Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?
Background
The challenges have become more complex, intertwined and dangerous as the world has become more uncertain and volatile. Domestic, overseas and online threats are increasingly integrated as adversaries develop capabilities and exploit vulnerabilities across borders and between the cyber and physical worlds. We are seeking research to help Government adapt to a changing security environment based on research and evidence.
Next steps
Should you have questions relating to this ARI please contact co_aris@cabinetoffice.gov.uk. If your query relates to a specific question please state its title in your email.
Source
This question was published as part of the set of ARIs in this document:
Related UKRI funded projects
-
Academic Centre of Excellence in Cyber Security Research - Cardiff University
Cardiff University is a leading UK academic institution for cyber security analytics and artificial intelligence - the interpretation and effective communication of applied data science and AI methods through interdiscip...
Funded by: EPSRC
Why might this be relevant?
The project focuses on cyber security analytics and artificial intelligence, which can be applied to address potential exploits and vulnerabilities in government's cyber security practices.
-
Leveraging the Multi-Stakeholder Nature of Cyber Security
Cyber Security (CyS) is a challenging, distributed, multi-stakeholder problem. It is distributed in the sense that the expertise to comprehensively assess the level of security of a given IT system is commonly not all av...
Funded by: EPSRC
Why might this be relevant?
The project aims to leverage the multi-stakeholder nature of cyber security and develop a framework to improve user access to tailored cyber security information, which can help address potential exploits and vulnerabilities in government's cyber security practices.
-
Cyber-R: Securing Businesses through Generative AI-based Adaptive Cyber Resilience Service
According to the UK Cyber Security Breaches Survey 2024, UK businesses faced approximately 7.78 million cybercrimes over the past year, with phishing attacks accounting for 84% of these incidents. Additionally, 50% of bu...
Funded by: Innovate UK
Lead research organisation: UNIVERSITY OF WOLVERHAMPTON
Why might this be relevant?
The project addresses the need for automation in cyber resilience to address potential exploits quickly.