UK CYBER HYGIENE - BIS asks industry for feedback
BIS is asking for feedback on the first draft of its Cyber Hygiene Profile developed by intended to identify the basic cyber controls that business really should have in place.
SUBMISSIONS NOW CLOSED
Version 1.0 of the 'profile' is now out for review through the BSI’s Draft Review System and the consultation will close on 16th March, 2014.
The current draft can be viewed and comments submitted through the BSI’s Draft Review System and the review will close on the 16th March, 2014.
To access the Draft Review System please visit to login or register HERE!
The Cyber Hygiene Profile can be found at HERE! (Note: you'll need to be logged in to the BSI system to view this page)
Last year BIS issued a Call for Evidence on Cyber Standards and over 6 months engaged in discussions and debate with industry. CRIF fully participated in these consultations and submitted a short paper to highlight and stress the importance of embedding wider risk management dimensions to help business understand the commercial implications of Cyber Risk and enable the Insurance Industry to better address the needs of the market.
This led to the announcement by Rt Hon David Willetts of the intention of BIS following industry feedback to develop a Profile for Basic Technical Cyber Hygiene in conjunction with the BSI and with the support of Information Security Forum (ISF) and IASME.
For more information of the work of BIS please CLICK HERE!
To find out more about our work and engagement with BIS and other industry stakeholders please contact us directly at email@example.com or via phone on +44 208 993 1599.
You might also like ...
In the HP 2012 Cyber Risk Report, HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including Web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.