9 05, 2019

CyberUK 19 Showcases Cybersecurity research in the UK

By |2019-05-09T08:02:04+00:00May 9th, 2019|Categories: Uncategorized|0 Comments

CyberUK is the UK government’s most important cyber security event.
This year it showcased the latest cyber security research from around the UK and abroad, to an audience of around 2000 people.

CYBERUK was organized by the GCHQ via the National Cyber Security Centre (NCSC). There was a strong line up of world-class cyber security speakers. The […]

9 05, 2019

RITICS Spring Showcase discusses how we use Artificial Intelligence in Cyber-Security

By |2019-05-09T08:01:22+00:00May 9th, 2019|Categories: Uncategorized|0 Comments

The RITICS Spring Showcase took place successfully on 15th April 2019 at the National Cyber Security Centre, Nova South, London. Around a hundred delegates were there drawn from industry, academia and government, and the meeting showcased the best research from the research projects that have just got under way funded as part of the second […]

9 05, 2019

Conference about cyber security in industry takes place in Leicester

By |2019-05-09T08:01:00+00:00May 9th, 2019|Categories: Uncategorized|0 Comments

The Cybersecurity in Industry conference took place at De Montfort University in Leicester on 28th February 2019. It was run as part of De Montfort’s CyberWeek, and was an event organised jointly by RITICS and De Montfort. There were keynote talks by Tony B of the National Cybersecurity Centre on ‘How to prevent a Category […]

11 03, 2019

Foreign Secretary Jeremy Hunt visits Professor Chris Johnson’s cybersecurity group at Glasgow University

By |2019-03-11T14:21:21+00:00March 11th, 2019|Categories: Uncategorized|0 Comments

Image credit: Andrew Milligan – PA Images

The Foreign Secretary Jeremy Hunt visited Glasgow University’s cybersecurity group, run by RITICS-funded Professor Chris Johnson.

He met Chris, and viewed a demo by Marco Cook, one of Chris’s PhD students. Marco ran an attack demo as Jeremy watched, overloading the […]

15 02, 2019

IE19 Conference takes place at Nottingham University

By |2019-02-15T14:02:46+00:00February 15th, 2019|Categories: Uncategorized|0 Comments

The Information Exchange Conference took place between 13th and 15th February 2019 at the East Midlands Conference Centre, Nottingham University.

It included a Cabinet Office session and a Case Study on a CNI Chemical Company, as well as a series of Snappy Chats on various topics. There were also talks from NCSC and CPNI. There were […]

5 02, 2019

Conference gives an insight into Cyber Security in Space

By |2019-02-05T10:15:15+00:00February 5th, 2019|Categories: Uncategorized|0 Comments

The Surrey Centre for Cyber Security (SCCS) Research Workshop and Networking Event took place on Thursday 31 January 2019 at the University of Surrey.

The purpose of the workshop was to bring together experts from industry, academia and government to identify challenges and opportunities for cyber security research in core domains of space systems and technologies.

There […]

27 11, 2018

WIHST Technical Workshop highlights the opportunities in healthcare cyber-security

By |2018-11-27T12:14:15+00:00November 27th, 2018|Categories: Uncategorized|0 Comments

Hundreds of millions of pounds are spent on healthcare technology in the UK every year. Digital health is becoming increasingly important, with the imminent launch of the NHS App, and the advent of Bring Your Own Device in healthcare. To add to this, we have a huge variety of technology in use in the NHS, […]

22 11, 2018

National Cyber Security Centre runs successful event for the Industrial Control Systems Community of Interest

By |2018-11-22T12:50:27+00:00November 22nd, 2018|Categories: Uncategorized|0 Comments

Over 150 people drawn from industry, government and academia came to the first Industrial Control Systems Community of Interest event, held at Nova South, London. A keynote talk from cyber-security company FireEye highlighted the ingenious techniques that criminals and state actors use in launching cyber-attacks. They described a detailed forensic analysis of one such attack, […]