SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Matt Lewis, CEO.
Project4 TechnologiesLtd
www.project4-technologies.co.uk
• Established in 2014 following successful CDEbid focused on physical Insider
Attacks
• Technology focused organisation born out of adesire to build and advance
technologiesof the future acrossarange of subject areas
• Working with professionalsfromacademiaand industry to take conceptsfrom
theory to reality
• Working with the Centre for Defence Enterprise (CDE)and the Defence Science
and Technology Laboratory (Dstl)
• Two CDEfunded programmesto date
๏ Cyber - Detecting Insider Attacks
๏ Preventing Physical Insider Attacks
Project4 TechnologiesLtd
Background
• Successfully won competition under the CDEcall ‘Cyber
Defence: Securing against the Insider Threat’
• Coventry University Computer Science and Behavioural
Psychology unitsworked in support assub contractors
• Utilise behaviour displayed through ‘Digital Pattern of Life’
• Develop analysismethod and bespoke algorithmsto detect
insider’s
• Development of bespoke Graphical User Interface (GUI)to
display and manage risk
Cyber Insider Attacks
CDEFunded Cyber Programme
Demonstrator
Cyber Insider AttacksProgramme
• Focused on understanding ausersdigital
Pattern of Life (PoL), both Typical and Atypical
• Dedicated research element focused on
understanding howthese typesof attack occur
• Defining relevant PoLbehaviours
• Answering the question “Can we detect the
tell?”
• Prototype, Bayesian based algorithmcapable
of detecting defined behavioursfor onward
analysis
• Developed Graphical User Interface (GUI)
capable of displaying and classifying potential
insider attack occurrences
• IPsolely owned by Project4 TechnologiesLtd
• Prototype completed to TRL4
• Ready for future development
• Potential for Defence and Commercial application
• Expandable to other market verticalssuch asfraud, IP
protection and health care
• Complete Project4 offering could be fully available in
2016 following future development and exploitation
• We require both investment and technical expertise to
progressthe innovation
Project4 Technologies
Cyber Insider AttacksProgramme
CDEFunded Physical Insider AttacksSimulator
• Successfully won competition under the CDEcall
‘Countering Insider Threat Attacks’
• Focused on detecting physical insider attacks
• Creating potential real life situationsfor the user based on
psychological profiling of attack vectors
• Utilisation of Coventry University Psychology and
Behavioural Sciencesexpertise
• Use of realistic Avatarsand animation to display key
characteristicsasper our findings
• Designed to operate on tablet or mobile device
• Creation of aSemi-immersive learning experience
• Providing amore ‘entertainment’ based learning
experience
Physical Insider Attacks
• Expandable to avariety of learning requirements
• Additional environments
• Statistical datacollection for:
• Compliance monitoring
• Training needsanalysis
• Skillsgapsidentification
• Ability to formpart of initial training aswell as
continuouslearning and Personal Development Reviews
• Providing arapidly up-dateable platformfor both
threats, risksand locations
• Using familiar technology and game play to increase skill
and risk identification
Developing acrossarange of scenariosand end users
CDEFunded Physical Insider AttacksSimulator
CDEFunded Physical Insider AttacksSimulator
• Simulator designed to be apersonal issue
companion device
• Unlimited learning areas- platforming
• Envisage major opportunitiesfor
expansion in all areasof security sector,
especially where the use of fixed simulator
technology iseither impractical or unable
to dynamically adapt to change
• Currently developing opportunitieswithin
the lawenforcement environment
• Interested in working with partners
• Desire to work with national and
international military organisations
• IPsolely owned by Project4 Technologies
Ltd
Physical Insider Attacks
CDE Marketplace: Project 4 Technologies

Mais conteúdo relacionado

Semelhante a CDE Marketplace: Project 4 Technologies

Cyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfCyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfisha bajpai
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersLife Cycle Engineering
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Ethical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfEthical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfisha bajpai
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfisha bajpai
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareM. Ariel Evans
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
Mobi sir presentation
Mobi sir presentationMobi sir presentation
Mobi sir presentationG Srinivasan
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
GDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxGDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxAhmedEssam402
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 

Semelhante a CDE Marketplace: Project 4 Technologies (20)

Cyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdfCyber Security Training in Noida.pdf
Cyber Security Training in Noida.pdf
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
9 September 2014: Project4 Technologies Ltd
9 September 2014: Project4 Technologies Ltd 9 September 2014: Project4 Technologies Ltd
9 September 2014: Project4 Technologies Ltd
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Ethical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdfEthical Hacking Course CETPA Infotech.pdf
Ethical Hacking Course CETPA Infotech.pdf
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshare
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
Mobi sir presentation
Mobi sir presentationMobi sir presentation
Mobi sir presentation
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
GDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptxGDSC Info session @Wagner College.pptx
GDSC Info session @Wagner College.pptx
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 

Mais de Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

Mais de Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

CDE Marketplace: Project 4 Technologies

  • 1. Matt Lewis, CEO. Project4 TechnologiesLtd www.project4-technologies.co.uk
  • 2. • Established in 2014 following successful CDEbid focused on physical Insider Attacks • Technology focused organisation born out of adesire to build and advance technologiesof the future acrossarange of subject areas • Working with professionalsfromacademiaand industry to take conceptsfrom theory to reality • Working with the Centre for Defence Enterprise (CDE)and the Defence Science and Technology Laboratory (Dstl) • Two CDEfunded programmesto date ๏ Cyber - Detecting Insider Attacks ๏ Preventing Physical Insider Attacks Project4 TechnologiesLtd Background
  • 3. • Successfully won competition under the CDEcall ‘Cyber Defence: Securing against the Insider Threat’ • Coventry University Computer Science and Behavioural Psychology unitsworked in support assub contractors • Utilise behaviour displayed through ‘Digital Pattern of Life’ • Develop analysismethod and bespoke algorithmsto detect insider’s • Development of bespoke Graphical User Interface (GUI)to display and manage risk Cyber Insider Attacks CDEFunded Cyber Programme
  • 4. Demonstrator Cyber Insider AttacksProgramme • Focused on understanding ausersdigital Pattern of Life (PoL), both Typical and Atypical • Dedicated research element focused on understanding howthese typesof attack occur • Defining relevant PoLbehaviours • Answering the question “Can we detect the tell?” • Prototype, Bayesian based algorithmcapable of detecting defined behavioursfor onward analysis • Developed Graphical User Interface (GUI) capable of displaying and classifying potential insider attack occurrences • IPsolely owned by Project4 TechnologiesLtd
  • 5. • Prototype completed to TRL4 • Ready for future development • Potential for Defence and Commercial application • Expandable to other market verticalssuch asfraud, IP protection and health care • Complete Project4 offering could be fully available in 2016 following future development and exploitation • We require both investment and technical expertise to progressthe innovation Project4 Technologies Cyber Insider AttacksProgramme
  • 6. CDEFunded Physical Insider AttacksSimulator • Successfully won competition under the CDEcall ‘Countering Insider Threat Attacks’ • Focused on detecting physical insider attacks • Creating potential real life situationsfor the user based on psychological profiling of attack vectors • Utilisation of Coventry University Psychology and Behavioural Sciencesexpertise • Use of realistic Avatarsand animation to display key characteristicsasper our findings • Designed to operate on tablet or mobile device • Creation of aSemi-immersive learning experience • Providing amore ‘entertainment’ based learning experience Physical Insider Attacks
  • 7. • Expandable to avariety of learning requirements • Additional environments • Statistical datacollection for: • Compliance monitoring • Training needsanalysis • Skillsgapsidentification • Ability to formpart of initial training aswell as continuouslearning and Personal Development Reviews • Providing arapidly up-dateable platformfor both threats, risksand locations • Using familiar technology and game play to increase skill and risk identification Developing acrossarange of scenariosand end users CDEFunded Physical Insider AttacksSimulator
  • 8. CDEFunded Physical Insider AttacksSimulator • Simulator designed to be apersonal issue companion device • Unlimited learning areas- platforming • Envisage major opportunitiesfor expansion in all areasof security sector, especially where the use of fixed simulator technology iseither impractical or unable to dynamically adapt to change • Currently developing opportunitieswithin the lawenforcement environment • Interested in working with partners • Desire to work with national and international military organisations • IPsolely owned by Project4 Technologies Ltd Physical Insider Attacks