dfm covers
 
 

New Government ‘Cyber Incident Response’ scheme

Print PDF
Wednesday, 07 November 2012 10:19 Written by DFM Team

Context Information Security is one of the first four companies to be certified in a new Government scheme announced today that will help UK organisations respond effectively to the increase in cyber security attacks. The ‘Cyber Incident Response’ scheme launched by CESG, the Information Assurance arm of GCHQ, and the Centre for the Protection of National Infrastructure (CPNI), is aimed primarily at the public sector and the UK’s critical national infrastructure as well as providing assistance to other parts of the private sector.

The new initiative supports the delivery of the UK Cyber Security Strategy and expands the UK’s cyber incident response capabilities through greater collaboration between Government and industry. Context is one of only four companies certified by CESG/CPNI as part of the initial pilot to work in partnership based on its knowledge and experience. As an established independent information security consultancy, Context has been providing technical assurance, targeted attack detection, response, investigation and mitigation services since 2007.

“The Cyber Incident Response scheme marks a very positive move by CESG/CPNI to harness the skills and expertise of companies such as Context in order to support the growing number of victims of targeted attacks,” said Alex Church, Technical Director at Context Information Security. “Organisations notified of attacks or those interested in getting advice about detection and mitigation will now have a clear pointer to specialist help with the level of trust and quality-assurance delivered by the scheme.”

"We are delighted to welcome Context to our new Cyber Incident Response pilot,” said a spokesman for GCHQ. “This pilot has been developed with the Centre for the Protection of National Infrastructure and is an important addition to the range of CESG certified products and services, which provide protection from the growing cyber threat. Context has been a member of our IT health-check scheme ‘CHECK’ for a number of years and we look forward to working with them in this new endeavour as they bring their considerable expertise to bear when responding to cyber attacks."

This latest announcement from CESG/CPNI follows on from the “10 Steps to Cyber Security” programme, which was launched by the Government in September and aimed at providing advice to business leaders on measures to increase cyber security within their own organisations.

Chloë Smith, Minister for Cyber Security said: “The growing cyber threat makes it inevitable that some attacks will get through, either where basic security is not implemented, or when an organisation is targeted by a highly capable attacker. ‘Cyber Incident Response’ services provide access to organisations certified by CESG/CPNI to respond effectively to cyber incidents. It builds on the ’10 steps to Cyber Security’ guidance on how to reduce the risk of vulnerability to attack. Together, GCHQ, CPNI, the incident response industry, and victims of cyber attack - can improve the cyber security of the UK; that is good for security, good for business and good for the UK’s prosperity.”


 
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Cyber Attack, Cyber Crime, Cyber Warfare - Cyber Complacency

Mark Osbourne's latest book covers all things Cyber. All proceeds from the book go to charity.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 21 on sale from November 2014:


Big Data
Andrew Pimlott examines Big Bata risk, creation of compliance data analytics dashboards, predictability fraud models that help predict fraud, cybercrime analytics and financial services analytics. Read More »

Finding the Relevant Artefact in Visual Content
Jan Willem Klerkx explains how the University of Amsterdam solved the problem of finding artefacts in pictures in an effective way.  Read More »

Subscribe today


Dental Biometrics
Aqsa Ajaz takes a look at Dental biometrics and investigates how it is is used in forensic ontology to identify individuals based on their dental characteristics. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue