Knowledge

UK cyber security community

Source đź“ť

563:(CREST) is a Not for profit accreditation and certification organization. CREST does not have its own study material and leverage on third party coursework so that the member can become certified. As of 24/8/2022, the cost of CREST membership is 5000GBP for membership of one country chapter and 25000GBP for a regional membership. On two occasions between 2012 and 2014, the examination-related activities of one of more NCC Group employees and candidates breached the CREST Code of Conduct and NCC Group was, as their employer, vicariously responsible for those individuals at the time 545:(ACFTI) is a not-for-profit, international professional organization focusing on the academics and research of cybersecurity, digital forensics, incident response, and threat investigations and their influence to the society. The vision of the association is to promote research and education in cybersecurity, digital forensics, incident response, and threat investigations fields and to contribute to the creation and dissemination of knowledge and technology in these domains. 817:(BSI), the UK's National Standards Body (NSB), which not only produces British Standards (BS) and Publicly Available Specifications (PAS) in the areas of Information and Cyber Security, but also provides the UK interface into international Standards Development Organisations (SDO), including ISO, IEC, ITU-T, CEN, CENELEC, and ETSI. The main Expert Committees for BSI relevant to these topic are IST/33 (Information and Cyber Security) and ICT/003 (Trustworthy Systems) 156:(CPNI). NCSC provides advice and support for the public and private sector in how to avoid cyber threats. CESG (originally Communications-Electronics Security Group) was a branch of GCHQ which worked to secure the communications and information systems of the government and critical parts of UK national infrastructure. The 669:
is a commercial certification scheme for technical security specialists, backed by university standards and covering a wide range of expertise. Tigerscheme is CESG certified in the UK and candidates are subject to an independent rigorous academic assessment authority. Tigerscheme was founded in 2007
685:
is a social enterprise representing cyber SME's (Small and Medium Enterprise) in the UK. The forum is composed of 20 regional cyber clusters around the UK. Each cluster is run as a subsidiary of the UK Cyber Security Forum and all are operated by groups of volunteers. They provide events around
670:
on the principle that a commercial certification scheme run on independent lines would give buyers of security testing services confidence that they were hiring a recognised and reputable company. In June 2014 the operational authority for Tigerscheme was transferred to USW Commercial Services Ltd.
569:
is a not for profit professional examination body under contract to the National Cyber Security Centre to provide technical exams in support of the government's assured penetration testing company scheme CHECK. The exams are independent and rigorous and are conducted for practitioner team member
576:(CIISec), formerly the Institute of Information Security Professionals (IISP), is an independent, non-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole. 131:
The central organisation supporting the GCSO is the Government Security Group (GSG), with a distributed Government Security Function / Government Security Profession across the departments and Arms Length Bodies (ALB), and three National Technical Authorities (NTA), all of which have a role in
243:
in determining priorities in relation to securing cyberspace. The unit provided strategic direction and coordinates action relating to enhancing cyber security and information assurance in the UK. The OCSIA was headed by James Quinault., but the function has been subsumed into the Government
295:
Team Defence Information (the current operating name for the UK Council for Electronic Business (UKCeB)), which is a not-for-profit, membership organisation whose mission is to transform secure information sharing for through life collaboration in defence acquisition and
850:
is the self-regulatory body for the UK's cyber security profession. It develops, promotes and stewards nationally recognised standards for cyber security in support of the UK Government's National Cyber Security Strategy to make the UK the safest place to live and work
557:(BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. BCI has a six certification standards to ensure individual practitioners literacy in organizations, responses, and other strategies. 216:
DSIT is responsible for supporting and promoting the UK cyber security sector, promoting cyber security research and innovation, and working with the National Cyber Security Centre to help ensure all UK organisations are secure online and resilient to cyber threats.
