Cyber Security Incident Response coordinators. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. January 2014 ALSO INSIDE

Size: px
Start display at page:

Download "Cyber Security Incident Response coordinators. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. January 2014 ALSO INSIDE"

Transcription

1 Script January 2014 Incident Response coordinators Update from Ian Glover CRESTCon & IISP Congress Careers New Members CSIR coordinators First CSIR certified companies have been announced Put into Context CSIR Procurement Guide

2 CON Script JUNE 2013 AN UPDATE FROM IAN GLOVER We have had a really good response to the request for nominations to the CREST Executive from member companies. Combined with the new Executive, the updated Memorandum of Agreement and Byelaws that will be announced at the AGM reflect the huge progress that CREST has made over a relatively short period of time. I would like to take this opportunity to thank all those that have supported CREST and look forward to continuing to work with you to make CREST the recognised authority in the area of technical security. CON CRESTCon & iisp Congress 2014 London, 19 March 2014 Royal College of Surgeons Bringing together professional expertise in information security CRESTCon & IISP Congress Registration for CRESTCon & IISP Congress 2014 is open - Register now at to secure your place - CRESTCon & IISP Congress is on 19th March 2014 at the Royal College of Surgeons in London. With four new members on board during November and December and our announcement of the first four certified CSIR companies, it was a great end to a very busy cyber security incident response coordinator examination will be beta trialled this month. As we have previously stated this will become a mandatory requirement for the Government s CIR scheme to become green light within a year. Given the importance of this role, CREST is also looking at how this can be introduced as a requirement for the CSIR membership. Those members providing cyber security incident response services should start to plan to put key members of staff through this examination. re has already been some very positive feedback on the Incident Response Guides and I hope you have had your copy. Following the success of these reports and the Procurement Guides last year, further research projects are in the pipeline for We have been working with some of the financial services regulators on the provision of intelligence based penetration testing services. This could be a major initiative for 2014 and we may be making calls for help to define the service soon, so if you are interested please look out for the request. initial request for information for the CESG proposed Training course assessment scheme has been completed and in line with the CCP scheme, we have entered a consortium with the IISP. We hope to be able to provide you with more information on this in the next issue of Script. This will be an important step forward for CREST as it will align with the training course assessment work we have been doing with e-skills UK. It will also start to complete the picture of learning pathways for those entering the industry through a degree or higher apprenticeships and for those already in the profession or those who want to cross train into it. This will also allow us access to additional funds to help member companies develop their staff. For example, the potential offer of 50% refund on training courses from e-skills still applies; all we need is a submission from the member company describing and costing their training programme for this year and then CREST will make the request for funding. Plans for CRESTCon 2014 are progressing well. call for papers is now closed and has brought in a good selection of interesting presentations. Registration has opened and it is already clear that the event will sell out so make sure you book your place as soon as possible! We are still actively looking for sponsors for the event and more information is available at crestcon.co.uk/partnerbrochure.pdf CREST website continues to develop and improve in terms of content. It is now becoming exactly what it needs to be - a really useful source of information - and is already helping with enquiries. Wishing you all a very happy and prosperous Ian Glover CREST President Exhibiting and sponsorship opportunities Partner with CREST, the professional body for ethical security testing and incident response, and IISP, the industry association for professional information security practitioners Attendance is open to members of CREST and the IISP, as well as the wider information security community. Spaces are limited and available only to those working in the industry. Tickets cost 120, however CREST members are entitled to two free tickets and further tickets at a 50% discount. For more information on this please contact allie@crest-approved.org or to register go to www. crestandiisp2014.eventbrite.co.uk re are two speaker tracks and delegates are free to move between them: Stream 1 - Technical presentations aimed at security consultants, researchers and those on the front line, ethically attacking and defending information systems or providing cyber security incident response services. Presentations will focus on new or innovative techniques or tools relevant to professional security testing activities, along with recent high profile breaches, analysis of compromise vectors and the impact of the attacks, along with lessons learned to formulate offensive and defensive strategies Stream 2 - Aimed at a cross section of the information security profession, especially those involved in security management, risk and compliance from both the private and public sectors. Security professionals must adapt if they are to meet the ever changing challenges over the next five to 10 years. Technical security skills will simply not be enough and tomorrow s professionals will also need business acumen, legal awareness and the ability quickly embrace new trends such as the cloud, big data and the increasingly mobile enterprise. But with demand already outstripping supply, what can be done to fill the talent pool with the right knowledge and skills? Exhibiting and sponsorship at CRESTCon & IISP Congress 2014 We are delighted that HP is our headline sponsor again this year. Other sponsors include Acuity, BT and Gotham Digital Science For information on the range of exhibiting and sponsorship opportunities at CRESTCon & IISP Congress, please contact Marc Callaway at marc@crestandiisp.com or download the partnership brochure at

3 Careers Internships Internship programme continues to develop and we are delighted to see an increasing number of CREST member companies taking up full internships and junior placements. One member has taken on an impressive 10 interns. If you would like to know any more about internships or would be willing to offer an internship between six weeks to a year please contact Ian Glover. Higher apprenticeships CREST believes that Higher Apprenticeships will become increasingly important. Pay as You Learn model is good for students and also many employers believe that Apprenticeships can create a better work ethic than the University route. With this in mind, CREST has been working with e-skills and in particular QinetiQ to create a syllabus for Higher Apprentices. This has now been agreed and will provide an excellent platform for those entering the penetration testing and intrusion analysis industry. It is hoped that this will help to provide a career route for network operators into intrusion analysis and cyber security incident response. If you would like to know any more about the scheme or would be willing to consider offering a young person the opportunity of a Higher Apprenticeship, please contact Ian Glover. E-skills will also now be engaging with training providers to provide access to training material. CREST educational videos first CRESTx material from CRESTx Lancaster is live on the CREST YouTube channel In addition to this material and the videos from CRESTCon, the day-in-the-life films are proving popular. We plan to develop this content further so that it becomes a rich source of careers information for those looking to enter the industry. Members New Dell SecureWorks listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognised as an industry leader by top analysts, Dell SecureWorks provides world-class IT security services to help organisations of all sizes protect their IT assets and comply with regulations and reduce security costs. Craig Lambert, Security Testing Practice Lead, EMEA, said: Dell SecureWorks is delighted to become part of the CREST community. CREST has made a significant contribution in providing a benchmark for security testing excellence, which has reduced barriers to entry and improved the profile of security testers and the security testing industry. Dell SecureWorks looks forward to working with and supporting CREST for the continued benefit of customers and security professionals alike. IT Governance Ltd is a fast-growing cyber security services business and an acknowledged leader within the IT governance, risk management and compliance (IT-GRC) field. We offer our corporate clients end-to-end solutions from books and tools to training and consultancy services to help them secure themselves against today s cyber threats. As a major IT-GRC provider, we also deliver a comprehensive range of penetration testing services, including: network testing, web application testing, wireless network testing and PCI QSA services. Our in-house team of qualified pen testers is passionate about their job and delivering the best possible results. team has experience in working with organisations of different types and sizes and is able to draw on the company s wide range of related resources to deliver bespoke and cost-effective services. This adds real value to our penetration testing services. Alan Calder, Founder and Executive Chairman of IT Governance, says, Our company has long been delivering penetration testing services through qualified pen testers to clients internationally. By becoming a CREST member, we can better demonstrate our credentials to our clients. In the context of constantly emerging cyber threats it is ever more important for customers to be able to trust their pen testing providers. We appreciate that being part of the CREST community reinforces the quality of our services and we look forward to working with CREST to keep the high standards in the future. If you would like to feature in one of our day-in-the-life-of videos please contact allie@crest-approved.org for more information.

4 C REST s CSIR ( Incident Response) scheme was one of two schemes launched following the successful National Programme funded pilot that concluded a complementary twin track approach for certified cyber incident response services was needed: broad based CSIR scheme led by CREST and endorsed by GCHQ and CPNI that focuses on appropriate standards for incident response aligned to demand from all sectors of industry, the wider public sector and academia. A smaller focused Government run Cyber Incident Response (CIR) scheme certified by GCHQ and CPNI, responding to sophisticated, targeted attacks against networks of national significance. Incident Response coordinators CREST worked with industry and Government to define standards that companies providing CSIR services should have in place to protect client information. CREST standard for the industryled segment is the foundation for establishing a strong UK cyber incident response industry that is able to tackle the vast majority of cyber-attacks. In support of the schemes, CREST is in the process of developing an examination for Incident Response coordinators at the CREST Certified level. This examination will be beta tested early in Once the examination has been reviewed by CESG it will form a mandatory part of the CESG CIR scheme within one year providing a green light status for companies in the same way as CHECK services. CREST has written a comprehensive set on the two schemes. If you would like a copy, please contact Elaine.luck@crest-approved.org. For CSIR membership information contact Adriana.Costa- McFadden@crest-approved.org. A number of CREST companies have or are working through the process of obtaining membership of the CSIR scheme. Membership will provide a significant differentiator in the marketplace.

