Posted by Open Access Government on November 8, 2018:

The Government will highlight ‘operators of essential services’ tomorrow (9th November) – to comply with new requirements set out in the European Security Network and Information Systems Directive (NIS)

The Directive requires identified businesses and service providers to ensure their technology, data and networks are secured and cyber resilient.

The Directive links to the UK’s National cybersecurity strategy of ‘Defend, Deter and Develop’.

Under this strategy, organisations within vital sectors will be required to update their  security measures to manage risks to their network and information systems.

According to the National Cyber Security Centre, the UK has been hit by more than 1000 serious cyber attacks over the past two years.

The increasing threat has led to 69% of organisations in the UK spending more on their IT security spending.

But World Wide Technology has warned that growing sophistication of cyber attacks requires more than increasing the spend on cybersecurity products.

Dave Locke, Chief Technology Officer at World Wide Technology said: “The increase in regulations combined with the augmented risk of cybersecurity attacks has led to an exponential rise in companies focusing on revamping their security and compliance infrastructures.

“Strategies have been remodelled to move on from corrective measures to a more proactive approach to cybersecurity.

“Businesses are increasingly undergoing full assurance exercises to map out applications and processes in their existing system before embedding new controls into their target environments.

“But due to the complex nature of existing systems which have been built with different and sometimes conflicting metrics over the years, legacy infrastructures now consist of a complex patchwork of applications which communicate with each other in complicated ways.

“This network of opaque interdependencies creates a significant challenge to businesses, which means they have to undertake an extensive discovery phase to create a real-time picture of the entire network.

View the full article.

  • 2018 Professional Services Commercial Rate Card

    WWT presents our 2018 Professional Services Commercial Rate Card. Please note that the price points listed do not take into account the impact of travel hours and budget costs.
  • WWT & Syncurity Patch Management Overview

    WWT and the Syncurity IR-FlowSOAR platform solve the patch management challenge with a comprehensive solution that delivers rapid response and reduced cyber risk.
  • Business Insight Support System Overview

    Software tools that deal with network security can run on many disparate applications. WWT developed a Business Insight Support System that ties output from software solutions into one web-based portal, functioning as a single touch point for all network security data.
  • Host-based Segmentation Pilot

    Implement segmentation protection with a host-based pilot capability and demonstrate success in 90 days.
  • Integrated Endpoint Security Architecture Federal Overview

    For most organizations, the ability to demonstrate compliance to an assessment program directly correlates to the maturity of their cyber security program. Learn more about WWT’s approach to integrated endpoint security architecture for our federal customers.
  • Integrated Endpoint Security Architecture Commercial Overview

    Endpoint security must be part of an overall security architecture and strategy. If all the areas referenced in this paper are addressed and integrated within an environment, the result will be a level of protection that far exceeds anything a single point product can provide.
  • Professional Services Security Overview

    Our Professional Services architects can help to overcome the challenges of securing an organization’s infrastructure through network discovery, a security assessment and penetration testing.
  • Brownfield Modernization Demonstration Brochure

    To make brownfield modernization real for our customers and partners, we integrated an external Ethernet card into a 2004 six-axis Mitsubishi robotic arm.
  • Mobile Field Kit Overview

    WWT’s Mobile Field Kit is a fixed or portable threat monitoring system that can be used to secure the perimeter of the places of interest.
  • ASL Pair Programming

    Numerous studies have shown that Pair Programming improves productivity and design quality with minimal economic impact to the customer.
  • Splunk Appliance for IT Operational Intelligence

    Through operational intelligence, Splunk helps organizations detect potential problems and decrease response time to meet DCOI compliance.
  • Identity and Access Management

    Organizations understand that providing users with secure access can be challenging and strenuous. Identity and Access Management (IAM) is an enterprise program that focuses on ensuring that authorized people and devices have the appropriate access at the right time.