676:(UK CPAG) is a membership organisation consisting of the UK's largest banks. Established in 2020 with a mission to use the collective power of the banks to audit Cloud Service Providers such as Google, Amazon and Microsoft. The group is operated by the 167:(NPSA) is the successor organisation to CPNI, but retains some elements of information and cyber security that were not transferred to NCSC, including for Cyber Physical Systems (CPS), and for security containers, locks, and structures to protect assets 582:(IET) is a multidisciplinary professional engineering institution, formed in 2006 from two separate institutions: the Institution of Electrical Engineers, dating back to 1871, and the Institution of Incorporated Engineers dating back to 1884 178:
Coordination of activity across government is through a series of committees, both from within the world of security, and in aligned domains such as the Chief Technology Officers (CTO), and Knowledge and Information Management (KIM).
836:(TSFdn) which is a UK public good activity aimed to encouraging good proactive in systems specification, realisation, and use, and providing related independent Organisational and Solution Conformity Assessments. It arose from the 171: 542: 228: 188: 616: 560: 654:
Group focused on “high threat” areas – including defence, national security and resilience, protection of critical national infrastructure, intelligence, and organised crime, chaired by Dr Andrew Rogoyski of
278:
In April 2016, the MOD announced the creation of the Cyber Security Operations Centre (CSOC) "to protect the MOD's cyberspace from malicious actors" with a budget of over ÂŁ40 million. It is located at
196: 920: 257:
has primacy for information and cyber security within both its civilian and military staffs (approximately 250,000 personnel), and for the Defence Supply Base (DSB - approximately 30,000 companies).
551:(BCS) is a professional body and a learned society that represents those working in information technology both in the United Kingdom and internationally. It has a security, data and privacy group. 220:
All other government departments and ALBs will have staff in the government security function / government security profession, supporting both their internal staff, and their client communities.
869: 23:
Although the terminology is currently largely aligned to a "cyber" view of the world, it is taken to still include information-related concerns, with previous predominant terminology including:
840:(TSI), previously the Software Security, Dependability and Reliability Initiative (SSDRI), and the Secure Software Development Partnership (SSDP), which were sponsored by the UK government's 927:
products and services operating within the UK public sector. The group maintained the UK information assurance community map, hosted on the CESG's web site. It has two co-chairs:
1674: 1145: 659:. The Security and Resilience Group works to build relationships between the technology industry and policymakers, customers and end users, and is chaired by Stephen Kingan of 594:
is the International Information Systems Security Certification Consortium is a non-profit organization which specializes in information security education and certifications.
124:
The internal protective security coordination role for UK government is led by the Government Chief Security Officer (GCSO) within the Cabinet Office, who since 2021 has been
673: 385:
Cyber Aware is a cross-government awareness and behaviour campaign which provides advice on the simple measures individuals can take to protect themselves from cyber crime.
1102: 872:(IAAC) worked across industry, government and academia towards ensuring the UK's information society has a robust, resilient and secure foundation. The IAAC was set up by 830:
National IA Forum (NIAF), an independent committee of leading UK Public and Private Sector Information Assurance (IA) experts, which largely replaced the role of GIPSI
203: 152:
arm of GCHQ) as well as the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the former
420:
Most other regulatory bodies will have staff covering information and cyber security function for both their internal staff, and their client communities.
153: 1457: 1432: 628: 357:
The Wider Public Sector (WPS) covers both the Central Government and Law Enforcement categories that are itemised separately, but also elements such as:
272: 1060: 923:(IACG) was formed following the UK's national IA conference in 2006. The IACG encourages greater collaboration between the commercial supply base for 1168: 588:
is an international professional association that deals with IT governance. Previously known as the Information Systems Audit and Control Association.
820: 1000: 1776: 600:(ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. There is a UK chapter. 125: 677: 338: 137: 1706: 566: 873: 666: 944:(IT Security Awareness for Everyone) was a former government-funded organisation that provided alerts, which was subsumed into GetSafeOnline 573: 240: 106: 1141: 579: 145: 1781: 1563: 947: 941: 597: 950:
was a former government-funded organisation building supply chains for the MOD and manufacturers using SMEs in the United Kingdom.
1786: 77: 43:
The significant constituents within that community are probably best understood by grouping into high level categories, namely:
1106: 376: 164: 1635: 1334: 500: 407: 318: 254: 1281: 1678: 1088: 73:
According to a parliamentary committee the UK government is not doing enough to protect the nation against cyber attack.
866:
Cyber Security Knowledge Transfer Network (CS KTN), as sponsored by Innovate UK (formerly the Technology Strategy Board)
285:
MOD collaborates with the DSB over information and cyber security matters through a number of organisations, including:
959:
Many of these categories will provide linkages from the UK to other nations' activities in cyber security, including:
823:(GSOL) is a United Kingdom-based campaign and national initiative to teach citizens about basic computer security and 928: 1649: 110: 837: 833: 1461: 1436: 982: 814: 554: 440: 1127: 613:
is a trade organisation for companies operating in the UK aerospace, defence, security and space industries.
1176: 1031: 264:
The Directorate of Security and Resilience (DSR), predominantly focused on physical and personnel security
855: 267:
The Directorate of Cyber Defence and Risk (CyDR), predominantly focused on information and cyber security
160:
provided protective security advice to businesses and organisations across the national infrastructure.
1610: 847: 520: 495: 1713: 1500: 690:
and to provide continued professional development to cyber professionals. The official clusters are:
1198: 548: 480: 445: 682: 622: 490: 470: 455: 428:
Work in academia on information and cyber security can be delineated into research and teaching.
1746: 382:
Cyber Technical Advisory Group (CTAG), formerly the Public Sector IA Coordination Group (PSIACG)
292:
Defence Industrial Security Association (DISA), formerly the Guild of Security Controllers (GSC)
1576: 510: 465: 858:) provide a trusted environment where members of a community can share problems and solutions. 187:
The role of Lead Government Department (LGD) for Cyber Security is currently fulfilled by the
924: 530: 450: 334: 1736:
EC2ND 2006 - Proceedings of the Second European Conference on Computer Network Defence, 2006
1017: 525: 515: 505: 485: 314: 149: 8: 656: 271:
These organisation work collaboratively to publish not only the internal rules, but also
475: 460: 436:
NCSC has accredited several Academic Centres of Excellence in Cyber Security Research:
1045: 938:
General IA Products and Service Initiative (GIPSI), which was largely replaced by NIAF
1692: 1340: 1330: 905: 687: 651: 647: 118: 885: 824: 876:
who chaired the organisation until 2007, handing over to the current chairman Sir
913: 909: 972:
Community of Practice links, such as the Open Systems Software Foundation (OSSF)
410:), leading on Data Protection (DP) for Personally Identifiable Information (PII) 232: 114: 17: 1770: 1344: 877: 236: 97:
Many of the stakeholders across all categories are engaged with that effort.
20:
has a diverse cyber security community, interconnected in a complex network.
431: 1004: 174:(UK NACE), which deals predominantly with countering technical surveillance 140:(NCSC) is the UK's authority on cyber security; its parent organisation is 1324: 625:(CDF) promotes the global interests of the UK crypto development industry. 1653: 633: 279: 163:
The National Technical Authority for Protective Security (NTA-P) is the
402:
Two regulatory bodies have a specific cyber security related function:
371:
Within the WPS, there are a number of collaborative bodies, including:
170:
The National Technical Authority for Technical Security (NTA-T) is the
610: 105:
The overall responsibility for security within the UK rests with the
1596: 1309: 1260: 591: 337:(NCA) hosts the law enforcement cyber crime unit, incorporating the 94:
The UK Government periodically publishes a Cyber Security Strategy.
1142:"Defence Secretary announces ÂŁ40m Cyber Security Operations Centre" 893: 881: 136:
The National Technical Authority for Cyber Security (NTA-C) is the
1001:
UK 'wholly' unprepared to stop devastating cyber-attack, MPs warn
889: 638: 416:, leading on telecommunications and broadcast aspects of security 966:
Defence links, in particular with NATO and the Five Eyes Allies
935:
and Ross Parsell of Thales. The IACG ceased operation in 2014.
