Got a cyber idea that you’d like to bring to life? Respond to one of our challenges

Challenges

Challenge 2: Addressing Critical Cybersecurity Challenges

The challenge areas have been chosen to broadly align with challenges identified by the National Cyber Security Centre as ongoing dialogue suggests they are important to our industry partners. We would ask you to think about the challenges and how you might solve a specific problem related to these areas.

Challenge details
  • StatusClosed

We are looking to identify, develop and demonstrate innovative solutions in the areas outlined below. The challenge areas have been chosen to broadly align with challenges identified by the National Cyber Security Centre as ongoing dialogue suggests they are important to our industry partners. We would ask you to think about the challenges and how you might solve a specific problem related to these areas. The challenge areas are as follows:

  • Operational technology
  • Protecting SMEs and citizens
  • Incident response for SMEs and citizens
  • Industrial IoT encryption

Call for Action

We are looking for ideas to address the cyber security challenge areas noted above.

We are looking for some key success indicators when evaluating challenge responses, including a clear articulation of the problem you are solving, a clear vision for proposed your solution, and the uniqueness or novelty of your solution.

We strongly recommend that you review the guidance documentation, processes, and videos prior to submitting your solution. See: How to apply

 

Further information

For any enquiries about this challenge please e-mail: cyberinnovationhub@cardiff.ac.uk

 

Submit your solution to a challenge to begin your journey!

Sign up to our newsletter

Stay up-to-date on the latest cybersecurity trends and technologies by joining the Cyber Innovation Hub newsletter today.

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website: privacy policy We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.