563:(CREST) is a Not for profit accreditation and certification organization. CREST does not have its own study material and leverage on third party coursework so that the member can become certified. As of 24/8/2022, the cost of CREST membership is 5000GBP for membership of one country chapter and 25000GBP for a regional membership. On two occasions between 2012 and 2014, the examination-related activities of one of more NCC Group employees and candidates breached the CREST Code of Conduct and NCC Group was, as their employer, vicariously responsible for those individuals at the time
545:(ACFTI) is a not-for-profit, international professional organization focusing on the academics and research of cybersecurity, digital forensics, incident response, and threat investigations and their influence to the society. The vision of the association is to promote research and education in cybersecurity, digital forensics, incident response, and threat investigations fields and to contribute to the creation and dissemination of knowledge and technology in these domains.
817:(BSI), the UK's National Standards Body (NSB), which not only produces British Standards (BS) and Publicly Available Specifications (PAS) in the areas of Information and Cyber Security, but also provides the UK interface into international Standards Development Organisations (SDO), including ISO, IEC, ITU-T, CEN, CENELEC, and ETSI. The main Expert Committees for BSI relevant to these topic are IST/33 (Information and Cyber Security) and ICT/003 (Trustworthy Systems)
156:(CPNI). NCSC provides advice and support for the public and private sector in how to avoid cyber threats. CESG (originally Communications-Electronics Security Group) was a branch of GCHQ which worked to secure the communications and information systems of the government and critical parts of UK national infrastructure. The
669:
is a commercial certification scheme for technical security specialists, backed by university standards and covering a wide range of expertise. Tigerscheme is CESG certified in the UK and candidates are subject to an independent rigorous academic assessment authority. Tigerscheme was founded in 2007
685:
is a social enterprise representing cyber SME's (Small and Medium
Enterprise) in the UK. The forum is composed of 20 regional cyber clusters around the UK. Each cluster is run as a subsidiary of the UK Cyber Security Forum and all are operated by groups of volunteers. They provide events around
670:
on the principle that a commercial certification scheme run on independent lines would give buyers of security testing services confidence that they were hiring a recognised and reputable company. In June 2014 the operational authority for
Tigerscheme was transferred to USW Commercial Services Ltd.
569:
is a not for profit professional examination body under contract to the
National Cyber Security Centre to provide technical exams in support of the government's assured penetration testing company scheme CHECK. The exams are independent and rigorous and are conducted for practitioner team member
576:(CIISec), formerly the Institute of Information Security Professionals (IISP), is an independent, non-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole.
131:
The central organisation supporting the GCSO is the
Government Security Group (GSG), with a distributed Government Security Function / Government Security Profession across the departments and Arms Length Bodies (ALB), and three National Technical Authorities (NTA), all of which have a role in
243:
in determining priorities in relation to securing cyberspace. The unit provided strategic direction and coordinates action relating to enhancing cyber security and information assurance in the UK. The OCSIA was headed by James
Quinault., but the function has been subsumed into the Government
295:
Team
Defence Information (the current operating name for the UK Council for Electronic Business (UKCeB)), which is a not-for-profit, membership organisation whose mission is to transform secure information sharing for through life collaboration in defence acquisition and
850:
is the self-regulatory body for the UK's cyber security profession. It develops, promotes and stewards nationally recognised standards for cyber security in support of the UK Government's
National Cyber Security Strategy to make the UK the safest place to live and work
557:(BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. BCI has a six certification standards to ensure individual practitioners literacy in organizations, responses, and other strategies.
216:
DSIT is responsible for supporting and promoting the UK cyber security sector, promoting cyber security research and innovation, and working with the
National Cyber Security Centre to help ensure all UK organisations are secure online and resilient to cyber threats.