643: 1564:
Protecting and promoting the UK in a digital world: 2 years on
1482: 1390: 1358: 932: 901: 660: 585: 413: 36:
Information Security or InfoSec (late 1990s and early 2000s)
1524: 1282:"Academic Centres of Excellence in Cyber Security Research" 1240: 1212: 841: 375:
Assurance Specialism Advisory Group (ASAG), which runs the
322: 209:
The Department for Business & Industrial Strategy (BIS)
157: 141: 1614: 1376: 27:
Automated Data Processing Security or ADP Security (1980s)
1750: 1544: 1418: 1295: 897: 432:
Academic Centres of Excellence in Cyber Security Research
204:
Department for Business, Energy & Industrial Strategy
172:
UK National Technical Authority for Counter-Eavesdropping
1226: 543:
Association of Cyber Forensics and Threat Investigators
1566:– Government Press Release, retrieved 12 December 2013 304:
DIPCOG, the Defence Infosec Product Co-Operation Group
1404: 810:
Current bodies that cover multiple sectors include:
393:
CIPCOG, the Civil Infosec Product Co-Operation Group
154:
Centre for the Protection of National Infrastructure
317:consolidates offensive cyber capabilities from the 121:, intelligence coordination, and defence strategy. 39:
Information Assurance or IA (2000s and early 2010s)
617:Asset Disposal & Information Security Alliance 229:Office of Cyber Security and Information Assurance 189:Department for Science, Innovation, and Technology 1160: 1768: 1326:Managing risk and resilience in the supply chain 678:Worshipful Company of Information Technologists 339:Child Exploitation and Online Protection Centre 561:Council of Registered Ethical Security Testers 1058: 308: 117:tasked with overseeing all issues related to 1322: 1061:"National Cyber Security Strategy 2016-2021" 1134: 574:Chartered Institute of Information Security 289:Defence Cyber Protection Partnership (DCPP) 212:The Department for Trade and Industry (DTI) 30:Computer Security or CompuSec (early 1990s) 969:Standards links, predominantly through BSI 954: 916:and its effects on information assurance. 580:Institution of Engineering and Technology 197:Department for Culture, Media, and Sports 921:Information Assuarnce Coordination Group 912:. The 2012/13 work programme focused on 862:Former bodies in this category include: 598:Information Systems Security Association 389:Former bodies in this category include: 344:Former bodies in this category include: 300:Former bodies in this category include: 260:It has two main security organisations: 223:Former bodies in this category include: 1777:Computer security in the United Kingdom 1166: 646:, formerly known as Intellect, is a UK 406:The Information Commissioner's Office ( 191:(DSIT), having previously rested with: 63: 1769: 870:Information Assurance Advisory Council 854:Warning, Advice and Reporting Points ( 805: 650:for the technology industry. It has a 536: 352: 231:(OCSIA) supports the Minister for the 182: 165:National Protective Security Authority 100: 1329:. London : BSI Business Information. 1144:. Ministry of Defence. 1 April 2016. 348:National High Tech Crime Unit (NHTCU) 248: 84: 844:, aimed at "making software better". 501:Royal Holloway, University of London 397: 275:and Industry Security Notices (ISN) 89: 1677:. National Archives. Archived from 1167:Hammick, Murray (30 October 2018). 