Script The February 2015 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST Training Education ALSO INSIDE Update from Ian Glover CREST Panel Sessions and AGM Getting to know you? CRESTCon & IISP Congress An update from the IISP Member Focus New Members Training & Education Cyber security project The Script FEBRUARY 2015 The Script FEBRUARY 2015 U P DAT E Speakers announced for CRESTCon & IISP Congress AN UPDATE FROM IAN GLOVER Seems a long time ago now but I hope everyone enjoyed the Christmas and the New Year break. It doesn’t seem long since the last newsletter but a lot has happened…. There has been unprecedented interest in CREST membership with new applications increasing and existing members applying for additional categories. The team at CREST has done a fantastic job of managing this and maintain the very high standards required for membership. The period for Grandfathered penetration testing companies in the STAR scheme drew to a close at the end of January and the period for threat intelligence service suppliers ends in March. The transition from STAR into the BoE CBEST scheme has also been working very well. The BoE has been very happy with the information and evidence provided by CREST, which has allowed them to concentrate on the specific areas of the application that relate to financial services and the implementation of the scheme. Existing CREST members have benefited already from the two elements of the STAR scheme and the threat intelligence industry is responding to the process very well. There is significant interest in these schemes from overseas regulators and other parts of the Critical National Infrastructure. This will undoubtedly lead to additional opportunities for CREST members. For example, we were recently asked to present to a large group of banks and the regulator in Saudi Arabia. Some of these banks already mandate CREST or equivalent in their ITTs and view it as a true mark of quality. The Cyber Essentials work is gaining pace as CREST members mature their service offerings. In addition to including Cyber Essentials on procurement frameworks, the UK Government has agreed a marketing strategy for 2015, which should result in increased requirements for certification. CREST is looking to run workshops this year to examine the link between ISO 27001 and Cyber Essentials and other ways of extending the scheme into areas such as incident management. Talking of which, the incident management maturity model, free to download from the CREST website, is also gaining momentum. This allows companies to assess their own level of maturity or for CREST member companies to build a service around the assessment. There are already calls for anonymised results to be collated to allow industry comparisons. CREST will review this later in the year so any feedback on the tool would be most welcomed. We are also creating a marketing strategy for the Cyber Security Incident Response scheme. We held back on this last year whilst the CREST company membership numbers and the number of certified individuals increased but we now feel that there is sufficient capacity in the market to push this forward. There is also a great deal of interest in this area from law enforcement agencies and the finance sector, which will help to re-enforce the offering. International The CREST Executive has put together a first class strategy paper for internationalisation that is getting a lot of interest. Although we have dabbled with internationalisation before we feel strongly that this is the right time. We have significant interest from overseas buyers of CREST services in a surprising number of countries; we understand the legal structures and technical infrastructure required; we have support from in-country professional bodies who would like to work with us and, we have the support of member companies who want to expand into other regions. We also have the support of the UK Government that sees CREST as being part of the answer to increase cyber security exports. There will be a lot happening in this area this year. There is so much more I would like to say but it may well fill this edition of the Newsletter. Suffice to say we have been busy and 2015 will be a very exciting year. If you want to know more, make sure that you get your tickets for CRESTCon 2015! Thank you for all the help and support we have received from our member companies and others. Ian Glover, CREST President CRESTCon & IISP Congress takes place on 18th March at the Royal College of Surgeons. It is a unique event that brings together leading technical and business information security professionals. Now in its third year, the event has become a key date in the industry calendar, attracting an impressive line-up of speakers and over 300 senior delegates. Stream 1 Stream 2 09:00 - 09:30 Registration, coffee and pastries 09:00 - 09:30 09:30 - 09:40 Welcome: Ian Glover & Alastair MacWillson, CREST & IISP 09:30 - 09:40Welcome: Ian Glover & Alastair MacWillson, CREST & IISP 09:45 - 10:15 HP: TBC 09:45 - 10:30Mark Hughes, President, BT: What does the Future Bring? 10:20 - 11:05 Ryan Kazanciyan, Mandiant: Exploiting the Attacker’s Dilemma 10:35 - 11:05Andrzej Kawalec, CTO, HP: Specificity: what does this mean to you and your organisation 11:05 - 11:35 Coffee & Networking 11:40 - 12:10James Chappell, Digital Shadows: Threat Intelligence – Marketing Hype or Innovation 12.15 – 13.00Cam Buchannan & Adrian Nish, BAE: Intelligence led Penetration Testing - applying attack tradecraft and tools 13.00 – 14.00Lunch 14.00 - 14:30Dave Hartley, MWR: Fracking with Hybrid Mobile Applications 14:35 - 15:20Dor Tumarkin & Kyle Lovett, Cisco: Vulnerabilities of Mass Disruption: How SOHO devices are shaping and changing the landscape of information security on a global level. 15:20 - 15:50 Coffee & Networking 11:05 - 11:35 Registration, coffee & pastries Coffee & Networking 11:40 - 12:10 Martin Tyley, Partner, KPMG: Supply chain: Effectively managing the increasingly complex relationships with vendors, third parties and the supply chain 12.15 – 13.00Member case studies: Architecture David Frith, IA Consultant, Info-Assure Ltd: What an IA architect can do for you John Hughes, Consultant and Member of Faculty, InfoSec Skills Ltd: The challenges of Training Security Architects 13.00 – 14.00Lunch 14.00 - 14:30Hannah State Davey, Psychologist, and Natalie Fischer, Chartered Occupational Psychologist, Qinetiq: Understanding Human implications of Information Security 14:35 - 15:20 Member case studies: Identity 15:50 - 16:20Ollie Whitehouse & Andy Davis, NCC: Practical Security Assessments of IoT Devices and Systems Paul Simmonds, CEO, Global Identity Foundation: Build your house on rock not sand 16:25 - 16:55Steve Elliott, Context: RDP-Replay – The story Behind the Tool Robert Lapes, Head of Identity Advisory Services, Capgemini - The challenges of identity in the digital future 17.00- 17:05 Ian Glover: Closing Address 15:20 - 15:50 17:05 - 18:00CREST & IISP, Drinks and Networking: Sponsored by Nettitude 15:50 - 16:20Focus on Legal, Stewart Room, Global Head of Cyber Security and Data Protection Law, PwC 16:25 - 16:55 Coffee & Networking Focus on Cyber Insurance, Speaker TBC 17.00- 17:10Alastair MacWilson: Closing Address & Fellowship Awards 17:10 - 18:00CREST & IISP, Drinks and Networking: Sponsored by Nettitude The Script FEBRUARY 2015 CRESTCon & IISP Congress – ticket information Tickets for CRESTCon & IISP Congress can be purchased at: https://crestconandiispcongress2015.eventbrite.co.uk CREST member companies also have until 18th February to claim their free or discounted tickets and are urged to contact allie@crest-approved.org as soon as possible to check availability and book. CRESTCon & IISP Congress – Sponsorship Thank you to our headline sponsor HP and to all of our sponsors: 7Safe, Digital Shadows, CheckSec, Gotham Digital Science, InfoSecure, Nettitude, Security Alliance and Titania. Members The Script FEBRUARY 2015 Info-Assure Pentest Info-Assure is a leading European independent Formed in 2001, Pentest Limited is an provider of cyber security and information established, independent security consultancy, assurance services. Info-Assure provides specialising in Web Application Testing. Pentest information assurance, security testing and is a trusted provider to hundreds of UK and cyber incident response services. Our range International organisations, across a range of of comprehensive security testing services sectors including banking, telecommunications, includes application testing, infrastructure healthcare, IT and local and national testing, mobile application testing and government. infrastructure build reviews. Why should you sponsor? •Unrivalled opportunity to meet high level influencers and decision makers from business and government •Network with existing and potential clients and contacts from the wider information security industry •Position your company as a leading industry player within the CREST and IISP communities •Showcase your products, solutions and services •Attend presentations from high level speakers in two streams •Benefit from PR and other marketing opportunities throughout the year •Access names, job titles and companies from delegate list For details of how you can get involved, please contact Marc Callaway on: marc@crestandiisp.com, 07836 381075 “Info-Assure has extensive experience of organisations become more secure. Our delivering cyber security services to the UK consultants offer frank, reliable and practical Government sector and is a member of the advice for the sole benefit of the customer, CESG CLAS, CESG CHECK, CESG CAS, and rather than ‘building the account’. By CESG CTAS Schemes. Prior to becoming developing an individual relationship with each a CREST member, we had utilised CREST of our clients, ensures they understand the examination services to certify its CHECK business drivers, technical requirements and Security Testing staff,” said Martin Walsham, specific sensitivities of each requirement. Cyber Security and Information Assurance Services at Info-Assure. New There are still a few sponsorship opportunities left for the event and CREST and IISP members are entitled to a discount on packages. At Pentest, we genuinely seek to help “CREST is a widely recognised and well respected body in the information security He adds: “Info-Assure has long viewed CREST industry. Much of what we do relies on as the leading standard for the assessment of customer trust and confidence in our technical security penetration testing companies and capabilities, discretion and security processes. staff. We were then further very impressed CREST Membership provides our customers by the addition of the CREST CSIR and STAR with additional assurance that the trust schemes. At that point we decided CREST full they place in us is justified,” said Francesca membership was something we must be part Bowman, Marketing Manager at Pentest. of as an organisation.” The Script FEBRUARY 2015 New The Script FEBRUARY 2015 Members CNS Hut3 New Members and in the excellence of our consultants that landscape. The organisation brings expertise permits a total focus on efficiency, effectiveness in Information Technology Risk, Vulnerability and risk management, independently of any Management and Intrusion Detection from over technological flavours. 