5 First CSIR certified companies have been announced Put into CONTEXT Founder CREST member Context Information Security was founded in 1998 by a group of security managers and consultants whose experience of working in blue-chip companies led them to identify the need for a truly holistic and product-agnostic security services consultancy. Today, Context employs over 110 people with offices in London, Cheltenham, Düsseldorf and Melbourne and has a client base that includes some of the world s most high profile blue chip companies and government organisations. Congratulations to BAE Systems Detica, Deloitte LLP, MWR InfoSecurity, PwC and Verizon UK Ltd who have met the stringent standards and have been accredited under the CREST CSIR ( Incident Response) scheme. scheme, which was launched earlier in the year in collaboration with CESG and CPNI, provides private and public sector organisations with access to the industry expertise they need to respond effectively to cyber security attacks. CSIR scheme aims to give the buying community confidence in the integrity and competence of CREST certified companies when they need help following an attack. Becoming accredited is not a trivial matter and rightly so. bar has to be set high to provide that level of confidence and ensure that cyber security incidents are dealt with properly and effectively. first companies to be accredited under the Government run CIR have also been announced - BAE Systems Detica, Context, Dell SecureWorks, Mandiant and MWR An exceptional level of technical expertise underpins Context services, while attention to detail helps clients to gain a deeper understanding of security vulnerabilities, threats or incidents and to implement tailored, preventative measures. In addition to providing technical assurance, incident response and investigation services, Context is at the forefront of research and development in security technology. As well as publishing white papers and blogs addressing security threats and trends, Context consultants frequently present at open and closed industry events around the world including Black Hat, 44Con and CRESTCon. With a wide variety of technical and business backgrounds and qualifications, Context consultants understand the business perspectives as well as the technical challenges. As a Green Light CESG CHECK Service provider, all Context consultants have achieved a minimum level of CESG CHECK team member status and a number hold team leader status. And as a CREST member, many also hold CREST Application Certification or CREST Infrastructure Certification professional qualifications, or are CREST Registered Testers (CRT). As a founder CREST member, we have always recognised the need for a regulated and professional security testing industry to serve the information security marketplace, said Mark Raeburn, CEO at Context. CREST also provides its members with a framework of guidance including standards, methodologies and recommendations aimed at ensuring the very highest standards of leading-edge security testing. In November, Context became one of the first companies to be certified by CESG CPNI as an approved supplier of cyber incident response services to UK organisations that have suffered attacks from the most sophisticated criminal or state-sponsored threat actors. As one of only four companies involved in the Cyber Incident Response (CIR) pilot scheme launched last year, Context had to pass further rigorous examinations of its cyber incident response skills, experience and methodologies before being given approval by CESG and CPNI to carry out work on their recommendation as part of the full CIR scheme. Context has also developed a range of powerful security testing and forensic tools including Canape, a network testing tool for arbitrary protocols, but specifically designed for binary ones. It contains builtin functionality to implement standard network proxies and provides the user with the ability to capture and modify traffic to and from a server. Its main strength is reducing the amount of development effort usually associated with effectively testing a new protocol. For more information about Context, visit James Forshaw scoops $100,000 bounty In November, James Forshaw, head of vulnerability research at Context became the first recipient of a Microsoft $100,000 Bounty for New Mitigation Bypass Techniques. bounty program was one of three introduced by Microsoft in June this year to pay for techniques that bypass built-in OS mitigations and protections, for defences that stop those bypasses and for vulnerabilities in Internet Explorer 11 Preview.

