Advertisement

Northrop helps with British Cyber-security education

Northrop Grumman is bringing the Cyber-Patriot program to Britain to help promote cyber-security skills.

By Richard Tomkins

LONDON, Aug. 11 (UPI) -- A U.S. program to help build and develop cyber-security skills among youth is to help Britain establish a similar program, Northrop Grumman announced.

Cyber-Patriot, the program established with the U.S. Air Force Association, promotes science, technology, engineering and mathematics -- or STEM -- education and will be used in Britain in collaboration with Cyber Security Challenge U.K.

Advertisement

"Promoting education in STEM is a core focus for Northrop Grumman and this partnership provides a fantastic opportunity for us to demonstrate how we can apply our industry leading knowledge and experience in cyber to stimulate an interest in STEM and help build the U.K. talent pool in cyber security," said Andrew Tyler, chief executive Europe, Northrop Grumman.

"We look forward to working together with Cyber Security Challenge U.K. and to CyberCenturion (the name of the British program) being as successful in the U.K. as CyberPatriot has been in the U.S. in cultivating the cyber professionals of the future."

CyberCenturion will enable youth interested in cyber security to get real experience of cyber-security scenarios and challenges and will be a bridge between the existing Cyber Security Challenge U.K. schools program for secondary schools, and a main competition program.

Advertisement

"CyberPatriot has grown at a phenomenal rate as young people are inspired by the opportunity to learn technical cyber-defence skills while also developing their skills in leadership, teamwork and communication," said Diane Miller, Northrop Grumman program director for CyberPatriot. "This program challenges them in new ways that will prepare them for continued academic success and for a bright future as a cyber professional."

CyberCenturion starts in October with two tester competitions. The competitions involve downloading a virtual computer image containing vulnerabilities that could be exploted by cyber criminal. The teams will have about six hours to identify and fix repair the vulnerabilities.

Latest Headlines