CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Similar documents
The UK s National Cyber Security Strategy

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Information Security Controls Policy

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Technical Information Assurance Team Structure. and Role Description

CISA EXAM PREPARATION - Weekend Program

Security and Privacy Governance Program Guidelines

Unit 3 Cyber security

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Cloud Security Standards Supplier Survey. Version 1

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Security Director - VisionFund International

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Cyber Security Strategy

BSc/MSci Professional Accounting in Business Programme Structure

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

CYBER SECURITY TRAINING

STUDENT AND ACADEMIC SERVICES

School of Engineering & Built Environment

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Project Management Professional (PMP) Certificate

IT Information Security Manager Job Description

Implementation Strategy for Cybersecurity Workshop ITU 2016

The Government IT Profession: Embedding IT Professionalism in Your Organisation

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Principles for a National Space Industry Policy

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Level Access Information Security Policy

BHConsulting. Your trusted cybersecurity partner

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

POSITION DESCRIPTION

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

Cyber Security is it a boardroom issue?

Cyber risk Getting the boardroom focus right

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8

Security by Default: Enabling Transformation Through Cyber Resilience

Virtually Real: Terrestrial Laser Scanning

Build confidence in the cloud Best practice frameworks for cloud security

ACCA Certificate in Audit (RQF Level 4) Qualification specification

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

Cyber security. Strategic delivery: Setting standards Increasing and. Details: Output:

Security Management Models And Practices Feb 5, 2008

Emerging Technologies The risks they pose to your organisations

The University of Queensland

The National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Which Side Are You On?

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Technical Information Assurance Team Structure. and Role Description

Cambridge TECHNICALS LEVEL 3

Information Security Controls Policy

CISA Training.

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Cloud solution consultant

New qualifications for a global profession. Jan Olivier IIA Learning Manager

Cloud Security Standards

MSc Computing and Technology (Part-Time)

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Level Level 33 IT IT Apprenticeships

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

A practical guide to IT security

Digital Health Cyber Security Centre

TEL2813/IS2820 Security Management

Commonwealth Cyber Declaration

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

BHConsulting. Your trusted cybersecurity partner

Chartered Membership: Professional Standards Framework

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Training + Information Sharing: Pillars of enhancing cybersecurity posture

HCPC's Risk Assurance Part 1

Find out more about APM qualifications and keep up to date with the latest developments at apm.org.uk/apmqualifications

Symantec Endpoint Protection Cloud (SEPC)

COURSE BROCHURE CISA TRAINING

Application for Certification

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Driving Global Resilience

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

The New Healthcare Economy is rising up

Cloud Security Alliance Quantum-safe Security Working Group

Cloud solution consultant

MANAGING THE COMPLEXITY.

ASD CERTIFICATION REPORT

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Building a Resilient Security Posture for Effective Breach Prevention

Designing and Building a Cybersecurity Program

INFORMATION TECHNOLOGY

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Transcription:

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure Configuration 3. Network Security 4. Managing User Privileges 5. User Education and Awareness

Building resilience: 10 Steps to Cyber Security 6. Incident Management 7. Malware Prevention 8. Monitoring 9. Removable Media Controls 10. Home and Mobile Working

Building resilience Adopt the Cyber Essentials or Cyber Essentials Plus cyber security controls Look at CESG s guidance on cloud security

Building resilience Improve your own awareness for simple advice on keeping safe online look at the keepsafeonline.org website Look at CESG s guidance on use of mobile devices

Sharing good practice Join the Cyber-security Information Sharing Partnership (CiSP), part of CERT-UK - https://www.cert.gov.uk/cisp/ - allows members from across sectors and organisations to exchange cyber threat information in real time, on a secure and dynamic environment, whilst operating within a framework that protects the confidentiality of shared information

Cross cutting knowledge, skills and capability Meeting UK Cyber Security Strategy Objective 4, of building the UK s cross-cutting knowledge, skills and capability to underpin all cyber security objectives, by extending knowledge and enhancing skills Develop a Cyber Security Profession Outcome 1 There is an increased pipeline of a cyber capable workforce. Develop the Workforce of the Future Apprenticeships Certification of Masters Degrees Academic Centres of Excellence for Education Cyber Security Challenge Develop the Workforce of Today CESG Certified Professional Scheme CESG Certified Training Scheme Outcome 2 There is a sustained supply of competent cyber security professionals available, adequate to meet growing demand levels. Research Institutes Outcome 4 The UK is recognised as having a leading edge cyber security research capability that can be exploited where appropriate. Users / Basic Cyber Security Knowledge Academic Centres of Excellence for Research Massive Open Online Course Increase Cyber Security Research Key = Activity is delivering benefits Sponsorship of PhD students Centres for Doctoral Training = Activity has started = Management activity Long-term Sustainability Finance / Legal / HR / Professional Business Services CEOs / Seniors / Boards Influence Associated Professions and the Wider Workforce Procurement Understand, Manage, Promote and Sustain Outcome 3 Appropriate cyber security knowledge is part of the day job for relevant non-cyber security professionals across the public and private sectors. Outcome 5 Cyber security knowledge and skills are understood and managed to exert a positive influence over the demand and supply of the cyber workforce.

Cyber skills training for workforce CESG Certified Training Awareness courses - useful for those new to the profession or to a specialism. Examples: Introduction to Cyber Security (from The Open University) Cyber Security for Information Asset Owners (IAOs) (from The National Archive) Certificate in Information Security Management Principles (from QA or Ultima Risk Management) Free online course about online security, introducing different types of malware and concepts such as network security, cryptography, identity theft and risk management Information assurance and cyber security are more than just concerns for your IT department how to protect your organisation and its information assets 5-day course covering the knowledge and skills required to manage information security and information risk processes

CESG Certified Training courses Application level - specialist courses providing a detailed insight and understanding. Suitable for people in a cyber security role wanting to develop new skills. Examples: CompTIA Security+ (from Bluescreen IT) Includes network security, operational security, threats and vulnerabilities, access control and identity management Technical Cyber Auditing, Cyber Essentials Plus (from IASME) Good cyber security practice to protect organisations from the most common cyber threats

QUESTIONS?? http://www.cesg.gov.uk/pages/homepage.aspx Enquiries@cesg.gsi.gov.uk or 01242 709141