NCSC Cyber Accelerator 

Developing the UK’s Cyber Security Ecosystem through accelerating innovative start-ups

What is NCSC Cyber Accelerator?

The NCSC Cyber Accelerator is a collaboration between the UK Government Department for Digital, Culture, Media and Sport (DCMS), the Government Communications Headquarters (GCHQ), and Wayra UK, part of Telefónica Open Future_.

We are looking for companies who are using novel techniques to solve real problems, and whose products could be applied in a cyber security context – for any customers, from individuals at home to the world’s biggest companies.

We also want next-generation solutions that are faster, better and cheaper than existing products. However, they must solve a known problem – we are not looking for research proposals, but ideas that make a difference now.


We have provided some indicative challenges to aid understanding of the things we are looking for – but this is not an exhaustive list – and we have roughly categorised them into three overlapping strands: Data, People, Technology.

NCSC has a specific set of objectives around minimising the risk of child sexual exploitation and we ask that you also consider this specific context when considering the challenges below.


What we offer

£25,000 grant

Access to a dedicated accelerator facility

Extensive acceleration services

Access to NCSC and Telefónica cyber experts

Our investor network

Telefónica business development

GET in touch

Data

Develop next generation data mining tools based on behavioural analytics, mathematical modelling or other techniques.

The tools should enable the analysis of network activity to detect, monitor, investigate and respond to cyber attacks, including tracing their origin and determining the tools and methods used to enact them.

They should provide simple visual representations that operate over entire networks, allowing people to rapidly and interactively perform investigations, share knowledge gained, and work with others in the community.

The topic includes generic approaches to the study of and detection of malware or other indicators of compromise, as well as mechanisms to predict attacks. It also includes knowledge management and visualisation.

IMPORT TRANSFORMATION AND VERIFICATION
BEYOND ANTI-VIRUS
DATA SHARING
AUDIT AND MONITORING
ENTERPRISE DATA DISCOVERY
DATA PROCESSING
No items found.

People

Develop tools to make it easy for anyone to be secure online, whilst minimising opportunities for cyber attackers.

This could include ways to assist software developers and network designers to produce highly secure solutions even when re-using the work of others, or to improve the take-up of Cyber Essentials.

Mechanisms to reduce the effectiveness of attackers with significant resources are also welcome, as are tools that will reduce the risk that people face from the aggregation of all of their internet activity.

This topic also includes training packages.


AUTHENTICATION
OUT-OF-THE-BOX SOLUTIONS FOR THE VULNERABLE
NOT ALL ANIMALS ARE EQUAL
GETTING THE BOARD TO ‘GET IT’
MAKING IT EASIER TO BE SECURE
IDENTIFYING ‘THE GOOD’
GDPR READINESS
IMPROVED TAKE UP OF CYBER ESSENTIALS AND INCREMENTAL IMPROVEMENTS

Companies

Technology

Develop new tools and prototypes that enhance or enable security on existing devices, including those containing potentially insecure third-party applications. A specific and pressing need here is tools that enable (trusted) understanding of the totality of devices that are present on the entire network.

Solutions might include mechanisms that enable the use of cloud technology for highly secure data storage or processing. Secure document readers would fall into this category, as would tools that reliably automate resource intensive or complex processes.

FASTER FORENSICS
EMBEDDED DEVICE FORENSICS
LAST GENERATION MANAGEMENT
NEXT GENERATION MANAGEMENT OF ‘SECRETS’
MANAGING THIRD-PARTY DEPENDENCIES / CONTINUOUS INTEGRATION PIPELINES
CONFIDENCE IN CLOUD SERVICES
BELIEVABLE ATTESTATION

Areas of Interest

The programme will invest in and accelerate start-ups tackling engineering challenges across selected focus areas:

No items found.
No items found.

FAQs

Q, WHERE WILL THE PROGRAMME BE BASED?
Q, WHY IS WAYRA UK SUITED TO HELP NCSC?
Q, WHY IS WAYRA UK SUITED TO HELP NCSC?
Q, HOW DOES THE ACCELERATOR RELATE TO THE WORK OF THE NATIONAL CYBER SECURITY CENTRE?
Q, HOW WAS WAYRA SELECTED?
Q, WHO IS WAYRA?
Q, WILL THE COMPANIES BE INVITED TO WORK WITH NCSC?
Q, WHAT WILL NCSC OFFER AFTER THE PROGRAMME IN TERMS OF SUPPORT?
Q, WHAT HAPPENS AFTER THE PROGRAMME ENDS?
Q, WHAT FACILITIES ARE MADE AVAILABLE WITHIN THE ACCELERATOR FACILITY?
Q, ARE THE COMPANIES EFFECTIVELY WORKING FOR NCSC/GCHQ?
Q, ARE THERE ANY RESTRICTIONS ON THE TYPE OF COMPANIES WHO CAN APPLY?
Q, ARE THE COMPANIES REQUIRED TO LICENCE OR TRANSFER ANY OF THEIR INTELLECTUAL PROPERTY TO NCSC OR WAYRA?
Q, WILL NCSC AND/OR WAYRA UK TAKE ANY EQUITY IN THE COMPANIES?
Q, WHAT FUNDING DO COMPANIES RECEIVE THROUGH THE PROGRAMME?
Q, HOW LONG IS THE PROGRAMME?
Q, HOW ARE THE COMPANIES CHOSEN?
Q, WHY IS NCSC RUNNING AN ACCELERATOR?