dfm covers
 
 

New Government ‘Cyber Incident Response’ scheme

Print PDF
Wednesday, 07 November 2012 10:19 Written by DFM Team

Context Information Security is one of the first four companies to be certified in a new Government scheme announced today that will help UK organisations respond effectively to the increase in cyber security attacks. The ‘Cyber Incident Response’ scheme launched by CESG, the Information Assurance arm of GCHQ, and the Centre for the Protection of National Infrastructure (CPNI), is aimed primarily at the public sector and the UK’s critical national infrastructure as well as providing assistance to other parts of the private sector.

The new initiative supports the delivery of the UK Cyber Security Strategy and expands the UK’s cyber incident response capabilities through greater collaboration between Government and industry. Context is one of only four companies certified by CESG/CPNI as part of the initial pilot to work in partnership based on its knowledge and experience. As an established independent information security consultancy, Context has been providing technical assurance, targeted attack detection, response, investigation and mitigation services since 2007.

“The Cyber Incident Response scheme marks a very positive move by CESG/CPNI to harness the skills and expertise of companies such as Context in order to support the growing number of victims of targeted attacks,” said Alex Church, Technical Director at Context Information Security. “Organisations notified of attacks or those interested in getting advice about detection and mitigation will now have a clear pointer to specialist help with the level of trust and quality-assurance delivered by the scheme.”

"We are delighted to welcome Context to our new Cyber Incident Response pilot,” said a spokesman for GCHQ. “This pilot has been developed with the Centre for the Protection of National Infrastructure and is an important addition to the range of CESG certified products and services, which provide protection from the growing cyber threat. Context has been a member of our IT health-check scheme ‘CHECK’ for a number of years and we look forward to working with them in this new endeavour as they bring their considerable expertise to bear when responding to cyber attacks."

This latest announcement from CESG/CPNI follows on from the “10 Steps to Cyber Security” programme, which was launched by the Government in September and aimed at providing advice to business leaders on measures to increase cyber security within their own organisations.

Chloë Smith, Minister for Cyber Security said: “The growing cyber threat makes it inevitable that some attacks will get through, either where basic security is not implemented, or when an organisation is targeted by a highly capable attacker. ‘Cyber Incident Response’ services provide access to organisations certified by CESG/CPNI to respond effectively to cyber incidents. It builds on the ’10 steps to Cyber Security’ guidance on how to reduce the risk of vulnerability to attack. Together, GCHQ, CPNI, the incident response industry, and victims of cyber attack - can improve the cyber security of the UK; that is good for security, good for business and good for the UK’s prosperity.”


 
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Cyber Attack, Cyber Crime, Cyber Warfare - Cyber Complacency

Mark Osbourne's latest book covers all things Cyber. All proceeds from the book go to charity.

Meet the Authors

Mark Osborne

Mark Osborne is the author of 'How To Cheat at Managing Information Security'

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 22 on sale from February 2015:


Dealing with the ‘Unknown Unknowns’ of Intelligence Data
The article will address how intelligence agencies can use data more effectively to predict and model crime. Read More »

BitCoin Targeted Phishing
This feature article is all about BitCoin and a Phishing attack. The article will explain what Bitcoin is and how this phishing attack was targeted at BitCoin. Read More »

Subscribe today


Exif Search
This feature article is all about exif data and It's role in the field of digital forensics. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue