SlideShare a Scribd company logo
North West Cyber Security Cluster
Thursday 24th March 2022
Event Structure
09:00 - Networking and Refreshments
09:30 - North West Cyber Security Cluster – Overview, aims and objectives
09:45 - Bob Askwith from Liverpool John Moores University
10:10 - James Bedford from Digital Tech Cluster (Sci-Tech Daresbury)
10:30 - Alan Cross from Science and Technology Facilities Council (STFC)
10:50 – Q&A
11:00 - Finish with networking
NWCSC
Overview, Aims and Objectives
Robert Briggs
Cluster Lead
Background
North West Cyber Security Cluster
• Launched 2014
• Originally ‘Pay subscription model’
• Held large events previously
• Relaunch January 2021
• Free membership
• Virtual presentations and roundtables during national and local lockdowns
UKC3
UK Cyber Cluster Collaboration (https://ukc3.co.uk/)
• Launched June 2021
• Funded by DCMS
• Represents all clusters across the country
• Co-ordinated approach to governance, investment and funding
UK Cyber Market
• UK Cyber Market - £10.1bn – Up 14%
Source: Perspective Economics
Cluster Reach
339 Active Offices
• Registered Offices
• Trading Offices
Source: Perspective Economics
Aims
• Grow North West share of UK cyber market
• Support UK initiatives in the region and indirectly across the country.
• Encourage people to skill up and train in Cyber to fill current and
projected skills gap.
North West - major investments
• Cyber Corridor
• National Cyber Force – Samlesbury – 3,000 positions
• GCHQ – Manchester - - 3,000 positions
Objectives
The North West Cyber Security Cluster want to represent and support cyber
security professionals, experts and organisations from the cyber security and
IT industry across Lancashire / Cumbria, Manchester, Liverpool City Region
and Cheshire.
Our objectives are to:
• Provide collaboration, support and networking opportunities for SMEs and
start-ups in the technology and cyber security sector.
• Educate the local community of businesses and individuals around cyber
security.
• Work with public sector bodies, including academia, to ensure that the
pertinent information is captured and distributed to local organisations
Greater
Manchester
Cheshire
Liverpool
City Region
Lancashire /
Cumbria
NWCSC
• Quarterly Cluster Wide
meetings - rotating
• Regional local meetings
• Monthly or
• Quarterly
Encourage more localised
meetings and enable
flexible running
Cyber Security at LJMU
Bob Askwith
Liverpool John Moores University
NWCSC Launch Meeting 24.3.2022
Cyber Security @ Liverpool JMU
Dr Bob Askwith
Subject Head (Security/Forensics)
School of Computer Science and Mathematics
Liverpool John Moores University
R.J.Askwith@ljmu.ac.uk
School of Computer Science @ LJMU
The School of Computer Science & Mathematics is one of three
schools in the Faculty of Engineering and Technology
• 60+ academic staff, incl. 11 in the Security group
• Approximately 1200 students, incl. 170+ studying Security
• Over 60 PhD students
• We are a highly research active School
• Several dedicated computing labs
• Computer Forensics & Security lab
• Isolated from Internet
• Private Cloud service for building security experiments
Undergraduate BSc Programmes
• Computer Science
• Computing
• Software Engineering
• Mathematics
• Mathematics with Finance
• Computer Games
Development
• Computing Forensics
• Computer Security
• Approx. 150 students
across all years (inc.
foundation year and
placement)
• Delivered since 2010-11
BSc Computer Security
Year 1
Intro to Programming
Computer Systems
Intro Security/Forensics
Web Dev. & Internet
Problem Solving for Security
Professional Practice
Year 2
Database Systems
Operating Systems
Info. Security Management
Secure Software Dev.
Pen Testing
Group Project
Year 3
Ethical Hacking
Network Defence
Network Forensics
Applied Cryptography
Dissertation Project
Curriculum Approach
• We are a School of Computer Science!
• Our Computing programmes are all Computer Science programmes
• Core base of general computer science (programming, databases, networks)
• Specialism in cyber security
• Moves from more general (33% in Year 1) to more focused (100% in Year 3)
• Scientific approach, Engineering ethos, Technology emphasis
• Evolve in step with widely known Cyber Security curricula
• Cyber Security Body of Knowledge (CyBOK) https://www.cybok.org/
• National Cyber Security Centre certified degree scheme
https://www.ncsc.gov.uk/information/ncsc-certified-degrees
(We have not sought NCSC accreditation. We do have BCS.)
Placement or ‘Sandwich’ Year
• 4-year sandwich undergraduate BSc (Hons)
• Year-long industry placement
• Preparation during Year 1 and 2:
• Year 1: Professional Practice (career and personal development)
• Year 2: Group Project (teamwork, research, planning)
• Individual support from personal tutors
• Employability support
• Placements are paid positions (exceptions for charitable orgs)
• There is a well-established network of 600+ employers
Industry contacts
Student Engagement
Barclays Technology Challenge
ROQ Software Challenge
Champions: LJMU
Postgraduate Study @ LJMU
• MSc Cyber Security
• Aimed at STEM graduates but primarily Computer Science
• Structure
• Semester 1: Computer Security, Information Security Management, Research Methods
• Semester 2: Ethical Hacking, Secure Systems, Cryptography
• Semester 3: Research Dissertation
• Currently 21 enrolled
• Delivered since 2015-16
• As with UG, we have ‘aligned’ with NCSC subject criteria
• PhD by research
• Cyber Security
• AI / Data Science / Machine Learning
• …
Summary
• LJMU has a team of 11 academics delivering Cyber Security teaching
and research, within a school of 60+ academics in C.Sci & Math
• LJMU supports the development NW talent pool of computer
science and Cyber Security
• 150 undergraduates in security & 20+ MSc
• Over 1000 undergraduates in computing subjects
• LJMU supports with regional business
• Placements opportunities for undergraduates
• Networking and alumni opportunities
• Research and knowledge transfer
Thank you
Q&A
How does the Digital Tech
Cluster help tech start-ups and
scale-ups?
James Bedford
Digital Tech Cluster (Sci-Tech Daresbury)
Digital Tech Cluster at Sci-
Tech Daresbury
How does the
Digital Tech Cluster
help tech start-ups
and scale-ups?
Digital Tech Cluster Overview
Environment for growth
• Business support to help tech entrepreneurs grow their business
• Advanced digital training for staff provided by the Hartree Centre
• Collaboration programme for tech start-ups and scale-ups to coordinate partnerships
with the wider non-tech economy
• Spin-out support
• Halton Digital Bootcamp Programme
• Investor Network
Community
• Peer-to-peer learning
• Newsletter and website with member directory
Digital Tech Companies
• The cluster is designed to support start-up and scale-up digital tech companies
• Software not hardware
• Product not services
• Fast-growing and scaleable
• Innovative
• This is the focus, not criteria for entry
• Cyber-security SMEs are very welcome
Envt for Growth - Business Support
• Supporting the leaders of digital tech companies to grow rapidly
• Coordinated with other business support
• Online means wider audience, part of marketing Daresbury
• Wide package of support including workshops and content:
• Investment-readiness workshops
• Intellectual property
• Finance and metrics
• Accessing international markets
2 workshops and 2 meetups already this year with 20-25 more planned.
Envt for Growth – Digital Training
• Delivered through the Hartree Centre, National Centre for Digital Innovation
• Cutting edge training for tech teams
• Support for tech staff of digital tech companies, helps with upskilling and retention
Envt for Growth - Collaboration Programme
• Why?
• Solving problems for tech companies
• Solving problems for wider economy
• How will it operate?
• Digital transformation – corporate accelerators
• Find problems, understand tech and cultural barriers
• Identify solutions and facilitate iterations and ongoing support
• Link with Daresbury assets and expertise e.g Hartree
• Outcomes
• New customers and new innovations
• New jobs, GVA and sustainable future
Community
• CTO Meetups
• Peer-to-peer learning
• 8 times a year
• Hartree link
• Membership
• Make cluster more official
• Benefits package
• Newsletter and website
• Opportunity to sign-post
• Membership directory
• Share activity of the cluster
How can cyber-security SMEs get involved?
• Lots of online workshops you may be interested in as you grow
• Written content around cyber-security, can you be involved?
• CTO Meetups may be of interest to CTOs in cyber-security
• CTO Meetup focussed on cyber-security
• Best way to connect is via the newsletter
• Via Twitter (see pinned tweet) @jamesbedford140
• James.Bedford@stfc.ac.uk
Q&A
Cyber Security and Space
Alan Cross
Science and Technology Facilities Council (STFC)
ESA UNCLASSIFIED
→ Cybersecurity and Space
Alan Cross
ESA Business Applications Ambassador
ESA UNCLASSIFIED
Global Navigation
Satellite Systems (GNSS)
Satellite Communication Satellite Imagery
(aka Earth Observation/Remote Sensing )
Space Weather Microgravity & the Space
Environment
ESA UNCLASSIFIED
Global Navigation Satellite
Systems (GNSS)
• Navigation & route optimisation
• Worldwide geolocation and
timestamping
• Integrity marker for blockchain
• Master clock synchronisation
Satellites
101
• Sometimes (inaccurately) called ‘GPS’, or ‘SatNav’
• Global coverage: GPS (USA), GLONASS (Russia), BeiDou (China), Galileo (EU)
• Regional coverage: NavIC (India), QZSS (Japan), plus multiple ‘SBAS’
• Atomic clocks sending ultra-precise timing signals
• Multiple satellites across multiple constellations
• GNSS devices calculate their position based on minimum 4 signals
Applications:
ESA UNCLASSIFIED
• Global access to data & services
• Back-up for terrestrial communications
• Improved security and integrity
• High-speed, low latency internet for remote areas
• Dedicated IoT solutions
Satellites
101
Satellite Communications
(SatComms)
Applications:
ESA UNCLASSIFIED
ESA UNCLASSIFIED
• Monitoring of land & marine parameters
• Infrastructure/asset monitoring (>30cm resolution)
• Change detection over time
• Real-time weather & climate mapping
Satellites
101
Earth Observation (EO)
Applications:
Passive:
• Panchromatic – Hi-res, broad spectra, optical & near-IR
• Multi-spectral – lo-res, narrow spectra, IR, UV, microwave
• Pan-sharpened – combines spectral res & spatial res
• Hyper-spectral – continuous spectra (not multiple narrow bands)
• Microwave Radiometry – atmospheric water vapour
Active:
• Synthetic Aperture Radar
• Ship detection, oil spills, infrastructure
monitoring, etc
