Click here to close now.


News Feed Item

Northrop Grumman Partners With Cyber Security Challenge UK to Help Build Future Cyber Talent

CyberCenturion competition to be launched in UK, an opportunity for young people to engage with real challenges of cyber defence

LONDON, Aug. 11, 2014 /PRNewswire/ -- Northrop Grumman Corporation (NYSE: NOC) has entered into a collaborative partnership with Cyber Security Challenge U.K. under which it will bring the proven U.S. national youth cyber education programme, CyberPatriot, to the U.K. for the first time as part of the company's commitment to promoting science, technology, engineering and mathematics (STEM) education, and to help build the U.K.'s pool of talent in cyber security. 

Northrop Grumman Corporation logo.

Photos accompanying this release are available at:

The partnership brings together Northrop Grumman's industry leading expertise in cyber security with the experience of Cyber Security Challenge in how to build new ways to inspire and nurture cyber talent at all ages. The competition programme will be known in the U.K. as CyberCenturion.

"Promoting education in STEM is a core focus for Northrop Grumman and this partnership provides a fantastic opportunity for us to demonstrate how we can apply our industry leading knowledge and experience in cyber to stimulate an interest in STEM and help build the U.K. talent pool in cyber security," said Andrew Tyler, chief executive Europe, Northrop Grumman. "We look forward to working together with Cyber Security Challenge U.K. and to CyberCenturion being as successful in the U.K. as CyberPatriot has been in the U.S. in cultivating the cyber professionals of the future."

CyberCenturion will enable young people interested in the world of cyber security to get their first real experience of the scenarios and challenges that existing professionals have to grapple with on a daily basis. It will sit between the existing Cyber Security Challenge U.K. schools programme for secondary schools, and the main competition programme, and will be designed specifically for young people who have an interest in cyber, but have yet to find a way to apply their knowledge to the real challenges that professionals face.

"CyberPatriot has grown at a phenomenal rate as young people are inspired by the opportunity to learn technical cyber defence skills while also developing their skills in leadership, teamwork and communication," said Diane Miller, Northrop Grumman programme director for CyberPatriot. "This programme challenges them in new ways that will prepare them for continued academic success and for a bright future as a cyber professional. I'm thrilled that students across the U.K. will have this wonderful opportunity, thanks to the vision of Cyber Security Challenge U.K. and the support of our outstanding association partner, the Air Force Association."

CyberCenturion starts in October with two tester competitions and the fully fledged game begins later in the year. It is played by teams of between four and six participants and involves downloading a virtual computer image full of vulnerabilities that could present opportunities for a cyber criminal. The teams have approximately six hours within a two-day window to identify and fix these vulnerabilities. The top six teams will advance to a face-to-face final in April 2015.

CyberPatriot, created by the U.S. Air Force Association (AFA) and sponsored by the Northrop Grumman Foundation, is a cyber security competition that has been designed to inspire future professionals towards careers in cyber security and STEM. It has already engaged more than 250,000 budding cyber professionals across the United States.

Cyber Security Challenge U.K. is a nationwide programme aimed at bringing more talented people into the cyber security profession and building a bigger U.K. cyber talent pool to help address the skills shortage that affects government bodies, businesses and citizens alike.

To find out more about CyberCenturion go to:  

Northrop Grumman is a leading global security company providing innovative systems, products and solutions in unmanned systems, cyber, C4ISR, and logistics and modernization to government and commercial customers worldwide. Please visit for more information.

Logo -

SOURCE Northrop Grumman Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.