise
• Help UKTI Plan cyber missions to priority markets
• Business Acceleration Clinics
• Deliver Large Business Open Innovation Events
• Provide Guidance on Small Business Collaboration
Vehicles
• Contact: Andy Williams
(andy.williams@techuk.org)
Innovation Vouchers
• A scheme for SMEs run by Innovate UK (formerly
TSB) designed to encourage business to get
outside expertise to enable them to grow.
• Vouchers available to enable business to receive
up to £5,000 of advice to improve their cyber
security.
• Vouchers allocated through a series of ‘calls’.
• Announced on Innovate UK website.
Cyber Security Standard
• What does good cyber security
look like?
• Core actions necessary to
mitigate majority of cyber
threats.
• 5 key controls: Boundary
firewalls and Internet gateways;
secure configuration; access
control; malware protection;
patch management
• Demonstrates cyber credentials
to capitalise on opportunities
• Accreditation needed for certain
government contracts
THANK YOU
ANY QUESTIONS?

More Related Content

What's hot

An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
Defence and Security Accelerator
 
About patent
About patentAbout patent
About patent
Unified Patent
 
160317 japan m2m_alliance_v01
160317 japan m2m_alliance_v01160317 japan m2m_alliance_v01
160317 japan m2m_alliance_v01
M2M Alliance e.V.
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers
CODE BLUE
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
Janne Järvinen
 
Quixoticity index slides 6 9-18
Quixoticity index slides 6 9-18Quixoticity index slides 6 9-18
Quixoticity index slides 6 9-18
Peter Clemons
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
CYBERWISER .eu
 
CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016
Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Defence and Security Accelerator
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresources
Voscur Staff
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
segughana
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
Elisha Quaye
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
Denitsa Gospodinova
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
segughana
 
Workshop overview
Workshop overview Workshop overview
Workshop overview
Jisc
 
APT PRFP 11: CERTs
APT PRFP 11: CERTsAPT PRFP 11: CERTs
APT PRFP 11: CERTs
APNIC
 
Henry Shennan - NIC - 5G Presentation
Henry Shennan - NIC - 5G PresentationHenry Shennan - NIC - 5G Presentation
Henry Shennan - NIC - 5G Presentation
techUK
 
Mediai Friday News Round-Up - W/E Dec 4, 2015
Mediai Friday News Round-Up - W/E Dec 4, 2015Mediai Friday News Round-Up - W/E Dec 4, 2015
Mediai Friday News Round-Up - W/E Dec 4, 2015
deniseshriv
 
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
DevClub_lv
 
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE Mexico
 

What's hot (20)

An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
About patent
About patentAbout patent
About patent
 
160317 japan m2m_alliance_v01
160317 japan m2m_alliance_v01160317 japan m2m_alliance_v01
160317 japan m2m_alliance_v01
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
 
Quixoticity index slides 6 9-18
Quixoticity index slides 6 9-18Quixoticity index slides 6 9-18
Quixoticity index slides 6 9-18
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016CDE - Innovation Network Event - 17 Nov 2016
CDE - Innovation Network Event - 17 Nov 2016
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresources
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
Workshop overview
Workshop overview Workshop overview
Workshop overview
 
APT PRFP 11: CERTs
APT PRFP 11: CERTsAPT PRFP 11: CERTs
APT PRFP 11: CERTs
 
Henry Shennan - NIC - 5G Presentation
Henry Shennan - NIC - 5G PresentationHenry Shennan - NIC - 5G Presentation
Henry Shennan - NIC - 5G Presentation
 
Mediai Friday News Round-Up - W/E Dec 4, 2015
Mediai Friday News Round-Up - W/E Dec 4, 2015Mediai Friday News Round-Up - W/E Dec 4, 2015
Mediai Friday News Round-Up - W/E Dec 4, 2015
 
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
 
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
 

Similar to Solent Cyber Security Cluster 2, BIS presentation

Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
Ray Bugg
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
Shiva Bissessar
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
IISPEastMids
 
Ktn business briefing may 2019
Ktn business briefing may 2019Ktn business briefing may 2019
Sustainable Innovation Fund October 2021 Briefing
Sustainable Innovation Fund October 2021 BriefingSustainable Innovation Fund October 2021 Briefing
Sustainable Innovation Fund October 2021 Briefing
KTN
 
Sustainable Innovation Fund September 2021 Briefing
Sustainable Innovation Fund September 2021 BriefingSustainable Innovation Fund September 2021 Briefing
Sustainable Innovation Fund September 2021 Briefing
KTN
 
