KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government.
The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions.
A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl
Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security
Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge Director, Innovate UK
1. Industrial Strategy Challenge Fund
Digital Security by Design
26th September 2019
John Goodacre – Interim Challenge Director
1
2. Industrial Strategy Challenge Fund
• £4.7b to support of the governments Industrial Strategy in
research and innovation
• Delivered in “annual waves” by UKRI of around £1b each
• DSbD is part of wave 3
• Each challenge will use different councils/instruments to
deliver the research and innovation funding
• DSbD is delivering through InnovateUK, EPSRC, and ESRC
• (and looking into future prize based “hackathons”)
3. In the next 5 years, the ISCF Digital Security by Design challenge will
overcome the market failures and radically update the foundation of the
insecure digital computing infrastructure that underpins the entire
economy. A new and secure computer hardware approach, proven in at
least two major industrial markets, will protect against at least half of
known and associated future technological vulnerabilities.
Working up for the first time from the central hardware of a digital device
Challenge vision
4. • Demonstrate a more secure hardware platform capable of protecting
the integrity and resilience of software in response to significant market
need for cyber security.
• Enable more secure platforms, for services which make extensive use
of secured, personal data and create investment in new scalable
businesses, digital products and services.
• Accelerate adoption in the digital transformation of industry, with the
accompanying investment in productivity and improved reliability of digital
services.
Challenge Objectives
5. Challenge Activities
Technology Platform
Prototype: deliver a proven
secure-by-default hardware
evaluation board and
system software
Collaborative R&D to enable
market use: tooling and
processes to utilise the new
security capabilities; community
engagement
Business-led demonstrators: sector-
specific adoptions e.g. IoT, connected
vehicles, AI, and/or financial services to
show-case real-world impact and move
the accepted norm
£9m£49.8m £11.2m
1. Enable 2. Use 3. Impact
6. Programme Advisory Group
Name Organisation
Paul W2 (Chair) NCSC
John Moor IoT Security Foundation
Talal Rajab TechUK
Paul Caseley OBE Dstl/MOD
Prof. Maire O’Neill RISE
Prof. Jeremy Watson Petras
Peter Davies Thales
Dr Robert Hercock BT
Sian John MBE (TBC) Microsoft
Dr Madeline Carr RISCS
Mark Browne BEIS/DCMS
Tim Cook Office for AI
Chris Dalton HP
7. Technology Platform Prototype
• Lead organisation: Arm
• Consortium: University of Edinburgh &
University of Cambridge, Linaro
• Will produce a Technology Platform Prototype
with additional hardware protection capabilities
along with the necessary enabling system
software which will be shared openly with
academia and industry
• Leveraging the Capability Hardware concepts
and approaches investigated by the CHERI
program
8. EPSRC First Call Objectives
The EPSRC call will focus on:
• Capability enabled hardware proof and software verification
• Impact on system software and libraries
• Future implications of Capability enabled Hardware
9. ESRC Call Scope
• The security landscape is inherently multi-dimensional, including
cognitive, physical and virtual spheres.
• The ESRC call will create a hub of expertise which will:
• Seek to map these geographies of behaviour
• Work to define what it means to be secured
• Fund small project to answer key arising questions
• Encourage and support the community of businesses and
academia to lead society and move beyond simply the adoption
10. • Business led “enabling” projects
• Expected to open through Innovate UK call November 2020
• Covering enabling technologies and tooling
• Also able to support significant academic involvement
• Industry sector demonstrators
• Two tranches, March’20 and Jan’21
• Able to support extending the approach to other solutions
Future Calls