'Cyber in the Liverpool City Region' hosted by the North West Cyber Security Cluster on Thursday 24th March 2022 in Liverpool. Three guest speakers discussing Cyber Security careers and university courses, How does the Digital Tech Cluster help tech start-ups and scale-ups?, and Cyber Security and Space.
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...APNIC
The NZITF, a 'trust group’ of volunteers in a country with no National C, by Barry Brailey. A presentation given at APNIC 38 during the Network Abuse BoF session.
Here's an overview of the Oxford Cyber Security Cluster for those who might be interested. The cluster is highly active, with over fifty member organisations from industry, business support and academia.
The document provides information about the Internet Society (ISOC) and its Deploy360 Programme.
The ISOC is a nonprofit organization founded in 1992 to promote an open and accessible Internet. Its Deploy360 Programme aims to advance the real-world deployment of Internet protocols by providing technical resources and educational events. It maintains a web portal with deployment guides and hosts ION conferences around the world to engage with network operators and other stakeholders. The agenda shown also provides an example of topics covered at an ION conference.
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrowerdri_ireland
Keynote address to the 2013 Czech Digital Preservation Society conference, Czech National Archives, Prague, October 1, 2013. Discusses two conceptions of trust: one that is technical, one that is about relationship-building
11 April 2016 - ION Bangladesh - What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
GÉANT supports over 40 National Research and Education Networks (NRENs) across Europe which in turn support over 10,000 institutions and 50 million academic users. eduTEAMS is a suite of services developed by GÉANT to enable the use of federated identity and access management (AAI) for research collaborations. This includes an eduTEAMS Membership Management service, Identity Hub, and Discovery Service that can be used together or separately to help collaborative organizations manage user identities and access to their services in a federated way. Several pilots are underway to test eduTEAMS with research communities, infrastructures, and NRENs.
The document discusses the activities of the Internet Society Bangladesh Dhaka Chapter, including their focus on bridging the digital divide through education, awareness, and research. They have participated in conferences on standards, policy, and technology run by organizations like IETF, ICANN, and ITU. The chapter also aims to support training, seminars, and grants through their partnership with the global Internet Society organization.
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...APNIC
The NZITF, a 'trust group’ of volunteers in a country with no National C, by Barry Brailey. A presentation given at APNIC 38 during the Network Abuse BoF session.
Here's an overview of the Oxford Cyber Security Cluster for those who might be interested. The cluster is highly active, with over fifty member organisations from industry, business support and academia.
The document provides information about the Internet Society (ISOC) and its Deploy360 Programme.
The ISOC is a nonprofit organization founded in 1992 to promote an open and accessible Internet. Its Deploy360 Programme aims to advance the real-world deployment of Internet protocols by providing technical resources and educational events. It maintains a web portal with deployment guides and hosts ION conferences around the world to engage with network operators and other stakeholders. The agenda shown also provides an example of topics covered at an ION conference.
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrowerdri_ireland
Keynote address to the 2013 Czech Digital Preservation Society conference, Czech National Archives, Prague, October 1, 2013. Discusses two conceptions of trust: one that is technical, one that is about relationship-building
11 April 2016 - ION Bangladesh - What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
GÉANT supports over 40 National Research and Education Networks (NRENs) across Europe which in turn support over 10,000 institutions and 50 million academic users. eduTEAMS is a suite of services developed by GÉANT to enable the use of federated identity and access management (AAI) for research collaborations. This includes an eduTEAMS Membership Management service, Identity Hub, and Discovery Service that can be used together or separately to help collaborative organizations manage user identities and access to their services in a federated way. Several pilots are underway to test eduTEAMS with research communities, infrastructures, and NRENs.
The document discusses the activities of the Internet Society Bangladesh Dhaka Chapter, including their focus on bridging the digital divide through education, awareness, and research. They have participated in conferences on standards, policy, and technology run by organizations like IETF, ICANN, and ITU. The chapter also aims to support training, seminars, and grants through their partnership with the global Internet Society organization.
Presentation from Networkshop46.
Liberate case study, by Josh Howlett, head of trust and identity, Jisc.
UK Access Management Federation update, by Rhys Smith, chief technical architect, trust and identity, Jisc and Alex Stuart, principal technical support specialist (UK federation), Jisc.
eduTEAMS, by Niels Van Dijk, SURFnet.
The document provides an update on the Internet Governance Forum (IGF) for 2015. It discusses the IGF's role in internet governance discussions and the importance of its continuation. It outlines the main theme and sub-themes for IGF 2015, and ways that technical communities can engage, including by submitting workshop proposals, participating in intersessional work, and indirectly through technical contributions and capacity building. Tips are provided on engagement and different stakeholders are encouraged to follow discussions and issues of relevance.
This document outlines key issues related to changes in the ICT landscape, learning landscape, research environment, libraries and content, and organizational environment that will impact higher education institutions in the coming years. Some of the main changes discussed are the rise of mobile devices, cloud computing, open access to content and data, blended and flipped learning models, MOOCs, emphasis on applied research, digitization of content, and new modes of delivery including online programs. Funding constraints and competition from new providers are also noted as organizational drivers of change.
ION Cape Town, 8 September 2015 - Andrei Robachevsky discusses the Routing Resilience Manifesto initiative, underpinned by the “Mutually Agreed Norms for Routing Security (MANRS)” document that includes a set of actionable recommendations, which aims to help network operators around the world work together to improve the security and resilience of the global routing system. In this session, we’ll explain the basic principles outlined in MANRS, how to sign up and support the effort, and how to get involved in helping to further increase global routing security.
The document discusses training initiatives to strengthen the fight against cybercrime. It begins by introducing "Mr. Cyberman" and his background and skills. It then defines cybercrime under South African law and discusses common types like unauthorized access, denial of service attacks, and identity theft. The remainder focuses on training recommendations, including providing basic training for all members, educating first responders, and emphasizing continuing education for experts to stay up to date on cybercrime trends and techniques.
Agile resources on the open web …. a global digital libraryJisc
The document summarizes a presentation about JISC's efforts to create an open, global digital library and infrastructure for accessing educational resources. It discusses JISC's role in funding content providers and shared services; principles for the infrastructure including being integrated, interoperable, and sustainable; creating open metadata and linking datasets; and a vision of students and researchers having easy access to integrated library, museum and archive resources through a collaborative framework.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Presentation given by Stuart Macdonald at the International Workshop on ICT and e-Knowledge for the Developing World in Shanghai International Convention Center, Pudong, Shanghai.
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
This document summarizes a presentation given by Catherine Dwyer at the Pitney Bowes Privacy and Security Conference on June 26, 2012. The presentation discusses the concept of "Privacy by Design" and argues that it needs to evolve into "Privacy Requirements Engineering" in order to make privacy objectives more tangible and measurable. Specifically, Dwyer recommends emphasizing privacy requirements engineering, developing data visualization tools to model information flows, and determining if privacy requirements are being met within business processes.
4th June 2015 – “Finding, managing and using the right MediaHub content” presentation for the “Connect More with Jisc in Scotland” event, Napier University, Edinburgh.
Sarah Jones - National approaches to data managementdri_ireland
From "A National Approach to Open Research Data in Ireland", a workshop held on 8 September 2017 in National Library of Ireland, organised by The National Library of Ireland, the Digital Repository of Ireland, the Research Data Alliance and Open Research Ireland.
Our Manchester event in April called ‘Cyber across the North West – a great opportunity for the region’, allowed attendees to network, learn about the Cluster, opportunities within the region and how to get involved. At the end of the event, an open discussion took place, to really find out what projects attendees wanted the Cluster to concentrate on.
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
This session spotlights an education provider and a large, public state university’s initiatives aimed at preparing K12 students, adult learners, military students, veterans, and career changers for in-demand cybersecurity and cloud computing jobs.
Internet of Things - how secure is it?IISPEastMids
Internet of Things Security event looked at how the Internet of Things operates; what advantages it could bring to you and your organisation; examines what the security issues are; and gave advice and guidance on how you can overcome them.
To foster greater and more consistent use of the new 100 Gbps connections that is being deployed in the national RNP backbone, the e-Cyber project aims at delivering high-performing services to the most infrastructure-demanding research centers in Brazil. To do this, the project is getting inspired by the “superfacility” concept, which is adopted by initiatives like GRP (Global Research Platform) and EOSC (European Open Science Cloud). However, one of our biggest challenges is to engage the client institutions and bring them to co-create solutions and participate in the project governance.
Presenting the following paper “Science Gateways: The Long Road to the Birth of an Institute” by Sandra Gesing, Nancy Wilkins-Diehr, Maytal Dahan, Katherine Lawrence, Michael Zentner, Marlon Pierce, Linda Hayden, Suresh Marru at HICSS50 Conference.
This document provides an overview of the KTH Applied Information Security Lab at NUST in Islamabad, Pakistan. It discusses the lab's vision and focus on bridging research and solving cybersecurity problems. It outlines the lab's achievements, including organized workshops and seminars for students, and funded/non-funded research projects in domains like cloud security and digital forensics. It also profiles the lab's faculty and staff and describes some of their current and past funded projects, industrial collaborations, and events.
Jisc is a UK organization that champions digital technologies in education and research. It aims to make the UK a world leader in digital education. Jisc provides digital content, networking services, and advice to help educational institutions improve teaching and learning, increase efficiency, and satisfy inspection requirements. It has account managers and subject matter experts who can provide consultancy and bespoke training to help organizations and support staff development.
Digital Capability: How digitally capable are we?BlackboardEMEA
Is the implementation of Blackboard/Collaborate/et cetera hampered by staff and students’ IT skills? Users struggle to make the most of Blackboard without basic digital capabilities such as file management, knowing what a browser is, not to mention wider capabilities such as creating and uploading videos, understanding file size issues, or utilising their mobiles and the list goes on.
During 2014 the UCISA User Skills Group undertook their inaugural Digital Capabilities Survey and followed up with several case studies. Their research shows:
• What strategic approaches universities are taking to support staff and students with their digital capabilities
• What universities are doing to address these skills for their staff and students
• How the sector is defining digital capabilities
• What universities are doing with BYO
Presentation from Networkshop46.
Liberate case study, by Josh Howlett, head of trust and identity, Jisc.