676:(UK CPAG) is a membership organisation consisting of the UK's largest banks. Established in 2020 with a mission to use the collective power of the banks to audit Cloud Service Providers such as Google, Amazon and Microsoft. The group is operated by the
167:(NPSA) is the successor organisation to CPNI, but retains some elements of information and cyber security that were not transferred to NCSC, including for Cyber Physical Systems (CPS), and for security containers, locks, and structures to protect assets
582:(IET) is a multidisciplinary professional engineering institution, formed in 2006 from two separate institutions: the Institution of Electrical Engineers, dating back to 1871, and the Institution of Incorporated Engineers dating back to 1884
178:
Coordination of activity across government is through a series of committees, both from within the world of security, and in aligned domains such as the Chief
Technology Officers (CTO), and Knowledge and Information Management (KIM).
836:(TSFdn) which is a UK public good activity aimed to encouraging good proactive in systems specification, realisation, and use, and providing related independent Organisational and Solution Conformity Assessments. It arose from the
171:
542:
228:
188:
616:
560:
654:
Group focused on “high threat” areas – including defence, national security and resilience, protection of critical national infrastructure, intelligence, and organised crime, chaired by Dr Andrew
Rogoyski of
278:
In April 2016, the MOD announced the creation of the Cyber Security Operations Centre (CSOC) "to protect the MOD's cyberspace from malicious actors" with a budget of over ÂŁ40 million. It is located at
196:
920:
257:
has primacy for information and cyber security within both its civilian and military staffs (approximately 250,000 personnel), and for the Defence Supply Base (DSB - approximately 30,000 companies).
551:(BCS) is a professional body and a learned society that represents those working in information technology both in the United Kingdom and internationally. It has a security, data and privacy group.
220:
All other government departments and ALBs will have staff in the government security function / government security profession, supporting both their internal staff, and their client communities.
869:
23:
Although the terminology is currently largely aligned to a "cyber" view of the world, it is taken to still include information-related concerns, with previous predominant terminology including:
840:(TSI), previously the Software Security, Dependability and Reliability Initiative (SSDRI), and the Secure Software Development Partnership (SSDP), which were sponsored by the UK government's
927:
products and services operating within the UK public sector. The group maintained the UK information assurance community map, hosted on the CESG's web site. It has two co-chairs:
1674:
1145:
659:. The Security and Resilience Group works to build relationships between the technology industry and policymakers, customers and end users, and is chaired by Stephen Kingan of
594:
is the International Information Systems Security Certification Consortium is a non-profit organization which specializes in information security education and certifications.
124:
The internal protective security coordination role for UK government is led by the Government Chief Security Officer (GCSO) within the Cabinet Office, who since 2021 has been
673:
385:
Cyber Aware is a cross-government awareness and behaviour campaign which provides advice on the simple measures individuals can take to protect themselves from cyber crime.
1102:
872:(IAAC) worked across industry, government and academia towards ensuring the UK's information society has a robust, resilient and secure foundation. The IAAC was set up by
830:
National IA Forum (NIAF), an independent committee of leading UK Public and Private Sector Information Assurance (IA) experts, which largely replaced the role of GIPSI
203:
152:
arm of GCHQ) as well as the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the former
420:
Most other regulatory bodies will have staff covering information and cyber security function for both their internal staff, and their client communities.
153:
1457:
1432:
628:
357:
The Wider Public Sector (WPS) covers both the Central Government and Law Enforcement categories that are itemised separately, but also elements such as:
272:
1060:
923:(IACG) was formed following the UK's national IA conference in 2006. The IACG encourages greater collaboration between the commercial supply base for
1168:
588:
is an international professional association that deals with IT governance. Previously known as the Information Systems Audit and Control Association.
820:
1000:
1776:
600:(ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. There is a UK chapter.
125:
677:
338:
137:
1706:
566:
873:
666:
944:(IT Security Awareness for Everyone) was a former government-funded organisation that provided alerts, which was subsumed into GetSafeOnline
573:
240:
106:
1141:
579:
145:
1781:
1563:
947:
941:
597:
950:
was a former government-funded organisation building supply chains for the MOD and manufacturers using SMEs in the United Kingdom.
1786:
77:
43:
The significant constituents within that community are probably best understood by grouping into high level categories, namely:
1106:
376:
164:
1635:
1334:
500:
407:
318:
254:
1281:
1678:
1088:
73:
According to a parliamentary committee the UK government is not doing enough to protect the nation against cyber attack.
866:
Cyber Security Knowledge Transfer Network (CS KTN), as sponsored by Innovate UK (formerly the Technology Strategy Board)
285:
MOD collaborates with the DSB over information and cyber security matters through a number of organisations, including:
959:
Many of these categories will provide linkages from the UK to other nations' activities in cyber security, including:
823:(GSOL) is a United Kingdom-based campaign and national initiative to teach citizens about basic computer security and
928:
1649:
110:
837:
833:
1461:
1436:
982:
814:
554:
440:
1127:
613:
is a trade organisation for companies operating in the UK aerospace, defence, security and space industries.
1176:
1031:
264:
The Directorate of Security and Resilience (DSR), predominantly focused on physical and personnel security
855:
267:
The Directorate of Cyber Defence and Risk (CyDR), predominantly focused on information and cyber security
160:
provided protective security advice to businesses and organisations across the national infrastructure.
1610:
847:
520:
495:
1713:
1500:
690:
and to provide continued professional development to cyber professionals. The official clusters are:
1198:
548:
480:
445:
682:
622:
490:
470:
455:
428:
Work in academia on information and cyber security can be delineated into research and teaching.
1746:
382:
Cyber Technical Advisory Group (CTAG), formerly the Public Sector IA Coordination Group (PSIACG)
292:
Defence Industrial Security Association (DISA), formerly the Guild of Security Controllers (GSC)
1576:
510:
465:
858:) provide a trusted environment where members of a community can share problems and solutions.
187:
The role of Lead Government Department (LGD) for Cyber Security is currently fulfilled by the
924:
530:
450:
334:
1736:
EC2ND 2006 - Proceedings of the Second European Conference on Computer Network Defence, 2006
1017:
525:
515:
505:
485:
314:
149:
8:
656:
271:
These organisation work collaboratively to publish not only the internal rules, but also
475:
460:
436:
NCSC has accredited several Academic Centres of Excellence in Cyber Security Research:
1045:
938:
General IA Products and Service Initiative (GIPSI), which was largely replaced by NIAF
1692:
1340:
1330:
905:
687:
651:
647:
118:
885:
824:
876:
who chaired the organisation until 2007, handing over to the current chairman Sir
913:
909:
972:
Community of Practice links, such as the Open Systems Software Foundation (OSSF)
410:), leading on Data Protection (DP) for Personally Identifiable Information (PII)
232:
114:
17:
1770:
1344:
877:
236:
97:
Many of the stakeholders across all categories are engaged with that effort.
20:
has a diverse cyber security community, interconnected in a complex network.
431:
1004:
174:(UK NACE), which deals predominantly with countering technical surveillance
140:(NCSC) is the UK's authority on cyber security; its parent organisation is
1324:
625:(CDF) promotes the global interests of the UK crypto development industry.
1653:
633:
279:
163:
The National Technical Authority for Protective Security (NTA-P) is the
402:
Two regulatory bodies have a specific cyber security related function:
371:
Within the WPS, there are a number of collaborative bodies, including:
170:
The National Technical Authority for Technical Security (NTA-T) is the
610:
105:
The overall responsibility for security within the UK rests with the
1596:
1309:
1260:
591:
337:(NCA) hosts the law enforcement cyber crime unit, incorporating the
94:
The UK Government periodically publishes a Cyber Security Strategy.
1142:"Defence Secretary announces ÂŁ40m Cyber Security Operations Centre"
893:
881:
136:
The National Technical Authority for Cyber Security (NTA-C) is the
1001:
UK 'wholly' unprepared to stop devastating cyber-attack, MPs warn
889:
638:
416:, leading on telecommunications and broadcast aspects of security
966:
Defence links, in particular with NATO and the Five Eyes Allies
935:
and Ross Parsell of Thales. The IACG ceased operation in 2014.
