SlideShare a Scribd company logo
Stephen Rhodes
Assistant Director, Cyber Security
Digital Economy Unit
UK Cyber Security Strategy
Our vision
Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and
secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and
the rule of law, enhance prosperity, national security and a strong society.
Our objectives
Objective 1:
The UK to tackle cyber crime
and be one of the most secure
places in the world to do
business in cyberspace
Objective 2:
The UK to be more resilient to
cyber attacks and better able to
protect our interests in
cyberspace
Objective 3:
The UK to have helped shape
an open, stable and vibrant
cyberspace which the UK public
can use safely and that
supports open societies
Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber
security objectives
BIS CYBER ACTIVITIES
• Raising business awareness of the threats (and
opportunities) through guidance, campaigns and annual
breaches survey
• Encouraging action on cyber security by business (e.g.
Cyber Essentials)
• Strengthening UK’s cyber security skills
• Strengthening UK’s cyber security research and innovation
capability
• Supporting growth of the UK cyber security sector
• Delivered in partnership with other departments, agencies
and external partners, funded by National Cyber Security
Programme
Cyber security sector growth agenda
• The cyber security industry in the UK is worth £6 billion and
employs around 40,000 people
• UK Cyber security exports in 2013 were £1040M (up 22%
from 2012’s £850M. On track to reach the Government
target of £2 billion by 2016.
• Cyber Growth Partnership (CGP) - joint initiative between
industry, academia and government, aimed at boosting the
UK’s global market position in cyber security products and
services.
Cyber Growth Partnership
• Main government-industry body for growing the cyber
security sector. Co-chaired by a government Minister and
CEO of BT.
• Industry led activities
• Emphasis on exporting: identifying target markets for
special attention (currently USA, Saudi, Malaysia, Qatar);
Best of British consortia development
• Supplier to Government Scheme.
• Export Risk Guidance
• Cyber showcase facility
CYBER GROWTH PARTNERSHIP
• SME Growth Projects announced last September.
• The appointment of a cluster development
representative who will provide support and
guidance to help establish cyber clusters in areas
of the UK where there is a concentration of cyber
businesses, drawing on the success of the
Malvern cluster.
• Cyber Connect UK
CYBER CONNECT UK
• Identify and Map all Cyber Companies in the UK
• Cyber Connect Portal: www.techuk.org/cyber-connect-uk
• "Access to Finance" Events
• Conduct Industry Consultation Exercise
• Help UKTI Plan cyber missions to priority markets
• Business Acceleration Clinics
• Deliver Large Business Open Innovation Events
• Provide Guidance on Small Business Collaboration
Vehicles
• Contact: Andy Williams
(andy.williams@techuk.org)
Innovation Vouchers
• A scheme for SMEs run by Innovate UK (formerly
TSB) designed to encourage business to get
outside expertise to enable them to grow.
• Vouchers available to enable business to receive
up to £5,000 of advice to improve their cyber
security.
• Vouchers allocated through a series of ‘calls’.
• Announced on Innovate UK website.
Cyber Security Standard
• What does good cyber security
look like?
• Core actions necessary to
mitigate majority of cyber
threats.
• 5 key controls: Boundary
firewalls and Internet gateways;
secure configuration; access
control; malware protection;
patch management
• Demonstrates cyber credentials
to capitalise on opportunities
• Accreditation needed for certain
government contracts
THANK YOU
ANY QUESTIONS?

