Tag Archives: DSIT

Cyber and Academia in Europe: Horizon Projects, Hubs, and Collaboration

Europe’s cybersecurity academic landscape is distributed, multi-lingual, and deeply integrated into public policy and industrial ecosystems. With powerful funding mechanisms like Horizon Europe, a strong regulatory backdrop (e.g. NIS2, Cyber Resilience Act), and a rising number of EU-funded collaborative hubs, academia in Europe isn’t just producing talent and research, it’s driving long-term cyber resilience at national and EU levels.

Continue reading

Cyber and Academia in the UK: Research Centres, Spinouts, and Influence

The UK’s academic institutions play a foundational role in shaping the country’s cybersecurity ecosystem. They don’t just educate the workforce, they produce world-class research, support government policy, commercialise IP into high-growth spinouts, and influence standards through international collaboration.

Continue reading

Global Cyber Powerhouses: The Leading Vendors and What They Offer

Cybersecurity is a global industry, but it’s also a geopolitical one. The vendors featured in this guide are not just tech companies. They’re often strategic assets, embedded in national security frameworks, powering defence alliances, and influencing cyber norms across continents.

Continue reading

The US Cyber Giants: Vendors, Solutions, and Federal Reach

The United States is home to the most powerful cybersecurity vendors on the planet. These companies don’t just sell products, they influence standards, embed themselves in national security supply chains, and shape global policy through their scale, threat intelligence, and lobbying power.

Continue reading

Top Cybersecurity Firms and Services Shaping Europe’s Digital Defence

Cybersecurity in Europe is evolving quickly, driven by growing regulation (NIS2, Cyber Resilience Act), state-sponsored threats, and accelerating digital transformation. The result is a dynamic and diverse vendor landscape: large integrators defending entire ministries, regional champions supporting SMEs, and specialised firms leading in OT, AI security, and cyber risk quantification.

Continue reading

Major Cyber Vendors and Service Providers in the UK

The UK’s cybersecurity sector is home to thousands of providers, ranging from nimble startups and regional MSSPs to global consulting firms and homegrown risk intelligence platforms. While the National Cyber Security Centre (NCSC) sets the tone for policy and technical guidance, it’s these vendors that translate strategy into services: monitoring networks, managing risk, conducting audits, and responding to breaches in real time.

Continue reading

Cyber Across Global Governments: International Cooperation and National Strategies

Cybersecurity has become a pillar of national security, digital economy growth, and global diplomacy. From ransomware attacks on hospitals to interference in democratic elections, governments worldwide now treat cyber threats as matters of statecraft, not just IT hygiene. While national strategies differ, a few shared patterns have emerged: defence of critical infrastructure, capacity building, and international coordination.

Continue reading

Cyber Across US Government: Agencies, Frameworks, and Innovation Pathways

The United States is arguably the most influential force in global cybersecurity, but its governance model is sprawling, federal, and often opaque to outsiders. Responsibility is distributed across military, civilian, and intelligence agencies, each with their own authorities, funding mechanisms, and strategic priorities.

Continue reading

Stakeholder Grid Example 3: WM CWG & West Midlands Cyber Ecosystem

The West Midlands Cyber Working Group (WM CWG) plays a pivotal role in uniting industry, academia, government, and grassroots cyber communities across the region. This article outlines how WM CWG applies stakeholder mapping to guide its coordination efforts, balancing the interests of funders, civic authorities, partners, and community actors.

Continue reading

Innovation Canvas Example 3 – West Midlands Cyber Working Group (WM CWG)

The West Midlands Cyber Working Group (WM CWG) is a collaborative, region-wide forum uniting cyber leaders from business, academia, government, and civil society. It facilitates quarterly convenings, shared strategy development, and joint funding bids to strengthen the regional cyber ecosystem. Operating as an open, grassroots-led group, WM CWG is aligned with DSIT goals, WMCA priorities, and the UK Cyber Strategy. It seeks to drive investment, skills, and coordination through regional initiatives. Here’s an example “innovation Canvas” for the WM CWG.

Continue reading

Stakeholder Grid Example 2: Psyber Inc.

Navigating influence in a new and emerging field like cyber psychology requires clarity, confidence, and strategic alignment. As a startup working at the intersection of AI ethics, human factors, and cybersecurity resilience, Psyber Inc. operates in a diverse and sometimes opaque stakeholder landscape.

Continue reading

Cyber Across European Governments: Key Bodies, Funding, and Coordination

The European cybersecurity landscape is layered, fragmented, and fast-evolving. Unlike the centralised approaches of some governments, the EU’s model of collective sovereignty means cybersecurity is coordinated, rather than controlled by Brussels. National governments still manage their defence and digital sovereignty, but major funding, regulation, and cross-border frameworks increasingly come from the EU level.

Continue reading

Stakeholder Grid Example 1: Cyber Tzar

Understanding your stakeholder landscape is key to scaling effectively, especially in cybersecurity, where trust, standards, and adoption often hinge on who’s in the room. This article explores how Cyber Tzar, a cybersecurity scale-up specialising in supply chain risk and cyber risk scoring, applies the Stakeholder Mapping Grid to guide its strategic engagement.

Continue reading

Innovation Canvas Example 2 – Psyber Inc.

Psyber Inc. applies psychology to cybersecurity, developing behavioural risk dashboards that assess human factors behind cyber threats. Built on academic research in cyberpsychology, the platform translates user sentiment, stress, and behavioural data into actionable cyber risk insights. Psyber Inc. is led by a neurodivergent, female founder and focuses on ethical, responsible AI. It addresses rising demand for insider threat detection, resilience measurement, and human-centric cyber tools across defence, education, and enterprise. Here’s an example “innovation Canvas” for Psyber Inc.

Continue reading

Cyber Across UK Government: Departments, Programmes, and Policy Players

The definitive guide to who shapes cyber policy in Whitehall, and how to work with them.

Continue reading

Inside the UK Cyber Ecosystem: A Strategic Guide in 26 Parts

An extensive guide mapping the networks, policy engines, commercial power bases, and future-shapers of British cybersecurity.

Continue reading

Innovation Canvas Example 1 – Cyber Tzar

Cyber Tzar is a SaaS platform providing advanced cyber risk quantification for enterprise supply chains. It delivers cyber risk scoring, benchmarking, and compliance assessment through big data analytics, AI, and proprietary IP. Its “credit score for cyber” approach supports better risk visibility for insurers, CISOs, and supply chain managers. Cyber Tzar is revenue-generating, scaling through strategic partnerships, and aligned with DORA, ISO 27001, and other regulatory frameworks. Here’s an example “innovation Canvas” for Cyber Tzar.

Continue reading

How to Create and Use an Innovation Canvas (and Why It Matters)

Innovation is often portrayed as spontaneous and unpredictable. But behind every meaningful breakthrough lies a structured process. Whether you’re launching a new product, transforming a service, or reimagining your organisation’s direction, clarity and rigour are critical.

Continue reading

The Insider’s Guide to Influencing Senior Tech and Cybersecurity Leaders in the UK

Influencing senior leaders in cybersecurity and technology is no small task, especially in the UK, where credibility, networks, and standards carry immense weight. Whether you’re a startup founder, a scale-up CISO, or a policy influencer, knowing where the key conversations happen (and who shapes them) can make the difference between being heard and being ignored.

Continue reading

Steering Regional Resilience: Reflections on Two Years Supporting DSIT’s Cyber Local Programme

As Chair of the West Midlands Cyber Working Group, I’ve helped lead DSIT’s Cyber Local steering group for the region over the past two years. Working alongside regional experts, I’ve supported the selection of projects that strengthen cyber resilience on the ground, including Aston University’s powerful work on cyber violence against women and girls. This experience has reinforced just how critical locally informed funding is to building practical, inclusive, and impactful cyber capability.

Continue reading