CyberASAP announces Cyber Security Projects progressing to develop Proofs of Concepts
The Cyber Security Academic Accelerator Programme (CyberASAP) has recently announced the academic teams selected to progress to the second phase of the programme. From 28 teams starting the programme last April, the final 14 teams have been identified as having the greatest potential and will now develop their Proof of Concept Demonstrators to be showcased to industry and investors in February 2021.
Representing universities from all over the UK, the chosen cohort of 14 will participate in a varied range of workshops designed to provide them with further support on their journey from lab-based concept to commercially viable product. Delivering the programme are KTN’s Programme Directors, Emma Fadlon and Robin Kennedy.
“It’s exciting to get to this stage. It has been great to be able to give the 20 teams who completed Phase 1 (from 28 who started the programme back in April) a helping hand to develop their ideas through the first phase of the programme. We can now start to further support our final Phase 2 teams to take them even further on their commercialisation journey” said Emma Fadlon.
Never has cyber security been more important and, to meet the ongoing cyber threat, a pipeline of new products is key. Unique in the cyber security ecosystem, and playing a vital role in populating this pipeline, CyberASAP exists to ensure great cyber security concepts, born in university labs, find their way to market.
The successful teams begin their Phase 2 journey with a Boot Camp in late September. This kickstarts a comprehensive programme of workshops and training sessions delivered by KTN and its network of special advisers to help teams develop the essential skills needed to make a success of their commercialisation plans, as they concurrently develop their Proof of Concept Demonstrators.
Congratulations to the following University teams progressing to Phase 2:
Bournemouth – Authentibility Pass
Application for people with disabilities to communicate authentication/accessibility requirements to organisations.
Bristol – A Tamper Guard and Intrusion Monitor using Zenneck Electromagnetic Surface-waves
Making surfaces that identify, verify and protect themselves.
Edinburgh Napier – Memcrypt
Memcrypt protects and recovers confidential data from ransomware attacks.
Essex – SenseiChain
Redefining the future of Blockchains through secure real-time data analytics.
Imperial College – Perfect Privacy Preservation as a Service
Unrivalled value from sensitive data silos with mathematically guaranteed privacy.
Imperial College – WhatML: Watermarking Machine Learning Models
WhatML protects the value and the intellectual property of machine learning models.
Kent – #ID Security of IoT
Secure Device Identity to power the future of the Internet of Things.
Lancaster – Developer Security Essentials
A non-profit helping consultants make the 400,000 UK developers better at security.
Leeds – Artificial Behaviour-Based Authentication for IoT (ABBA-IoT)
Data tampering detection system for automotive sensors.
Middlesex – Threat Hunting System Based on Linux Security Hardening and Mandatory Access Control Policies
A Security assessment tool for Linux systems based on the MITRE Framework..
Plymouth – MaCRA (Software Tooling for Maritime Cyber Risk Assessment)
Dynamic, Multi-Dimensional Risk Assessment for Holistic Appraisal of Maritime Specific Operations.
Southampton – CyberHelper
CyberHelper is an innovative tool that efficiently runs your cyberattacks’ investigations.
Strathclyde – Lupovis: A Wolf in Sheep’s Clothing
Lupovis provides AI-driven deception solutions to detect threats and automate incident response.
Wolverhampton – CyberMIND
An AI-based platform helping Cybersecurity professionals to detect, predict, and manage stress.
Join us on social: