Stuart O'Brien, Author at Cyber Secure Forum | Forum Events Ltd - Page 40 of 61
Posts By :

Stuart O'Brien

Time running out to claim your FREE VIP ticket

960 640 Stuart O'Brien

Time is running out for you to claim your free place at the Security IT Summit – We have just 3 free VIP tickets left!

This unique event takes place on July 2nd at the Hilton London Canary Wharf.

Register here for the following benefits:

  • Meet with innovative suppliers for a series of face-to-face, pre-arranged meetings based on your own requirements.
  • Network with like-minded senior cyber security professionals.
  • Attend a series of insightful seminar sessions.
  • Enjoy complimentary lunch and refreshments

Our seminar programme includes:

  • Assessing and improving the maturity of your security operations – by Kev Eley, Enterprise Client Director
  • 4th Industrial Revolution – Globalisation 4.0 – by Alfred Rolington, Joint CEO, Cyber Security Intelligence
  • Weaponising data: the dark nexus of hacking, leaking, journalism and information warfare – by Geoff White, Journalist

Would you like to join 60 other senior professionals? – Register here!

Accountancies take lion’s share of cyber security recruitment

960 640 Stuart O'Brien

The UK’s so-called ‘Big Four’ accountancy firms account the for majority of cyber security recruitment in the country.

Job search site Indeed.com has released data that shows PwC, KPMG, EY and Deloitte take the top four places in its Top 10 ranking, ahead of the likes of Vodafone, Aviva and Barclays (see table below).

Indeed says the introduction of regulations such as GDPR have driven much of this demand, with the accountancies being asked to consult on the implications for many firms.

As an illustration of this growth, Indeed it has seen an increase of 14.58% for job postings for security roles per one-million vacancies on its site.

Bill Richards, UK MD at Indeed, said: “Every aspect of a modern company relies on its IT and the growing threat of cyber attack and tightening of privacy laws means demand is rising fast for professionals who are able to protect companies’ most precious information.”

“The critical importance of their work, the skill and discretion it requires, and strong demand from employers have combined to drive up cyber professionals’ salaries. Cyber security is both a hot topic and a lucrative profession right now.”

Cyber roles as % of job postings 2018

1 KPMG 5.95
2 PwC 5.08
3 EY 1.99
4 Deloitte 1.47
5 Vodafone 1.46
6 Hastings Direct 1.43
7 Aviva 0.78
8 Capita 0.75
9 Barclays 0.66
10 Capgemini 0.66

Source: Indeed.com

Survey reveals increasing IT investment in containers

960 640 Stuart O'Brien

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers.

That’s up considerably from two years ago, when just 67 percent of teams were running container technologies in production, according to the 2019 Annual Container Adoption Survey from Portworx and Aqua Security.

The report features insights from over 500 IT professionals across a variety of industries and company sizes. The survey, conducted in April and May, asked questions about the state of container usage, tooling, environments and barriers to adoption, to get a snapshot of the container market landscape today and its evolution over time.

Yet despite their pervasiveness, the report highlights that containers aren’t without hurdles: when asked to name their top challenges to container adoption, respondents most frequently cited security (51%), data management (40%) and cross-cloud/multiple cloud support (36%). 

Other Key Findings:

  • Organisations are making bigger investments in containers. In 2019, nearly one in five organisations is spending over $1 million annually on containers (17%). Compare this to just four percent in 2016.
  • Data security tops the list of security challenges with a super majority of respondents (61%) listing this as their top security challenges, followed by vulnerability management (43%) and runtime protection (34%).
  • For the third year in a row, increasing developer speed and efficiency is the primary driver of container adoption with 37 percent of respondents listing it as the top benefit.
  • When asked which team bears the main responsibility for container security, most (31%) named the organisation’s security team, with a joint responsibility or DevSecOps in second place (24%). However, respondents’ own roles influenced their answer, with 47% of DevOps respondents naming DevSecOps as the main owner and 54% of Security respondents named Security as the main owner. 

Download the full 2019 Portworx & Aqua Security Container Adoption Survey Report here.

INDUSTRY SPOTLIGHT: CurrentWare AccessPatrol

960 640 Stuart O'Brien

Use the latest technology to prevent employees causing data breaches 

Data theft can rob you of thousands of dollars and countless hours of hard work and effort. So how should a company protect itself from cyber threats?