• Radar Altimetry
• Millimetric surface topography
• Lidar
• Monitoring glacial loss, winds,
atmospheric aerosols, etc
ESA UNCLASSIFIED
Global Navigation
Satellite Systems (GNSS)
Satellite Communication Satellite Imagery
(aka Earth Observation/Remote Sensing )
• Positioning (cm
accuracy)
• Timing (nanosecond
accuracy)
• Navigation
• Reflectometry useful for
wide swath altimetry,
seawater salinity, ice-
layer density
• Ubiquitous connectivity
• ‘Bent pipes’ + mesh
networks
• High bandwidth options
• Low bandwidth/power
IoT
• Low latency (LEO +
MEO)
• ‘Eyes on’, anywhere on
Earth
• >30cm spatial resolution
• Multiple spectra +
techniques
• Passive (‘seeing’)
• Active (‘texture’ +
topography)
• Change detection over
time
Satellites (In A
Nutshell)
ESA UNCLASSIFIED
→ ESA Business Applications
Case Studies
ESA UNCLASSIFIED
• Global shipping is vulnerable to GNSS &
AIS spoofing/jamming, both on board & on
shore, impacting tracking & analysis
• Legacy ships with internet access often
weakest link in security chain
• End-to-end security for shipping industry,
taking into account satellite links, securely
collecting data on board & transmitting
safely to shore for storage & analysis
ARCAmarine
ESA UNCLASSIFIED
• A CyberSec Test Range, Grottaglie Airport
• Defence against hardware attacks, wireless
attacks, and spoofing
• Satcom – Beyond line of sight, UAS
command & control, payload coms
• GNSS – asset location, masterclock sync
• EO – mission sim & prep, countermeasure
techniques to assess GNSS performance
CRUISE
ESA UNCLASSIFIED
• Satellite based Quantum Key Distribution
(telecoms, FinTech, Oil & Gas, SecDef,
diplomatic services)
• Using CubeSats to deliver cryptographic
keys & related services at a fraction of
traditional cost
• Bypasses loss experienced in ground
based optical networks, for beyond line of
sight, scalable, ubiquitous QKD
distribution
A-QKD-S
ESA UNCLASSIFIED
→ ESA Business Applications
An Introduction
ESA UNCLASSIFIED
The largest space innovation network in the
world
• The go-to place for great business
involving space to improve everyday life.
• Supporting European start-ups and SMEs
to develop businesses using space
technology and data.
• Offering funding, business and technical
support to help to generate successful
business and create jobs.
→ ESA SPACE SOLUTIONS
What ESA Business
Applications Offers
ESA UNCLASSIFIED
• Innovative services & Products that:
• Start from market demand – not
technology push
• Are focused on Business / Service
deployment, not technology R&D
• Foster utilisation of existing space
capabilities
• Avoid research and new technology
developments
• Work in close partnership with
users/customers
• Develop integrated and sustainable
services
What ESA Business Applications looks
for...
DESIRED by Customers
VIABLE & SUSTAINABLE
Service or Product
FEASIBLE Technology -
Adding value from Space
ESA UNCLASSIFIED
• Open call –Feasibility Studies or Demonstration projects, €60k - €2m+, 50% funded, zero equity funding
• Space for Tourism – FS or DP, 50% funded, closes 31/03/2022
• NHS Future Hospitals – DP, 50% funded, closes 30/09/2022
• Space4Rail – FS or DP, 50% funded, closes 31/12/2024
• Space Systems for Safety & Security - FS or DP, 50% funded, closes 31/12/2025
• Digital Supply Chain – FS or DP, 50% funded, closes 21/05/2022
• Space Applications Supporting Digital Transformation in Public Safety – DP, 50% funded, closes
01/11/2022
• Digital Transformation & the Green Economy – FS or DP, 50% funded, closes 31/10/2022
• Space & Digital Transformation for Green Energy Utilities – FS or DP, 50% funded, closes 10/06/2022
• Commercial Applications Enabled by Space Environments (CASE) - FS or DP, 50% funded, closes
~2025
Current opportunities with
ESA Business Applications
ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 62
• Use the Ambassador Network - don’t
jump in!
• Each application is reviewed on a case
by case basis
• Be clear on your innovation
• Engage with your customers
• Understand the Management
Information for Projects
• Review your competitor analysis
• Understand your risks
• Think about the RoI for UK PLC
SUBMISSION GUIDANCE
Prepare, engage, review
• Talk to your Regional Ambassador
• Register your company on EMITS
• Review the Business Model Canvas
• Refine your idea
• Explore ‘gaps’ in your knowledge
• Read the guidance notes
• Watch the presentation
• Review existing ESA Projects
• Attend an APQ Surgery or workshop
• Ask all the questions…
Thinking of applying?
ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 64
• Tens of thousands of orbital cyber
physical systems
• Communications Satellites
• Earth Observation Satellites
• Orbital Solar Farms
• Manufacturing facilities
• Cyber physical systems beyond Earth
• Moon
• Mars
• Asteroids
• Inner system
• Outer system
• Hundreds (or thousands) of Humans in
Space
• A civilization dependent on Space for
connectivity, energy, and transit
The Future Is Coming
BUSINESS
APPLICATIONS
BUSINESS
INCUBATION
TECHNOLOGY
TRANSFER
alan.cross@stfc.ac.uk
www.business.esa.int
@Space4Europe
@ESABA_NW
Thank you
Q&A
Next Meeting
• Next Meeting – Thursday 28th April 2022 | Manchester
• The Cyber Security Cluster in Manchester
• Booking details will be out soon.
• Looking for members and organisations to present - Get in
touch
For more information…

More Related Content

What's hot

Trust and identity
Trust and identityTrust and identity
Trust and identity
Jisc
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG Update
APNIC
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issues
Jisc
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
Peter Jones
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
Deploy360 Programme (Internet Society)
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
Jacqueline Fick
 
Agile resources on the open web …. a global digital library
Agile resources on the open web …. a global digital libraryAgile resources on the open web …. a global digital library
Agile resources on the open web …. a global digital library
Jisc
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
Commonwealth Telecommunications Organisation
 
Harnessing Collective Intelligence for Sustainable Development
Harnessing Collective Intelligence for Sustainable DevelopmentHarnessing Collective Intelligence for Sustainable Development
Harnessing Collective Intelligence for Sustainable Development
EDINA, University of Edinburgh
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
Cathy Dwyer
 
Finding, managing and using the right MediaHub content
Finding, managing and using the right MediaHub contentFinding, managing and using the right MediaHub content
Finding, managing and using the right MediaHub content
EDINA, University of Edinburgh
 
Sarah Jones - National approaches to data management
Sarah Jones - National approaches to data managementSarah Jones - National approaches to data management
Sarah Jones - National approaches to data management
dri_ireland
 

What's hot (12)

Trust and identity
Trust and identityTrust and identity
Trust and identity
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG Update
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issues
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Agile resources on the open web …. a global digital library
Agile resources on the open web …. a global digital libraryAgile resources on the open web …. a global digital library
Agile resources on the open web …. a global digital library
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
Harnessing Collective Intelligence for Sustainable Development
Harnessing Collective Intelligence for Sustainable DevelopmentHarnessing Collective Intelligence for Sustainable Development
Harnessing Collective Intelligence for Sustainable Development
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Finding, managing and using the right MediaHub content
Finding, managing and using the right MediaHub contentFinding, managing and using the right MediaHub content
Finding, managing and using the right MediaHub content
 
Sarah Jones - National approaches to data management
Sarah Jones - National approaches to data managementSarah Jones - National approaches to data management
Sarah Jones - National approaches to data management
 

Similar to NWCSC March 2022 event.pptx

NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
Cyber Security Partners
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
Amazon Web Services
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
IISPEastMids
 
The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
Leandro Ciuffo
 
CD Winter 2017 - Main Slides
CD Winter 2017 - Main SlidesCD Winter 2017 - Main Slides
CD Winter 2017 - Main Slides
Comit Projects Ltd
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentation
maytaldahan
 
Building digital capability and digital experience insights community event
Building digital capability and digital experience insights community eventBuilding digital capability and digital experience insights community event
Building digital capability and digital experience insights community event
Jisc
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
Introduction wbl presentatrion april 2015
Introduction  wbl presentatrion april 2015Introduction  wbl presentatrion april 2015
Introduction wbl presentatrion april 2015
Jane Mackenzie
 
Digital Capability: How digitally capable are we?
Digital Capability: How digitally capable are we?Digital Capability: How digitally capable are we?
Digital Capability: How digitally capable are we?
BlackboardEMEA
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
IISPEastMids
 
Student experience experts group meet up, April 2020
Student experience experts group meet up, April 2020Student experience experts group meet up, April 2020
Student experience experts group meet up, April 2020
Jisc
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
KevinAlt1
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
KTN
 
Building Successful API Programs in Higher Education
Building Successful API Programs in Higher EducationBuilding Successful API Programs in Higher Education
Building Successful API Programs in Higher Education
3scale
 
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
National Information Standards Organization (NISO)
 
Kansas State University UC Showcase
Kansas State University UC ShowcaseKansas State University UC Showcase
Kansas State University UC Showcase
nado-web
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
IISPEastMids
 
The DATALAB - building a world-class innovation centre in data science
The DATALAB - building a world-class innovation centre in data scienceThe DATALAB - building a world-class innovation centre in data science
The DATALAB - building a world-class innovation centre in data science
University of Glasgow Research Strategy & Innovation Office
 
Digital Capability Training for University Staff Developing a Framework
Digital Capability Training for University Staff Developing a FrameworkDigital Capability Training for University Staff Developing a Framework
Digital Capability Training for University Staff Developing a Framework
Good Things Foundation
 

Similar to NWCSC March 2022 event.pptx (20)

NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
 
CD Winter 2017 - Main Slides
CD Winter 2017 - Main SlidesCD Winter 2017 - Main Slides
CD Winter 2017 - Main Slides
 
SGCI HICSS50 Presentation
SGCI HICSS50 PresentationSGCI HICSS50 Presentation
SGCI HICSS50 Presentation
 
Building digital capability and digital experience insights community event
Building digital capability and digital experience insights community eventBuilding digital capability and digital experience insights community event
Building digital capability and digital experience insights community event
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Introduction wbl presentatrion april 2015
Introduction  wbl presentatrion april 2015Introduction  wbl presentatrion april 2015
Introduction wbl presentatrion april 2015
 
Digital Capability: How digitally capable are we?
Digital Capability: How digitally capable are we?Digital Capability: How digitally capable are we?
Digital Capability: How digitally capable are we?
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
Student experience experts group meet up, April 2020
Student experience experts group meet up, April 2020Student experience experts group meet up, April 2020
Student experience experts group meet up, April 2020
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
 
Building Successful API Programs in Higher Education
Building Successful API Programs in Higher EducationBuilding Successful API Programs in Higher Education
Building Successful API Programs in Higher Education
 
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
August 12 NISO Webinar: MOOCs and Libraries: A Brewing Collaboration.
 
Kansas State University UC Showcase
Kansas State University UC ShowcaseKansas State University UC Showcase
Kansas State University UC Showcase
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
The DATALAB - building a world-class innovation centre in data science
The DATALAB - building a world-class innovation centre in data scienceThe DATALAB - building a world-class innovation centre in data science
The DATALAB - building a world-class innovation centre in data science
 
Digital Capability Training for University Staff Developing a Framework
Digital Capability Training for University Staff Developing a FrameworkDigital Capability Training for University Staff Developing a Framework
Digital Capability Training for University Staff Developing a Framework
 

More from Cyber Security Partners

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
Cyber Security Partners
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
Cyber Security Partners
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
Cyber Security Partners
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
Cyber Security Partners
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Cyber Security Partners
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
Cyber Security Partners
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
Cyber Security Partners
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
Cyber Security Partners
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
Cyber Security Partners
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist
Cyber Security Partners
 

More from Cyber Security Partners (10)