20 years of experience in multiple sectors across organisations from the FTSE 10 through to SMEs. IBM CNS Hut3 is a London-based cyber security At INTEGRITY we provide security consulting company specialising in the disciplines of services, as well as world-class penetration At JustASC, our staff comprise ex-senior Big4 services company with a proud history of information assurance and security assessment. testing services covering areas such as trusted advisors and true industry experts in technical innovation and leadership, building on Based next door to the Gherkin in Holland infrastructure, web applications, mobile, wifi and specific security disciplines, allowing us to bring over a century of research and development. House, we hold accreditations for CESG CHECK SCADA, performed by highly skilled consultants. the true meaning of the issue into pure business IBM seeks to shape the future of our industry context for our clients. Our experts can translate through prized research, development and even the most technical security issue into a technical talent around the world. At IBM, meaningful business risk that the board can penetration testing is just one of many security understand and action, safe in the knowledge it services that we offer. We monitor and manage is doing the right thing to continue the business 15 billion events daily in real-time, in some of on a strong path. the most complex networks in the world. IBM and Listed Advisor Schemes, Tiger Scheme and CREST, to name a few, as well as SC and MV clearances. Operating right at the bleeding edge of the cyber security industry, we provide clients with the newest, most thorough pen testing services. We also provide a persistent penetration testing service, KEEP-IT-SECURE24, where our consultants perform manual penetration testing and provide reporting through a vulnerability management platform where customers can monitor their risk levels, Commenting on the company’s CREST view vulnerability details and mitigation The organisation offers Threat Management, approved status, Edd Hardy, Head of Operations recommendations, manage their testing Secure Architecture & Incident Response services for CNS Hut3 said, “We wanted to achieve priorities, request re-testing and extract reports. as a complete end-to-end package, to ensure CREST approved status because of the respect CREST holds in the industry both from clients and testers. One of our abiding aims is to contribute to helping the industry move forward and we feel CREST is doing just that by helping “Being a CREST Member brings trust and recognition, as it ensures to our clients that we have passed CREST’s rigorous assessment and certification process to demonstrate standards in our security testing practice,” said Rui that our clients have the right visibility of the issues, appropriateness of control and detection, with a response to threats in real time. We make the issues tangible and pride ourselves in our ability to translate complex threats and “what IBM is the world’s largest IT and consulting also develops some of the most sophisticated testing tools in the industry, which are also used by our competitors. Teams of highly skilled security professionals identify and analyse new threats, often found and released to our clients before they are known to the public. IBM maintains the largest database of known cyber security threats in the world. ifs” into real world, actionable intelligence. “As CREST is one of the schemes that operate Since its incorporation, JustASC has developed in the penetration testing industry, we needed strategic partnerships with key vendors in the to be part of the CREST organisation to get marketplace to augment our delivery capability more involved in the community. CREST offers and provide the necessary connectivity between a great opportunity to gain access to wide JustASC the different aspects of the end-to-end process. reaching companies and people that are part INTEGRITY Advanced Security Consulting Limited “This has always been the badge we wanted INTEGRITY has been focused on consulting, (JustASC) is a specialist security services to display to our clients. CREST is the best and organisation offering consulting, managed most respected, most rigorous qualification in services, penetration testing, governance, risk, the industry and it is with great personal pride compliance and training, focussed on improving that we have achieved it. It wasn’t easy!” – Jay our client’s ability to manage the cyber threat Abbott, Managing Director at JustASC. the industry to grow up. CREST has set an exceptionally hard standard that presents a Shantilal, Managing Partner at INTEGRITY. challenge for the industry to rise to.” advisory and auditing in information security, telecom management and IT governance since 2009. We distinguish our practice based on a strong sense of impartiality and independence of it. At IBM, we really feel we can not only gain from being a member of CREST, but help enhance its reputation, knowledge and shape it for the future of the security industry,” said Brian McGlone, Senior Managing Security Consultant at IBM. The Script FEBRUARY 2015 CREST Panel Sessions and AGM 17 March 2015, Royal College of Surgeons CREST is holding a series of panel sessions for Members, which will be followed by the AGM, on Tuesday 17th March 2015, the day before CRESTCon. There is no charge to attend either the panel sessions or the AGM. Below is the agenda for the afternoon: Agenda The Script FEBRUARY 2015 An update from the IISP 12.45 - 13.30 Registration and coffee 13.30 - 14.30Cyber Essentials panel discussion and Q&A 14.30 - 15.00 CSIR scheme update 15.00 - 15.30 Coffee & networking 15.30 - 16.45STAR/CBEST panel discussion and Q&A Amanda Finch, general manager at the IISP gives a round-up of 2014 17.00 - 18.30AGM Please register your attendance at the panel sessions and/or the AGM at: https://crestpanelsandagm.eventbrite.co.uk/ Members’ Dinner In response to requests and interest we are arranging a Members’ Dinner after the AGM. We have secured a private room at a popular restaurant, which is just a few minutes walk from the Royal College of Surgeons. Details 17th March, 7.30pm Bacco Italian Restaurant 25-26 Red Lion Street, Holborn, London, WC1R 4PS Cost: £50 per head, which includes wine and service charge http://www.baccolondon.co.uk/about.aspx There is also an opportunity on the panel sessions and AGM booking page https://crestpanelsandagm.eventbrite.co.uk/ - to register your interest in attending the dinner and we will be in touch very shortly with booking details. T ime does seem to fly - where did the last 12 months go? The IISP certainly had another very busy year in 2014 and I while I catch my breath, I would like to highlight a few facts and figures. IISP membership has grown to over 2,000 individual members and we also welcomed 14 new corporate members in 2014, bringing the total to 35. We have continued to grow the CCP scheme and have now issued over 1,000 CCP certificates; while also working with CESG on developing the new CCP roles to be introduced this year. Furthermore, we have increased links with training organisations and have a growing portfolio of 16 accredited courses, which we will be adding to next year. We have also strengthened links with academia and now have a total of 12 academic partners as well as a significant rise in student membership. On the events front, as well as our successful second IISP Congress, which was run in conjunction with CRESTCon, we held 15 branch meetings and will be looking to set up two new branches in 2015. We were also able to offer member discounts or free places for over 30 industry events and our Associate Development Programme for corporate members goes from strength to strength with a two-year programme now in place. The IISP Skills Framework is increasingly used to measure information security capability. In addition to the work being done by CESG to use the framework to certify training and university courses and by e-skills UK to build a national occupational standard, the framework is also being used by our corporate members to benchmark and develop capability within their organisations. Within the Secretariat, we have implemented a number of internal efficiencies, relocated the London office and added a new office in Evesham to help us to be closer to the membership in Central England and welcomed new people into the team. One thing is for sure, we expect 2015 to be just as busy and look forward to updating you on our progress. The Script FEBRUARY 2015 The Script FEBRUARY 2015 T Training Education here has been a significant increase in the demand for Practitioner level examinations. This has not only been driven by the requirements of Cyber Essentials, but also because CREST members view it as being the first tangible step on a penetration testing career. We have also started to assess training courses against the syllabus, which are on the CREST website. Classroom based training combined with practical application is ideal for those operating or aspiring to this level. All the training providers assessed by CREST are suitable to be included in the Tech Partnership (formally e-Skills UK) development pathways. CREST has also been working to help define the new Trailblazer Cyber Analyst Higher Apprenticeship scheme. This is a fantastic opportunity for CREST member companies to employ young people, put them through a formal development programme part funded by the Government, and for the apprentice to come out with a CREST qualification and degree. This is a major new initiative and has a significant amount of Government support. Anyone wishing to know more or would be willing to take on an apprentice, please email. The monitoring and logging research project is going extremely well. The attendance and enthusiasm at workshops and responses to requests for site visits and detailed questionnaires has been overwhelming. We are already working with other influencers on defining additional research activities which will be announced soon. The CREST work we have been doing on supporting careers is now part of the UK Cyber Security Strategy and the website developed from this work will have a Ministerial launch in the second quarter of 2015. We are still looking for more ‘Day in the Life’ films, so if you would be willing to help and gain significant exposure for your company please contact Allie Andrews at PRPR – allie@crest-approved.org. The Script FEBRUARY 2015 The Script FEBRUARY 2015 New entrant Getting to Member focus to know you Name: Michael Marriott Company: Digital Shadows Professional: How did you first hear about CREST and what has your involvement with CREST been? I first came across the work of CREST whilst I was researching for my dissertation. I was looking at the role of SMEs in cyber security when a contact put me in touch with Ian Glover. Ian was good enough to take the time to talk me through the current schemes in place and how the industry was developing. It was obvious that CREST’s work is critical to the success of the cyber security industry. Two months later, I had finished my Masters and was hunting for a job. A vacancy popped up at Digital Shadows and I haven’t looked back since. What better place than an innovative cyber security start-up that was at the forefront of defining CBEST? My next engagement with CREST will be in March when I will be attending the CrestCon and IISP Congress. What is your best advice to anyone entering a career in infosecurity? I’d say go for it – infosec is an exciting, fast-growing industry and there are huge opportunities. It’s tricky to pick the right role for you, of course. There is a vast range of companies operating in the industry, from prevention to investigation. None of these are better or worse; they’re all different in terms of being a job and depend on what stage of your career you’re at and what interests you the most. There’s the added challenge of picking which sized company is best for you. Large companies can be great for training opportunities and remuneration, whereas with start-up companies give you the opportunity to shape the company and carve your own niche. For me, the opportunity to work for a small, agile company with an exciting offering was a huge appeal. Since I’ve joined it’s been high-paced and I’ve had to hit the ground running – clients are flooding in and we’ll be opening a couple of offices in the US in the coming months. What degree or other qualification did you do and how did it help get you into infosecurity? It was during my MA in Applied Security and Strategy that I first began to consider a role in infosecurity. The course focuses on war-gaming, scenario planning and red-teaming which are fastbecoming key analytic tools for infosecurity. Biog: Michael joined Digital Shadows in late 2014. He holds a BA in History and MA in Applied Security and Strategy, both from the University of Exeter. Job Title: Marketing and Sales Operations Traditionally infosecurity has attracted more technical individuals whereas threat intelligence also attracts those from a humanities background, such as history and sociology. What surprised you the most when you started working in this field? How much of a friendly community the information security world is. There’s a growing sense that there is no silver bullet for the range of challenges we face and each company has its own contribution to make. Competition inevitably comes with the territory but, importantly, there’s also a spirit of cooperation which reminds us that we’re all on the same side. How do you see the industry developing in the future? The adoption of cloud and mobile devices and the rise of industrialised attackers is forcing the traditional infosecurity industry to keep on its toes and embrace new disciplines such as threat intelligence. We’ve also seen the beginning of an intersection between cyber and physical security, and this is likely to continue over the next five years. Watch out for the Government’s upcoming 2015 Strategic Defence and Security Review (SDSR), which is likely to list cyber security as a top priority for the UK. We’ll most likely see a call for greater collaboration and better situational awareness. Personal: Do you have a celebrity “doppelganger”? I’m increasingly being likened to Chris O’Dowd, which must either mean I’m fully part of the I.T. crowd or I’ve been over-indulging. What is your ideal holiday destination? Krakow – I studied there for a year and absolutely love the place. It’s a beautiful place with great people. I’d be lying if I said 60 pence beer wasn’t a factor too. What is your favourite film? Depending on my mood, either Pulp Fiction (a classic) or The Intouchables - well into the double figures for viewing both films. 7safe 7 Safe’s Cyber Security Team is led by Steve Bailey (M.Inst.ISP) and with over 25 years’ experience of security work, Steve sees his current role as the most empowering. “Leading a team of highly capable people, from hard-core technical experts through to strategists, delivering for a wide range of clients across the world, means that every day is different and I am constantly learning new things from the team,” says Steve. One part of the 7Safe practice is focused on cyber security, delivering technical security services such as ethical hacking, PCI-DSS and Information Security policy, strategy and controls. This also increasingly includes people risk as well as threat and risk assessments. The other team is focused on eDiscovery and digital forensics. This expertise led to 7Safe authoring the Good Practice Guide for Computer Based Electronic Evidence with ACPO, while its work with law enforcement agencies in both education and investigations continues to complement its growing involvement with large corporates. Both teams have a presence in PA Consulting’s technology labs in Cambridge in addition to offices in London, augmented with a team of technical security consultants in Bangalore. As well as delivering for clients across Europe, 7Safe specialists have recently been working as far afield as Brazil and the Middle East, in environments diverse as cruise ships and night clubs. Sadly, the pentest for a Bahamas-based retailer was conducted offsite. 7Safe was acquired by PA Consulting in 2011 to enhance its strong cyber security offering and this puts 7Safe in a unique position. “We are still very much a boutique technical security team yet, as part of the wider PA Consulting Group, we can reach back into the skills of a world-class management consulting firm,” says Steve. “‘We are increasingly complementing our technical security testing and forensic work with broader security consulting work or even wider capabilities like systems engineering or business change.” The range of organisations that 7Safe works with is incredibly varied and the assignments that consultants work on range from small jobs for retailers or law firms for a few days, to multi-year security partnerships with multinational companies. Training has always been at the heart of 7Safe’s approach, with the first courses being launched over ten years ago. These training courses are very much hands-on and run by delivery consultants, which is great for the students as they get taught by professionals who are real experts very much practising what they preach. For 7Safe’s consultants this means that one day they can be out solving real problems with our clients and the next day educating others, giving them great variety and challenge. Aleksander Gorkowienko leads the Penetration Testing Team and you can regularly see him talking to clients, running training courses, leading testing programmes or meeting with one of our medical device experts in our Technology Group to discuss how to secure them from attack. He finds this multitude of activities not only gives him true variety, but has also allowed him to continuously develop his technical skills. Aleksander says: “At 7Safe we have a unique team of highly knowledgeable and experienced security consultants. The key to our success is that we listen to our customers and work with people who are truly passionate about what they do, are eager to learn and are tenacious when it comes to solving problems. The research and development work we do quite often continues at home, causing many a sleepless night! We are experimenting, learning, trying new tools and techniques every day and doing everything needed to stay one step ahead of the real hackers.” Today the portfolio of courses extends to 13 different standard technical courses and, as companies look to increase their overall security awareness, 7Safe is frequently asked for bespoke training packages on anything from social engineering to building secure applications. The hands-on, classroom training courses can be used towards a Masters Degree in Information Security under a partnership with De Montfort University and 7Safe’s ethical hacking courses were recently accredited by CREST. Richard Allen, the head of training was delighted with the CREST accreditation and looks forward to further collaboration. ”I’m thrilled that CREST has recognised the hard work and commitment that goes into developing and maintaining our market-leading training courses. Our newly accredited courses have been developed to enable delegates to enter or progress within this exciting industry, tackle cyber security attacks and prepare for their CREST exams.’ As the world we live in becomes ever more connected, 7Safe intends to continue taking the lead on helping organisations to develop, maintain and capitalise on their cyber security and information investigation capabilities, increasing overall trust in the systems that they operate and getting greater value out of the information that they hold. The Script FEBRUARY 2015 The Script FEBRUARY 2015 to CREST Cyber security monitoring and logging project An update from Jason Creasey, Project Manager The final validation workshop for the cyber security monitoring and logging research project has now been completed. This was kindly hosted by Deloitte in Reading. It was highly productive and popular, with 34 workshop participants validating key project findings and analysing results from the 66 responses to the consumer requirements survey. The workshop included interactive breakout sessions that helped define best practice for: 1. Cyber security monitoring and logging in practice; defining pragmatic log management and improving situational awareness 2. The evolving role of suppliers in cyber security monitoring and logging; designing the next generation of SOCs and developing services to meet requirements The main findings from the project are that organisations need to: • Identify potential indicators of compromise (IOC) at an early stage • Investigate them effectively • Take appropriate action to reduce the frequency and impact of cyber security incidents. Research on the project is now complete and the focus is now on production of the final Cyber Security Monitoring and Logging Guide. This Guide will: • The objectives of this are to help organisations to: • Become more difficult for cyber security adversaries to attack • Reduce the frequency and impact of cyber security incidents • Meet compliance requirements • Identify and respond to cyber security incidents quickly and effectively • Determine what to outsource, why and to whom. • • Present details about how to monitor and log cyber security events, many of which are potential indicators of compromise (IOC) that can lead to cyber security incidents if not addressed quickly and effectively Provide practical advice on how to deal with suspicious events, use cyber security intelligence and address the main challenges Enable organisations to priorities and manage myriad event logs; build an effective cyber security monitoring process and learn about where and how they can get help. The release of the final Guide is planned for Spring 2015. Getting to know you Name: Louise Pordage Company: N ational Cyber Crime Unit Job Title: Industry Partnerships Manager What is the role of the National Cyber Crime Unit (NCCU)? The National Cyber Crime Unit (NCCU) is part of the National Crime Agency and has the responsibility to lead, support and co-ordinate operational and high-impact activity against the most significant cyber crime threats to the UK. In order to understand the cyber crime threat and deliver a targeted and high impact response, the NCCU has placed partnership working at the heart of its approach. The NCCU has a dedicated partnership team focused on developing both strategic and tactical relationships across the community, including: national and international policing; other national partners, including CERT UK, and with industry and academia. What is your role within the National Cyber Crime Unit? It is my role to head up our industry partnership team. My team for the last year has been working to develop relationships across a variety of sectors: financial, internet service providers, retail, security and hosting providers to name a few, with the mission to start to build a law enforcement and industry community. There are a number of factors that have been central to our outreach plan, but in essence the focus has been on building trust. We have looked to achieve this through sharing our understanding of the threat; listening and responding to the threats that partners and their customers are experiencing; by engaging partners in operational activity; providing feedback to referrals; maintaining contact with our partners; ensuring our efforts are joined up with other government and law enforcement partners; and proactively identifying opportunities for collaboration. We are still at the beginning of this journey, but certainly from my experience over the last year, the opportunities to work together to understand and respond to cyber crime are truly transformational. How does the NCCU work with industry partners? I think trust is built through doing, and showing commitment and respect to those that you partner with. These values sit at the heart of what my team are working hard to achieve. Over the last year we have been engaging with our partners in a number of ways in order to support the priorities of the NCCU, to understand the cyber crime threat, deliver a targeted and high impact response and hear from our industry partners about the latest threats causing harm to the UK. To make this happen, we provide a number of routes for engaging with the NCCU. In January 2014, we established a cross sector industry group with the mission to work in partnership to identify intelligence gaps; understand the capabilities available in law enforcement and industry, and embark on joint working. This group has placed industry within the Cyber Crime Strategic Governance model. We also run sector specific groups where we are looking to encourage collaboration across the sector; engage through other established groups, and pull together relevant stakeholders when there is a particular threat or operation. We have also recognised the great value of engaging 1-2-1 with partners, and although this can be resource intensive, these meetings have been fundamental to briefing on the NCCU: our interests, the importance of working in partnership, identifying mutual interests and building trust. What happens now? The NCCU Industry team have engaged with a number of CREST members over the last year, but we look forward to the opportunity to further develop the relationship. We are particularly interested in how we could collaborate on investigations, hear about new vulnerabilities you are seeing and collectively encourage industry to engage law enforcement and policing partners. The Script FEBRUARY 2015 Training Course Accreditation CREST has now accredited a number of training courses. Information on all of them is available on the CREST website at: http://crest-approved.org/training-and-academia/crest-accredited-training-courses/index.html. All of the courses have been assessed against the CREST syllabus areas and the UK National Occupational Standards. Courses assessed by CREST are recognised by the Tech Partnership (formerly e-Skills UK) and can be included on its website and careers pathways. They are also recognised by the IISP (Institute of Information Security Professionals) and are included on its website. For further information on how to get a training course accredited by CREST, go to: http://www.crest-approved.org/ training-and-academia/how-to-get-your-training-course-assessed/index.htm Working with Recruiters Over the last few months CREST has held two workshops with representatives from technical information security recruitment companies. These have been very well attended and positive, with participants keen to engage with CREST to develop an industry-specific differentiator. The first meeting also included representatives from CESG, BIS and e-Skills (now Tech Partnership). The second focused on developing a Code of Ethics and Good Practice that recruitment companies could in the future be asked to comply with, along with the development of questions that they will need to respond to. 522 Uxbridge Road, Pinner, Middlesex, HA5 3PU. CREST is a not for profit company registered in the UK with company number 06024007.