643:
1564:
Protecting and promoting the UK in a digital world: 2 years on
1482:
1390:
1358:
932:
901:
660:
585:
413:
36:
Information Security or InfoSec (late 1990s and early 2000s)
1524:
1282:"Academic Centres of Excellence in Cyber Security Research"
1240:
1212:
841:
375:
Assurance Specialism Advisory Group (ASAG), which runs the
322:
209:
The Department for Business & Industrial Strategy (BIS)
157:
141:
1614:
1376:
27:
Automated Data Processing Security or ADP Security (1980s)
1750:
1544:
1418:
1295:
897:
432:
Academic Centres of Excellence in Cyber Security Research
204:
Department for Business, Energy & Industrial Strategy
172:
UK National Technical Authority for Counter-Eavesdropping
1226:
543:
Association of Cyber Forensics and Threat Investigators
1566:– Government Press Release, retrieved 12 December 2013
304:
DIPCOG, the Defence Infosec Product Co-Operation Group
1404:
810:
Current bodies that cover multiple sectors include:
393:
CIPCOG, the Civil Infosec Product Co-Operation Group
154:
Centre for the Protection of National Infrastructure
317:consolidates offensive cyber capabilities from the
121:, intelligence coordination, and defence strategy.
39:
Information Assurance or IA (2000s and early 2010s)
617:Asset Disposal & Information Security Alliance
229:Office of Cyber Security and Information Assurance
189:Department for Science, Innovation, and Technology
1160:
1768:
1326:Managing risk and resilience in the supply chain
678:Worshipful Company of Information Technologists
339:Child Exploitation and Online Protection Centre
561:Council of Registered Ethical Security Testers
1058:
308:
117:tasked with overseeing all issues related to
1322:
1061:"National Cyber Security Strategy 2016-2021"
1134:
574:Chartered Institute of Information Security
289:Defence Cyber Protection Partnership (DCPP)
212:The Department for Trade and Industry (DTI)
30:Computer Security or CompuSec (early 1990s)
969:Standards links, predominantly through BSI
954:
916:and its effects on information assurance.
580:Institution of Engineering and Technology
197:Department for Culture, Media, and Sports
921:Information Assuarnce Coordination Group
912:. The 2012/13 work programme focused on
862:Former bodies in this category include:
598:Information Systems Security Association
389:Former bodies in this category include:
344:Former bodies in this category include:
300:Former bodies in this category include:
260:It has two main security organisations:
223:Former bodies in this category include:
1777:Computer security in the United Kingdom
1166:
646:, formerly known as Intellect, is a UK
406:The Information Commissioner's Office (
191:(DSIT), having previously rested with:
63:
1769:
870:Information Assurance Advisory Council
854:Warning, Advice and Reporting Points (
805:
650:for the technology industry. It has a
536:
352:
231:(OCSIA) supports the Minister for the
182:
165:National Protective Security Authority
100:
1329:. London : BSI Business Information.
1144:. Ministry of Defence. 1 April 2016.
348:National High Tech Crime Unit (NHTCU)
248:
84:
844:, aimed at "making software better".
501:Royal Holloway, University of London
397:
275:and Industry Security Notices (ISN)
89:
1677:. National Archives. Archived from
1167:Hammick, Murray (30 October 2018).
132:information and/or cyber security:
13:
1458:"Intellect Defence & Security"
1148:from the original on 25 April 2019
779:South West Cyber Cluster (Exeter)
604:
328:
14:
1798:
1545:"Trustworthy Software Foundation"
1059:HM Government (1 November 2016).
1241:"Cyber Technical Advisory Group"
33:IT Security or ITSec (mid 1990s)
1782:Computer security organizations
1739:
1730:
1699:
1685:
1667:
1642:
1628:
1603:
1589:
1569:
1557:
1537:
1517:
1493:
1475:
1450:
1425:
1411:
1397:
1383:
1369:
1351:
1316:
1302:
1288:
1274:
1253:
1233:
1219:
1205:
1191:
838:Trustworthy Software Initiative
834:Trustworthy Software Foundation
686:the UK to engage the public in
1787:Internet in the United Kingdom
1120:
1095:
1081:
1052:
1038:
1024:
1010:
994:
138:National Cyber Security Centre
80:, the Digital Policy Alliance
68:
1:
988:
983:British intelligence agencies
815:British Standards Institution
570:level and team leader levels.
555:Business Continuity Institute
1032:"UK Cyber Security Strategy"
7:
1675:"Establishment of the IACG"
976:
963:Inter-governmental linkages
674:UK Cloud Pooled Audit Group
423:
144:. It absorbed and replaced
10:
1803:
1433:"Intellect Cyber Security"
709:Bournemouth Cyber Cluster
441:Queen's University Belfast
309:National Cyber Force (NCF)
848:UK Cyber Security Council
739:North East Cyber Cluster
521:University of Southampton
496:University College London
241:National Security Council
107:National Security Council
1201:. HMG. 23 November 2023.
1175:. London. Archived from
1169:"The Budget and Defence"
1130:. HMG. 14 December 2023.
549:British Computer Society
446:University of Birmingham
764:Scottish Cyber Cluster
704:Bristol and Bath Cyber
683:UK Cyber Security Forum
623:Crypto Developers Forum
491:Imperial College London
471:University of Edinburgh
456:University of Cambridge
1636:"IAAC - Neville-Jones"
955:International Linkages
874:Baroness Neville-Jones
827:. It subsumed ITSafe.
794:West Midlands Cluster
789:Thames Valley Cluster
734:Norfolk Cyber Cluster
511:Northumbria University
466:De Montfort University
1323:Kaye, David. (2008).
925:information assurance
880:. Affiliates include
769:Solent Cyber Cluster
531:University of Warwick
481:King's College London
451:University of Bristol
379:series of Conferences
335:National Crime Agency
526:University of Surrey
516:University of Oxford
506:Newcastle University
486:Lancaster University
315:National Cyber Force
150:information security
64:Public sector bodies
47:Public sector bodies
806:Cross-sector bodies
754:N Somerset Cluster
749:North West Cluster
695:
657:Roke Manor Research
537:Professional bodies
353:Wider Public Sector
319:Ministry of Defence
255:Ministry of Defence
183:Civilian components
101:Capstone components
59:Cross-sector bodies
53:Professional bodies
1707:"IA Community Map"
1363:crest-approved.org
1263:. 20 November 2023
1179:on 22 October 2019
1173:The Military Times
799:Yorkshire Cluster
714:Cambridge Cluster
699:UK Cyber Clusters
694:
476:University of Kent
461:Cardiff University
249:Defence components
85:Central government
1336:978-1-62198-414-6
906:Ultra Electronics
803:
802:
648:trade association
629:IT Security Forum
398:Regulatory bodies
367:Local Authorities
273:Defence Standards
119:national security
111:cabinet committee
90:National strategy
1794:
1762:
1761:
1759:
1758:
1749:. Archived from
1743:
1737:
1734:
1728:
1727:
1725:
1724:
1718:
1712:. Archived from
1711:
1703:
1697:
1696:
1689:
1683:
1682:
1671:
1665:
1664:
1662:
1661:
1652:. Archived from
1646:
1640:
1639:
1632:
1626:
1625:
1623:
1622:
1613:. Archived from
1607:
1601:
1600:
1593:
1587:
1586:
1584:
1583:
1573:
1567:
1561:
1555:
1554:
1552:
1551:
1541:
1535:
1534:
1532:
1531:
1521:
1515:
1514:
1512:
1511:
1505:www.bsigroup.com
1497:
1491:
1490:
1479:
1473:
1472:
1470:
1469:
1460:. Archived from
1454:
1448:
1447:
1445:
1444:
1435:. Archived from
1429:
1423:
1422:
1415:
1409:
1408:
1401:
1395:
1394:
1387:
1381:
1380:
1373:
1367:
1366:
1355:
1349:
1348:
1320:
1314:
1313:
1306:
1300:
1299:
1292:
1286:
1285:
1278:
1272:
1271:
1269:
1268:
1257:
1251:
1250:
1248:
1247:
1237:
1231:
1230:
1223:
1217:
1216:
1209:
1203:
1202:
1195:
1189:
1188:
1186:
1184:
1164:
1158:
1157:
1155:
1153:
1138:
1132:
1131:
1124:
1118:
1117:
1115:
1114:
1105:. Archived from
1099:
1093:
1092:
1085:
1079:
1078:
1076:
1074:
1065:
1056:
1050:
1049:
1042:
1036:
1035:
1028:
1022:
1021:
1014:
1008:
998:
886:Northrop Grumman
825:internet privacy
729:Malvern Cluster
696:
693:
1802:
1801:
1797:
1796:
1795:
1793:
1792:
1791:
1767:
1766:
1765:
1756:
1754:
1745:
1744:
1740:
1735:
1731:
1722:
1720:
1716:
1709:
1705:
1704:
1700:
1693:"IACG Overview"
1691:
1690:
1686:
1673:
1672:
1668:
1659:
1657:
1650:"IAAC Sponsors"
1648:
1647:
1643:
1634:
1633:
1629:
1620:
1618:
1609:
1608:
1604:
1595:
1594:
1590:
1581:
1579:
1575:
1574:
1570:
1562:
1558:
1549:
1547:
1543:
1542:
1538:
1529:
1527:
1523:
1522:
1518:
1509:
1507:
1499:
1498:
1494:
1487:tigerscheme.org
1481:
1480:
1476:
1467:
1465:
1456:
1455:
1451:
1442:
1440:
1431:
1430:
1426:
1417:
1416:
1412:
1403:
1402:
1398:
1389:
1388:
1384:
1375:
1374:
1370:
1357:
1356:
1352:
1337:
1321:
1317:
1308:
1307:
1303:
1294:
1293:
1289:
1280:
1279:
1275:
1266:
1264:
1259:
1258:
1254:
1245:
1243:
1239:
1238:
1234:
1225:
1224:
1220:
1211:
1210:
1206:
1197:
1196:
1192:
1182:
1180:
1165:
1161:
1151:
1149:
1140:
1139:
1135:
1126:
1125:
1121:
1112:
1110:
1101:
1100:
1096:
1087:
1086:
1082:
1072:
1070:
1063:
1057:
1053:
1044:
1043:
1039:
1030:
1029:
1025:
1016:
1015:
1011:
999:
995:
991:
979:
957:
914:consumerisation
910:GlaxoSmithKline
821:Get Safe Online
808:
784:Sussex Cluster
607:
605:Industry groups
539:
434:
426:
400:
355:
331:
329:Law Enforcement
311:
251:
244:Security Group.
185:
113:chaired by the
103:
92:
87:
71:
66:
56:Industry groups
12:
11:
5:
1800:
1790:
1789:
1784:
1779:
1764:
1763:
1738:
1729:
1698:
1684:
1681:on 2008-03-05.
1666:
1641:
1627:
1602:
1588:
1568:
1556:
1536:
1516:
1492:
1474:
1449:
1424:
1410:
1396:
1382:
1368:
1350:
1335:
1315:
1310:"BCS Security"
1301:
1287:
1273:
1252:
1232:
1218:
1204:
1190:
1159:
1133:
1119:
1094:
1080:
1051:
1037:
1023:
1009:
992:
990:
987:
986:
985:
978:
975:
974:
973:
970:
967:
964:
956:
953:
952:
951:
945:
939:
936:
917:
867:
860:
859:
852:
845:
831:
828:
818:
807:
804:
801:
800:
796:
795:
791:
790:
786:
785:
781:
780:
776:
775:
771:
770:
766:
765:
761:
760:
756:
755:
751:
750:
746:
745:
741:
740:
736:
735:
731:
730:
726:
725:
721:
720:
719:East Midlands
716:
715:
711:
710:
706:
705:
701:
700:
692:
691:
