UK Cyber Security Council Officially Launched

The UK Cyber Security Council, a self-regulatory organisation responsible for boosting professional standards and career prospects for those working in cyber security, has now officially started work as an independent body. The council will now undertake its role in representing the cyber security profession, driving awareness and excellence across the industry, with the ultimate aim of growing the UK’s cyber-skills base. 

This will involve delivering thought leadership, career tools and resources for those in the cyber security industry and those looking to pursue a career in the sector, as well as working with government, industry and academia to close the skills gap.

The council’s inaugural leadership has been confirmed as the following: Dr Claudia Natanson (chair), Jessica Figueras (vice-chair), Mike Watson (treasurer) and Carla Baker (trustee). The first priorities are to appoint a permanent leadership team to work alongside the Board of Trustees as well as recruit personnel to build on the work of the Formation Project in areas such as professional ethics and recognition for cyber security practitioners. 

The council has also been invited by the NCSC to participate at the UK government’s cyber security conference, CYBERUK, in May.

Dr Claudia Natanson is a longstanding CISO with both public and private sector experience and the council will seek to broaden representation for the sector, accelerate awareness and promote excellence within the profession through a mix of thought leadership, career tools, education and lobbying government, industry and academia to develop and promote the UK’s cyber sector. The Council will be "engaging with government to ensure the delivery of the standards and governance needed to ensure a strong cyber security profession now and in the future. The trustees assure all those involved in the council to date of our maximum efforts to take their work forward." she said.

Discussing the official launch, (ISC)2 a non-profit association of certified cyber security professionals and part of the Cyber Security Alliance, called for more industry collaboration to address the cyber-skills shortage. Clar Rosso, CEO of (ISC)2, said: “Our shared vision and commitment to the creation of the council, and our ongoing support for it as a founder member of the Alliance, has brought our industry together, and it is important we do not squander the opportunity for progress and innovation that cooperation creates."
 

UKCyberSecurityCouncil:    ISACA:     NCSC  (ISC)2:     Computer Weekly:     Infosecurity Magazine:     

You Might Also Read:

British Cyber Security Spending Is Rising:

 

« US Blacklists Seven Chinese Supercomputer Organisations
Cyber Attacks Target SAP Applications »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).