132:information and/or cyber security: 13: 1458:"Intellect Defence & Security" 1148:from the original on 25 April 2019 779:South West Cyber Cluster (Exeter) 604: 328: 14: 1798: 1545:"Trustworthy Software Foundation" 1059:HM Government (1 November 2016). 1241:"Cyber Technical Advisory Group" 33:IT Security or ITSec (mid 1990s) 1782:Computer security organizations 1739: 1730: 1699: 1685: 1667: 1642: 1628: 1603: 1589: 1569: 1557: 1537: 1517: 1493: 1475: 1450: 1425: 1411: 1397: 1383: 1369: 1351: 1316: 1302: 1288: 1274: 1253: 1233: 1219: 1205: 1191: 838:Trustworthy Software Initiative 834:Trustworthy Software Foundation 686:the UK to engage the public in 1787:Internet in the United Kingdom 1120: 1095: 1081: 1052: 1038: 1024: 1010: 994: 138:National Cyber Security Centre 80:, the Digital Policy Alliance 68: 1: 988: 983:British intelligence agencies 815:British Standards Institution 570:level and team leader levels. 555:Business Continuity Institute 1032:"UK Cyber Security Strategy" 7: 1675:"Establishment of the IACG" 976: 963:Inter-governmental linkages 674:UK Cloud Pooled Audit Group 423: 144:. It absorbed and replaced 10: 1803: 1433:"Intellect Cyber Security" 709:Bournemouth Cyber Cluster 441:Queen's University Belfast 309:National Cyber Force (NCF) 848:UK Cyber Security Council 739:North East Cyber Cluster 521:University of Southampton 496:University College London 241:National Security Council 107:National Security Council 1201:. HMG. 23 November 2023. 1175:. London. Archived from 1169:"The Budget and Defence" 1130:. HMG. 14 December 2023. 549:British Computer Society 446:University of Birmingham 764:Scottish Cyber Cluster 704:Bristol and Bath Cyber 683:UK Cyber Security Forum 623:Crypto Developers Forum 491:Imperial College London 471:University of Edinburgh 456:University of Cambridge 1636:"IAAC - Neville-Jones" 955:International Linkages 874:Baroness Neville-Jones 827:. It subsumed ITSafe. 794:West Midlands Cluster 789:Thames Valley Cluster 734:Norfolk Cyber Cluster 511:Northumbria University 466:De Montfort University 1323:Kaye, David. (2008). 925:information assurance 880:. Affiliates include 769:Solent Cyber Cluster 531:University of Warwick 481:King's College London 451:University of Bristol 379:series of Conferences 335:National Crime Agency 526:University of Surrey 516:University of Oxford 506:Newcastle University 486:Lancaster University 315:National Cyber Force 150:information security 64:Public sector bodies 47:Public sector bodies 806:Cross-sector bodies 754:N Somerset Cluster 749:North West Cluster 695: 657:Roke Manor Research 537:Professional bodies 353:Wider Public Sector 319:Ministry of Defence 255:Ministry of Defence 183:Civilian components 101:Capstone components 59:Cross-sector bodies 53:Professional bodies 1707:"IA Community Map" 1363:crest-approved.org 1263:. 20 November 2023 1179:on 22 October 2019 1173:The Military Times 799:Yorkshire Cluster 714:Cambridge Cluster 699:UK Cyber Clusters 694: 476:University of Kent 461:Cardiff University 249:Defence components 85:Central government 1336:978-1-62198-414-6 906:Ultra Electronics 803: 802: 648:trade association 629:IT Security Forum 398:Regulatory bodies 367:Local Authorities 273:Defence Standards 119:national security 111:cabinet committee 90:National strategy 1794: 1762: 1761: 1759: 1758: 1749:. Archived from 1743: 1737: 1734: 1728: 1727: 1725: 1724: 1718: 1712:. Archived from 1711: 1703: 1697: 1696: 1689: 1683: 1682: 1671: 1665: 1664: 1662: 1661: 1652:. Archived from 1646: 1640: 1639: 1632: 1626: 1625: 1623: 1622: 1613:. Archived from 1607: 1601: 1600: 1593: 1587: 1586: 1584: 1583: 1573: 1567: 1561: 1555: 1554: 1552: 1551: 1541: 1535: 1534: 1532: 1531: 1521: 1515: 1514: 1512: 1511: 1505:www.bsigroup.com 1497: 1491: 1490: 1479: 1473: 1472: 1470: 1469: 1460:. Archived from 1454: 1448: 1447: 1445: 1444: 1435:. Archived from 1429: 1423: 1422: 1415: 1409: 1408: 1401: 1395: 1394: 1387: 1381: 1380: 1373: 1367: 1366: 1355: 1349: 1348: 1320: 1314: 1313: 1306: 1300: 1299: 1292: 1286: 1285: 1278: 1272: 1271: 1269: 1268: 1257: 1251: 1250: 1248: 1247: 1237: 1231: 1230: 1223: 1217: 1216: 1209: 1203: 1202: 1195: 1189: 1188: 1186: 1184: 1164: 1158: 1157: 1155: 1153: 1138: 1132: 1131: 1124: 1118: 1117: 1115: 1114: 1105:. Archived from 1099: 1093: 1092: 1085: 1079: 1078: 1076: 1074: 1065: 1056: 1050: 1049: 1042: 1036: 1035: 1028: 1022: 1021: 1014: 1008: 998: 886:Northrop Grumman 825:internet privacy 729:Malvern Cluster 696: 693: 1802: 1801: 1797: 1796: 1795: 1793: 1792: 1791: 1767: 1766: 1765: 1756: 1754: 1745: 1744: 1740: 1735: 1731: 1722: 1720: 1716: 1709: 1705: 1704: 1700: 1693:"IACG Overview" 1691: 1690: 1686: 1673: 1672: 1668: 1659: 1657: 1650:"IAAC Sponsors" 1648: 1647: 1643: 1634: 1633: 1629: 1620: 1618: 1609: 1608: 1604: 1595: 1594: 1590: 1581: 1579: 1575: 1574: 1570: 1562: 1558: 1549: 1547: 1543: 1542: 1538: 1529: 1527: 1523: 1522: 1518: 1509: 1507: 1499: 1498: 1494: 1487:tigerscheme.org 1481: 1480: 1476: 1467: 1465: 1456: 1455: 1451: 1442: 1440: 1431: 1430: 1426: 1417: 1416: 1412: 1403: 1402: 1398: 1389: 1388: 1384: 1375: 1374: 1370: 1357: 1356: 1352: 1337: 1321: 1317: 1308: 1307: 1303: 1294: 1293: 1289: 1280: 1279: 1275: 1266: 1264: 1259: 1258: 1254: 1245: 1243: 1239: 1238: 1234: 1225: 1224: 1220: 1211: 1210: 1206: 1197: 1196: 1192: 1182: 1180: 1165: 1161: 1151: 1149: 1140: 1139: 1135: 1126: 1125: 1121: 1112: 1110: 1101: 1100: 1096: 1087: 1086: 1082: 1072: 1070: 1063: 1057: 1053: 1044: 1043: 1039: 1030: 1029: 1025: 1016: 1015: 1011: 999: 995: 991: 979: 957: 914:consumerisation 910:GlaxoSmithKline 821:Get Safe Online 808: 784:Sussex Cluster 607: 605:Industry groups 539: 434: 426: 400: 355: 331: 329:Law Enforcement 311: 251: 244:Security Group. 185: 113:chaired by the 103: 92: 87: 71: 66: 56:Industry groups 12: 11: 5: 1800: 1790: 1789: 1784: 1779: 1764: 1763: 1738: 1729: 1698: 1684: 1681:on 2008-03-05. 1666: 1641: 1627: 1602: 1588: 1568: 1556: 1536: 1516: 1492: 1474: 1449: 1424: 1410: 1396: 1382: 1368: 1350: 1335: 1315: 1310:"BCS Security" 1301: 1287: 1273: 1252: 1232: 1218: 1204: 1190: 1159: 1133: 1119: 1094: 1080: 1051: 1037: 1023: 1009: 992: 990: 987: 986: 985: 978: 975: 974: 973: 970: 967: 964: 956: 953: 952: 951: 945: 939: 936: 917: 867: 860: 859: 852: 845: 831: 828: 818: 807: 804: 801: 800: 796: 795: 791: 790: 786: 785: 781: 780: 776: 775: 771: 770: 766: 765: 761: 760: 756: 755: 751: 750: 746: 745: 741: 740: 736: 735: 731: 730: 726: 725: 721: 720: 