CurrentWare’s AccessPatrol helps secure company endpoints like USBs, DVDs, Bluetooth devices.

AccessPatrol allows you to generate comprehensive reports that highlight endpoint device usage by computer and by user.

In essence, you can identify errant employees and take immediate action to prevent data pilferage.

It endpoint device usage is necessary for business operations, AccessPatrol allows you to track and generate PDF and Excel reports of all data transfer activity.

Can you join 60 peers at the Security IT Summit?

960 640 Stuart O'Brien

There’s a free VIP place reserved for you at the Security IT Summit. Claim yours today!

2 July 2019 – Hilton Canary Wharf, London

This unique event is entirely FREE for you to attend – simply reserve your place here to secure these benefits:-

  • Source new innovative and budget-saving suppliers
  • Attend inspirational seminar sessions from industry thought-leaders
  • Network with like-minded peers
  • Enjoy complimentary lunch and refreshments

RSVP now to avoid disappointment!

Or visit www.securityitsummit.co.uk for more information.

Do you specialise in Browser Security? We want to hear from you!

960 640 Stuart O'Brien

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in June we’re focussing on Browser Security solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re a Browser Security solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Chris Cannon on c.cannon@forumevents.co.uk.

Here are the areas we’ll be covering, month by month:

Jun – Browser/Web Security
Jul – Authentication
Aug – Penetration Testing
Sep – Vulnerability Management
Oct – Employee Security Awareness
Nov – Malware
Dec – Network Security Management

For information on any of the above topics, contact Chris Cannon on c.cannon@forumevents.co.uk.

The YubiKey: Setting the global standard for two-factor and passwordless authentication

960 640 Stuart O'Brien

How do you currently authenticate and manage users within your organisation?

Discover how your business compares against the industry standard with our free self-assessment and get a relevant, actionable, executive report! 

Our assessment takes less than 4 minutes and the first 10 people to complete it will receive a £5 Amazon Voucher!

Click here for your FREE assessment.

Digital skills shortages ‘costing UK £63bn a year’

960 640 Stuart O'Brien

A lack of technical expertise has fuelled skills shortages across the UK for the last two decades.

That is according to comparative analysis of the professional jobs market by The Association of Professional Staffing Companies (APSCo).

A 1999 report from University College London said almost half (47%) of all ‘skill-shortage vacancies’ that year could be attributed to a lack of technical expertise.

For ‘associate professional and technical’ roles, the need for ‘advanced IT’ skills was responsible for 31% of vacancies, while a lack of ‘other technical and practical skills’ were responsible for a further 49% of all open roles.

A separate report published the same year by Computer Weekly revealed that C++ developers were the most in-demand professionals with Java the second most sought-after skill in the IT recruitment market.

Now, research from The Edge Foundation suggests that around half of all employers (51%) have been forced to leave a role open because there are no suitable candidates available, and that tech job vacancies are costing the UK economy £63 billion a year.

LinkedIn data indicates that cloud and distributed computing is the most valued skill among employers, with user interface design, SEO/SEM marketing and mobile development also featuring in the top 10.

Commenting on the analysis, Ann Swain, Chief Executive of APSCo, said: “While the specific skills that employers are seeking have changed dramatically over the past two decades, the fact that talent gaps continue to be aligned with technical competencies suggests that we need to do more to boost Britain’s digital capabilities.

“Our members have long reported shortages of talent across the IT and digital fields. For this reason, it is crucial that we ensure that we retain access to the STEM professionals that businesses need in the short term – through maintaining access to global talent and retaining our flexible labour market.

“However, perhaps more importantly, we must pipeline the calibre and volume of skills we need for the future so that we break free from this perpetual skills shortage. As this data indicates, for the past 20 years we have been playing catch-up – and we must break the cycle if individual businesses, and the wider UK economy, are to fulfil their full potential.”

NCSC outlines data breach roles

960 640 Stuart O'Brien

Data breach roles have been outlined to help victims of cyber incidents and form an improved approach between the UK’s technical authority for cyber threats and its independent authority for data protection. 

Speaking at the second day of the National Cyber Security Centre (NCSC) annual conference CYBERUK, Chief Executive Ciaran Martin and Information Commission Office (ICO) Deputy Commissioner James Dipple-Johnstone outlined the understanding between the organisations.