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

NWCSC March 2022 event.pptx

  • 1. North West Cyber Security Cluster Thursday 24th March 2022
  • 2. Event Structure 09:00 - Networking and Refreshments 09:30 - North West Cyber Security Cluster – Overview, aims and objectives 09:45 - Bob Askwith from Liverpool John Moores University 10:10 - James Bedford from Digital Tech Cluster (Sci-Tech Daresbury) 10:30 - Alan Cross from Science and Technology Facilities Council (STFC) 10:50 – Q&A 11:00 - Finish with networking
  • 3. NWCSC Overview, Aims and Objectives Robert Briggs Cluster Lead
  • 4. Background North West Cyber Security Cluster • Launched 2014 • Originally ‘Pay subscription model’ • Held large events previously • Relaunch January 2021 • Free membership • Virtual presentations and roundtables during national and local lockdowns
  • 5. UKC3 UK Cyber Cluster Collaboration (https://ukc3.co.uk/) • Launched June 2021 • Funded by DCMS • Represents all clusters across the country • Co-ordinated approach to governance, investment and funding
  • 6. UK Cyber Market • UK Cyber Market - £10.1bn – Up 14% Source: Perspective Economics
  • 7. Cluster Reach 339 Active Offices • Registered Offices • Trading Offices Source: Perspective Economics
  • 8. Aims • Grow North West share of UK cyber market • Support UK initiatives in the region and indirectly across the country. • Encourage people to skill up and train in Cyber to fill current and projected skills gap.
  • 9. North West - major investments • Cyber Corridor • National Cyber Force – Samlesbury – 3,000 positions • GCHQ – Manchester - - 3,000 positions
  • 10. Objectives The North West Cyber Security Cluster want to represent and support cyber security professionals, experts and organisations from the cyber security and IT industry across Lancashire / Cumbria, Manchester, Liverpool City Region and Cheshire. Our objectives are to: • Provide collaboration, support and networking opportunities for SMEs and start-ups in the technology and cyber security sector. • Educate the local community of businesses and individuals around cyber security. • Work with public sector bodies, including academia, to ensure that the pertinent information is captured and distributed to local organisations
  • 11. Greater Manchester Cheshire Liverpool City Region Lancashire / Cumbria NWCSC • Quarterly Cluster Wide meetings - rotating • Regional local meetings • Monthly or • Quarterly Encourage more localised meetings and enable flexible running
  • 12. Cyber Security at LJMU Bob Askwith Liverpool John Moores University
  • 13. NWCSC Launch Meeting 24.3.2022 Cyber Security @ Liverpool JMU Dr Bob Askwith Subject Head (Security/Forensics) School of Computer Science and Mathematics Liverpool John Moores University R.J.Askwith@ljmu.ac.uk
  • 14.
  • 15. School of Computer Science @ LJMU The School of Computer Science & Mathematics is one of three schools in the Faculty of Engineering and Technology • 60+ academic staff, incl. 11 in the Security group • Approximately 1200 students, incl. 170+ studying Security • Over 60 PhD students • We are a highly research active School • Several dedicated computing labs • Computer Forensics & Security lab • Isolated from Internet • Private Cloud service for building security experiments
  • 16. Undergraduate BSc Programmes • Computer Science • Computing • Software Engineering • Mathematics • Mathematics with Finance • Computer Games Development • Computing Forensics • Computer Security • Approx. 150 students across all years (inc. foundation year and placement) • Delivered since 2010-11
  • 17. BSc Computer Security Year 1 Intro to Programming Computer Systems Intro Security/Forensics Web Dev. & Internet Problem Solving for Security Professional Practice Year 2 Database Systems Operating Systems Info. Security Management Secure Software Dev. Pen Testing Group Project Year 3 Ethical Hacking Network Defence Network Forensics Applied Cryptography Dissertation Project
  • 18. Curriculum Approach • We are a School of Computer Science! • Our Computing programmes are all Computer Science programmes • Core base of general computer science (programming, databases, networks) • Specialism in cyber security • Moves from more general (33% in Year 1) to more focused (100% in Year 3) • Scientific approach, Engineering ethos, Technology emphasis • Evolve in step with widely known Cyber Security curricula • Cyber Security Body of Knowledge (CyBOK) https://www.cybok.org/ • National Cyber Security Centre certified degree scheme https://www.ncsc.gov.uk/information/ncsc-certified-degrees (We have not sought NCSC accreditation. We do have BCS.)
  • 19. Placement or ‘Sandwich’ Year • 4-year sandwich undergraduate BSc (Hons) • Year-long industry placement • Preparation during Year 1 and 2: • Year 1: Professional Practice (career and personal development) • Year 2: Group Project (teamwork, research, planning) • Individual support from personal tutors • Employability support • Placements are paid positions (exceptions for charitable orgs) • There is a well-established network of 600+ employers
  • 21. Student Engagement Barclays Technology Challenge ROQ Software Challenge Champions: LJMU
  • 22. Postgraduate Study @ LJMU • MSc Cyber Security • Aimed at STEM graduates but primarily Computer Science • Structure • Semester 1: Computer Security, Information Security Management, Research Methods • Semester 2: Ethical Hacking, Secure Systems, Cryptography • Semester 3: Research Dissertation • Currently 21 enrolled • Delivered since 2015-16 • As with UG, we have ‘aligned’ with NCSC subject criteria • PhD by research • Cyber Security • AI / Data Science / Machine Learning • …
  • 23. Summary • LJMU has a team of 11 academics delivering Cyber Security teaching and research, within a school of 60+ academics in C.Sci & Math • LJMU supports the development NW talent pool of computer science and Cyber Security • 150 undergraduates in security & 20+ MSc • Over 1000 undergraduates in computing subjects • LJMU supports with regional business • Placements opportunities for undergraduates • Networking and alumni opportunities • Research and knowledge transfer
  • 25. Q&A
  • 26. How does the Digital Tech Cluster help tech start-ups and scale-ups? James Bedford Digital Tech Cluster (Sci-Tech Daresbury)
  • 27. Digital Tech Cluster at Sci- Tech Daresbury
  • 28. How does the Digital Tech Cluster help tech start-ups and scale-ups?
  • 29. Digital Tech Cluster Overview Environment for growth • Business support to help tech entrepreneurs grow their business • Advanced digital training for staff provided by the Hartree Centre • Collaboration programme for tech start-ups and scale-ups to coordinate partnerships with the wider non-tech economy • Spin-out support • Halton Digital Bootcamp Programme • Investor Network Community • Peer-to-peer learning • Newsletter and website with member directory
  • 30. Digital Tech Companies • The cluster is designed to support start-up and scale-up digital tech companies • Software not hardware • Product not services • Fast-growing and scaleable • Innovative • This is the focus, not criteria for entry • Cyber-security SMEs are very welcome
  • 31. Envt for Growth - Business Support • Supporting the leaders of digital tech companies to grow rapidly • Coordinated with other business support • Online means wider audience, part of marketing Daresbury • Wide package of support including workshops and content: • Investment-readiness workshops • Intellectual property • Finance and metrics • Accessing international markets 2 workshops and 2 meetups already this year with 20-25 more planned.
  • 32. Envt for Growth – Digital Training • Delivered through the Hartree Centre, National Centre for Digital Innovation • Cutting edge training for tech teams • Support for tech staff of digital tech companies, helps with upskilling and retention