719:East Midlands 716: 715: 711: 710: 706: 705: 701: 700: 692: 691: 688:cyber security 680: 671: 664: 652:Cyber Security 641: 636: 631: 626: 620: 614: 606: 603: 602: 601: 595: 589: 583: 577: 571: 564: 558: 552: 546: 538: 535: 534: 533: 528: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 473: 468: 463: 458: 453: 448: 443: 433: 430: 425: 422: 418: 417: 411: 399: 396: 395: 394: 387: 386: 383: 380: 369: 368: 365: 362: 354: 351: 350: 349: 330: 327: 310: 307: 306: 305: 298: 297: 293: 290: 269: 268: 265: 250: 247: 246: 245: 233:Cabinet Office 214: 213: 210: 207: 200: 184: 181: 176: 175: 168: 161: 126:Vincent Devine 115:Prime Minister 102: 99: 91: 88: 86: 83: 82: 81: 70: 67: 65: 62: 61: 60: 57: 54: 51: 48: 41: 40: 37: 34: 31: 28: 18:United Kingdom 9: 6: 4: 3: 2: 1799: 1788: 1785: 1783: 1780: 1778: 1775: 1774: 1772: 1753:on 2016-10-21 1752: 1748: 1742: 1733: 1719:on 2013-07-31 1715: 1708: 1702: 1694: 1688: 1680: 1676: 1670: 1656:on 2017-06-07 1655: 1651: 1645: 1637: 1631: 1617:on 2018-04-10 1616: 1612: 1606: 1598: 1592: 1578: 1572: 1565: 1560: 1546: 1540: 1526: 1520: 1506: 1502: 1496: 1488: 1484: 1478: 1464:on 2013-06-14 1463: 1459: 1453: 1439:on 2013-06-14 1438: 1434: 1428: 1420: 1414: 1406: 1400: 1392: 1386: 1378: 1372: 1364: 1360: 1354: 1346: 1342: 1338: 1332: 1328: 1327: 1319: 1311: 1305: 1297: 1291: 1283: 1277: 1262: 1261:"ICO - About" 1256: 1242: 1236: 1228: 1222: 1214: 1208: 1200: 1194: 1178: 1174: 1170: 1163: 1147: 1143: 1137: 1129: 1123: 1109:on 2013-01-23 1108: 1104: 1098: 1090: 1084: 1069: 1062: 1055: 1047: 1041: 1033: 1027: 1019: 1013: 1007: 1006: 1002: 997: 993: 984: 981: 980: 971: 968: 965: 962: 961: 960: 949: 946: 943: 940: 937: 934: 930: 929:Colin Robbins 926: 922: 918: 915: 911: 907: 903: 899: 895: 891: 887: 883: 879: 878:Edmund Burton 875: 871: 868: 865: 864: 863: 857: 853: 849: 846: 843: 839: 835: 832: 829: 826: 822: 819: 816: 813: 812: 811: 798: 797: 793: 792: 788: 787: 783: 782: 778: 777: 773: 772: 768: 767: 763: 762: 758: 757: 753: 752: 748: 747: 743: 742: 738: 737: 733: 732: 728: 727: 723: 722: 718: 717: 713: 712: 708: 707: 703: 702: 698: 697: 689: 684: 681: 679: 675: 672: 668: 665: 662: 658: 653: 649: 645: 642: 640: 637: 635: 632: 630: 627: 624: 621: 618: 615: 612: 609: 608: 599: 596: 593: 590: 587: 584: 581: 578: 575: 572: 568: 565: 562: 559: 556: 553: 550: 547: 544: 541: 540: 532: 529: 527: 524: 522: 519: 517: 514: 512: 509: 507: 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 472: 469: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 438: 437: 429: 421: 415: 412: 409: 405: 404: 403: 392: 391: 390: 384: 381: 378: 374: 373: 372: 366: 363: 360: 359: 358: 347: 346: 345: 342: 340: 336: 326: 324: 320: 316: 303: 302: 301: 294: 291: 288: 287: 286: 283: 281: 276: 274: 266: 263: 262: 261: 258: 256: 242: 238: 237:Francis Maude 235:, the Rt Hon 234: 230: 226: 225: 224: 221: 218: 211: 208: 205: 201: 198: 194: 193: 192: 190: 180: 173: 169: 166: 162: 159: 155: 151: 147: 143: 139: 135: 134: 133: 129: 127: 122: 120: 116: 112: 108: 98: 95: 79: 76: 75: 74: 58: 55: 52: 49: 46: 45: 44: 38: 35: 32: 29: 26: 25: 24: 21: 19: 1755:. Retrieved 1751:the original 1741: 1732: 1721:. Retrieved 1714:the original 1701: 1687: 1679:the original 1669: 1658:. Retrieved 1654:the original 