Misplaced Pages

UK cyber security community

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
(Redirected from British cyber security community)
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
This article may need to be rewritten to comply with Misplaced Pages's quality standards. You can help. The talk page may contain suggestions. (November 2024)
This article may be in need of reorganization to comply with Misplaced Pages's layout guidelines. Please help by editing the article to make improvements to the overall structure. (November 2024) (Learn how and when to remove this message)
The topic of this article may not meet Misplaced Pages's general notability guideline. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.
Find sources: "UK cyber security community" – news · newspapers · books · scholar · JSTOR (November 2024) (Learn how and when to remove this message)
This article's tone or style may not reflect the encyclopedic tone used on Misplaced Pages. See Misplaced Pages's guide to writing better articles for suggestions. (November 2024) (Learn how and when to remove this message)
This article may lack focus or may be about more than one topic. Please help improve this article, possibly by splitting the article and/or by introducing a disambiguation page, or discuss this issue on the talk page. (November 2024)
(Learn how and when to remove this message)

The United Kingdom has a diverse cyber security community, interconnected in a complex network.

Public sector bodies

Legislative

According to a parliamentary committee the UK government is not doing enough to protect the nation against cyber attack.

  • EURIM, the Digital Policy Alliance

National strategy

The UK Government periodically publishes a Cyber Security Strategy.

Many of the stakeholders across all categories are engaged with that effort.

Capstone components

The overall responsibility for security within the UK rests with the National Security Council which is a cabinet committee chaired by the Prime Minister tasked with overseeing all issues related to national security, intelligence coordination, and defence strategy.

The internal protective security coordination role for UK government is led by the Government Chief Security Officer (GCSO) within the Cabinet Office, who since 2021 has been Vincent Devine.

The central organisation supporting the GCSO is the Government Security Group (GSG), with a distributed Government Security Function / Government Security Profession across the departments and Arms Length Bodies (ALB), and three National Technical Authorities (NTA), all of which have a role in information and/or cyber security:

  • The National Technical Authority for Cyber Security (NTA-C) is the National Cyber Security Centre (NCSC) is the UK's authority on cyber security; its parent organisation is GCHQ. It absorbed and replaced CESG (the information security arm of GCHQ) as well as the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the former Centre for the Protection of National Infrastructure (CPNI). NCSC provides advice and support for the public and private sector in how to avoid cyber threats. CESG (originally Communications-Electronics Security Group) was a branch of GCHQ which worked to secure the communications and information systems of the government and critical parts of UK national infrastructure. The NPSA provided protective security advice to businesses and organisations across the national infrastructure.
  • The National Technical Authority for Protective Security (NTA-P) is the National Protective Security Authority (NPSA) is the successor organisation to CPNI, but retains some elements of information and cyber security that were not transferred to NCSC, including for Cyber Physical Systems (CPS), and for security containers, locks, and structures to protect assets
  • The National Technical Authority for Technical Security (NTA-T) is the UK National Technical Authority for Counter-Eavesdropping (UK NACE), which deals predominantly with countering technical surveillance

Civilian components

The role of Lead Government Department (LGD) for Cyber Security is currently fulfilled by the Department for Science, Innovation, and Technology (DSIT), having previously rested with:

All other government departments and ALBs will have staff in the government security function / government security profession, supporting both their internal staff, and their client communities.

Former bodies in this category include:

Defence components

The Ministry of Defence has primacy for information and cyber security within both its civilian and military staffs (approximately 250,000 personnel), and for the Defence Supply Base (DSB - approximately 30,000 companies).

It has two main security organisations:

  • The Directorate of Security and Resilience (DSR), predominantly focused on physical and personnel security
  • The Directorate of Cyber Defence and Risk (CyDR), predominantly focused on information and cyber security

These organisation work collaboratively to publish not only the internal rules, but also Defence Standards and Industry Security Notices (ISN)

In April 2016, the MOD announced the creation of the Cyber Security Operations Centre (CSOC) with a budget of over £40 million. It is located at MoD Corsham.

MOD collaborates with the DSB over information and cyber security matters through a number of organisations, including:

  • Defence Cyber Protection Partnership (DCPP)

Former bodies in this category include:

  • DIPCOG, the Defence Infosec Product Co-Operation Group

National Cyber Force (NCF)

The National Cyber Force consolidates offensive cyber capabilities from the Ministry of Defence and GCHQ.

Law Enforcement

The National Crime Agency (NCA) hosts the law enforcement cyber crime unit, incorporating the Child Exploitation and Online Protection Centre.

Former bodies in this category include:

  • National High Tech Crime Unit (NHTCU)

Wider Public Sector

Within the WPS, there are a number of collaborative bodies, including:

  • Assurance Specialism Advisory Group (ASAG), which runs the SUAC series of Conferences
  • Cyber Technical Advisory Group (CTAG), formerly the Public Sector IA Coordination Group (PSIACG)


Regulatory bodies

Two regulatory bodies have a specific cyber security related function:

  • The Information Commissioner's Office (ICO), leading on Data Protection (DP) for Personally Identifiable Information (PII)
  • OFCOM, leading on telecommunications and broadcast aspects of security

Most other regulatory bodies will have staff covering information and cyber security function for both their internal staff, and their client communities.

Professional bodies

  • Association of Cyber Forensics and Threat Investigators (ACFTI).
  • British Computer Society (BCS) is a professional body and a learned society that represents those working in information technology both in the United Kingdom and internationally. It has a security, data and privacy group.
  • Business Continuity Institute (BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. BCI has a six certification standards to ensure individual practitioners literacy in organizations, responses, and other strategies.
  • Council of Registered Ethical Security Testers (CREST) is a Not for profit accreditation and certification organization. CREST does not have its own study material and leverage on third party coursework so that the member can become certified. As of 24/8/2022, the cost of CREST membership is 5000GBP for membership of one country chapter and 25000GBP for a regional membership. On two occasions between 2012 and 2014, the examination-related activities of one of more NCC Group employees and candidates breached the CREST Code of Conduct and NCC Group was, as their employer, vicariously responsible for those individuals at the time

Industry groups

  • ADS is a trade organisation for companies operating in the UK aerospace, defence, security and space industries.
  • Asset Disposal & Information Security Alliance, ADISA
  • Crypto Developers Forum (CDF)
  • IT Security Forum
  • Law Society
  • Nominet
  • Tigerscheme is a commercial certification scheme for technical security specialists, backed by university standards and covering a wide range of expertise. Tigerscheme is CESG certified in the UK and candidates are subject to an independent rigorous academic assessment authority. Tigerscheme was founded in 2007 on the principle that a commercial certification scheme run on independent lines would give buyers of security testing services confidence that they were hiring a recognised and reputable company. In June 2014 the operational authority for Tigerscheme was transferred to USW Commercial Services Ltd.
  • UK Cloud Pooled Audit Group (UK CPAG) is a membership organisation consisting of the UK's largest banks. Established in 2020 with a mission to use the collective power of the banks to audit Cloud Service Providers such as Google, Amazon and Microsoft. The group is operated by the Worshipful Company of Information Technologists
  • UK Cyber Security Forum is a social enterprise representing cyber SME's (Small and Medium Enterprise) in the UK. The forum is composed of 20 regional cyber clusters around the UK. Each cluster is run as a subsidiary of the UK Cyber Security Forum and all are operated by groups of volunteers. They provide events around the UK to engage the public in cyber security and to provide continued professional development to cyber professionals. The official clusters are:
UK Cyber Clusters
Bristol and Bath Cyber
Bournemouth Cyber Cluster
Cambridge Cluster
East Midlands
London
Malvern Cluster
Norfolk Cyber Cluster
North East Cyber Cluster
North Wales
North West Cluster
N Somerset Cluster
Oxford
Scottish Cyber Cluster
Solent Cyber Cluster
South Wales
South West Cyber Cluster (Exeter)
Sussex Cluster
Thames Valley Cluster
West Midlands Cluster
Yorkshire Cluster

Cross-sector bodies

Current bodies that cover multiple sectors include:

  • British Standards Institution (BSI), the UK's National Standards Body (NSB), which not only produces British Standards (BS) and Publicly Available Specifications (PAS) in the areas of Information and Cyber Security, but also provides the UK interface into international Standards Development Organisations (SDO), including ISO, IEC, ITU-T, CEN, CENELEC, and ETSI. The main Expert Committees for BSI relevant to these topic are IST/33 (Information and Cyber Security) and ICT/003 (Trustworthy Systems)
  • Trustworthy Software Foundation (TSFdn) which is a UK public good activity aimed to encouraging good proactive in systems specification, realisation, and use, and providing related independent Organisational and Solution Conformity Assessments. It arose from the Trustworthy Software Initiative (TSI), previously the Software Security, Dependability and Reliability Initiative (SSDRI), and the Secure Software Development Partnership (SSDP), which were sponsored
  • UK Cyber Security Council
  • Warning, Advice and Reporting Points (WARPs) provide a trusted environment where members of a community can share problems and solutions.

Former bodies in this category include:

  • Cyber Security Knowledge Transfer Network (CS KTN), as sponsored by Innovate UK (formerly the Technology Strategy Board)
  • Information Assurance Advisory Council (IAAC) worked across industry, government and academia towards ensuring the UK's information society has a robust, resilient and secure foundation. The IAAC was set up by Baroness Neville-Jones who chaired the organisation until 2007, handing over to the current chairman Sir Edmund Burton. Affiliates include BT Group, Northrop Grumman, QinetiQ, Raytheon, PwC, O2 UK, Ultra Electronics and GlaxoSmithKline. The 2012/13 work programme focused on consumerisation and its effects on information assurance.
  • The Information Assuarnce Coordination Group (IACG) was formed following the UK's national IA conference in 2006. The IACG encourages greater collaboration between the commercial supply base for information assurance products and services operating within the UK public sector. The group maintained the UK information assurance community map, hosted on the CESG's web site. It has two co-chairs: Colin Robbins of Nexor and Ross Parsell of Thales. The IACG ceased operation in 2014.
  • General IA Products and Service Initiative (GIPSI), which was largely replaced by NIAF
  • ITSafe (IT Security Awareness for Everyone) was a former government-funded organisation that provided alerts, which was subsumed into GetSafeOnline
  • NDI was a former government-funded organisation building supply chains for the MOD and manufacturers using SMEs in the United Kingdom.

See also

References

  1. UK 'wholly' unprepared to stop devastating cyber-attack, MPs warn The Guardian
  2. "EURIM".
  3. "UK Cyber Security Strategy". HMG.
  4. "GCSO". HMG.
  5. HM Government (1 November 2016). "National Cyber Security Strategy 2016-2021" (PDF). gov.uk. Retrieved 2 November 2016.
  6. "OCSIA". Archived from the original on 2013-01-23. Retrieved 2013-01-14.
  7. "ISN". HMG. 14 December 2023.
  8. "Defence Secretary announces £40m Cyber Security Operations Centre". Ministry of Defence. 1 April 2016. Archived from the original on 25 April 2019. Retrieved 2 April 2016.
  9. Hammick, Murray (30 October 2018). "The Budget and Defence". The Military Times. London. Archived from the original on 22 October 2019. Retrieved 7 May 2020.
  10. "DCPP". HMG. 23 November 2023.
  11. "Cyber Technical Advisory Group". Retrieved 2023-12-24.
  12. "ICO - About". 20 November 2023. Retrieved 2023-12-24.
  13. "ACFTI UK".
  14. "BCS Security".
  15. Kaye, David. (2008). Managing risk and resilience in the supply chain. London : BSI Business Information. ISBN 978-1-62198-414-6. OCLC 849744629.
  16. "Home". crest-approved.org.
  17. "ADS".
  18. "CDF".
  19. "Home". tigerscheme.org.
  20. "BSI - NSB". www.bsigroup.com. Retrieved 2023-12-24.
  21. "Trustworthy Software Foundation". Retrieved 2023-12-24.
  22. Protecting and promoting the UK in a digital world: 2 years on – Government Press Release, retrieved 12 December 2013
  23. "UKCSC". Retrieved 2023-12-24.
  24. "WARP".
  25. "IAAC". Archived from the original on 2018-04-10. Retrieved 2013-01-14.
  26. "IAAC - Neville-Jones".
  27. "IAAC Sponsors". Archived from the original on 2017-06-07. Retrieved 2016-05-17.
  28. "Establishment of the IACG". National Archives. Archived from the original on 2008-03-05.
  29. "IACG Overview".
  30. "IA Community Map" (PDF). Archived from the original (PDF) on 2013-07-31. Retrieved 2013-01-14.
  31. EC2ND 2006 - Proceedings of the Second European Conference on Computer Network Defence, 2006
  32. "NDI UK". Archived from the original on 2016-10-21. Retrieved 2013-08-21.
Categories: