Bank of England Partners With US for Cyberattack Simulation

Operation Resilient Shield has been in the works since David Cameron and Barack Obama announced plans for closer co-operation in January

The Bank of England, in partnership with some of the largest US banks, is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

The simulation has been dubbed “Operation Resilient Shield” and will provide a more robust examination of the sector’s defences than the recently implemented Waking Shark tests.

The transatlantic operation was announced by UK Prime Minister David Cameron back in January, after visiting President Barack Obama. It will be co-ordinated by the Computer Emergency Response Team (CERT) in both countries and will look to test communication between banks and governments.

Speaking at the time of the announcement, both the US and UK government reiterated the importance of international co-operation in order to deal with cyberthreats. It is hoped that Operation Resilient Shield will “strengthen threat information sharing and intelligence co-operation on cyber issues, and support new educational exchanges” between the two countries.
A number of high-profile cyberattacks have hit the headlines in recent weeks, serving as a reminder that the threat facing businesses and consumers is ever-present. Both TalkTalk and Vodafone have had to inform customers that their accounts have been compromised, with the former announcing that 21,000 unique bank account numbers and sort codes had been stolen.

More than most other industries, the financial sector must ensure that its security protocols are frequently tested and updated in order to counter the threat posed by cyber attackers. The sensitive information stored by banks and similar institutions means that even a minor security breach could have devastating consequences for businesses and individuals. As well as the threat posed by individuals hackers and collectives, state-led attacks by nations like China and Russia are also now viewed as a serious risk to the UK and US economies.
Ein News: http://bit.ly/1MRO9ze

 

 

« New UK Surveillance Bill Appears In The Wake of Snowden
Can EU Judges Keep NSA Spying in Check ? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.