The KTN Digital and Creative Business Briefing : June 2019
The KTN Digital and Creative Business Briefing : June 2019The KTN Digital and Creative Business Briefing : June 2019
The KTN Digital and Creative Business Briefing : June 2019
The Knowledge Transfer Network Creative, Digital & Design
 
Digital Business Briefing February 2019
Digital Business Briefing February 2019Digital Business Briefing February 2019
Digital Business Briefing February 2019
The Knowledge Transfer Network Creative, Digital & Design
 
Matt Ward from Digital Catapult (CDEC)
Matt Ward from Digital Catapult (CDEC)Matt Ward from Digital Catapult (CDEC)
Matt Ward from Digital Catapult (CDEC)
wired_sussex
 
UK British Business Angels Association Keynote
UK British Business Angels Association KeynoteUK British Business Angels Association Keynote
UK British Business Angels Association Keynote
gerardgrech
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
grahamhitchen
 
Digital business briefing September 2014
Digital business briefing   September 2014Digital business briefing   September 2014
Digital business briefing September 2014
The Knowledge Transfer Network Creative, Digital & Design
 
QIB Q1 2021: Angel Investment
QIB Q1 2021: Angel InvestmentQIB Q1 2021: Angel Investment
QIB Q1 2021: Angel Investment
Briony Phillips
 
Digital business briefing August 2014
Digital business briefing   August 2014Digital business briefing   August 2014
Digital business briefing August 2014
The Knowledge Transfer Network Creative, Digital & Design
 
KTN Digital & Creative Business Briefing, February 2020
KTN Digital & Creative Business Briefing, February 2020KTN Digital & Creative Business Briefing, February 2020
KTN Digital & Creative Business Briefing, February 2020
The Knowledge Transfer Network Creative, Digital & Design
 
Digital business briefing October 2014
Digital business briefing October 2014Digital business briefing October 2014
Digital business briefing October 2014
The Knowledge Transfer Network Creative, Digital & Design
 
IOT Launchpad TechnologyStrategyBoard
IOT Launchpad TechnologyStrategyBoardIOT Launchpad TechnologyStrategyBoard
IOT Launchpad TechnologyStrategyBoard
TechCityUK
 
Jon Kingsbury from Knowledge Transfer Network (KTN)
Jon Kingsbury from Knowledge Transfer Network (KTN)Jon Kingsbury from Knowledge Transfer Network (KTN)
Jon Kingsbury from Knowledge Transfer Network (KTN)
wired_sussex
 
Peter Karney: Intro to the Digital catapult
Peter Karney: Intro to the Digital catapultPeter Karney: Intro to the Digital catapult
Peter Karney: Intro to the Digital catapult
huguk
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Dale Butler
 

Similar to Solent Cyber Security Cluster 2, BIS presentation (20)

Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
Ktn business briefing may 2019
Ktn business briefing may 2019Ktn business briefing may 2019
Ktn business briefing may 2019
 
Sustainable Innovation Fund October 2021 Briefing
Sustainable Innovation Fund October 2021 BriefingSustainable Innovation Fund October 2021 Briefing
Sustainable Innovation Fund October 2021 Briefing
 
Sustainable Innovation Fund September 2021 Briefing
Sustainable Innovation Fund September 2021 BriefingSustainable Innovation Fund September 2021 Briefing
Sustainable Innovation Fund September 2021 Briefing
 
The KTN Digital and Creative Business Briefing : June 2019
The KTN Digital and Creative Business Briefing : June 2019The KTN Digital and Creative Business Briefing : June 2019
The KTN Digital and Creative Business Briefing : June 2019
 
Digital Business Briefing February 2019
Digital Business Briefing February 2019Digital Business Briefing February 2019
Digital Business Briefing February 2019
 
Matt Ward from Digital Catapult (CDEC)
Matt Ward from Digital Catapult (CDEC)Matt Ward from Digital Catapult (CDEC)
Matt Ward from Digital Catapult (CDEC)
 
UK British Business Angels Association Keynote
UK British Business Angels Association KeynoteUK British Business Angels Association Keynote
UK British Business Angels Association Keynote
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
 
Digital business briefing September 2014
Digital business briefing   September 2014Digital business briefing   September 2014
Digital business briefing September 2014
 
QIB Q1 2021: Angel Investment
QIB Q1 2021: Angel InvestmentQIB Q1 2021: Angel Investment
QIB Q1 2021: Angel Investment
 
Digital business briefing August 2014
Digital business briefing   August 2014Digital business briefing   August 2014
Digital business briefing August 2014
 
KTN Digital & Creative Business Briefing, February 2020
KTN Digital & Creative Business Briefing, February 2020KTN Digital & Creative Business Briefing, February 2020
KTN Digital & Creative Business Briefing, February 2020
 
Digital business briefing October 2014
Digital business briefing October 2014Digital business briefing October 2014
Digital business briefing October 2014
 
IOT Launchpad TechnologyStrategyBoard
IOT Launchpad TechnologyStrategyBoardIOT Launchpad TechnologyStrategyBoard
IOT Launchpad TechnologyStrategyBoard
 
Jon Kingsbury from Knowledge Transfer Network (KTN)
Jon Kingsbury from Knowledge Transfer Network (KTN)Jon Kingsbury from Knowledge Transfer Network (KTN)
Jon Kingsbury from Knowledge Transfer Network (KTN)
 
Peter Karney: Intro to the Digital catapult
Peter Karney: Intro to the Digital catapultPeter Karney: Intro to the Digital catapult
Peter Karney: Intro to the Digital catapult
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 

Recently uploaded

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 

Recently uploaded (20)

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 

Solent Cyber Security Cluster 2, BIS presentation

  • 1. Stephen Rhodes Assistant Director, Cyber Security Digital Economy Unit
  • 2. UK Cyber Security Strategy Our vision Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and the rule of law, enhance prosperity, national security and a strong society. Our objectives Objective 1: The UK to tackle cyber crime and be one of the most secure places in the world to do business in cyberspace Objective 2: The UK to be more resilient to cyber attacks and better able to protect our interests in cyberspace Objective 3: The UK to have helped shape an open, stable and vibrant cyberspace which the UK public can use safely and that supports open societies Objective 4: The UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber security objectives
  • 3. BIS CYBER ACTIVITIES • Raising business awareness of the threats (and opportunities) through guidance, campaigns and annual breaches survey • Encouraging action on cyber security by business (e.g. Cyber Essentials) • Strengthening UK’s cyber security skills • Strengthening UK’s cyber security research and innovation capability • Supporting growth of the UK cyber security sector • Delivered in partnership with other departments, agencies and external partners, funded by National Cyber Security Programme
  • 4. Cyber security sector growth agenda • The cyber security industry in the UK is worth £6 billion and employs around 40,000 people • UK Cyber security exports in 2013 were £1040M (up 22% from 2012’s £850M. On track to reach the Government target of £2 billion by 2016. • Cyber Growth Partnership (CGP) - joint initiative between industry, academia and government, aimed at boosting the UK’s global market position in cyber security products and services.
  • 5. Cyber Growth Partnership • Main government-industry body for growing the cyber security sector. Co-chaired by a government Minister and CEO of BT. • Industry led activities • Emphasis on exporting: identifying target markets for special attention (currently USA, Saudi, Malaysia, Qatar); Best of British consortia development • Supplier to Government Scheme. • Export Risk Guidance • Cyber showcase facility
  • 6. CYBER GROWTH PARTNERSHIP • SME Growth Projects announced last September. • The appointment of a cluster development representative who will provide support and guidance to help establish cyber clusters in areas of the UK where there is a concentration of cyber businesses, drawing on the success of the Malvern cluster. • Cyber Connect UK
  • 7. CYBER CONNECT UK • Identify and Map all Cyber Companies in the UK • Cyber Connect Portal: www.techuk.org/cyber-connect-uk • "Access to Finance" Events • Conduct Industry Consultation Exercise • Help UKTI Plan cyber missions to priority markets • Business Acceleration Clinics • Deliver Large Business Open Innovation Events • Provide Guidance on Small Business Collaboration Vehicles • Contact: Andy Williams (andy.williams@techuk.org)
  • 8. Innovation Vouchers • A scheme for SMEs run by Innovate UK (formerly TSB) designed to encourage business to get outside expertise to enable them to grow. • Vouchers available to enable business to receive up to £5,000 of advice to improve their cyber security. • Vouchers allocated through a series of ‘calls’. • Announced on Innovate UK website.
  • 9. Cyber Security Standard • What does good cyber security look like? • Core actions necessary to mitigate majority of cyber threats. • 5 key controls: Boundary firewalls and Internet gateways; secure configuration; access control; malware protection; patch management • Demonstrates cyber credentials to capitalise on opportunities • Accreditation needed for certain government contracts