Introduction to Hipster
In this presentation at the PETRAS Securing the Future event in November 2021, Charles Weir introduces the project, and explores what makes it an exciting piece of research.
Smart devices offer huge possibilities to improve our health and quality of life. Internet-connected gadgets can help the elderly to live independently, automate complex medical treatments, encourage a healthy lifestyle and much else. Yet with these opportunities comes responsibility and even danger. How are the creators of these systems to ensure that users and operators will not be hurt by unintentional weaknesses or problems in the software that controls them?
Security, Privacy and Safeguarding (SPS) problems are often complex and tricky to identify; yet many of the teams creating these devices and systems belong to small to medium enterprises, without the ability to employ expensive software security experts and systems.
The Hipster project (Health IoT Privacy and Security Transferred to Engineering Requirements) explores how software development teams and product managers can work together to identify such problems, and to use industry-wide knowledge to decide which problems to address and how best to address them.
Can we help you? If you’re working in development, security or product management for health device software, contact us for free support to help your teams improve. If you’re researching or supporting others in the area, please get in touch; we’d love to discuss this more.
In this presentation at the PETRAS Securing the Future event in November 2021, Charles Weir introduces the project, and explores what makes it an exciting piece of research.
Our funders and collaborator network
Discussing how we do the research.
Developer security support from the Secure Development companion project.
This is the research team. We'll be delighted to hear from you.
Cyber Security Research Centre (Security Group), Cyber Threat Lab, i-DID , SCC (Security), Security Lancaster, Security Lancaster (Academic Centre of Excellence), Security Lancaster (Systems Security)
Security Lancaster, Security Lancaster (Software Security), Security Lancaster (Systems Security)
SCC (Security), Security Lancaster, Security Lancaster (Societal Threats)
RT @PETRASiot: 📢Dr Charles Weir is presenting at CYBERUK 2022: Three Steps to Cyber: Teaching Developers to Discuss #Cybersecurity with Product Owners 🗓️11 May, 12:45 Spotlight Stage ICC Wales in Newport, South Wales REGISTER: https://t.co/Fpxqq1X4C8 @charlesweir @CYBERUKevents @JoeBourne https://t.co/hMLqW4s1u2
Qualitative open coding creates an abundance of themes/concepts from a dataset. Where to begin when it comes to understanding it all? Here in the Hipster @PETRASiot project, we held a focused workshop session to make sense of our open codes: https://t.co/QDq0hoLffb
RT @SecureDevelop: Do my SME need cybersecurity insurance? Perhaps, but do an hour of team contingency planning as your first step! - @dan_prince of @hipster_project in https://t.co/9uiQQJmrfM
RT @SecureDevelop: Fascinating round-table event incorporating ideas from the @PETRASiot Hipster project, on now and viewable later... https://t.co/9uiQQJmrfM https://t.co/8XHRgnS0kh