UK MOD to Build Open Source Analytics Platform

mod.png

The Ministry of Defence has launched a competition to build an evolutionary new open source analytics platform to help it better understand its data.

The department is seeking prototype solutions to help analyse its structured and unstructured data.
The platform will help the MOD to understand its internal information, documents, processes and interactions, allowing it to streamline processes, collaborate and share knowledge more easily. Ministry of Defence embraces cloud apps with Office 365 move Ministry of Defence launches private cloud for app sharing MoD scientists publish open source code on GitHub for first time

The department has £250,000 available for the first phase of the competition, with up to £2 million allocated for phase two, which will be awarded to the most successful phase one projects.  The project will be created by the Centre for Defence Enterprise (CDE), on behalf of the MOD’s information systems and services wing, will be led by CIO Mike Stone.

Companies interested in competing are invited to attend a briefing event at techUK in London on 24 June and have until 13 Ausgust 2015 to submit their proposals online.
“Traditionally the MOD has been cautious of adopting emerging and unproved technologies. However, we need to adopt these freely available capabilities and services now,” said Stone announcing the initiative.
            
“I hope this CDE competition will encourage industry, and particularly small and medium-sized enterprises (SMEs) that are delivering analytics and digital enablers, to help us develop a capability that will become an important part of defence transformation,” he added.
Stone joined the MOD a year ago with a promise to “dramatically improve” the department’s IT by adopting more user-friendly technologies and exploiting cloud and mobile.
Last week the department announced it has started to move its 420,000-strong workforce to Microsoft Office 365.

The IT team are working to improve 30 different issues identified by Stone, including better access to the internet and social media, quicker logon times, better file sharing, browser choice, reducing device size and weight and more regular password resets.
Computerworld:  http://bit.ly/1Mb53ns

« Australia is 'one of most aggressive' in Mass Surveillance
Digital Currencies: A Gold Standard for Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.