Posted by Open Access Government on November 8, 2018:

The Government will highlight ‘operators of essential services’ tomorrow (9th November) – to comply with new requirements set out in the European Security Network and Information Systems Directive (NIS)

The Directive requires identified businesses and service providers to ensure their technology, data and networks are secured and cyber resilient.

The Directive links to the UK’s National cybersecurity strategy of ‘Defend, Deter and Develop’.

Under this strategy, organisations within vital sectors will be required to update their  security measures to manage risks to their network and information systems.

According to the National Cyber Security Centre, the UK has been hit by more than 1000 serious cyber attacks over the past two years.

The increasing threat has led to 69% of organisations in the UK spending more on their IT security spending.

But World Wide Technology has warned that growing sophistication of cyber attacks requires more than increasing the spend on cybersecurity products.

Dave Locke, Chief Technology Officer at World Wide Technology said: “The increase in regulations combined with the augmented risk of cybersecurity attacks has led to an exponential rise in companies focusing on revamping their security and compliance infrastructures.

“Strategies have been remodelled to move on from corrective measures to a more proactive approach to cybersecurity.

“Businesses are increasingly undergoing full assurance exercises to map out applications and processes in their existing system before embedding new controls into their target environments.

“But due to the complex nature of existing systems which have been built with different and sometimes conflicting metrics over the years, legacy infrastructures now consist of a complex patchwork of applications which communicate with each other in complicated ways.

“This network of opaque interdependencies creates a significant challenge to businesses, which means they have to undertake an extensive discovery phase to create a real-time picture of the entire network.

View the full article.

  • Next-generation Firewall Workshop

    WWT’s Next-generation Firewall (NGFW) Workshop can help identify and install the right firewall platform for your business.
  • Patch Management Assessment

    WWT's Patch Management Assessment evaluates and improves your organization's ability to fix bugs and other vulnerabilities in a workshop setting.
  • Security Incident Tabletop Exercise

    WWT's Security Incident Tabletop Exercise is a workshop designed to help your business improve its response to and recovery from cybersecurity events.
  • Red Hat VNF Certification

    Virtual Network Functions are critical to NFV deployments. WWT is partnering with Red Hat to validate the functionality of leading OEMs' virtualized Evolved Packet Core (vEPC) and virtualized IP Multimedia Subsystem (vIMS) solutions installed on Red Hat OpenStack Platform version 13.
  • Patch Management as a Service

    WWT created Patch Management as a Service to close the gap between knowing about vulnerabilities and actually patching them.
  • ServiceNow Automation & Orchestration Brochure

    Leverage WWT's ServiceNow Automation & Orchestration expertise to accelerate your company's ServiceNow journey. Our ITSM practice and Services Catalog of more than 50 no-touch automations can help you get the most out of this exciting technology.
  • 2018 Professional Services Commercial Rate Card

    WWT presents our 2018 Professional Services Commercial Rate Card. Please note that the price points listed do not take into account the impact of travel hours and budget costs.
  • WWT & Syncurity Patch Management Overview

    WWT and the Syncurity IR-FlowSOAR platform solve the patch management challenge with a comprehensive solution that delivers rapid response and reduced cyber risk.
  • Host-based Segmentation Pilot

    Implement segmentation protection with a host-based pilot capability and demonstrate success in 90 days.
  • Integrated Endpoint Security Architecture Federal Overview

    For most organizations, the ability to demonstrate compliance to an assessment program directly correlates to the maturity of their cyber security program. Learn more about WWT’s approach to integrated endpoint security architecture for our federal customers.
  • Integrated Endpoint Security Architecture Commercial Overview

    Endpoint security must be part of an overall security architecture and strategy. If all the areas referenced in this paper are addressed and integrated within an environment, the result will be a level of protection that far exceeds anything a single point product can provide.
  • Professional Services Security Overview

    Our Professional Services architects can help to overcome the challenges of securing an organization’s infrastructure through network discovery, a security assessment and penetration testing.