This problem is a UK government area of research interest (ARI) that was originally posted at https://ari.org.uk/ by a UK government organisation to indicate that they are keen to see research related to this area.
Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?
The challenges have become more complex, intertwined and dangerous as the world has become more uncertain and volatile. Domestic, overseas and online threats are increasingly integrated as adversaries develop capabilities and exploit vulnerabilities across borders and between the cyber and physical worlds. We are seeking research to help Government adapt to a changing security environment based on research and evidence.
Contact details
Should you have questions relating to this ARI please contact co_aris@cabinetoffice.gov.uk. If your query relates to a specific question please state its title in your email.
Related UKRI Projects
- Academic Centre of Excellence in Cyber Security Research - Cardiff University
- Leveraging the Multi-Stakeholder Nature of Cyber Security
- RISKREVELATION AI
- Machine Learning, Robust Optimisation, and Verification: Creating Synergistic Capabilities in Cybersecurity Research
- Proactive Security Decision Support System informed by Cyber Threat Intelligence (PSDSS-CTI)
- Evaluating Cyber Security Evidence for Policy Advice: The Other Human Dimension
- Cyber Enterprise Security - predict it, fix it
- Customized and Adaptive approach for Optimal Cybersecurity Investment
- Cyber Graph-to-Text: AI automation for Threat Intelligence, made accessible to all
- Academic Centre of Excellence in Cyber Security Research - King's College London