The Department for Digital, Culture, Media and Sport (DCMS) will work with Innovate UK, part of UK Research and Innovation, to invest up to £800,000 in innovation cyber security projects coming from an academic research base.
The aim of this competition is to identify the most promising commercial opportunities. Your proposal must include the area of your research, the problem that you are solving and your proposed solution.
The Cyber Security Academic Startup Accelerator Programme (CyberASAP) is a 1-year programme.
This is phase 1 of a 2-phase competition.
Phase 1 will last up to 4 months, split into 2 stages:
Phase 1 will determine the value of the idea and, if appropriate, identify the best commercial route to progress. The programme will be supported by industry experts, including some from cyber security.
This competition has two funding strands for entry:
You will be asked to specify which funding strand you are applying for in your application.
In applying to this competition, you are entering into a competitive process. The competition closes at 11am UK time on the deadline stated.
Your project’s total eligible costs must be up to £32,000.
This competition offers two funding strands:
You will be asked which funding strand you are applying for:
Eligible researchers are those who have been funded from PETRAS as part of a research project. This strand offers commercialisation support for UKRI-funded project-based research results with promising innovation potential and societal impact. Applicable projects extend across the PETRAS current project portfolio as well as the legacy project portfolio of the PETRAS IoT Research Hub.
2. Open strand, is open for eligible individuals from academic institutions that are not eligible for the SDTaP – commercialisation strand.
This is phase 1 of a 2-phase competition.
Phase 1 will last up to 4 months, split into 2 stages
Your project must:
Lead applicant
To be eligible for funding you must:
Project team
To collaborate with the lead, you must:
All individuals based in a UK academic institution are eligible, including but not limited to early career researchers and senior academic researchers.
The grant will be paid to the academic institutions after each stage of phase 1. Each academic institution in the consortium will be funded individually, but the total funding for all academic partners must be no more than £32,000 for each application.
Building value proposition and market validation activities
Participants in phase 1 with ideas that demonstrate the most potential for commercialisation will be invited to apply to participate in phase 2, where funding is available to develop a proof of concept for the product or service.
If we award you funding you must be dedicated to the project for the 2-month value proposition building activity from 1 April 2022. If we decide you can continue to the market validation activity you must be dedicated for the additional 2 months until the end of July 2022.
'Dedicated to the project' means you must:
The events will be organised by the Innovate UK KTN. You will be contacted by Innovate UK KTN with full details, including confirmed dates.
The planned dates for the value proposition stage are:
Innovate UK KTN will hold informal weekly 1-hour drop-in sessions during the value proposition stage. These are likely to be Friday mornings.
Before the formal start of the programme an informal introduction session is planned for the morning of Wednesday 23 March 2022.
If selected to undertake the additional 2 months for market validation, you must commit to attend 3 days of in person events and 2 days of online events, alongside optional in person or online attendance at Info Security Europe exhibition in London.
The planned dates are:
Multiple applications
You can submit more than one application if you have multiple ideas, but we will not select more than one for funding.
The aim of this competition is to identify the most promising commercial opportunities in academia in respect to cyber security.
We define ‘cyber security’ to mean protecting any or all the following from unauthorised access, harm or misuse:
This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures.
Your project must include: