Skip to main content

Programme Structure

Phase One (Workshops, online materials & one-to-one meetings)

The business would need to commit to:

  • An initial diagnostic meeting
  • Attending 2 days of face-to-face workshops
  • Completing several online, structured packages of support (business model canvas; innovation audit; absorptive capacity analysis; driving forces exercise; cyber growth; developing a business strategy)
  • Attend a one-to-one development meeting

Each business then receives a tailored report, business strategy and action plan.

Phase Two (Technical Assistance)

Some businesses may then be eligible to receive further technical assistance from one of the academic teams to drive forward a new cyber product or service. This phase would match the business’ support requirements with an expert in that field and work collaboratively on the project for around 4 months.  Examples of some of the areas of specialism include:

Data visualisation

Data science – privacy & anonymisation

Applied cryptography

Data driven democracy & fake news

Cloud computing security

Distributed ledger technology

Human aspect of security (socio-technical)

Distributed systems security

Biometric authentication

Fraud detection

Machine learning

Electrical power

Code verification

IoT security

Crypto markets

Penetration testing