The NCSC manages cyber incidents of national importance to reduce harm caused to victims and to the UK, help with managing the response and learn lessons to help deter future attacks.

The ICO is the independent regulator for the monitoring and enforcement of the General Data Protection Regulation (GDPR) and the competent authority for Digital Service Providers under the NIS Directive, meaning breached organisations should notify them of incidents, cooperate and take remedial action.

Amongst the commitments outlined were a greater clarity of the separate roles and responsibilities each organisation has after a cyber incident, making it easier for a victim to deal with the right authority/organisation at the right time.

The NCSC outlined plans to engage directly with victims to understand the nature of the incident and provide free and confidential advice to help mitigate its impact in the immediate aftermath; encourage impacted organisations to meet their requirements under GDPR and the NIS Directive, while reassuring organisations that the NCSC will not share information reported to them on a confidential basis with the ICO without first seeking the consent of the organisation concerned and help the ICO expand their GDPR guidance as it relates to cyber incidents.

The ICO stated it would focus its early stage engagement to the vital steps required to help ensure impacted organisations mitigate risks to individuals and stand up an effective investigation and establish circumstances of the incident, making sure that organisations have adequately protected any personal data put at risk and in circumstances of high risk to individuals organisations have properly met their legal responsibilities.

Both organisation should share duties, including the sharing anonymised and aggregated information with each other to assist with their respective understanding of the risk and commit to amplify each other’s messages to promote consistent, high quality advice to ensure the UK is secure and resilient to cyber threats.

Discussing the roles outlined,NCSC Chief Executive Ciaran Martin said: “This framework will enable both organisations to best serve the UK during data breaches, while respecting each other’s remits and responsibilities.

“The development of this understanding is as a result of a constructive working relationship between our organisations, and we remain committed to an open dialogue on strategic issues.

“While it’s right that we work closely together, the NCSC will never pass specific information to a regulator without first seeking the consent of the victim.”

ICO Deputy Commissioner – Operations, James Dipple-Johnstone, said: “It’s important organisations understand what to expect if they suffer a cyber security breach.

“The NCSC has an important role to play in keeping UK organisation safe online, while our role reflects the impact cyber incidents have on the people whose personal data is lost, stolen or compromised.

“Organisations need to be clear on the legal requirements when to report these breaches to the ICO, and the potential implications, including sizeable fines, if these requirements aren’t followed.”

The NCSC will seek to forge similar enhanced clarity on its working relationship with law enforcement colleagues who are at the core of the response to malicious data breach incidents.

Network with the best at the Security IT Summit

960 640 Stuart O'Brien

Join senior cyber security professionals from Arcadia Group, EDF Energy, Tesco and more at the Security IT Summit on July 2nd.

It’s entirely free for you to attend – simply register here.

As our VIP guest, you’ll be provided with an itinerary of face-to-face meetings with suppliers who match your requirements.

You can also attend insightful seminars and network with peers who share your challenges.

You’ll be joining representatives from the likes of:

  • ABF Soldiers Charity
  • Ageas Insurance 
  • Arcadia Group
  • Artemis Fund Management
  • Associated British Foods 
  • Birketts LLP
  • Brett Group
  • Catalyst
  • Department of Work & Pensions
  • Derwentside College
  • Drivetech UK
  • EDF Energy
  • Elysium Healthcare
  • EPR Architects
  • Fabulous Fan Fayre
  • Federation of Royal Colleges of Physicians of the UK
  • Girls’ Day School Trust
  • Glenny LLP
  • Heathrow Airport 
  • Hesley Group
  • Hireright
  • Homebase
  • HS1 
  • HS2 
  • HSBC
  • International Alert
  • Marshall Motor Group
  • Natural History Museum
  • North London Forensic Service BEH NHS Trust
  • Pickering Interfaces 
  • Royal Mail Group 
  • RPS Group
  • Save the Children International
  • Sequel
  • St Andrew’s Healthcare 
  • TES Global
  • Tesco Mobile
  • Tesco Underwriting
  • TGI Fridays UK
  • The Salvation Army UK Territory
  • Tructyre ATS
  • Twentieth Century Fox Film Co 
  • United International Pictures
  • United Utilities
  • XP Power Plc

This one-day event takes place on July 2nd at the Hilton Canary Wharf, London.

Your ticket includes lunch and refreshments. But places are limited so register today.

For more information, visit www.securityitsummit.co.uk.