Defence Cyber Protection Partnership 
Industry Information Security Liaison, Ministry of Defence 
CDE Innovation Network event 
9 September 2014, London
Context of the cyber threat 
“…the greatest transfer of wealth in history." 
General Alexander, Director of the NSA 
“We ignore the cyber threat at our peril…. 93% of large corporations… have had a cyber security breach in the past year.” 
Francis Maude, Minister for the Cabinet Office 
The cyber threat is real and growing 
Detica Report 2011 
Cyber attack is a ‘Tier 1’ threat to the nation National Security Strategy, 2010 
2 
Longest time period within which APT1 has continued to access a victim’s network: 
4 years, 10 months 
Mandiant report 2013 
Largest APT1 data theft from a single organisation: 
6.5 Terabytes 
over 10 months 
Mandiant report 2013
It won’t happen to me 
My systems are already protected 
It’s the CIO’s problem 
It’s the customer’s problem 
I’m too small to be a target 
I can’t afford it 
It’s the Prime’s problem 
Do I need to worry? 
3
The latest trends in cyber security 
Information Security Breaches Survey (2014) – trends 
Small businesses (< 50 staff) 
% of respondents that had a breach 
Average number of breaches in year 
Cost of worst breach of the year 
Overall cost of security breaches 
2013 
2014 
£65k 
£115k 
“The average cost of the worst breach suffered has gone up significantly particularly for small businesses – it’s nearly doubled over the last year.”
9 September 2014: Cyber Security Model
DCPP ENABLING WORK 
Information sharing 
• 
Reducing adversaries’ window of opportunity by: 
• 
Timely sharing of information across industry and government – some of it sensitive 
Measurements and standards 
• 
Providing clarity in terms of where we are and where we need to get to by: 
• 
Defining the proportionate and practical cyber security standards required in all defence contracts 
Supply chain awareness 
• 
Raising awareness of cyber security by: 
• 
Briefing a common message and surveying readiness
DCPP proportionate security model 
Proportionate security within the procurement lifecycle 
The principles involved are: 
 
To mandate cyber security risk management 
 
To bring about a cultural change – top-down, policy change (primarily affecting all new contracts placed) 
 
To risk-assess all supplies (including services) so that a proportionate level of security is routinely requested by acquirers 
 
To ensure that all contracts include clear, appropriate cyber security requirements 
 
To ensure that acquirers assess their aggregated risk through active monitoring of their own and suppliers’ on-going compliance to contracted security requirements
Outline 
Risk assessment 
• 
Used by buyer, pre- contract 
• 
26 questions 
• 
Output is indicative requirement ‘low’, ‘medium’, ‘high’ for supply, organisation and supply chain 
Assurance questionnaire 
• 
Used by buyer to specify detail expectations 
• 
Used by supplier to respond 
• 
97 questions in 14 categories 
control 
‘red flag’ 
degree of rigour
2. Assurance assessment
Pilots - criteria 
Confirm the process is simple to follow and identify any areas of concern 
Confirm the questions are clear and easily understood and identify any areas of concern 
Confirm hypothesis that CES is subset of DCPP (identify gaps/overlaps) 
Understand level of effort and appropriate skills 
Understand whether responses are naturally organisational or project specific
WHERE CAN I GO FOR FURTHER ADVICE? 
For general cyber security advice and guidance: 
 
Check your organisation and your IT service provider(s) against HMG’s ‘10 Steps to Cyber Security’ (search www.cesg.gov.uk) 
 
BIS Cyber Essentials Scheme (search www.gov.uk) 
 
Ask your information security staff to join Cyber Security Information Sharing Partnership (CiSP) to access threat information (www.cisp.org.uk) 
 
Access Technology Strategy Board’s voucher scheme for funding to improve cyber security (Search https://vouchers.innovateuk.org, closing date: 23 July 2014) 
 
CERT UK (www.cert.gov.uk) 
 
CPNI (www.cpni.gov.uk/advice/cyber) 
 
CESG (www.cesg.gov.uk) 
For defence sector specific advice 
 
Ask for advice: ADS, techUK, Primes, trade associations

More Related Content

PPTX
A Look at Cyber Insurance -- A Corporate Perspective
PPTX
Cyber Security: Challenges and Solutions for the Corporate
PDF
From Cybersecurity to Cyber Resilience
PPTX
Cyber Security Threats Facing Small Businesses--June 2019
PPT
CTO-CybersecurityForum-2010-Des Ward
PDF
Brochure - Jan 14
PDF
Network-Security
PDF
National Cyber Security Policy 2013 (NCSP)
A Look at Cyber Insurance -- A Corporate Perspective
Cyber Security: Challenges and Solutions for the Corporate
From Cybersecurity to Cyber Resilience
Cyber Security Threats Facing Small Businesses--June 2019
CTO-CybersecurityForum-2010-Des Ward
Brochure - Jan 14
Network-Security
National Cyber Security Policy 2013 (NCSP)

What's hot (20)

PPTX
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
PDF
McAfee Labs 2017 Threats Predictions
PPT
Indusrty Strategy For Action
PDF
The Digital Telecom. Security Services
PPTX
Cyber resilient infrastructure
PPTX
Development of Jisc security programme - Networkshop44
PDF
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
PDF
Lessons learned from the SingHealth Data Breach COI Report
PDF
ISF Congress 2016 - Session 7.2_Kukreja
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PDF
Singapore Cybersecurity Strategy and Legislation (2018)
PDF
Brunswick Intelligence - Building reputational resilience to cyber attack
PPTX
The Jisc vulnerability assessment management service – part 2: how to avoid t...
PDF
The impact of a security breach on MSP's and their clients
PDF
CWIN17 New-York / earning the currency of trust
PPTX
GRC Dynamics in Securing Cloud
PDF
The State of Cyber
PDF
Overview of national cybercrime strategies
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
McAfee Labs 2017 Threats Predictions
Indusrty Strategy For Action
The Digital Telecom. Security Services
Cyber resilient infrastructure
Development of Jisc security programme - Networkshop44
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Lessons learned from the SingHealth Data Breach COI Report
ISF Congress 2016 - Session 7.2_Kukreja
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Singapore Cybersecurity Strategy and Legislation (2018)
Brunswick Intelligence - Building reputational resilience to cyber attack
The Jisc vulnerability assessment management service – part 2: how to avoid t...
The impact of a security breach on MSP's and their clients
CWIN17 New-York / earning the currency of trust
GRC Dynamics in Securing Cloud
The State of Cyber
Overview of national cybercrime strategies
Ad

Similar to 9 September 2014: Cyber Security Model (20)

PDF
30 September 2014: Cyber Security Model
PDF
dcb1203CyberNDI
PDF
Cybersecurity Threats - NI Business Continuity Forum
PDF
4th Digital Finance Forum, Simon Brady
PPTX
Cyber Security in the Interconnected World
PDF
Cybersecurity Toolkit
PPTX
Cloud Security.pptx
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
The Security Circle- Services Offered
PDF
Cyber Security For Businesses
PPTX
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PPTX
Your cyber security webinar
PPTX
defensible_security-executive_support-sample.pptx
PPTX
What is Information Security and why you should care ...
PDF
Cyber Security small
PPTX
GDPR challenges for the healthcare sector and the practical steps to compliance
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
Cyber Risk Quantification | Safe Security
30 September 2014: Cyber Security Model
dcb1203CyberNDI
Cybersecurity Threats - NI Business Continuity Forum
4th Digital Finance Forum, Simon Brady
Cyber Security in the Interconnected World
Cybersecurity Toolkit
Cloud Security.pptx
Cyber Risk Management in 2017: Challenges & Recommendations
The Security Circle- Services Offered
Cyber Security For Businesses
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Your cyber security webinar
defensible_security-executive_support-sample.pptx
What is Information Security and why you should care ...
Cyber Security small
GDPR challenges for the healthcare sector and the practical steps to compliance
CRI "Lessons From The Front Lines" March 26th Dublin
Cyber Risk Quantification | Safe Security
Ad

More from Defence and Security Accelerator (20)

PPTX
DASA Security Showcase - Department for International Trade Presentation
PPTX
DASA Security Showcase - UK Fire Service Presentation
PPTX
DASA Security Showcase - Department for Transport and Home Office Presentation
PPTX
DASA Security Showcase - DASA Presentation
PPTX
DASA Security Showcase - Bank of England Presentation
PDF
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
PPTX
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
PDF
27 July 2017 Innovation nework event: how to create a great proposal
PDF
27 July 2017 Innovation nework event: Working with the Accelerator
PDF
Improving crowd resilience themed competition slides
PPTX
Accelerator First Innovation Fund network event Session 1
PDF
CDE themed comp -syn-bio part 2
PDF
CDE themed comp - synbio part 1
PPTX
Beyond battery power: future autonomy
PDF
CDE themed challenge - Beyond battery power: the technical challenge and futu...
PPTX
Beyond battery power - CDE themed competition part 2
PPTX
Beyond battery power - CDE themed competition part 1
PPTX
Beyond battery power - how the competition will work
PPTX
Introduction to the Centre for Defence Enterprise and introducing the Defence...
PDF
CDE Competition on FASS - technology challenge 1
DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - DASA Presentation
DASA Security Showcase - Bank of England Presentation
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: Working with the Accelerator
Improving crowd resilience themed competition slides
Accelerator First Innovation Fund network event Session 1
CDE themed comp -syn-bio part 2
CDE themed comp - synbio part 1
Beyond battery power: future autonomy
CDE themed challenge - Beyond battery power: the technical challenge and futu...
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 1
Beyond battery power - how the competition will work
Introduction to the Centre for Defence Enterprise and introducing the Defence...
CDE Competition on FASS - technology challenge 1

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Configure Apache Mutual Authentication
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPT
What is a Computer? Input Devices /output devices
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
OpenACC and Open Hackathons Monthly Highlights July 2025
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Final SEM Unit 1 for mit wpu at pune .pptx
Configure Apache Mutual Authentication
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Hindi spoken digit analysis for native and non-native speakers
Taming the Chaos: How to Turn Unstructured Data into Decisions
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Getting started with AI Agents and Multi-Agent Systems
UiPath Agentic Automation session 1: RPA to Agents
What is a Computer? Input Devices /output devices
Flame analysis and combustion estimation using large language and vision assi...
1 - Historical Antecedents, Social Consideration.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Microsoft Excel 365/2024 Beginner's training
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Convolutional neural network based encoder-decoder for efficient real-time ob...

9 September 2014: Cyber Security Model

  • 1. Defence Cyber Protection Partnership Industry Information Security Liaison, Ministry of Defence CDE Innovation Network event 9 September 2014, London
  • 2. Context of the cyber threat “…the greatest transfer of wealth in history." General Alexander, Director of the NSA “We ignore the cyber threat at our peril…. 93% of large corporations… have had a cyber security breach in the past year.” Francis Maude, Minister for the Cabinet Office The cyber threat is real and growing Detica Report 2011 Cyber attack is a ‘Tier 1’ threat to the nation National Security Strategy, 2010 2 Longest time period within which APT1 has continued to access a victim’s network: 4 years, 10 months Mandiant report 2013 Largest APT1 data theft from a single organisation: 6.5 Terabytes over 10 months Mandiant report 2013
  • 3. It won’t happen to me My systems are already protected It’s the CIO’s problem It’s the customer’s problem I’m too small to be a target I can’t afford it It’s the Prime’s problem Do I need to worry? 3
  • 4. The latest trends in cyber security Information Security Breaches Survey (2014) – trends Small businesses (< 50 staff) % of respondents that had a breach Average number of breaches in year Cost of worst breach of the year Overall cost of security breaches 2013 2014 £65k £115k “The average cost of the worst breach suffered has gone up significantly particularly for small businesses – it’s nearly doubled over the last year.”
  • 6. DCPP ENABLING WORK Information sharing • Reducing adversaries’ window of opportunity by: • Timely sharing of information across industry and government – some of it sensitive Measurements and standards • Providing clarity in terms of where we are and where we need to get to by: • Defining the proportionate and practical cyber security standards required in all defence contracts Supply chain awareness • Raising awareness of cyber security by: • Briefing a common message and surveying readiness
  • 7. DCPP proportionate security model Proportionate security within the procurement lifecycle The principles involved are:  To mandate cyber security risk management  To bring about a cultural change – top-down, policy change (primarily affecting all new contracts placed)  To risk-assess all supplies (including services) so that a proportionate level of security is routinely requested by acquirers  To ensure that all contracts include clear, appropriate cyber security requirements  To ensure that acquirers assess their aggregated risk through active monitoring of their own and suppliers’ on-going compliance to contracted security requirements
  • 8. Outline Risk assessment • Used by buyer, pre- contract • 26 questions • Output is indicative requirement ‘low’, ‘medium’, ‘high’ for supply, organisation and supply chain Assurance questionnaire • Used by buyer to specify detail expectations • Used by supplier to respond • 97 questions in 14 categories control ‘red flag’ degree of rigour
  • 10. Pilots - criteria Confirm the process is simple to follow and identify any areas of concern Confirm the questions are clear and easily understood and identify any areas of concern Confirm hypothesis that CES is subset of DCPP (identify gaps/overlaps) Understand level of effort and appropriate skills Understand whether responses are naturally organisational or project specific
  • 11. WHERE CAN I GO FOR FURTHER ADVICE? For general cyber security advice and guidance:  Check your organisation and your IT service provider(s) against HMG’s ‘10 Steps to Cyber Security’ (search www.cesg.gov.uk)  BIS Cyber Essentials Scheme (search www.gov.uk)  Ask your information security staff to join Cyber Security Information Sharing Partnership (CiSP) to access threat information (www.cisp.org.uk)  Access Technology Strategy Board’s voucher scheme for funding to improve cyber security (Search https://vouchers.innovateuk.org, closing date: 23 July 2014)  CERT UK (www.cert.gov.uk)  CPNI (www.cpni.gov.uk/advice/cyber)  CESG (www.cesg.gov.uk) For defence sector specific advice  Ask for advice: ADS, techUK, Primes, trade associations