More Related Content

PPTX
IISP Sept 2014 presentation
PPTX
Insider threat event presentation
PDF
How to avoid becoming the next victim of ransomware
PPTX
5 introduction to geant
PDF
KTN funding opportunities & networking events
PPTX
Vodafone security priorities in Greece
PDF
Cyber Academic Startup Accelerator Programme
PDF
dcb1222 - Feature3
IISP Sept 2014 presentation
Insider threat event presentation
How to avoid becoming the next victim of ransomware
5 introduction to geant
KTN funding opportunities & networking events
Vodafone security priorities in Greece
Cyber Academic Startup Accelerator Programme
dcb1222 - Feature3

What's hot (20)

PPTX
An overview of the Joint Security and Resilience Centre
PPTX
About patent
PDF
160317 japan m2m_alliance_v01
PDF
[CB20] Alliance power for Cyber Security by Kenneth Geers
PDF
Bb20151019 trusted cloud-rennes-final
PDF
Quixoticity index slides 6 9-18
PPTX
The WISER Project at a glance
PPTX
CDE - Innovation Network Event - 17 Nov 2016
PPTX
Introduction to the Centre for Defence Enterprise and introducing the Defence...
PPT
It4 ccommunityi tresources
PPT
CTO-Cybersecurity-Forum-2010-Peter Burnett
PDF
uk-cyber-security-strategy-final-2
PPTX
Expand your professional network with iabc 2016 v2
PPTX
CTO-CyberSecurityForum-2010-Philip Victor
PPTX
Workshop overview
PPTX
APT PRFP 11: CERTs
PDF
Mediai Friday News Round-Up - W/E Dec 4, 2015
PDF
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
PPTX
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
PDF
The effects of video surveillance - what does the research say?
An overview of the Joint Security and Resilience Centre
About patent
160317 japan m2m_alliance_v01
[CB20] Alliance power for Cyber Security by Kenneth Geers
Bb20151019 trusted cloud-rennes-final
Quixoticity index slides 6 9-18
The WISER Project at a glance
CDE - Innovation Network Event - 17 Nov 2016
Introduction to the Centre for Defence Enterprise and introducing the Defence...
It4 ccommunityi tresources
CTO-Cybersecurity-Forum-2010-Peter Burnett
uk-cyber-security-strategy-final-2
Expand your professional network with iabc 2016 v2
CTO-CyberSecurityForum-2010-Philip Victor
Workshop overview
APT PRFP 11: CERTs
Mediai Friday News Round-Up - W/E Dec 4, 2015
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
The effects of video surveillance - what does the research say?
Ad

Similar to Solent Cyber Security Cluster 2, BIS presentation (20)

PDF
Cyber Security For Businesses
PPTX
Keeping your business safe online cosy club
PDF
dcb1203CyberNDI
PPTX
TPC_Presentation - Copy.pptx
PDF
The UK National Cyber Security Strategy
PDF
Cybersecurity Threats - NI Business Continuity Forum
PDF
Digital Energy 2018 Day 2
PDF
Future-proof your business - West Sussex Recover & Rise S4W2
PPTX
TPC_Presentation.pptx
PDF
awareness.pdf
PDF
Scot Secure 2018
PPTX
Master tech uk’s cyber security programme ghm update
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PPTX
Retail Excellence Ireland - Cyber Threats 2015 Overview
PPTX
Cyber Threat Overview for Euro IT counsel
PPTX
Cyber - it's all now a matter of time!
PDF
Cyber_Security_Awareness_Presentation.pdf
PPTX
Cyber_Security_Awareness_Presentation (1).pptx
PPTX
Cyber_Security_Awareness_Presentation.pptx
PPTX
Cyber_Security_Awareness_Presentation.pptx
Cyber Security For Businesses
Keeping your business safe online cosy club
dcb1203CyberNDI
TPC_Presentation - Copy.pptx
The UK National Cyber Security Strategy
Cybersecurity Threats - NI Business Continuity Forum
Digital Energy 2018 Day 2
Future-proof your business - West Sussex Recover & Rise S4W2
TPC_Presentation.pptx
awareness.pdf
Scot Secure 2018
Master tech uk’s cyber security programme ghm update
CRI "Lessons From The Front Lines" March 26th Dublin
Retail Excellence Ireland - Cyber Threats 2015 Overview
Cyber Threat Overview for Euro IT counsel
Cyber - it's all now a matter of time!
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Approach and Philosophy of On baking technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Chapter 5: Probability Theory and Statistics
NewMind AI Weekly Chronicles - August'25-Week II
Web App vs Mobile App What Should You Build First.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Heart disease approach using modified random forest and particle swarm optimi...
MIND Revenue Release Quarter 2 2025 Press Release
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
WOOl fibre morphology and structure.pdf for textiles
Approach and Philosophy of On baking technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
Encapsulation_ Review paper, used for researhc scholars
Accuracy of neural networks in brain wave diagnosis of schizophrenia
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
Chapter 5: Probability Theory and Statistics

