Secure Innovation Frequently Asked Questions

The Security Review scheme provides early-stage innovative companies holistic and actionable protective security advice to support them to protect their IP, looking at the company’s approach to protective security governance, risk and incident management, security culture, cyber security, and supply chains and partnerships.

Businesses receiving a Security Review will also receive a £300 voucher towards Cyber Essentials certification. Cyber Essentials is recommended by the NCSC as the minimum baseline for cyber security in the UK.

The Security Review scheme provides early-stage innovative companies holistic and actionable protective security advice to support them to protect their IP, looking at the company’s approach to protective security governance, risk and incident management, security culture, cyber security, and supply chains and partnerships.

Businesses receiving a Security Review will also receive a £300 voucher towards Cyber Essentials certification. Cyber Essentials is recommended by the NCSC as the minimum baseline for cyber security in the UK.

To be eligible to apply:

  • You must be a UK registered and trading business.
  • You must be a small or medium sized enterprise (under 250 people)
  • You must agree to contribute £500 (including VAT) towards the cost of the Security Review.
  • You must be able and willing to dedicate resource, including potential financial resource, to developing your protective security strategy.
  • You must be able and willing to complete the full review process, including the 6-month follow-up review and submission of any required documentation.
  • You must be working in one of the 17 sensitive areas of the economy set out in the National Security and Investment Act, or within one of the four selected areas of the UK’s Modern Industrial Strategy (see below for further details of these sectors).
  • Receipt of this support is subject to the Subsidy Control Act (2022). To qualify an enterprise cannot have received more than £315,000 Minimal Financial Assistance (MFA) and or De Minimis within any three-year period (in Northern Ireland €300,000 De Minimis).
  • If your business in based in Northern Ireland, please note that EU State aid rules now only apply in limited circumstances. Please see the Windsor Framework to check if these rules apply to your organisation.

National Security and Investment Act:

    • Advanced materials (including semiconductors)
    • Advanced robotics
    • Artificial intelligence
    • Civil nuclear
    • Communications
    • Computing hardware
    • Critical suppliers to government
    • Cryptographic authentication
    • Data Infrastructure
    • Defence
    • Energy
    • Military and dual-use
    • Quantum Technologies
    • Satellite and space technologies
    • Suppliers to the emergency services
    • Synthetic biology
    • Transport

UK Industrial Strategy:

    • Advanced Manufacturing
    • Clean Energy Industries
    • Defence
    • Life Sciences

To encourage organisations receiving a security review to progress toward achieving Cyber Essentials certification (the NCSC recommends Cyber Essentials as the minimum standard of cyber security for all organisations), a £300 voucher code towards Cyber Essentials will be provided to each organisation after the report has been submitted. This voucher code will be sent with your successful application email.

The voucher code can be redeemable against certifying or recertifying to CE level 1 (independently verified self-assessment). Organisations wishing to use this must do so by 31st March 2026.

This voucher code is non-transferable and may only be used by the organisation to which it was issued.

Secure Innovation Security Review participating businesses contribute £500 towards the service, with the remaining £2,500 funded by the scheme.

On acceptance participating businesses will receive a £300 voucher towards cyber essentials certification.

State threats are overt or covert actions by foreign governments which fall short of direct armed conflict with the UK but go beyond peaceful diplomacy and expected statecraft to harm or threaten the safety or interests of the UK or our allies.

State threats present a real and evolving risk to the UK. They can manifest in a range of forms. These include attempts to:

    • steal sensitive information through espionage or cyber attacks
    • threaten the public’s safety, including through physical violence.
    • harm our prosperity
    • undermine our values and freedoms

State threats do not only materialise against government and intelligence agencies. Some states are particularly interested in industrial or commercial information which could be used to support their own economy or military. This information may not be “classified” or an obvious target for espionage.

States may seek to exploit foreign direct investment, academic partnerships and supply chains to gain access to sensitive information.

This includes information on companies’ products and plans or commercial/academic research. State actors could seek to fast track their own technological capabilities or increase their military advantage. Examples of industries in which states show particular interest include advanced materials, biotech, and artificial intelligence. It also includes research and mainly academic research, particularly in STEM (science, technology, engineering and mathematics), dual-use technologies, emerging technology and other commercially sensitive areas. As with business information, state actors could seek to exploit research to improve their own technological or military capabilities.

Yes. State actors do not only target large corporations or government entities. In fact, companies of all sizes —especially those with lower levels of security—can be attractive targets.

No business is too small or too early-stage to be of interest, particularly if it holds valuable intellectual property, innovative technologies, or sensitive data.

Yes. There are steps businesses of any size can take to reduce their vulnerabilities to state threats. The aim of the protective security measures outlined in Secure Innovation is to reduce the risk to the business and increase the risk to the state actor trying to get hold of their assets. The better an organisation’s protective security measures are, the harder a state actor will have to try to get access to their technologies, and the greater the chance that they will be detected doing so. State actors will make a risk-benefit decision on who to target, so the higher the risk to them, the less likely they are to try

Secure Innovation Security Reviews is a subsidy scheme. Until all slots are filled, organisations that meet the eligibility criteria and successfully pass the application process will be offered access to a partially funded Secure Innovation Security Review. Participating companies will contribute £500; while the government will fund the remaining £2,500.

Funding for the scheme is limited and will be awarded on a first-come, first-served basis. Once the available funding has been allocated, no further awards can be made—meaning only a limited number of companies will be able to benefit from the scheme this financial year.

It should be noted that the government will fund £2,500 (including VAT) of the total cost of the review which is £3,000 (including VAT); by making an application for a Security Review an organisation is confirming their agreement to fund the remaining £500 (including VAT) of the overall cost. This will be invoiced and paid directly to the Security Reviewer.

KEYSIGMA are approved Security Reviewers due to our NCSC assured Cyber Advisory status.

We have applied to be part of this scheme, have completed training on the Secure Innovation Security Review framework with NPSA and NCSC and passed a knowledge check to demonstrate an understanding of the scheme and framework, and have committed to completing reviews anywhere in the UK.

 

  1. Complete the KEYSIGMA Secure Innovation Security Review Application Form by contacting info@keysigma.co.uk.
  2. Complete the Innovate UK Business Growth Consortium’s application form.
  3. Accept the scheme’s terms and conditions.
  4. Formally appoint KEYSIGMA as their Security Reviewer.
  5. Paying the outstanding £500 to KEYSIGMA.
  6. Complete the preparatory work.
  7. Arrange an in-person site visit with the KEYSIGMA.
  8. Review and sign-off the report.
  9. Confirm that your Security Reviewer has submitted the final report and their invoice for £2,500 via email to secureinnovation@iukbg.ukri.org.

If you require an extension, should contact KEYSIGMA at info@keysigma.co.uk as soon as possible, who will try to arrange an extension with the Secure Innovation scheme’s owners.

If the report is not submitted within the time allowed and an extension has not been agreed; or if an extension has been agreed, but the report is not submitted before the expiry of the extension period, the scheme’s owners will assume the review report is not going to be submitted and withdraw the funding offer.

Firstly, you should share the content of your confirmation email along with a copy of your application form with the appointed security reviewer.

Secondly, you should undertake the Secure Innovation Action plan preparatory work.

Yes. It will only be shared with selected individuals within DBT/DSIT, Innovate UK, NPSA and the NCSC.

No, the £3000 is for the purposes of the security review only.

Applications for the current scheme will be open until the end of the 25/26 financial year. There are grants available for 500 organisations, which will be allocated on a first-come-first-served basis to organisations who pass the eligibility criteria and assessment.

This is not a certification scheme, as there is no requirement and/or test or audit to ensure organisations have implemented the security measures recommended by the review.

The scheme does not offer a logo which companies can display to show they have gone through the process. This is to avoid the risk of the scheme being misinterpreted as a certification or accreditation scheme. However, you can mention having had a security review completed as a way of demonstrating your commitment to security.

Data will be collected through various stages of the scheme, including the application process, site visit, written report, Health Check Questionnaires, and feedback surveys. This may include business contact details, security-related information, and feedback on the scheme.

Your data will be shared with the following organisations involved in the funding, delivery and oversight of the scheme:

      • Department for Business and Trade (DBT)
      • Department for Science, Innovation and Technology (DSIT)
      • Innovate UK
      • National Protective Security Authority (NPSA)
      • National Cyber Security Centre (NCSC)
      • Innovate UK Business Growth service consortium delivery partner

These organisations are responsible for funding, managing, delivering, and evaluating the scheme. Data sharing enables them to monitor the scheme’s effectiveness, assess behavioural change, and inform future improvements or expansion.

National Protective Security Authority (NPSA) are part of MI5. They are the UK’s national technical authority for personnel and physical security.  Their mission is to reduce the vulnerability of UK government, businesses, and academia to a range of threats, including terrorism, espionage, and sabotage. NPSA provides expert guidance to help organisations strengthen their protective security posture.

The National Cyber Security Centre (NCSC) are part of GCHQ. They are the UK’s national technical authority for cyber security. Their role is to make the UK the safest place to live and work online. They support the most critical organisations in the UK, the wider public sector, industry, SMEs as well as the general public.

No. Your data will not be used for marketing purposes unless you have explicitly consented to this.

In accordance with the UK General Data Protection Regulation (GDPR) and the Data Protection Act 2018 (as applicable), by participating in the Secure Innovation Security Review Scheme, you acknowledge and agree that any data you provide or that is collected throughout the scheme via the site visit, written report, Health Check Questionnaires, and feedback surveys—may be shared with Innovate UK Business Growth service consortium delivery partner, the Department for Business and Trade (DBT), the Department for Science, Innovation and Technology (DSIT), the National Protective Security Authority (NPSA), and the National Cyber Security Centre (NCSC). This data will be used solely for the purposes of administering, evaluating, and improving the scheme, and for monitoring its impact. All data will be handled in accordance with applicable data protection laws and will not be used for marketing purposes without your explicit consent.

By providing your contact details, you agree to any partner mentioned above storing your information and they may contact you at a future date to learn about your experiences and to share opportunities related to other Secure Innovation products. Your data will be handled in accordance with the relevant privacy notices of each organisation as available on their websites.

If you have any questions or concerns about how your data is being used, you should contact KEYSIGMA at info@keysigma.co.uk or the data protection officer for the scheme at secureinnovation@iukbg.ukri.org

How to Apply

Email

Or Speak with us

Schedule a free 30 minute consultation with a KEYSIGMA Cyber Advisor

Secure Innovation Frequently Asked Questions