b'EXCELLENCE INCYBER SECURITY AWARDThis award recognises an organisation which is taking proactive steps to counter cyber attacks and take preventative measures to remain one-step ahead of cyber threats.It recognises the creative thinking, engineering, people and projects that are taking on this growing threat for the benefit of the global community. In particular, innovations that have reached the stage where its potential to mitigate risk to organisations, government and individuals has been clearly identified.BTMobius - Simulation of Malware for Connected and Autonomous VehiclesMobius began in January 2020 as a combination of traffic simulation and web-based geospatial analytics.It was developed with the aim of enabling anomaly detection in a population of mixed manual, semi-autonomous and autonomous vehicles. The aim is to assist in identifying vehicles that may have become compromised aswell as supporting planning and decision-making processes and enables complex modelling of cyber physical traffic incidents using urban traffic data and vehicle information. Electronics of the Future, Inc Terahertz Cyber Security Testing using Artificial IntelligenceA new terahertz Artificial Intelligence testing technique was developed for non-destructive identification ofgenuine integrated circuits. Even in-situ and even under bias, their response to terahertz and/or sub-terahertz radiation is measured at the circuit pins and AI algorithms are used for the response classification and interpretation. Northumbria UniversityFlow-based Botnet Detection System through Optimised Bio-inspired Machine LearningThe innovation is the development of an intelligent botnet detection system with very high accuracy. It isinnovative as it uses a flow-based and optimised-AI based approach to detect the botnets in a network with 99.8% accuracy, without knowing what is inside the packets. This software can stop botnet attacks on anetwork with good accuracy.SternumSecuring IoT Devices from WithinThis innovation is threefold: (i) the focus on the exploitation stage, or the point where the hacker takes advantage of a vulnerability to execute an attack; (ii) solutions are embedded directly into the binary code using patent-pending binary instrumentation technology and (iii), it enables protection from all third-party vulnerabilities within the device, even if they come in closed-source binary form. Use aTricerion LimitedNeurographicpassword on a Keypad Frictionless Secure Customer Authentication with Neurographic Passwordsto LoginThis simple, easy to use and low-cost patented software enables frictionless secure customer authentication and addresses the economic impact of spoof phishing. It can easily digitally authenticate an individual with a proven patented solution providing frictionless Secure Customer Authentication to all, but especially to the most underserved demographic that often struggle with the technological complexity, such as the elderly, disabled or neurodiverse.eandt.theiet.org/innovation#eandtawards 26'