  • 33. Envt for Growth - Collaboration Programme • Why? • Solving problems for tech companies • Solving problems for wider economy • How will it operate? • Digital transformation – corporate accelerators • Find problems, understand tech and cultural barriers • Identify solutions and facilitate iterations and ongoing support • Link with Daresbury assets and expertise e.g Hartree • Outcomes • New customers and new innovations • New jobs, GVA and sustainable future
  • 34. Community • CTO Meetups • Peer-to-peer learning • 8 times a year • Hartree link • Membership • Make cluster more official • Benefits package • Newsletter and website • Opportunity to sign-post • Membership directory • Share activity of the cluster
  • 35. How can cyber-security SMEs get involved? • Lots of online workshops you may be interested in as you grow • Written content around cyber-security, can you be involved? • CTO Meetups may be of interest to CTOs in cyber-security • CTO Meetup focussed on cyber-security • Best way to connect is via the newsletter • Via Twitter (see pinned tweet) @jamesbedford140 • James.Bedford@stfc.ac.uk
  • 36. Q&A
  • 37. Cyber Security and Space Alan Cross Science and Technology Facilities Council (STFC)
  • 38. ESA UNCLASSIFIED → Cybersecurity and Space Alan Cross ESA Business Applications Ambassador
  • 39. ESA UNCLASSIFIED Global Navigation Satellite Systems (GNSS) Satellite Communication Satellite Imagery (aka Earth Observation/Remote Sensing ) Space Weather Microgravity & the Space Environment
  • 40. ESA UNCLASSIFIED Global Navigation Satellite Systems (GNSS) • Navigation & route optimisation • Worldwide geolocation and timestamping • Integrity marker for blockchain • Master clock synchronisation Satellites 101 • Sometimes (inaccurately) called ‘GPS’, or ‘SatNav’ • Global coverage: GPS (USA), GLONASS (Russia), BeiDou (China), Galileo (EU) • Regional coverage: NavIC (India), QZSS (Japan), plus multiple ‘SBAS’ • Atomic clocks sending ultra-precise timing signals • Multiple satellites across multiple constellations • GNSS devices calculate their position based on minimum 4 signals Applications:
  • 41. ESA UNCLASSIFIED • Global access to data & services • Back-up for terrestrial communications • Improved security and integrity • High-speed, low latency internet for remote areas • Dedicated IoT solutions Satellites 101 Satellite Communications (SatComms) Applications:
  • 43. ESA UNCLASSIFIED • Monitoring of land & marine parameters • Infrastructure/asset monitoring (>30cm resolution) • Change detection over time • Real-time weather & climate mapping Satellites 101 Earth Observation (EO) Applications: Passive: • Panchromatic – Hi-res, broad spectra, optical & near-IR • Multi-spectral – lo-res, narrow spectra, IR, UV, microwave • Pan-sharpened – combines spectral res & spatial res • Hyper-spectral – continuous spectra (not multiple narrow bands) • Microwave Radiometry – atmospheric water vapour Active: • Synthetic Aperture Radar • Ship detection, oil spills, infrastructure monitoring, etc • Radar Altimetry • Millimetric surface topography • Lidar • Monitoring glacial loss, winds, atmospheric aerosols, etc
  • 44. ESA UNCLASSIFIED Global Navigation Satellite Systems (GNSS) Satellite Communication Satellite Imagery (aka Earth Observation/Remote Sensing ) • Positioning (cm accuracy) • Timing (nanosecond accuracy) • Navigation • Reflectometry useful for wide swath altimetry, seawater salinity, ice- layer density • Ubiquitous connectivity • ‘Bent pipes’ + mesh networks • High bandwidth options • Low bandwidth/power IoT • Low latency (LEO + MEO) • ‘Eyes on’, anywhere on Earth • >30cm spatial resolution • Multiple spectra + techniques • Passive (‘seeing’) • Active (‘texture’ + topography) • Change detection over time Satellites (In A Nutshell)
  • 45. ESA UNCLASSIFIED → ESA Business Applications Case Studies
  • 46. ESA UNCLASSIFIED • Global shipping is vulnerable to GNSS & AIS spoofing/jamming, both on board & on shore, impacting tracking & analysis • Legacy ships with internet access often weakest link in security chain • End-to-end security for shipping industry, taking into account satellite links, securely collecting data on board & transmitting safely to shore for storage & analysis ARCAmarine
  • 47. ESA UNCLASSIFIED • A CyberSec Test Range, Grottaglie Airport • Defence against hardware attacks, wireless attacks, and spoofing • Satcom – Beyond line of sight, UAS command & control, payload coms • GNSS – asset location, masterclock sync • EO – mission sim & prep, countermeasure techniques to assess GNSS performance CRUISE
  • 48. ESA UNCLASSIFIED • Satellite based Quantum Key Distribution (telecoms, FinTech, Oil & Gas, SecDef, diplomatic services) • Using CubeSats to deliver cryptographic keys & related services at a fraction of traditional cost • Bypasses loss experienced in ground based optical networks, for beyond line of sight, scalable, ubiquitous QKD distribution A-QKD-S
  • 49. ESA UNCLASSIFIED → ESA Business Applications An Introduction
  • 50. ESA UNCLASSIFIED The largest space innovation network in the world • The go-to place for great business involving space to improve everyday life. • Supporting European start-ups and SMEs to develop businesses using space technology and data. • Offering funding, business and technical support to help to generate successful business and create jobs. → ESA SPACE SOLUTIONS
  • 52. ESA UNCLASSIFIED • Innovative services & Products that: • Start from market demand – not technology push • Are focused on Business / Service deployment, not technology R&D • Foster utilisation of existing space capabilities • Avoid research and new technology developments • Work in close partnership with users/customers • Develop integrated and sustainable services What ESA Business Applications looks for... DESIRED by Customers VIABLE & SUSTAINABLE Service or Product FEASIBLE Technology - Adding value from Space
  • 53. ESA UNCLASSIFIED • Open call –Feasibility Studies or Demonstration projects, €60k - €2m+, 50% funded, zero equity funding • Space for Tourism – FS or DP, 50% funded, closes 31/03/2022 • NHS Future Hospitals – DP, 50% funded, closes 30/09/2022 • Space4Rail – FS or DP, 50% funded, closes 31/12/2024 • Space Systems for Safety & Security - FS or DP, 50% funded, closes 31/12/2025 • Digital Supply Chain – FS or DP, 50% funded, closes 21/05/2022 • Space Applications Supporting Digital Transformation in Public Safety – DP, 50% funded, closes 01/11/2022 • Digital Transformation & the Green Economy – FS or DP, 50% funded, closes 31/10/2022 • Space & Digital Transformation for Green Energy Utilities – FS or DP, 50% funded, closes 10/06/2022 • Commercial Applications Enabled by Space Environments (CASE) - FS or DP, 50% funded, closes ~2025 Current opportunities with ESA Business Applications
  • 54. ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 62 • Use the Ambassador Network - don’t jump in! • Each application is reviewed on a case by case basis • Be clear on your innovation • Engage with your customers • Understand the Management Information for Projects • Review your competitor analysis • Understand your risks • Think about the RoI for UK PLC SUBMISSION GUIDANCE
  • 55. Prepare, engage, review • Talk to your Regional Ambassador • Register your company on EMITS • Review the Business Model Canvas • Refine your idea • Explore ‘gaps’ in your knowledge • Read the guidance notes • Watch the presentation • Review existing ESA Projects • Attend an APQ Surgery or workshop • Ask all the questions… Thinking of applying?
  • 56. ESA UNCLASSIFIED ESA | 01/01/2016 | Slide 64 • Tens of thousands of orbital cyber physical systems • Communications Satellites • Earth Observation Satellites • Orbital Solar Farms • Manufacturing facilities • Cyber physical systems beyond Earth • Moon • Mars • Asteroids • Inner system • Outer system • Hundreds (or thousands) of Humans in Space • A civilization dependent on Space for connectivity, energy, and transit The Future Is Coming
  • 58. Q&A
  • 59. Next Meeting • Next Meeting – Thursday 28th April 2022 | Manchester • The Cyber Security Cluster in Manchester • Booking details will be out soon. • Looking for members and organisations to present - Get in touch

Editor's Notes

  1. bahnschrift
  2. Introduce myself
  3. Interested Less interested in hearing from experts Very interested in learning from peers Top topics are Scaling software, scaling team, dealing with CEOs, board and investors Size: 6-10 people Times: before or after work or lunchtime. Online always.
  4. Short term – no funding Longer Term - requires some funding and long term partnerships
  5. Tech companies need customers They struggle to pilot new products They struggle to understand non-digital companies and large companies Industry knows it needs to utilise technology better but struggles to understand Hard to work with digital sector because made up of so many small companies Difficult to understand what is good and Risk of buying the wrong solution too big Corporate accelerator but different because work with multiple companies Facilitate relationship between tech companies and customers Link with Daresbury assets – Hartree due diligence role which could lead to work - diffusion effects of being around commercialised technology on R+D - utilising different spaces from collaboration space, to event space and basing themselves here Increased revenue New jobs Valuable feedback on products New innovations for non-tech companies Increased efficiencies Increased revenue Safeguarded jobs Sustainable future
  6. Tech companies need customers They struggle to pilot new products They struggle to understand non-digital companies and large companies Industry knows it needs to utilise technology better but struggles to understand Hard to work with digital sector because made up of so many small companies Difficult to understand what is good and Risk of buying the wrong solution too big Corporate accelerator but different because work with multiple companies Facilitate relationship between tech companies and customers Link with Daresbury assets – Hartree due diligence role which could lead to work - diffusion effects of being around commercialised technology on R+D - utilising different spaces from collaboration space, to event space and basing themselves here Increased revenue New jobs Valuable feedback on products New innovations for non-tech companies Increased efficiencies Increased revenue Safeguarded jobs Sustainable future
  7. Tech companies need customers They struggle to pilot new products They struggle to understand non-digital companies and large companies Industry knows it needs to utilise technology better but struggles to understand Hard to work with digital sector because made up of so many small companies Difficult to understand what is good and Risk of buying the wrong solution too big Corporate accelerator but different because work with multiple companies Facilitate relationship between tech companies and customers Link with Daresbury assets – Hartree due diligence role which could lead to work - diffusion effects of being around commercialised technology on R+D - utilising different spaces from collaboration space, to event space and basing themselves here Increased revenue New jobs Valuable feedback on products New innovations for non-tech companies Increased efficiencies Increased revenue Safeguarded jobs Sustainable future
  8. Investment Collaboration with customers Living Lab
  9. Investment Collaboration with customers Living Lab