The North West Cyber Security Cluster is here!

Cyber Security
Blog Image
Masthead Bottom

nwcscThe North West Cyber Security Cluster is launching it’s new website in early 2015! As one of only a few initiatives of its type in the UK, the group is based on the model for the highly successful Worcestershire based Malvern Cyber Security Cluster, which was launched in 2011 and now consists of more than 50 SME’s.

And you’re still trying to guess what exactly the North West Cyber Security Cluster (NWCSC) do, something to do with security?

What Cyber Security Scheme does do is define a focused set of controls, which will provide cost effective, basic cyber security for organisations of all sizes.

NWCSC’s goals involve establishing a minimum certification level for entry to the group, thereby raising industry standards and meaning a step closer to high accreditation becoming the norm for businesses in the cyber security sector.

The Cluster will enable businesses and organisations in the North West, and beyond, to benefit from a pool of experts with skills that can put in place protective measures to reduce the risks posed by cyber security threats.

The North West Cyber Security Cluster is an accreditation body for the Cyber Essentials Scheme, which is a scheme developed by the Government.

Taking cyber-crime and making the UK one of the most secure places in the world to do business is a big task for the Government.

CSC 2015

The Cyber Security Conference 2015 is the coming together of the North of England’s two most successful Cyber Security Conferences, BEC Information & Data Security Conference and Lancaster University’s NW Cyber Security Conference.

From large corporations to micro businesses, the importance of protecting personal and commercial information has become much more important with the introduction of the smart phone and other portable devices.

Businesses are confident that they are doing everything that is needed when it comes to Information Security Systems.

However, 87% of data protection contraventions are related to poor information security.

The protection of personality identifiable information continues to dominate regulatory compliance efforts, with European data protection laws cracking down on negligence and poor data management.

Information security may be a new concept to some, but there are proven vendor-neutral frameworks and methodologies available that can help companies overcome the challenges of poor IT security.

What has all this got to do with a cloud telephony and connectivity provider?

A successful cyber-attack on a telecommunications operator could disrupt services for thousands of phone customers, sever internet services for millions of customers, cripple businesses and shut down government operations.

Telecoms operators are adept at protecting their networks. It is also true that cyber adversaries employ the telecom infrastructure as their primary transport for most attacks.

Combined, mobility and cloud computing create new frontiers of risks for operators that will expose them to many of the same security risks that tech companies must dodge.

Telecoms businesses tend to be comparatively adept at managing information security risks.

Concert are one of them and we are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats.

Come to the CSC 2015.

Come and join industry leaders and local practitioners for the FREE event, who will share with you the threats, opportunities, contractual obligations and regulations that are starting to hit the widest supply chains.

Concert will be there and the conference will be a benefit to Legal practices, accountants, Insurance brokers, Personal information suppliers, Nuclear suppliers, Public Sector suppliers, NHS suppliers, Engineering, Schools, Colleges, and wholesalers.