News & Events-One month left to enter the IET Innovation Awards 2016

There is just one month left to submit your entry for the IET Innovation Awards - the deadline for entries is 8 July 2016.

Frazer-Nash is sponsoring the Cyber Security category of this year's IET Innovation Awards, which will be looking for innovation that has reached the stage where its potential to mitigate risk to organisations, government and individuals has been clearly identified.

Business Director, Bill Hodson who will be one of the judges for the Cyber Security category, says:

"The clock is ticking to showcase your new, innovative Cyber Security product or service to a wider audience.

"At Frazer-Nash we're committed to the very best in innovation and creativity and I'm looking forward to seeing entries that demonstrate fresh thinking, advanced technology and new approaches to address today's cyber security problems"

The IET's annual Innovation Awards celebrate the very best in new innovations in science, engineering and technology, showcasing entries from around the world. With 15 categories to choose from there is something for every corner of industry to reveal the latest innovations, be it idea, design or product.

The Awards are free to enter and impartially peer-reviewed. Finalists and winners will receive a personalised trophy, and will benefit from extensive promotional opportunities including support from the IET's PR Agency. A selection of winners will be invited to display their innovation at the interactive feature 100 Engineering Ideas that Changed the World at IET London

More details on the Awards and how to enter can be found here.

Information on Frazer-Nash's expertise in security and resilience and our capability in cyber security can be viewed here.

Entries are particularly encouraged from - but not limited to - the following areas:

  • Threat intelligence
  • Incident response
  • IoT
  • Social media
  • Mobile malware
  • DDoS
  • Third party attacks
  • APTs
  • The insider threat
  • Cloud computing
  • Phishing and social engineering
  • Education
  • Cyber Forensics
  • Threat detection
  • Critical infrastructure