UK Access Management Federation update, by Rhys Smith, chief technical architect, trust and identity, Jisc and Alex Stuart, principal technical support specialist (UK federation), Jisc.
eduTEAMS, by Niels Van Dijk, SURFnet.
The document provides an update on the Internet Governance Forum (IGF) for 2015. It discusses the IGF's role in internet governance discussions and the importance of its continuation. It outlines the main theme and sub-themes for IGF 2015, and ways that technical communities can engage, including by submitting workshop proposals, participating in intersessional work, and indirectly through technical contributions and capacity building. Tips are provided on engagement and different stakeholders are encouraged to follow discussions and issues of relevance.
This document outlines key issues related to changes in the ICT landscape, learning landscape, research environment, libraries and content, and organizational environment that will impact higher education institutions in the coming years. Some of the main changes discussed are the rise of mobile devices, cloud computing, open access to content and data, blended and flipped learning models, MOOCs, emphasis on applied research, digitization of content, and new modes of delivery including online programs. Funding constraints and competition from new providers are also noted as organizational drivers of change.
ION Cape Town, 8 September 2015 - Andrei Robachevsky discusses the Routing Resilience Manifesto initiative, underpinned by the “Mutually Agreed Norms for Routing Security (MANRS)” document that includes a set of actionable recommendations, which aims to help network operators around the world work together to improve the security and resilience of the global routing system. In this session, we’ll explain the basic principles outlined in MANRS, how to sign up and support the effort, and how to get involved in helping to further increase global routing security.
The document discusses training initiatives to strengthen the fight against cybercrime. It begins by introducing "Mr. Cyberman" and his background and skills. It then defines cybercrime under South African law and discusses common types like unauthorized access, denial of service attacks, and identity theft. The remainder focuses on training recommendations, including providing basic training for all members, educating first responders, and emphasizing continuing education for experts to stay up to date on cybercrime trends and techniques.
Agile resources on the open web …. a global digital libraryJisc
The document summarizes a presentation about JISC's efforts to create an open, global digital library and infrastructure for accessing educational resources. It discusses JISC's role in funding content providers and shared services; principles for the infrastructure including being integrated, interoperable, and sustainable; creating open metadata and linking datasets; and a vision of students and researchers having easy access to integrated library, museum and archive resources through a collaborative framework.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Presentation given by Stuart Macdonald at the International Workshop on ICT and e-Knowledge for the Developing World in Shanghai International Convention Center, Pudong, Shanghai.
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
This document summarizes a presentation given by Catherine Dwyer at the Pitney Bowes Privacy and Security Conference on June 26, 2012. The presentation discusses the concept of "Privacy by Design" and argues that it needs to evolve into "Privacy Requirements Engineering" in order to make privacy objectives more tangible and measurable. Specifically, Dwyer recommends emphasizing privacy requirements engineering, developing data visualization tools to model information flows, and determining if privacy requirements are being met within business processes.
4th June 2015 – “Finding, managing and using the right MediaHub content” presentation for the “Connect More with Jisc in Scotland” event, Napier University, Edinburgh.
Sarah Jones - National approaches to data managementdri_ireland
From "A National Approach to Open Research Data in Ireland", a workshop held on 8 September 2017 in National Library of Ireland, organised by The National Library of Ireland, the Digital Repository of Ireland, the Research Data Alliance and Open Research Ireland.
Our Manchester event in April called ‘Cyber across the North West – a great opportunity for the region’, allowed attendees to network, learn about the Cluster, opportunities within the region and how to get involved. At the end of the event, an open discussion took place, to really find out what projects attendees wanted the Cluster to concentrate on.
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
This session spotlights an education provider and a large, public state university’s initiatives aimed at preparing K12 students, adult learners, military students, veterans, and career changers for in-demand cybersecurity and cloud computing jobs.
Internet of Things - how secure is it?IISPEastMids
Internet of Things Security event looked at how the Internet of Things operates; what advantages it could bring to you and your organisation; examines what the security issues are; and gave advice and guidance on how you can overcome them.
To foster greater and more consistent use of the new 100 Gbps connections that is being deployed in the national RNP backbone, the e-Cyber project aims at delivering high-performing services to the most infrastructure-demanding research centers in Brazil. To do this, the project is getting inspired by the “superfacility” concept, which is adopted by initiatives like GRP (Global Research Platform) and EOSC (European Open Science Cloud). However, one of our biggest challenges is to engage the client institutions and bring them to co-create solutions and participate in the project governance.
Presenting the following paper “Science Gateways: The Long Road to the Birth of an Institute” by Sandra Gesing, Nancy Wilkins-Diehr, Maytal Dahan, Katherine Lawrence, Michael Zentner, Marlon Pierce, Linda Hayden, Suresh Marru at HICSS50 Conference.
This document provides an overview of the KTH Applied Information Security Lab at NUST in Islamabad, Pakistan. It discusses the lab's vision and focus on bridging research and solving cybersecurity problems. It outlines the lab's achievements, including organized workshops and seminars for students, and funded/non-funded research projects in domains like cloud security and digital forensics. It also profiles the lab's faculty and staff and describes some of their current and past funded projects, industrial collaborations, and events.
Jisc is a UK organization that champions digital technologies in education and research. It aims to make the UK a world leader in digital education. Jisc provides digital content, networking services, and advice to help educational institutions improve teaching and learning, increase efficiency, and satisfy inspection requirements. It has account managers and subject matter experts who can provide consultancy and bespoke training to help organizations and support staff development.
Digital Capability: How digitally capable are we?BlackboardEMEA
Is the implementation of Blackboard/Collaborate/et cetera hampered by staff and students’ IT skills? Users struggle to make the most of Blackboard without basic digital capabilities such as file management, knowing what a browser is, not to mention wider capabilities such as creating and uploading videos, understanding file size issues, or utilising their mobiles and the list goes on.
During 2014 the UCISA User Skills Group undertook their inaugural Digital Capabilities Survey and followed up with several case studies. Their research shows:
• What strategic approaches universities are taking to support staff and students with their digital capabilities
• What universities are doing to address these skills for their staff and students
• How the sector is defining digital capabilities
• What universities are doing with BYO
Insider threat: tackling cyber security risk from inside your organisation. This event provided an overview of the current state of understanding of who the “insiders” are; how they operate; what motivates them and what threats they pose to information systems.
Student experience experts group meet up, April 2020Jisc
This document summarizes the agenda for the 46th meeting of Jisc's student experience experts group. The meeting will include presentations and discussions on the future of assessment, transforming assessment and feedback through technology, and equipping staff with digital capabilities. Presentations will cover Jisc's research on the future of assessment, examples of effective practice from Manchester Metropolitan University and Preston's College, and supporting new students' digital experience. The agenda also includes virtual coffee breaks and a lunch break. Recordings and materials from the event will be made available on Jisc's website.
This document provides information about graduate programs in data science and cybersecurity at the University of Denver. It discusses why Colorado and Denver are good locations, highlights of the University of Denver including new facilities and rankings, and details of the programs such as curriculum, career outcomes, costs, and application requirements. Student profiles and ambassador contacts are also included to learn more from current students.
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...KTN
Following the Collaborators' Workshop held on 26th Sept (presentations available on KTN's SlideShare account), EPSRC/ESRC are running a Collaboration Development workshop on 22nd November 2019 in London to facilitate academia-industry and academia-academia collaboration ahead of the closing dates for the EPSRC and ESRC ISCF Digital Security by Design calls.
The calls need to be led by academic institutions. Industrial involvement, while not mandatory, is highly desirable and will be required for future competitions. Hence this workshop aims to have a mix of academic and industrial participants.
The Digital Security by Design challenge was announced in July. This challenge, amounting to £70 million of government funding over 5 years, will be delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
Find out more: https://ktn-uk.co.uk/news/iscf-digital-security-by-design-collaboration-development-workshop
Building Successful API Programs in Higher Education3scale
In this webinar, hosted on August 27, 2015, Steven Willmott discusses the benefits of API development in higher education.
APIs are not exclusive to for-profit organizations. In higher education—from statewide university and college systems to smaller private institutions—schools like Notre Dame and Brigham Young University have built highly successful API programs.
About the Webinar
The development and rising popularity of the massive open online course (MOOC) presents a new opportunity for libraries to be involved in the education of patrons, to highlight the resources libraries provide and to further demonstrate the value of the library to administrators. There are, of course, a host of logistics to be considered when deciding to organize or support a MOOC. Diminished library budgets and staffing levels challenge libraries both monetarily and administratively. Marketing the course, mounting it on a site, securing copyright permissions and negotiating licensing for course materials, managing the course while in progress and troubleshooting technical problems add to the issues that have caused some libraries to hesitate in joining the MOOC movement. On the other hand, partnerships such as that between Georgetown University and edX, itself an initiative of Harvard and MIT, allow a pooling of resources thereby easing the burden on any one library. In some cases price breaks for certain course materials used in MOOCs can help draw students to the course, though the pricing must still be negotiated by the course organizer. A successful MOOC, such as the RootsMOOC, created by the Z. Smith Reynolds Library at Wake Forest University and the State Library of North Carolina, can bring awareness of library resources to a broad audience.
In the end, libraries must ask whether the advantages of participating in a MOOC outweigh the challenges. The speakers for this webinar will consider these issues surrounding MOOCs and libraries and try to answer the question of whether the impact of libraries on MOOCs has been realized or is still brewing.
Agenda
Introduction
Todd Carpenter, Executive Director, NISO
MOOCS: Assessing the Landscape and Trends of Open Online Learning
Heather Ruland Staines, Director Publisher and Content Strategy, ProQuest SIPX
The RootsMOOC Project or: that time we threw a genealogy party and 4,000 people showed up
Kyle Denlinger, eLearning Librarian, Wake Forest University Z. Smith Reynolds Library
Rebecca Hyman, Reference and Outreach Librarian, Government and Heritage Library, State Library of North Carolina
MOOCS and Me: Georgetown's Experience with MOOC Production
Barrinton Baynes, Multimedia Projects Manager, Gelardin New Media Center, Georgetown University Library
The document summarizes a University Center Showcase presented by Jeff Tucker from Kansas State University's Technology Development Institute (TDI). The TDI focuses on accelerating innovation for small and medium enterprises through technology development assistance, supporting commercialization and business expansion. It has received funding from the Economic Development Administration to upgrade equipment for fabrication, machining and additive manufacturing. The TDI has also developed a microfactory program and provides internships in technology entrepreneurship to cultivate innovation ecosystems.