688:cyber security
680:
671:
664:
652:Cyber Security
641:
636:
631:
626:
620:
614:
606:
603:
602:
601:
595:
589:
583:
577:
571:
564:
558:
552:
546:
538:
535:
534:
533:
528:
523:
518:
513:
508:
503:
498:
493:
488:
483:
478:
473:
468:
463:
458:
453:
448:
443:
433:
430:
425:
422:
418:
417:
411:
399:
396:
395:
394:
387:
386:
383:
380:
369:
368:
365:
362:
354:
351:
350:
349:
330:
327:
310:
307:
306:
305:
298:
297:
293:
290:
269:
268:
265:
250:
247:
246:
245:
233:Cabinet Office
214:
213:
210:
207:
200:
184:
181:
176:
175:
168:
161:
126:Vincent Devine
115:Prime Minister
102:
99:
91:
88:
86:
83:
82:
81:
70:
67:
65:
62:
61:
60:
57:
54:
51:
48:
41:
40:
37:
34:
31:
28:
18:United Kingdom
9:
6:
4:
3:
2:
1799:
1788:
1785:
1783:
1780:
1778:
1775:
1774:
1772:
1753:on 2016-10-21
1752:
1748:
1742:
1733:
1719:on 2013-07-31
1715:
1708:
1702:
1694:
1688:
1680:
1676:
1670:
1656:on 2017-06-07
1655:
1651:
1645:
1637:
1631:
1617:on 2018-04-10
1616:
1612:
1606:
1598:
1592:
1578:
1572:
1565:
1560:
1546:
1540:
1526:
1520:
1506:
1502:
1496:
1488:
1484:
1478:
1464:on 2013-06-14
1463:
1459:
1453:
1439:on 2013-06-14
1438:
1434:
1428:
1420:
1414:
1406:
1400:
1392:
1386:
1378:
1372:
1364:
1360:
1354:
1346:
1342:
1338:
1332:
1328:
1327:
1319:
1311:
1305:
1297:
1291:
1283:
1277:
1262:
1261:"ICO - About"
1256:
1242:
1236:
1228:
1222:
1214:
1208:
1200:
1194:
1178:
1174:
1170:
1163:
1147:
1143:
1137:
1129:
1123:
1109:on 2013-01-23
1108:
1104:
1098:
1090:
1084:
1069:
1062:
1055:
1047:
1041:
1033:
1027:
1019:
1013:
1007:
1006:
1002:
997:
993:
984:
981:
980:
971:
968:
965:
962:
961:
960:
949:
946:
943:
940:
937:
934:
930:
929:Colin Robbins
926:
922:
918:
915:
911:
907:
903:
899:
895:
891:
887:
883:
879:
878:Edmund Burton
875:
871:
868:
865:
864:
863:
857:
853:
849:
846:
843:
839:
835:
832:
829:
826:
822:
819:
816:
813:
812:
811:
798:
797:
793:
792:
788:
787:
783:
782:
778:
777:
773:
772:
768:
767:
763:
762:
758:
757:
753:
752:
748:
747:
743:
742:
738:
737:
733:
732:
728:
727:
723:
722:
718:
717:
713:
712:
708:
707:
703:
702:
698:
697:
689:
684:
681:
679:
675:
672:
668:
665:
662:
658:
653:
649:
645:
642:
640:
637:
635:
632:
630:
627:
624:
621:
618:
615:
612:
609:
608:
599:
596:
593:
590:
587:
584:
581:
578:
575:
572:
568:
565:
562:
559:
556:
553:
550:
547:
544:
541:
540:
532:
529:
527:
524:
522:
519:
517:
514:
512:
509:
507:
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
438:
437:
429:
421:
415:
412:
409:
405:
404:
403:
392:
391:
390:
384:
381:
378:
374:
373:
372:
366:
363:
360:
359:
358:
347:
346:
345:
342:
340:
336:
326:
324:
320:
316:
303:
302:
301:
294:
291:
288:
287:
286:
283:
281:
276:
274:
266:
263:
262:
261:
258:
256:
242:
238:
237:Francis Maude
235:, the Rt Hon
234:
230:
226:
225:
224:
221:
218:
211:
208:
205:
201:
198:
194:
193:
192:
190:
180:
173:
169:
166:
162:
159:
155:
151:
147:
143:
139:
135:
134:
133:
129:
127:
122:
120:
116:
112:
108:
98:
95:
79:
76:
75:
74:
58:
55:
52:
49:
46:
45:
44:
38:
35:
32:
29:
26:
25:
24:
21:
19:
1755:. Retrieved
1751:the original
1741:
1732:
1721:. Retrieved
1714:the original
1701:
1687:
1679:the original
1669:
1658:. Retrieved
1654:the original
1644:
1630:
1619:. Retrieved
1615:the original
1605:
1591:
1580:. Retrieved
1571:
1559:
1548:. Retrieved
1539:
1528:. Retrieved
1519:
1508:. Retrieved
1504:
1495:
1486:
1477:
1466:. Retrieved
1462:the original
1452:
1441:. Retrieved
1437:the original
1427:
1413:
1399:
1385:
1371:
1362:
1353:
1325:
1318:
1304:
1290:
1276:
1265:. Retrieved
1255:
1244:. Retrieved
1235:
1221:
1207:
1193:
1181:. Retrieved
1177:the original
1172:
1162:
1150:. Retrieved
1136:
1122:
1111:. Retrieved
1107:the original
1097:
1089:"Committees"
1083:
1071:. Retrieved
1067:
1054:
1040:
1026:
1012:
1005:The Guardian
1003:
996:
958:
861:
809:
774:South Wales
744:North Wales
567:Cyber Scheme
435:
427:
419:
401:
388:
370:
356:
343:
332:
312:
299:
284:
277:
270:
259:
252:
222:
219:
215:
186:
177:
130:
123:
104:
96:
93:
72:
42:
22:
15:
1501:"BSI - NSB"
667:Tigerscheme
634:Law Society
280:MoD Corsham
239:MP and the
109:which is a
69:Legislative
1771:Categories
1757:2013-08-21
1723:2013-01-14
1660:2016-05-17
1621:2013-01-14
1582:2023-12-24
1550:2023-12-24
1530:2023-12-24
1510:2023-12-24
1468:2013-01-16
1443:2013-01-14
1296:"ACFTI UK"
1267:2023-12-24
1246:2023-12-24
1113:2013-01-14
1073:2 November
989:References
1377:"ISSA UK"
1345:849744629
361:Education
1747:"NDI UK"
1419:"techUK"
1227:"UK CeB"
1146:Archived
977:See also
894:Raytheon
882:BT Group
424:Academia
296:support.
50:Academia
1577:"UKCSC"
1284:. NCSC.
1152:2 April
1103:"OCSIA"
1018:"EURIM"
890:QinetiQ
851:online.
759:Oxford
724:London
639:Nominet
619:, ADISA
1611:"IAAC"
1597:"WARP"
1525:"NIAF"
1483:"Home"
1359:"Home"
1343:
1333:
1213:"DISA"
1199:"DCPP"
1068:gov.uk
1048:. HMG.
1046:"GCSO"
1034:. HMG.
942:ITSafe
644:TechUK
592:(ISC)²
364:Health
206:(BEIS)
199:(DCMS)
1717:(PDF)
1710:(PDF)
1405:"CDF"
1391:"ADS"
1183:7 May
1128:"ISN"
1064:(PDF)
933:Nexor
902:O2 UK
856:WARPs
661:Nexor
586:ISACA
414:OFCOM
148:(the
78:EURIM
1341:OCLC
1331:ISBN
1185:2020
1154:2016
1075:2016
919:The
908:and
842:NPSA
377:SUAC
333:The
323:GCHQ
321:and
313:The
253:The
227:The
202:The
195:The
158:NPSA
146:CESG
142:GCHQ
16:The
948:NDI
931:of
898:PwC
611:ADS
408:ICO
1773::
1503:.
1485:.
1361:.
1339:.
1171:.
1066:.
904:,
900:,
896:,
892:,
888:,
884:,
341:.
325:.
282:.
128:.
1760:.
1726:.
1695:.
1663:.
1638:.
1624:.
1599:.
1585:.
1553:.
1533:.
1513:.
1489:.
1471:.
1446:.
1421:.
1407:.
1393:.
1379:.
1365:.
1347:.
1312:.
1298:.
1270:.
1249:.
1229:.
1215:.
1187:.
1156:.
1116:.
1091:.
1077:.
1020:.
663:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.