The Hacker Hardened Public Sector Enterprise: Practical Steps to Real Cyber Security

 

Practical Steps to Real Cyber Security
By Sir Kevin Tebbit KCB CMG (Former Head of GCHQ)

'As the global digital economy becomes a growing reality at a local level The Public Sector should prepare cyber and security strategies to become Hacker Hardened’

THE NEW PRIME TARGET: Hackers are increasingly targeting local and central government, recognising the rich opportunity to exploit the move towards the wider use of digital services.

CALM VOICE OF REASON: The Cyber Security space is very noisy and you would be forgiven for being deafened by the racket. There are just a few practical steps that you can and should take to mitigate the risk for your organisation.

JUST THE ESSENTIAL FACTS PLEASE: In this paper, Sir Kevin Tebbit (former head of GCHQ) argues that, as part of the necessary approach, local government should be given a specific remit for cyber resilience, with both executive and political accountability. 

Simply submit your details below to download your free copy of ‘Practical Steps to Real Cyber Security:

If you see this, leave this form field blank and invest in CSS support.
Your Details (* denotes required field)

Non WiredGov Registrants: Please fill in all the required fields below.

WiredGov Registrants: Simply login here to automatically fill the fields with your information. Alternatively you can fill in the required fields manually.

Further Resources from Ascot Barclay Group Ltd

NEW GLOBAL FORUM TACKLES OPERATIONAL TECHNOLOGY SECURITY

Share this campaign

Ascot Barclay Group Ltd

Cyber Security

We enable our clients to achieve strong cyber security resilience through a combination of our expert services and world-leading cyber products. Click HERE to find out how we can help you.
  1. Start with a Discovery Review - where are you vulnerable?
  2. Professional CIO, CSO and CISO Support Service for  Corporates and SME's
  3. Achieve Cyber Essentials Certification, ISO 27001, IEC 26443, ISA99
  4. Benefit from Managed Security Services & Cyber Security Operations Center (C-SOC)
  5. Cyber Security Education and Risk Awareness Training
 

'Companies spend millions of dollars on firewalls, encryption and secure access devices and it's money wasted; none of these measures address the weakest link in the security chain.'

Kevin Mitnick (The World's Most Famous Hacker)