The NCSC Cyber Accelerator is a collaboration between the UK Government Department for Digital, Culture, Media and Sport (DCMS), the Government Communications Headquarters (GCHQ), and Wayra UK, part of Telefónica Open Future_.
We are looking for companies who are using novel techniques to solve real problems, and whose products could be applied in a cyber security context – for any customers, from individuals at home to the world’s biggest companies.
We also want next-generation solutions that are faster, better and cheaper than existing products. However, they must solve a known problem – we are not looking for research proposals, but ideas that make a difference now.
We have provided some indicative challenges to aid understanding of the things we are looking for – but this is not an exhaustive list – and we have roughly categorised them into three overlapping strands: Data, People, Technology.
NCSC has a specific set of objectives around minimising the risk of child sexual exploitation and we ask that you also consider this specific context when considering the challenges below.
Develop next generation data mining tools based on behavioural analytics, mathematical modelling or other techniques.
The tools should enable the analysis of network activity to detect, monitor, investigate and respond to cyber attacks, including tracing their origin and determining the tools and methods used to enact them.
They should provide simple visual representations that operate over entire networks, allowing people to rapidly and interactively perform investigations, share knowledge gained, and work with others in the community.
The topic includes generic approaches to the study of and detection of malware or other indicators of compromise, as well as mechanisms to predict attacks. It also includes knowledge management and visualisation.
Develop tools to make it easy for anyone to be secure online, whilst minimising opportunities for cyber attackers.
This could include ways to assist software developers and network designers to produce highly secure solutions even when re-using the work of others, or to improve the take-up of Cyber Essentials.
Mechanisms to reduce the effectiveness of attackers with significant resources are also welcome, as are tools that will reduce the risk that people face from the aggregation of all of their internet activity.
This topic also includes training packages.
Develop new tools and prototypes that enhance or enable security on existing devices, including those containing potentially insecure third-party applications. A specific and pressing need here is tools that enable (trusted) understanding of the totality of devices that are present on the entire network.
Solutions might include mechanisms that enable the use of cloud technology for highly secure data storage or processing. Secure document readers would fall into this category, as would tools that reliably automate resource intensive or complex processes.
The programme will invest in and accelerate start-ups tackling engineering challenges across selected focus areas: