UK cyber security community

New Operational Technology Cyber Security Alliance Launches to Deliver Comprehensive Cyber Security Guidelines for Operational Technology

Retrieved on: 
Tuesday, October 22, 2019

The Operational Technology Cyber Security Alliance (OTCSA) was established to help companies address the OT security challenges that continue to put operations, and consequently, business at risk.

Key Points: 
  • The Operational Technology Cyber Security Alliance (OTCSA) was established to help companies address the OT security challenges that continue to put operations, and consequently, business at risk.
  • One of the driving forces behind IT and OT convergence is cyber security of operational systems, like SCADA, MES, controllers, etc.
  • Senior executives are tasking operations executives to get their OT systems integrated into the overall enterprise cyber security governance.
  • Mark Milford, Vice President Cyber Security, Wrtsil
    Operational Technology Cyber Security Alliance (OTCSA) is a group of global industry-leading organizations focused on providing operational technology (OT) operators with resources and guidance to mitigate their cyber risk in an evolving world.

SANS to Host San Francisco Cyber Security Training Event

Retrieved on: 
Tuesday, September 24, 2019

BETHESDA, Md., Sept. 24, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced SANS San Francisco Winter 2019 (#SANSSanFrancisco) taking place December 2-7 in California.

Key Points: 
  • BETHESDA, Md., Sept. 24, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced SANS San Francisco Winter 2019 (#SANSSanFrancisco) taking place December 2-7 in California.
  • Course topics include digital forensics and incident response, cyber defense, ethical hacking, cyber threat intelligence, security management, secure development, audit, and ICS security.
  • SANS is the most trusted and, by far, the largest provider of cyber security training and certification to professionals at governments and commercial institutions world-wide.
  • Renowned SANS instructors teach over 60 different courses at more than 200 live cyber security training events as well as online.

SANS Heads to Las Vegas for One of its Largest Cyber Security Training Events of the Year

Retrieved on: 
Thursday, August 1, 2019

BETHESDA, Md., Aug. 1, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced its return to Las Vegas, NV for SANS Network Security 2019 (#SANSNetworkSecurity) taking place September 9-16.

Key Points: 
  • BETHESDA, Md., Aug. 1, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced its return to Las Vegas, NV for SANS Network Security 2019 (#SANSNetworkSecurity) taking place September 9-16.
  • Top cyber security practitioners from around the world will gather to share their first-hand knowledge of what works and what doesn't in cyber security.
  • SANS is the most trusted and, by far, the largest provider of cyber security training and certification to professionals at governments and commercial institutions world-wide.
  • Renowned SANS instructors teach over 60 different courses at more than 200 live cyber security training events as well as online.

SANS Announces the Agenda for Seattle Cyber Security Training Event

Retrieved on: 
Wednesday, July 31, 2019

BETHESDA, Md., July 31, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced the agenda for SANS Seattle Fall 2019 (#SANSSeattle) taking place October 14-19 in Washington state.

Key Points: 
  • BETHESDA, Md., July 31, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced the agenda for SANS Seattle Fall 2019 (#SANSSeattle) taking place October 14-19 in Washington state.
  • SANS Seattle Fall 2019 features course covering cyber defense, secure DevOps, ethical hacking, penetration testing, and security management.
  • SANS is the most trusted and, by far, the largest provider of cyber security training and certification to professionals at governments and commercial institutions world-wide.
  • Renowned SANS instructors teach over 60 different courses at more than 200 live cyber security training events as well as online.

Crypsis Appoints Leading Cyber Crime Investigator as Vice President

Retrieved on: 
Monday, July 1, 2019

The Crypsis Group, which specializes in delivering cyber security incident response, risk management, and digital forensics services to companies and organizations of all sizes, today announced it has appointed Art Ehuan, a seasoned cyber security practitioner with a criminal investigations background, to join its senior management team as vice president.

Key Points: 
  • The Crypsis Group, which specializes in delivering cyber security incident response, risk management, and digital forensics services to companies and organizations of all sizes, today announced it has appointed Art Ehuan, a seasoned cyber security practitioner with a criminal investigations background, to join its senior management team as vice president.
  • He has frequently given expert testimony in federal, military, and state courts on digital forensics and cyber crime matters.
  • For the past 17 years he has served as a lecturer for the U.S. State Departments Anti-Terrorism Assistance Cyber Training Program and has conducted seminars for senior foreign government and law enforcement officials on cyber crime and terrorism.
  • The Crypsis Group is a leading national cyber security advisory firm offering a full spectrum of services including incident response, digital forensic investigations, and cyber risk management.

National Cyber Security Strategy needs long-term plan

Retrieved on: 
Wednesday, June 5, 2019

Government has not made sufficient progress on developing long-term objectives for the National Security Strategy, says Public Accounts Committee

Key Points: 

Report summary

  • To counter this threat, and continue to support the UKs digital government and economy, since 2011 the Cabinet Office (the Department) has managed two, five-year national cyber security strategies.
  • The Department is beginning to make progress in meeting the strategic outcomes of the current, 20162021 National Cyber Security Strategy after a poor start.

Chair's comments

  • As it currently stands, the Strategy is not supported by the robust evidence the Department needs to make informed decisions and accurately measure progress.
  • On top of this, neither the Strategy or the Programme were grounded in business cases despite being allocated 1.9bn funding.

Conclusions and recommendations

  • Recommendation: The Department should ensure another long-term coordinated approach to cyber security is put in place well in advance of the current Strategy finishing in March 2021.
    • The Department cannot justify how its approach to cyber security is delivering value for money.
  • Recommendation: The Department should ensure that, to support any follow on, long-term and coordinated approach to cyber security, it produces a properly costed business case.
    • The Department lacks the robust evidence base it needs to make informed decisions about cyber security.
  • Recommendation: The Department should write to the Committee by November 2019 setting out what progress it is making in using evidence-based decisions in prioritising cyber security work. This should include plans for undertaking a robust ‘lessons learnt’ exercise to capture all relevant evidence from the current Strategy and Programme to support any future approach to cyber security.
    • The Department has not been clear what the Strategy will actually deliver by 2021.
  • Recommendation: When the Department publishes its costed plan in autumn 2019 for its future approach to cyber security it should also set out what the existing Strategy and Programme should deliver by March 2021, and the risks around those areas where it will not meet its strategic outcomes and objectives.
    • Government has not yet done enough to enhance cyber security throughout the economy and better protect consumers.

National Cyber Security Strategy needs long-term plan

Retrieved on: 
Wednesday, June 5, 2019

Government has not made sufficient progress on developing long-term objectives for the National Security Strategy, says Public Accounts Committee

Key Points: 

Report summary

  • To counter this threat, and continue to support the UKs digital government and economy, since 2011 the Cabinet Office (the Department) has managed two, five-year national cyber security strategies.
  • The Department is beginning to make progress in meeting the strategic outcomes of the current, 20162021 National Cyber Security Strategy after a poor start.

Chair's comments

  • As it currently stands, the Strategy is not supported by the robust evidence the Department needs to make informed decisions and accurately measure progress.
  • On top of this, neither the Strategy or the Programme were grounded in business cases despite being allocated 1.9bn funding.

Conclusions and recommendations

  • Recommendation: The Department should ensure another long-term coordinated approach to cyber security is put in place well in advance of the current Strategy finishing in March 2021.
    • The Department cannot justify how its approach to cyber security is delivering value for money.
  • Recommendation: The Department should ensure that, to support any follow on, long-term and coordinated approach to cyber security, it produces a properly costed business case.
    • The Department lacks the robust evidence base it needs to make informed decisions about cyber security.
  • Recommendation: The Department should write to the Committee by November 2019 setting out what progress it is making in using evidence-based decisions in prioritising cyber security work. This should include plans for undertaking a robust ‘lessons learnt’ exercise to capture all relevant evidence from the current Strategy and Programme to support any future approach to cyber security.
    • The Department has not been clear what the Strategy will actually deliver by 2021.
  • Recommendation: When the Department publishes its costed plan in autumn 2019 for its future approach to cyber security it should also set out what the existing Strategy and Programme should deliver by March 2021, and the risks around those areas where it will not meet its strategic outcomes and objectives.
    • Government has not yet done enough to enhance cyber security throughout the economy and better protect consumers.

National Cyber Security Strategy needs long-term plan

Retrieved on: 
Wednesday, June 5, 2019

Government has not made sufficient progress on developing long-term objectives for the National Security Strategy, says Public Accounts Committee

Key Points: 

Report summary

  • To counter this threat, and continue to support the UKs digital government and economy, since 2011 the Cabinet Office (the Department) has managed two, five-year national cyber security strategies.
  • The Department is beginning to make progress in meeting the strategic outcomes of the current, 20162021 National Cyber Security Strategy after a poor start.

Chair's comments

  • As it currently stands, the Strategy is not supported by the robust evidence the Department needs to make informed decisions and accurately measure progress.
  • On top of this, neither the Strategy or the Programme were grounded in business cases despite being allocated 1.9bn funding.

Conclusions and recommendations

  • Recommendation: The Department should ensure another long-term coordinated approach to cyber security is put in place well in advance of the current Strategy finishing in March 2021.
    • The Department cannot justify how its approach to cyber security is delivering value for money.
  • Recommendation: The Department should ensure that, to support any follow on, long-term and coordinated approach to cyber security, it produces a properly costed business case.
    • The Department lacks the robust evidence base it needs to make informed decisions about cyber security.
  • Recommendation: The Department should write to the Committee by November 2019 setting out what progress it is making in using evidence-based decisions in prioritising cyber security work. This should include plans for undertaking a robust ‘lessons learnt’ exercise to capture all relevant evidence from the current Strategy and Programme to support any future approach to cyber security.
    • The Department has not been clear what the Strategy will actually deliver by 2021.
  • Recommendation: When the Department publishes its costed plan in autumn 2019 for its future approach to cyber security it should also set out what the existing Strategy and Programme should deliver by March 2021, and the risks around those areas where it will not meet its strategic outcomes and objectives.
    • Government has not yet done enough to enhance cyber security throughout the economy and better protect consumers.

Lessons Learned Discussion at SANS Chicago Cyber Security Training Event: Equifax Breach was Entirely Preventable

Retrieved on: 
Tuesday, June 4, 2019

BETHESDA, Md., June 4, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced SANS Chicago 2019 (#SANSChicago) taking place August 19-24 in Illinois.

Key Points: 
  • BETHESDA, Md., June 4, 2019 /PRNewswire/ --SANS Institute, the global leader in cyber security training and certifications, today announced SANS Chicago 2019 (#SANSChicago) taking place August 19-24 in Illinois.
  • Hands-on immersion training and evening talks will provide security professionals with tips and techniques to be successful in cyber security.
  • SANS Chicago 2019 features courses covering cyber defense, ethical hacking, penetration testing, cloud security, digital forensics, and cyber threat intelligence.
  • Renowned SANS instructors teach over 60 different courses at more than 200 live cyber security training events as well as online.

Ultra Electronics, 3eTI Tapped by US Marine Corps for Infrastructure Monitoring Upgrades

Retrieved on: 
Tuesday, June 4, 2019

Ultra Electronics, 3eTI will provide centralized monitoring and control of the utilities at US Marine Corps Base Camp Pendleton in southern California.

Key Points: 
  • Ultra Electronics, 3eTI will provide centralized monitoring and control of the utilities at US Marine Corps Base Camp Pendleton in southern California.
  • In addition, 3eTI will provide Information Assurance and cyber defense services to support the risk management framework (RMF) for accreditation.
  • Ultra Electronics, 3eTI is a leading provider of military-grade secure communications that enable critical systems security, infrastructure security, and facilities management for the defense, government, utilities and industrial markets worldwide.
  • 3eTI is part of the Ultra Electronics Group , a specialist international electrical and electronics engineering company.