The Impact of the General Data Protection Regulation - 10th May 2016IISPEastMids
This event looked at the new data protection regulation how it will effect your business. The event gave an overview of the new regulation as well as things that you need to watch out within the regulation when it comes into force in 2018.
http://qonex.com/east-midlands-cyber-security-forum/
Professor Rod Murray-Smith from the University of Glasgow presents at the University's Commonwealth Future Cities Business Networking event on the 24th July 2014
Digital Capability Training for University Staff Developing a FrameworkGood Things Foundation
This is the Powerpoint presentation by Vicki McGarvey and Julie Adams, Staffordshire University, from our TeachMeet event with CILIP ILG in Leeds on Wednesday 10 February 2016.
Cyber Security Partners (CSP) are a security consultancy that go above and beyond for our clients. As Team CSP, we strive in helping clients in the rapidly growing interconnected world.
'The Cyber Security Concerns for Small to Medium Sized Law Firms, when Digitally Transforming your Business.’
Description:
Digital transformation of your company brings many benefits in streamlining your route to market and enabling consistent and accurate responses to your clients.
But that often means relying on services and expertise outside of your comfort zone and sending data into that big bad word of the ‘internet’. This session will NOT take you through all the bad things that can happen and then magically provide a software solution. What it will do is take you through the steps of establishing your Cyber Security posture when moving to a more digital way of doing business.
Kevin Else, Consultancy Director at Cyber Security Partners, will provide guidance and advice on taking a methodical approach to implementing security around technology used by your business and define the areas of responsibility that you as an organisation, need to take to protect your business and your client’s data.
CSP and LegalTech in Leeds hosted an event on Thursday 9th February 2023. This event discussed ‘Data and Cyber Security’ to help the Legal sector be more aware, protected and secure.
The Click and Protect team exhibited at The Business Show 2022 for 2 days in November. This was to raise awareness around Cyber Security for SME, help them grow and develop to achieve their goals. Kevin Else, Director, also had a speaker slot at the event to discuss free tools that businesses can take advantage of to benefit their operations.
Our very well received 'Who Dun It' event returned for another year after a successful response in 2021!
It was our attendees turn to help Detective Else solve how a company got infected with Ransomware in our scenario for our 2022 event. All they had to do was to listen to the scenario, then interview the characters to establish the weaknesses in the company that let the malware in and how it could have been prevented. The staff gave attendees clues and bluffs, to help with the answers or false trails.
So, attendees learnt ways a cyber-crime can be committed right under their noses and learnt about what precautions you should be putting in place to protect your business.
Attendees enjoyed a fun evening of networking, crime solving and security advice with welcome drinks and food provided before CSP revealed the criminal at the end of the event, with prizes for the winning guess!
This event was hosted by Chris Bell, one of our CSP Directors who has over 35 years experience in the Information Technology Industry with the last 25 years in the Infosec space.
The panel of experts discussed how management can be confident that their security posture of the organisation is actually OK and protected against potential disruptive threats.
Assurance and Compliance (and their role in assessing and demonstrating security posture) was discussed in conversations by the panelists. Attendees had the opportunity to explore this subject further through hearing insights and expertise from our local leaders in the information security community, with a live Q&A.
This document provides an overview and guidance on implementing legal services in a digital environment while considering cyber security. It discusses the benefits of digital transformation, as well as machine learning and AI pros and cons and data privacy issues to consider. The document also includes an implementation checklist and questions for attendees.
Cyber Security careers are available to everyone. So, how do we encourage people, young and old, to see the great opportunities and to take the step into Cyber Security?
CSP's CEO, Robert Briggs, discusses the many options available to either upskill or reskill for a career in one of the fastest growing industries. With advice on government backed and commercial schemes to help yourself, this session will ensure that you are equipped with all the information you need to start your Cyber Security career.
This session gives you real-life insights and examples of the most ridiculous cyber-attacks and the smartest cyber-crimes that have occurred over the last 30 years. Each director from CSP tell their own personal stories from working in the industry and from past clients, about the strangest and funniest cyber-crimes they have come across.
Yes, these examples are a laugh, but they also raise awareness of how easy it could be to fall victim to these cyber criminals and their attempts. So, we will be discussing how to protect your business also, and be more aware of their tell-tale signs and attempts to disrupt your business.
Our attendees helped to discover ‘who dunit’ and solve the cybercrime at our final in-person LDF event of 2021. The evening’s entertainment started with the question - who has made off with £20,000 from Small Company Ltd? Follow the clues throughout the evening with the assistance (and sometimes hinderance) of Cyber Security Partners team to track down the thief and save the company. This will be followed by an insightful short presentation, covering what guidance and advice our experts recommend to avoid such attacks happening, the different attacks you could potentially be exposed to and benefits of putting certain steps in place. Then we will host a live Q&A for your chance to ask questions about anything discussed during the event towards our Cyber Security professionals.
So, sign up for a fun yet thought-provoking investigation and take advantage of having conversations with our team about any CS related concerns or queries you have. Enjoy refreshments, a bite to eat, network with your fellow attendees and have one-to-one chats with our team.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
2. Event Structure
09:00 - Networking and Refreshments
09:30 - North West Cyber Security Cluster – Overview, aims and objectives
09:45 - Bob Askwith from Liverpool John Moores University
10:10 - James Bedford from Digital Tech Cluster (Sci-Tech Daresbury)
10:30 - Alan Cross from Science and Technology Facilities Council (STFC)
10:50 – Q&A
11:00 - Finish with networking
4. Background
North West Cyber Security Cluster
• Launched 2014
• Originally ‘Pay subscription model’
• Held large events previously
• Relaunch January 2021
• Free membership
• Virtual presentations and roundtables during national and local lockdowns
5. UKC3
UK Cyber Cluster Collaboration (https://ukc3.co.uk/)
• Launched June 2021
• Funded by DCMS
• Represents all clusters across the country
• Co-ordinated approach to governance, investment and funding
6. UK Cyber Market
• UK Cyber Market - £10.1bn – Up 14%
Source: Perspective Economics
8. Aims
• Grow North West share of UK cyber market
• Support UK initiatives in the region and indirectly across the country.
• Encourage people to skill up and train in Cyber to fill current and
projected skills gap.
9. North West - major investments
• Cyber Corridor
• National Cyber Force – Samlesbury – 3,000 positions
• GCHQ – Manchester - - 3,000 positions
10. Objectives
The North West Cyber Security Cluster want to represent and support cyber
security professionals, experts and organisations from the cyber security and
IT industry across Lancashire / Cumbria, Manchester, Liverpool City Region
and Cheshire.
Our objectives are to:
• Provide collaboration, support and networking opportunities for SMEs and
start-ups in the technology and cyber security sector.
• Educate the local community of businesses and individuals around cyber
security.
• Work with public sector bodies, including academia, to ensure that the
pertinent information is captured and distributed to local organisations
13. NWCSC Launch Meeting 24.3.2022
Cyber Security @ Liverpool JMU
Dr Bob Askwith
Subject Head (Security/Forensics)
School of Computer Science and Mathematics
Liverpool John Moores University
R.J.Askwith@ljmu.ac.uk
14.
15. School of Computer Science @ LJMU
The School of Computer Science & Mathematics is one of three
schools in the Faculty of Engineering and Technology
• 60+ academic staff, incl. 11 in the Security group
• Approximately 1200 students, incl. 170+ studying Security
• Over 60 PhD students
• We are a highly research active School
• Several dedicated computing labs
• Computer Forensics & Security lab
• Isolated from Internet
• Private Cloud service for building security experiments
16. Undergraduate BSc Programmes
• Computer Science
• Computing
• Software Engineering
• Mathematics
• Mathematics with Finance
• Computer Games
Development
• Computing Forensics
• Computer Security
• Approx. 150 students
across all years (inc.
foundation year and
placement)
• Delivered since 2010-11
17. BSc Computer Security
Year 1
Intro to Programming
Computer Systems
Intro Security/Forensics
Web Dev. & Internet
Problem Solving for Security
Professional Practice
Year 2
Database Systems
Operating Systems
Info. Security Management
Secure Software Dev.
Pen Testing
Group Project
Year 3
Ethical Hacking
Network Defence
Network Forensics
Applied Cryptography
Dissertation Project
18. Curriculum Approach
• We are a School of Computer Science!
• Our Computing programmes are all Computer Science programmes
• Core base of general computer science (programming, databases, networks)
• Specialism in cyber security
• Moves from more general (33% in Year 1) to more focused (100% in Year 3)
• Scientific approach, Engineering ethos, Technology emphasis
• Evolve in step with widely known Cyber Security curricula
• Cyber Security Body of Knowledge (CyBOK) https://www.cybok.org/
• National Cyber Security Centre certified degree scheme
https://www.ncsc.gov.uk/information/ncsc-certified-degrees
(We have not sought NCSC accreditation. We do have BCS.)
19. Placement or ‘Sandwich’ Year
• 4-year sandwich undergraduate BSc (Hons)
• Year-long industry placement
• Preparation during Year 1 and 2:
• Year 1: Professional Practice (career and personal development)
• Year 2: Group Project (teamwork, research, planning)
• Individual support from personal tutors
• Employability support
• Placements are paid positions (exceptions for charitable orgs)
• There is a well-established network of 600+ employers
22. Postgraduate Study @ LJMU
• MSc Cyber Security
• Aimed at STEM graduates but primarily Computer Science
• Structure
• Semester 1: Computer Security, Information Security Management, Research Methods
• Semester 2: Ethical Hacking, Secure Systems, Cryptography
• Semester 3: Research Dissertation
• Currently 21 enrolled
• Delivered since 2015-16
• As with UG, we have ‘aligned’ with NCSC subject criteria
• PhD by research
• Cyber Security
• AI / Data Science / Machine Learning
• …
23. Summary
• LJMU has a team of 11 academics delivering Cyber Security teaching
and research, within a school of 60+ academics in C.Sci & Math
• LJMU supports the development NW talent pool of computer
science and Cyber Security
• 150 undergraduates in security & 20+ MSc
• Over 1000 undergraduates in computing subjects
• LJMU supports with regional business
• Placements opportunities for undergraduates
• Networking and alumni opportunities
• Research and knowledge transfer
29. Digital Tech Cluster Overview
Environment for growth
• Business support to help tech entrepreneurs grow their business
• Advanced digital training for staff provided by the Hartree Centre
• Collaboration programme for tech start-ups and scale-ups to coordinate partnerships
with the wider non-tech economy
• Spin-out support
• Halton Digital Bootcamp Programme
• Investor Network
Community
• Peer-to-peer learning
• Newsletter and website with member directory
30. Digital Tech Companies
• The cluster is designed to support start-up and scale-up digital tech companies
• Software not hardware
• Product not services
• Fast-growing and scaleable
• Innovative
• This is the focus, not criteria for entry
• Cyber-security SMEs are very welcome
31. Envt for Growth - Business Support
• Supporting the leaders of digital tech companies to grow rapidly
• Coordinated with other business support
• Online means wider audience, part of marketing Daresbury
• Wide package of support including workshops and content:
• Investment-readiness workshops
• Intellectual property
• Finance and metrics
• Accessing international markets
2 workshops and 2 meetups already this year with 20-25 more planned.
32. Envt for Growth – Digital Training
• Delivered through the Hartree Centre, National Centre for Digital Innovation
• Cutting edge training for tech teams
• Support for tech staff of digital tech companies, helps with upskilling and retention
33. Envt for Growth - Collaboration Programme
• Why?
• Solving problems for tech companies
• Solving problems for wider economy
• How will it operate?
• Digital transformation – corporate accelerators
• Find problems, understand tech and cultural barriers
• Identify solutions and facilitate iterations and ongoing support
• Link with Daresbury assets and expertise e.g Hartree
• Outcomes
• New customers and new innovations
• New jobs, GVA and sustainable future
34. Community
• CTO Meetups
• Peer-to-peer learning
• 8 times a year
• Hartree link
• Membership
• Make cluster more official
• Benefits package
• Newsletter and website
• Opportunity to sign-post
• Membership directory
• Share activity of the cluster
35. How can cyber-security SMEs get involved?
• Lots of online workshops you may be interested in as you grow
• Written content around cyber-security, can you be involved?
• CTO Meetups may be of interest to CTOs in cyber-security
• CTO Meetup focussed on cyber-security
• Best way to connect is via the newsletter
• Via Twitter (see pinned tweet) @jamesbedford140
• James.Bedford@stfc.ac.uk
39. ESA UNCLASSIFIED
Global Navigation
Satellite Systems (GNSS)
Satellite Communication Satellite Imagery
(aka Earth Observation/Remote Sensing )
Space Weather Microgravity & the Space
Environment
40. ESA UNCLASSIFIED
Global Navigation Satellite
Systems (GNSS)
• Navigation & route optimisation
• Worldwide geolocation and
timestamping
• Integrity marker for blockchain
• Master clock synchronisation
Satellites
101
• Sometimes (inaccurately) called ‘GPS’, or ‘SatNav’
• Global coverage: GPS (USA), GLONASS (Russia), BeiDou (China), Galileo (EU)
• Regional coverage: NavIC (India), QZSS (Japan), plus multiple ‘SBAS’
• Atomic clocks sending ultra-precise timing signals
• Multiple satellites across multiple constellations
• GNSS devices calculate their position based on minimum 4 signals
Applications:
41. ESA UNCLASSIFIED
• Global access to data & services
• Back-up for terrestrial communications
• Improved security and integrity
• High-speed, low latency internet for remote areas
• Dedicated IoT solutions
Satellites
101
Satellite Communications
(SatComms)
Applications:
46. ESA UNCLASSIFIED
• Global shipping is vulnerable to GNSS &
AIS spoofing/jamming, both on board & on
shore, impacting tracking & analysis
• Legacy ships with internet access often
weakest link in security chain
• End-to-end security for shipping industry,
taking into account satellite links, securely
collecting data on board & transmitting
safely to shore for storage & analysis
ARCAmarine
47. ESA UNCLASSIFIED
• A CyberSec Test Range, Grottaglie Airport
• Defence against hardware attacks, wireless
attacks, and spoofing
• Satcom – Beyond line of sight, UAS
command & control, payload coms
• GNSS – asset location, masterclock sync
• EO – mission sim & prep, countermeasure
techniques to assess GNSS performance
CRUISE
48. ESA UNCLASSIFIED
• Satellite based Quantum Key Distribution
(telecoms, FinTech, Oil & Gas, SecDef,
diplomatic services)
• Using CubeSats to deliver cryptographic
keys & related services at a fraction of
traditional cost
• Bypasses loss experienced in ground
based optical networks, for beyond line of
sight, scalable, ubiquitous QKD
distribution
A-QKD-S
50. ESA UNCLASSIFIED
The largest space innovation network in the
world
• The go-to place for great business
involving space to improve everyday life.
• Supporting European start-ups and SMEs
to develop businesses using space
technology and data.
• Offering funding, business and technical
support to help to generate successful
business and create jobs.
→ ESA SPACE SOLUTIONS
52. ESA UNCLASSIFIED
• Innovative services & Products that:
• Start from market demand – not
technology push
• Are focused on Business / Service
deployment, not technology R&D
• Foster utilisation of existing space
capabilities
• Avoid research and new technology
developments
• Work in close partnership with
users/customers
• Develop integrated and sustainable
services
What ESA Business Applications looks
for...
DESIRED by Customers
VIABLE & SUSTAINABLE
Service or Product
FEASIBLE Technology -
Adding value from Space
53. ESA UNCLASSIFIED
• Open call –Feasibility Studies or Demonstration projects, €60k - €2m+, 50% funded, zero equity funding
• Space for Tourism – FS or DP, 50% funded, closes 31/03/2022
• NHS Future Hospitals – DP, 50% funded, closes 30/09/2022
• Space4Rail – FS or DP, 50% funded, closes 31/12/2024
• Space Systems for Safety & Security - FS or DP, 50% funded, closes 31/12/2025
• Digital Supply Chain – FS or DP, 50% funded, closes 21/05/2022
• Space Applications Supporting Digital Transformation in Public Safety – DP, 50% funded, closes
01/11/2022
• Digital Transformation & the Green Economy – FS or DP, 50% funded, closes 31/10/2022
• Space & Digital Transformation for Green Energy Utilities – FS or DP, 50% funded, closes 10/06/2022
• Commercial Applications Enabled by Space Environments (CASE) - FS or DP, 50% funded, closes
~2025
Current opportunities with
ESA Business Applications
54. ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 62
• Use the Ambassador Network - don’t
jump in!
• Each application is reviewed on a case
by case basis
• Be clear on your innovation
• Engage with your customers
• Understand the Management
Information for Projects
• Review your competitor analysis
• Understand your risks
• Think about the RoI for UK PLC
SUBMISSION GUIDANCE
55. Prepare, engage, review
• Talk to your Regional Ambassador
• Register your company on EMITS
• Review the Business Model Canvas
• Refine your idea
• Explore ‘gaps’ in your knowledge
• Read the guidance notes
• Watch the presentation
• Review existing ESA Projects
• Attend an APQ Surgery or workshop
• Ask all the questions…
Thinking of applying?
56. ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 64
• Tens of thousands of orbital cyber
physical systems
• Communications Satellites
• Earth Observation Satellites
• Orbital Solar Farms
• Manufacturing facilities
• Cyber physical systems beyond Earth
• Moon
• Mars
• Asteroids
• Inner system
• Outer system
• Hundreds (or thousands) of Humans in
Space
• A civilization dependent on Space for
connectivity, energy, and transit
The Future Is Coming
59. Next Meeting
• Next Meeting – Thursday 28th April 2022 | Manchester
• The Cyber Security Cluster in Manchester
• Booking details will be out soon.
• Looking for members and organisations to present - Get in
touch
Interested
Less interested in hearing from experts
Very interested in learning from peers
Top topics are Scaling software, scaling team, dealing with CEOs, board and investors
Size: 6-10 people
Times: before or after work or lunchtime. Online always.
Short term – no funding
Longer Term - requires some funding and long term partnerships
Tech companies need customers
They struggle to pilot new products
They struggle to understand non-digital companies and large companies
Industry knows it needs to utilise technology better but struggles to understand
Hard to work with digital sector because made up of so many small companies
Difficult to understand what is good and Risk of buying the wrong solution too big
Corporate accelerator but different because work with multiple companies
Facilitate relationship between tech companies and customers
Link with Daresbury assets
– Hartree due diligence role which could lead to work
- diffusion effects of being around commercialised technology on R+D
- utilising different spaces from collaboration space, to event space and basing themselves here
Increased revenue
New jobs
Valuable feedback on products
New innovations for non-tech companies
Increased efficiencies
Increased revenue
Safeguarded jobs
Sustainable future
Tech companies need customers
They struggle to pilot new products
They struggle to understand non-digital companies and large companies
Industry knows it needs to utilise technology better but struggles to understand
Hard to work with digital sector because made up of so many small companies
Difficult to understand what is good and Risk of buying the wrong solution too big
Corporate accelerator but different because work with multiple companies
Facilitate relationship between tech companies and customers
Link with Daresbury assets
– Hartree due diligence role which could lead to work
- diffusion effects of being around commercialised technology on R+D
- utilising different spaces from collaboration space, to event space and basing themselves here
Increased revenue
New jobs
Valuable feedback on products
New innovations for non-tech companies
Increased efficiencies
Increased revenue
Safeguarded jobs
Sustainable future
Tech companies need customers
They struggle to pilot new products
They struggle to understand non-digital companies and large companies
Industry knows it needs to utilise technology better but struggles to understand
Hard to work with digital sector because made up of so many small companies
Difficult to understand what is good and Risk of buying the wrong solution too big
Corporate accelerator but different because work with multiple companies
Facilitate relationship between tech companies and customers
Link with Daresbury assets
– Hartree due diligence role which could lead to work
- diffusion effects of being around commercialised technology on R+D
- utilising different spaces from collaboration space, to event space and basing themselves here
Increased revenue
New jobs
Valuable feedback on products
New innovations for non-tech companies
Increased efficiencies
Increased revenue
Safeguarded jobs
Sustainable future
Investment
Collaboration with customers
Living Lab
Investment
Collaboration with customers
Living Lab