Could You Be A UK Cyber-Warrior?

A crack team of 50 'brilliant brains' is to be recruited by the UK Government to defend the country against hacking attacks.

As part of the new National Cyber Security Programme, UK ministers want people seeking a career change to try-out for the new team.

The idea is to recruit people who do not currently work in the computer industry but who have 'high aptitude' brains with an untapped natural talent.

It is similar to the use of the Telegraph cryptic crossword in 1942 to find identify codebreakers for Bletchley Park.

The scheme is part of the £1.9billion cyber defence project unveiled by UK Chancellor Philip Hammond. As a pilot scheme, the free training course in London will target people such as soldiers, doctors and nurses who are interested in a new direction. If selected, the individuals will be put through exercises including dealing with a nationwide cyber-attack, and studying the mindset of hackers.

Matt Hancock, the minister for digital and culture, told The Times: 'This new academy will give students the skills the nation needs to fight cyberattacks and help us achieve our ambition of making the UK the safest place to live and do business online.'

Launching the strategy at an event in east London recently, Mr Hammond said investment in 'offensive' capabilities would help deter other countries from targeting the UK.

'If we do not have the ability to respond in cyberspace to an attack which takes down our power network, leaving us in darkness or hits our air traffic control system grounding our planes, we would be left with the impossible choice of turning the other cheek, ignoring the devastating consequences, or resorting to a military response,' Mr Hammond said as he described the National Cyber Security Strategy in London.

'That is a choice we do not want to face and a choice we do not want to leave as a legacy to our successors.' Mr Hammond said that as a former foreign secretary, responsible for GCHQ, he had seen the 'full extent' of the threats against the UK.

They included 'threats to our data, to our IP (intellectual property), to our military secrets, to our financial information and perhaps most of all to our infrastructure itself'. 'All of those areas are targets for our adversaries,' he warned. In a sign of the scale of the threat, it has emerged that one scam saw up to 50,000 Britons a day sent a fake tax refund.

The bogus communication, which asked for personal details in order to reclaim money, peaked in September and took six weeks to close down.

Daily Mail:        UK’s New National Cyber Security Centre:

« Overconfident: US Will Win A Cyber War With China
NSA Chief Has A Special Phone For Top-Secret Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.