Helping the military shrink its cyber attack surface
The defence sector is full of legacy systems vulnerable to cyber attack. Do you have the technology to reduce defence exposure to cyber effects?
The defence sector is diverse and continually growing, with a large integrated network of legacy cyber technologies. This presents a substantial and diverse surface area for cyber enabled attack to disrupt military operations.
Being able to accelerate next generation hardware and software technologies to phase out the cyber vulnerabilities within current computer networks is vital in order to reduce defence exposure to cyber attack.
So, the Defence and Security Accelerator (DASA) is launching a new Innovation Focus Area (IFA) called Reducing the Cyber Attack Surface, which aims to develop technologies that reduce the opportunity for cyber attacks on Ministry of Defence (MOD) systems and platforms.
This IFA is being run on behalf of Defence Science and Technology laboratory (DSTL) and Defence Science and Technology (DST) and seeks proposals that enable greater confidence and a level of assurance in military systems against cyber-enabled attack.
Can you help? Read the competition document now and submit your idea.
DASA expects to fund proposals within Technical Readiness Level 4 – 7 (TRLs) up to £300K for a 9 month contract. Proposed technologies should demonstrate by providing a roadmap describing how they would achieve a technical demonstrator by end of Financial Year 2023 if further funding was made available.
The MOD is interested in identifying and accelerating next generation hardware and software technologies to reduce the vulnerabilities within current and future computer networks and systems, focusing particularly on operational technologies.
DASA are looking for technologies that:
1) intelligently apply technologies that significantly reduce the opportunity for cyber attack;
2) effectively raise the barrier to entry for adversaries and providing greater confidence and a level of assurance against cyber-enabled attack; and
3) are novel and applicable across a whole “class” of attack surface rather than solutions tailored to a specific threat.
Find out more & apply