Solent Cyber Security Cluster 2, BIS presentation

  • 1. Stephen Rhodes Assistant Director, Cyber Security Digital Economy Unit
  • 2. UK Cyber Security Strategy Our vision Our vision is for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and secure cyberspace, where our actions, guided by our core values of liberty, fairness, transparency and the rule of law, enhance prosperity, national security and a strong society. Our objectives Objective 1: The UK to tackle cyber crime and be one of the most secure places in the world to do business in cyberspace Objective 2: The UK to be more resilient to cyber attacks and better able to protect our interests in cyberspace Objective 3: The UK to have helped shape an open, stable and vibrant cyberspace which the UK public can use safely and that supports open societies Objective 4: The UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber security objectives
  • 3. BIS CYBER ACTIVITIES • Raising business awareness of the threats (and opportunities) through guidance, campaigns and annual breaches survey • Encouraging action on cyber security by business (e.g. Cyber Essentials) • Strengthening UK’s cyber security skills • Strengthening UK’s cyber security research and innovation capability • Supporting growth of the UK cyber security sector • Delivered in partnership with other departments, agencies and external partners, funded by National Cyber Security Programme
  • 4. Cyber security sector growth agenda • The cyber security industry in the UK is worth £6 billion and employs around 40,000 people • UK Cyber security exports in 2013 were £1040M (up 22% from 2012’s £850M. On track to reach the Government target of £2 billion by 2016. • Cyber Growth Partnership (CGP) - joint initiative between industry, academia and government, aimed at boosting the UK’s global market position in cyber security products and services.
  • 5. Cyber Growth Partnership • Main government-industry body for growing the cyber security sector. Co-chaired by a government Minister and CEO of BT. • Industry led activities • Emphasis on exporting: identifying target markets for special attention (currently USA, Saudi, Malaysia, Qatar); Best of British consortia development • Supplier to Government Scheme. • Export Risk Guidance • Cyber showcase facility
  • 6. CYBER GROWTH PARTNERSHIP • SME Growth Projects announced last September. • The appointment of a cluster development representative who will provide support and guidance to help establish cyber clusters in areas of the UK where there is a concentration of cyber businesses, drawing on the success of the Malvern cluster. • Cyber Connect UK
  • 7. CYBER CONNECT UK • Identify and Map all Cyber Companies in the UK • Cyber Connect Portal: www.techuk.org/cyber-connect-uk • "Access to Finance" Events • Conduct Industry Consultation Exercise • Help UKTI Plan cyber missions to priority markets • Business Acceleration Clinics • Deliver Large Business Open Innovation Events • Provide Guidance on Small Business Collaboration Vehicles • Contact: Andy Williams (andy.williams@techuk.org)
  • 8. Innovation Vouchers • A scheme for SMEs run by Innovate UK (formerly TSB) designed to encourage business to get outside expertise to enable them to grow. • Vouchers available to enable business to receive up to £5,000 of advice to improve their cyber security. • Vouchers allocated through a series of ‘calls’. • Announced on Innovate UK website.
  • 9. Cyber Security Standard • What does good cyber security look like? • Core actions necessary to mitigate majority of cyber threats. • 5 key controls: Boundary firewalls and Internet gateways; secure configuration; access control; malware protection; patch management • Demonstrates cyber credentials to capitalise on opportunities • Accreditation needed for certain government contracts