1644: 1630: 1619:. Retrieved 1615:the original 1605: 1591: 1580:. Retrieved 1571: 1559: 1548:. Retrieved 1539: 1528:. Retrieved 1519: 1508:. Retrieved 1504: 1495: 1486: 1477: 1466:. Retrieved 1462:the original 1452: 1441:. Retrieved 1437:the original 1427: 1413: 1399: 1385: 1371: 1362: 1353: 1325: 1318: 1304: 1290: 1276: 1265:. Retrieved 1255: 1244:. Retrieved 1235: 1221: 1207: 1193: 1181:. Retrieved 1177:the original 1172: 1162: 1150:. Retrieved 1136: 1122: 1111:. Retrieved 1107:the original 1097: 1089:"Committees" 1083: 1071:. Retrieved 1067: 1054: 1040: 1026: 1012: 1005:The Guardian 1003: 996: 958: 861: 809: 774:South Wales 744:North Wales 567:Cyber Scheme 435: 427: 419: 401: 388: 370: 356: 343: 332: 312: 299: 284: 277: 270: 259: 252: 222: 219: 215: 186: 177: 130: 123: 104: 96: 93: 72: 42: 22: 15: 1501:"BSI - NSB" 667:Tigerscheme 634:Law Society 280:MoD Corsham 239:MP and the 109:which is a 69:Legislative 1771:Categories 1757:2013-08-21 1723:2013-01-14 1660:2016-05-17 1621:2013-01-14 1582:2023-12-24 1550:2023-12-24 1530:2023-12-24 1510:2023-12-24 1468:2013-01-16 1443:2013-01-14 1296:"ACFTI UK" 1267:2023-12-24 1246:2023-12-24 1113:2013-01-14 1073:2 November 989:References 1377:"ISSA UK" 1345:849744629 361:Education 1747:"NDI UK" 1419:"techUK" 1227:"UK CeB" 1146:Archived 977:See also 894:Raytheon 882:BT Group 424:Academia 296:support. 50:Academia 1577:"UKCSC" 1284:. NCSC. 1152:2 April 1103:"OCSIA" 1018:"EURIM" 890:QinetiQ 851:online. 759:Oxford 724:London 639:Nominet 619:, ADISA 1611:"IAAC" 1597:"WARP" 1525:"NIAF" 1483:"Home" 1359:"Home" 1343:  1333:  1213:"DISA" 1199:"DCPP" 1068:gov.uk 1048:. HMG. 1046:"GCSO" 1034:. HMG. 942:ITSafe 644:TechUK 592:(ISC)² 364:Health 206:(BEIS) 199:(DCMS) 1717:(PDF) 1710:(PDF) 1405:"CDF" 1391:"ADS" 1183:7 May 1128:"ISN" 1064:(PDF) 933:Nexor 902:O2 UK 856:WARPs 661:Nexor 586:ISACA 414:OFCOM 148:(the 78:EURIM 1341:OCLC 1331:ISBN 1185:2020 1154:2016 1075:2016 919:The 908:and 842:NPSA 377:SUAC 333:The 323:GCHQ 321:and 313:The 253:The 227:The 202:The 195:The 158:NPSA 146:CESG 142:GCHQ 16:The 948:NDI 931:of 898:PwC 611:ADS 408:ICO 1773:: 1503:. 1485:. 1361:. 1339:. 1171:. 1066:. 904:, 900:, 896:, 892:, 888:, 884:, 341:. 325:. 282:. 128:. 1760:. 1726:. 1695:. 1663:. 1638:. 1624:. 1599:. 1585:. 1553:. 1533:. 1513:. 1489:. 1471:. 1446:. 1421:. 1407:. 1393:. 1379:. 1365:. 1347:. 1312:. 1298:. 1270:. 1249:. 1229:. 1215:. 1187:. 1156:. 1116:. 1091:. 1077:. 1020:. 663:.

Index

United Kingdom
EURIM
National Security Council
cabinet committee
Prime Minister
national security
Vincent Devine
National Cyber Security Centre
GCHQ
CESG
information security
Centre for the Protection of National Infrastructure
NPSA
National Protective Security Authority
UK National Technical Authority for Counter-Eavesdropping
Department for Science, Innovation, and Technology
Department for Culture, Media, and Sports
Department for Business, Energy & Industrial Strategy
Office of Cyber Security and Information Assurance
Cabinet Office
Francis Maude
National Security Council
Ministry of Defence
Defence Standards
MoD Corsham
National Cyber Force
Ministry of Defence
GCHQ
National Crime Agency
Child Exploitation and Online Protection Centre

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