Building Nation-Level Defences to Fight Cyber Crime
BT's Mark Hughes argues that nation states should act now to put in place cyber defences to protect themselves from the most advanced threats ever seen.
We’re at cyber war
The worldwide WannaCry and NotPeyta ransomware attacks of 2017, and the growing levels of malware-related data breaches in 2018, are stark reminders of the increasingly dangerous and fast-developing world of cyber crime we all live and do business in.
Every business, financial institution, telecoms provider, energy company and government should now consider itself to be under threat from cyber criminals intent on causing devastation for gain. This ever-growing network of cyber criminals wants to develop the most advanced attack methods to penetrate your systems. And, increasingly, nation states are employing these hacker services to damage other governments and influence political outcomes.
We need to respond to this. Those of us with national responsibilities, the leaders of nationally-important businesses, and major institutions, need to unite to fight. We need to lead a defence strategy against this cyber warfare at a national level, bringing the best minds and tools together to protect your assets and serve the national interest.
Seismic shifts in the cyber landscape
We all know that the cyber-defence landscape is one of constant change, but 2017-18 saw a seismic shift in attack methodologies, threat actors, means, motive and opportunities.
In 2018, we’re operating in an environment where threat actors are not solely criminals motivated by the possibility of financial gain. Partly due to geopolitical influences, the most advanced attackers have moved on, and are seeking out a greater wealth: power. As a result, we’ve seen wave after wave of serious attacks designed to display, acquire or leverage power. Cyber sabotage as a method of organisational disruption is only likely to gather pace from this point onwards.
Nation states are flexing their cyber powers, and displaying a disturbing willingness to escalate their actions to cause major nation-state-level threats. Relatively unsophisticated countries are revealing the ability and determination to use cyber crime to fund national developments such as nuclear weapons.
It’s time to seize the initiative
As the risk of digital crime grows, I believe businesses must be proactive in fighting back. Rather than simply putting up defences, organisations should recognise that we all have a common interest in taking action to protect our data and that of our customers. If we carry on just acting as individual organisations, then we’re leaving ourselves open to further attacks — attacks that will only escalate.
The only effective response to the levels of cyber attack we’re seeing is for businesses to establish an enhanced level of collaboration, working with the UK Government and international security organisations in a coordinated way. This means putting the structures and processes in place that will allow us to collaborate at a national and a European level. The key is to respond as a community of security professionals.
Cyber defence at a national level is the essential first step
The first step in bringing about a united way of working is to take a major step up in cyber security at a country level. This will achieve national-level insight and oversight that will work closely with industry and government, both at home and abroad. We need to develop a cohesive, multi-layered and sophisticated national cyber-defence capability.
So how does a nation make this a reality?
It starts by establishing a focus for its national cyber-defence capability, by creating a National Cyber Security Centre, or Capability (NCSC) — such as the ones in the UK.
A NCSC then begins a significant period of strategy, policy creation and technical direction setting - all alongside working closely with the nation’s industry. It’s vital that government, critical infrastructure and industry forge strong and effective relationships to share relevant information and, together, make decisions that help detect, deter and (ultimately) defeat them at source. In fact, the NCSC in the UK played a vital role in coordinating a response to the WannaCry attack - so it’s clear that they’re effective.
A national cyber-defence capability ideally divides its organisation into the four key operational domains of intelligence, forensics, threat monitoring and information sharing.
Leaders of large enterprises share the defence responsibility
We all accept that business plays a key role in determining the success of a nation, and that national decisions impact on business; this interdependence now extends to cyber security.
Cyber security has stepped beyond the realm of pure cyber-security specialists. Key decision makers need to understand what data the NCSC will require, as well as how to maintain and follow the guidance and policies provided. Organisations need to be ready to action NCSC-generated intelligence, to respond and defend with agility, in order to help the NCSC identify threats that could devastate them.
This spirit of shared enterprise makes it much easier for organisations to scale up their cyber security measures, since the approaches taken by the NCSC provide a template to follow to develop a multifaceted, highly-responsive cyber defence capability.
Spearheading the nation’s cyber defences
We already work with the UK’s NCSC to disrupt cyber attacks and to make it more difficult for cyber criminals to target the UK.
We believe that only by working together with the Government and the rest of the telecommunications industry can we collectively succeed in stemming the tide of cyber crime. So, in direct response to an initiative led by the NCSC, we’ve become the first telecommunications provider in the world to start sharing information about malicious software and websites on a large scale with other Internet Service Providers (ISPs). To make this happen, we’ve launched a free, collaborative online platform to share our threat intelligence data across the ISP community in a secure and trusted way.
Since we began sharing threat information at the end of 2017, we’ve identified and shared over 200,000 malicious domains. Our team is currently preventing the delivery of 50 million malicious emails with 2,000 unique malicious attachments every month — that’s almost 20 malicious emails every second.
Our latest step involves joining a group of global technology and security companies to become part of the Cybersecurity Tech Accord, a landmark public shared commitment to collaborate on cyber security. Its principles echo those we’ve held for many years: to protect all of our users and customers everywhere; to oppose cyber attacks on innocent citizens and enterprises from anywhere; to help empower users, customers and developers to strengthen cyber-security protection; and to partner with each other and with likeminded groups to enhance cyber security. We’re looking forward to a new era of collaboration with the other companies in the Cybersecurity Tech Accord, and to finding new ways to protect the people we serve.
And our efforts don’t stop there. We’re the first Communications Service Provider to have an intelligence sharing partnership with Interpol. In addition, we work closely with the National Crime Agency to disrupt organised cyber crime by supporting investigations and working to build new capabilities to enable us to jointly investigate criminal infrastructure. Plus, we’re a founding member of the Fusion Cell in the UK, a joint industry / Government operational team that collates, assesses and distributes intelligence from industry and government sources to its members.
Explore the possibilities and share in our experience
We’ve always been at the forefront of cyber-security development as an essential part of protecting our global network. And, as our expertise has evolved, we’ve shared our knowledge with UK government and some of the largest business organisations in the world. We’ve distilled all this insight and proficiency into practical functionality that can give your enterprise and your nation the cyber defence you need.
- Microsoft Azure Sales Consultant
- Up to £100,000 Base + OTE
DCL are currently working on behalf one of the fastest growing service providers in London who are on the lookout for a consultative Microsoft Azure Sales Consultant. The Microsoft Azure Sales Consultant will be responsible for selling (opening and closing new business opportunities new business) and being the SME in all things Cloud providing support to other members in the sales team. Preference will be given to the Microsoft Azure Sales Consultant who possesses Exceptional knowledge of Cloud Technology (Public / Private / Hybrid.). Current experience with technology such as Azure, AWS, Office 365 is required Proven sales experience of identifying and closing new business within the Cloud market. Must be currently selling into the enterprise market. Consistency on tenure in current and past roles. New business background is a must In return you will be working for a successful, growing SME organisation with excellent training and sales support from pre-sales, post-sales, project management, service management, bid management, pricing and customer service. Candidates must be UK Based. sponsorship can not be provided for this role. Reference Number: BD7690 (Cloud Sales Jobs, Cloud Computing Jobs, Cloud Computing Sales)
- Senior Incident Cyber Response Consultant
- Up to £75,000 Base
Senior Incident Cyber Response Consultant with Forensic experience is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. From my perspective, as a recruitment partner, this is a particularly interesting and exciting opportunity. Not only is the team in an active growth mode, but they have varied, high profile and interesting projects for their team. Globally recognised. This is an opportunity to drive and grow a career. Experienced Senior Incident Cyber Response Consultant is needed to help take clients through the complete IR / triage process. The position is be client facing and will be expected to engage with clients at a commercial level. Proactive IR planning is also key to the position. The Senior Incident Cyber Response Consultant will not hold a sales target, but any previous experience in identifying and generating revenue is highly sort after. A broad forensic background would be highly desirable also. An ideal Senior Incident Cyber Response Consultant will be CREST CCIR, CCIM certified. Experience with forensics is highly desirable. Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) An individual must be London commutable Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) The opportunity for an individual to conduct malware research and analysis is actively promoted. Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 or 02086634030 or email email@example.com Unfortunately, our client are unable to provide sponsorship for this opportunity. Candidates must be UK based. Ref: CH7679 (Incident Response Jobs, CREST Jobs, Digital Forensics Jobs, IR Jobs)
- Principal Electrical Engineer
- Salary: Up to £90,000 Base + Bonus
Principal Electrical Engineer Location: London Salary: Up to £90,000 Base + Bonus A Principal Electrical Engineer is needed for a state of the art, London based Data Centre provider. The Principal Electrical Engineer will be responsible for all of the Mechanical & Electrical components (support, development/design etc.) within our clients Data Centre’s. Other responsibilities include but not limited to; Commissioning, approving, design & review/improvement of new data centre infrastructure Commercial’s (Contract negotiation, project finances etc.) Project management Training/Development of other staff General engineering tasks Requirements HND / Degree in Engineering or equivalent. Must have current/recent experience (ideally in a senior position) within a mechanical & electrical position within a Data Centre environment Candidates must be UK based and unfortunately, our client are unable to provide sponsorship Ref: PG7600 (M&E Jobs, Mechanical & Electrical Jobs, Engineering Jobs, Data Centre Jobs, Data Center Jobs)
- Cyber Security Senior Managing Consultant
- Up to £100,000 Base
A Cyber Security Senior Managing Consultant is needed to join the leadership team of a Management Consultancy. Ideally based in London- but can be flexible. The Cyber Security Senior Managing Consultant will engage with key client stakeholders to understand, advise, influence and deliver critical programs and projects. Including, but not limited to strategic, transformation, advisory cyber services. This role will require an adaptive individual who is able to lead technical teams, provide consultative change, identify new revenue opportunities within existing / prospective accounts etc. Any experience across AI, GRC, IoT, Data privacy, Cloud Security, Penetration Testing, Forensics / IR / EDiscovery. This is a non-exclusive list. Cyber Security Senior Managing Consultant must have a blend of consultative advisory skills and a strong commercial, business focus. This position will be responsible for driving new revenues. Experience working across multiple verticals including the UK public sector, finance, retail, critical national infrastructure, defence, Blue light, MOD etc is desirable. Ability to achieve UK Security Clearance is essential. All details kept indiscretion. Ref CH7688 Salary: Up to £100.000 Base (Cyber Security Jobs, Information Security Jobs)