6 Incident Response Getting know to you Name: Zia Rehman Company: Perspective Risk Job Title: Senior Security Consultant Procurement Guide Incident Response Procurement Guide is now complete and has been sent out to all member companies, along with a separate brochure that acts as an introduction to the main guide. If you are not a CREST member company but would like a copy please elaine.luck@crestapproved.org or request one through the website and we will send you a copy free of charge. This offer is also available for the Penetration Testing procurement guides. se are an excellent resource for member companies to distribute to their clients or for organisations establishing a cyber incident response capability, developing a penetration testing programme or preparing an invitation to tender. A PDF version is also available and we will shortly be publishing e-book versions. Following the extensive research project, CREST s Procurement Guide for Incident Response services will help improve the purchasing process for current and potential buyers of CSIR services and help organisations to meet all the requirements for responding effectively to a cyber security incident. In summary, the guide helps to: Define what cyber security is Compare different types of attack Analyse the anatomy of a cyber security attack Summarise the main challenges in responding to incidents Show how organisations can take a structured approach to CSIR Outline how organisations can determine their own state of risk, capability and readiness Explain how employing expert professional suppliers of CSIR services enables a faster and more effective response Highlight what to look for when selecting a supplier and what questions to ask internally Demonstrate how to implement good practice. guide has been written for IT or information security managers and cyber security specialists. It will however, be of interest to a much wider audience such as business continuity experts, business managers, risk managers, procurement specialists and auditors, which is why we also developed the separate introduction to the guide. What was your first role in information security and how did it come about? After leaving university I was employed as a Penetration Tester for BT Syntegra. I knew I wanted to work in information security after developing a keen interest in cryptography and penetration testing seemed a good place to start. What degree or other qualification (if any) did you do and how did it help get you into info security (if at all)? My degree was in Physics, which I think helped quite a lot, particularly with regards to penetration testing. It helps to develop a methodical and meticulous approach, which I believe has been invaluable throughout my career. What has been your biggest professional achievement to date and why? Setting up a CREST Approved penetration testing company, has been both the most challenging and biggest professional achievement to date. It has not only meant keeping up to date with latest information security but also becoming well versed in the day to day running of a business. What is your best advice to anyone entering a career in info security? I would have to say variety. Try and get as much experience in every facet of the field before becoming more specialised. Being well versed in a number of information security disciplines will not only help your career progression but will make you a more well rounded security professional. What surprised you the most when you started working in this field? What surprised me was how much work goes into keeping up to date with latest information security developments. re are a large number of very talented and committed professionals in this industry and it takes a great amount of time to keep at the cutting edge. What is your claim to fame? Once tried to drive to Australia - did not go as planned! What is your biggest weakness? Interview questions!

7 White Hat Rally: the Rise of the Dark Net This year s White Hat Rally - Rise of the Dark Net - will take place from 19th to 21st September moving through France, Belgium and the Netherlands. Teams of information security professionals will be getting together to decipher the route, participate in spooky activities and solve ghoul themed challenges. puzzles will also challenge the participants on their information security knowledge and skills. But as well as having fun, the purpose of the annual event is to raise money for Barnado s to help their work with vulnerable children and teenagers. Last year s rally raised an amazing 43,341 and a cheque was presented to Barnardo s at the 2014 Rally launch event on 21 January. White Hat Rally committee are looking for as many teams as possible to register for this year s rally at so they can continue to support Barnardo s work. Tell us what you want to see... Script Script Script NOVEMBER 2012 June 2013 FEBRUARY 2013 New cyber security skills certification incident Response CREST member focus Security Alliance Update from Ian New skills certification Update from Ian Glover Incident Update Update from Ian 5th Annual White Hat Rally NEEDS YOU CRESTCon update CREST defines path to academia DFM CrestCon & IISP Congress New Members Member focus Crest Con & IISP Congress Member Focus Security Alliance New members CREST Procurement guide Government launches cyber security guidance We want your news CrestCon from another perspective CCP Scheme update Happy Birthday CREST CCIAS Thanks to the sponsors Crest Partner CREST international Updated Membership process LIAG is recruiting CCP Update Internship HP Showcase We are always looking for new and interesting content for SCRIPT so if you have something you want to shout about, a topical issue you want to discuss or just something you want to get off your chest, please get in touch. You can send your company news and article ideas to crest@prpr.co.uk or call Allie Andrews on to discuss and we will look at including it. Also, please let us know if you would like to be featured in the Getting to Know You section or would like your company to be profiled. 522 Uxbridge Road, Pinner, Middlesex, HA5 3PU. CREST is a not for profit company registered in the UK with company number

Australia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September 2013. Also Inside

Australia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September 2013. Also Inside Script The September 2013 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST CREST in Australia Also Inside Update from Ian Glover CESG and CPNI launch new schemes CRESTCon 2014 The CCP Report New Members

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal

More information

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK Talented People to Secure Our Future Judy Baker, Director Cyber Security Challenge UK A story Starts in the US, Comes to the UK Outcome: more and better cyber security talent in US and UK businesses The

More information

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud

More information

CREST helps roll-out of Cyber Essentials

CREST helps roll-out of Cyber Essentials Script The July 2014 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST CREST helps roll-out of Cyber Essentials ALSO INSIDE Update from Ian Glover CRESTCon & IISP Congress New Members New Members CREST helps

More information

Cyber Security incident Response. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. June 2013. Also Inside

Cyber Security incident Response. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. June 2013. Also Inside Script The June 2013 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST Cyber Security incident Response Also Inside Update from Ian Glover CrestCon & IISP Congress CrestCon from another perspective Updated

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

CESG Certified Professional

CESG Certified Professional CESG Certified Professional Verify your skills and competence in information assurance Now open to cyber security professionals working in UK industry CONTENTS 1. Introduction 2. IA in Context: Why Professionalism

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Cyber Security Incident Response Supplier Selection Guide

Cyber Security Incident Response Supplier Selection Guide Cyber Security Incident Response Supplier Selection Guide Version 1 Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jason Creasey,

More information

CBEST Implementation Guide

CBEST Implementation Guide CBEST Implementation Guide Introduction Existing penetration testing services conducted within the financial services sector are well understood and utilised. Whilst these services have provided a good

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

Can you hack it? Opportunities for Graduates and Interns

Can you hack it? Opportunities for Graduates and Interns Can you hack it? Opportunities for Graduates and Interns Who we are MWR is a global research-led information security consultancy. We analyse and protect our clients information systems their corporate

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

February 2015 Issue No: 5.2. CESG Certification for IA Professionals February 2015 Issue No: 5.2 CESG Certification for IA Professionals Issue No: 5.2 February 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The

More information

Medical leadership for better patient care: Support for healthcare organisations 2015

Medical leadership for better patient care: Support for healthcare organisations 2015 Medical leadership for better patient care: Support for healthcare organisations 2015 1 Our vision is to see and inspire excellence in medical leadership and drive continuous improvement in health and

More information

First-class export advice World-class business growth

First-class export advice World-class business growth 1 First-class export advice World-class business growth UK Trade & Investment (UKTI) works with UK-based businesses of all sizes, providing advice, expertise and support to ensure their success within

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

idata Improving Defences Against Targeted Attack

idata Improving Defences Against Targeted Attack idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does

More information

IOR Strategy 3 Year PlanThe Professional Body for Recruiters & HR

IOR Strategy 3 Year PlanThe Professional Body for Recruiters & HR IOR Strategy Year PlanThe Professional Body for Recruiters & HR Professional Certificate in Social Recruiting (IOR Cert) Part Qualified in HR Online 1 Why IOR Professional Qualifications? The IOR is a

More information

CYBER SECURITY. A Guide to Programmes and Resources for Schools & Further Education

CYBER SECURITY. A Guide to Programmes and Resources for Schools & Further Education CYBER SECURITY A Guide to Programmes and Resources for Schools & Further Education March 2015 A Guide to Cyber Security Programmes and Resources for Schools and Further Education Providers Cyber security

More information

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an

More information

THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent

THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent Dr Robert L Nowill The Cyber Security Challenge UK ( https://cybersecuritychallenge.org.uk/ ) runs a series of

More information

CBEST FAQ February 2015

CBEST FAQ February 2015 CBEST Frequently Asked Questions: February 2015 At this time, the UK Financial Authorities have only made CBEST available to firms and FMIs which they consider to be core to the UK financial system. Those

More information

(Funding for training support means all you pay is the apprentice s wage)

(Funding for training support means all you pay is the apprentice s wage) Your apprentices of today will be your skilled workers of the future. Due to the fast moving nature of the digital world, the demand for talent has never been higher and nurturing skills in-house is one

More information

Digital Pathways. Penetration Testing

Digital Pathways. Penetration Testing Penetration Testing inftouch@digitalpathwyas.co.uk Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

The six digital imperatives. Moving your organisation towards Digital Excellence (and how we can help)

The six digital imperatives. Moving your organisation towards Digital Excellence (and how we can help) The six digital imperatives Moving your organisation towards Digital Excellence (and how we can help) Digital Excellence: a good place to aim for. Digital used to be just another channel to market. Now

More information

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM Objectives Provide an overview of the CBEST program Overview will include answers to the following questions: What types

More information

IoSCM Strategy. Who we are. Innovative learning methods Flexible study routes Recognised qualifications

IoSCM Strategy. Who we are. Innovative learning methods Flexible study routes Recognised qualifications IoSCM Strategy Who we are Innovative learning methods Flexible study routes Recognised qualifications The Institute of Supply Chain Management was formed as the first international institute representing

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Cyber Essentials Scheme. Summary

Cyber Essentials Scheme. Summary Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme

More information

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016 Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard

More information

Your introduction to web design qualifications with Home Learning College

Your introduction to web design qualifications with Home Learning College Your introduction to web design qualifications with Home Learning College Dennis Davis Home Learning College student Adobe Dreamweaver & Flash CS6 Associate 1 Introduction Thank you for considering Home

More information

2015 INFORMATION SECURITY BREACHES SURVEY

2015 INFORMATION SECURITY BREACHES SURVEY 2015 INFORMATION SECURITY BREACHES SURVEY Executive Summary Survey conducted by In association with 2 INFORMATION SECURITY BREACHES SURVEY 2015 executive summary Commissioned by: The UK Cyber Security

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level April 2015 Issue No:1.0 Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level Application Guidance CCP Security and Information Risk Advisor Role, Practitioner Level

More information

IT Security Testing Services

IT Security Testing Services Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------ WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 3 RD DECEMBER 2012 Minister for the Cabinet Office and Paymaster General: Progress on the UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Sponsored Degree Programme The Capgemini Sponsored Degree Programme

Sponsored Degree Programme The Capgemini Sponsored Degree Programme Spons Degree Programme The Capgemini Sponsored Degree Programme 2 Passionate about Information Technology? Excited by a career in Software Engineering? Then take the opportunity to work for one of the

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

ACCREDITATION. APM Corporate CASE STUDY

ACCREDITATION. APM Corporate CASE STUDY Introduction Established in 1969, The Open University (OU) was the world s first successful distance teaching university, founded on the belief that communications technology could bring high quality,

More information

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

An introduction to CNS Group for prospective employees.

An introduction to CNS Group for prospective employees. Securing Business Data An introduction to CNS Group for prospective employees. Welcome History Thank you for considering to further your career with CNS Group. We have put together some information to

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

Guide to Penetration Testing

Guide to Penetration Testing What to consider when testing your network HALKYN CONSULTING 06 May 11 T Wake CEH CISSP CISM CEH CISSP CISM Introduction Security breaches are frequently in the news. Rarely does a week go by without a

More information

APPRENTICESHIPS. JOIN THE DIGITAL BUSINESS REVOLUTION A guide for Candidates

APPRENTICESHIPS. JOIN THE DIGITAL BUSINESS REVOLUTION A guide for Candidates APPRENTICESHIPS JOIN THE DIGITAL BUSINESS REVOLUTION A guide for Candidates OVERVIEW Future LDN is designed to introduce talented Young People to London s most exciting companies. The programme runs for

More information

Is There Really A Career In Legal Ethical Hacking and Forensics!! Ian Glover 07970 817 101 Ian.glover@crest-approved.org

Is There Really A Career In Legal Ethical Hacking and Forensics!! Ian Glover 07970 817 101 Ian.glover@crest-approved.org Is There Really A Career In Legal Ethical Hacking and Forensics!! Ian Glover 07970 817 101 Ian.glover@crest-approved.org Ian Glover - 35 years experience in information technology and has specialised in

More information

70250 Graduate Certificate in Digital Forensics

70250 Graduate Certificate in Digital Forensics 70250 Graduate Certificate in Digital Forensics Course overview The certificate course was inspired by experienced practitioners working in academia and the field of Digital Forensics, who saw the benefits

More information

strategic plan and implementation framework 2013-2018

strategic plan and implementation framework 2013-2018 strategic plan and implementation framework 2013-2018 contents Introduction 3 Strategic Plan 2013-2018 4 Strategic Priorities 4 2 Implementing the Plan 5 Measuring and Monitoring 5 Communicating and Reporting

More information

Cyber Threat Summit Brochure

Cyber Threat Summit Brochure 2012 Cyber Threat Summit Brochure The European Cyber Threat Summit will be held over two days in Dublin. The syllabus will be delivered by over 20 of the world s leading cyber security experts with a specific

More information

BCS Accreditation... Relevance, Recognition, Assurance

BCS Accreditation... Relevance, Recognition, Assurance BCS Accreditation... Relevance, Recognition, Assurance BCS degree accreditation The BCS accreditation of degrees is an important benchmark of the standard of Higher Education programmes and their contribution

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified

More information

Novus. Investing in the future of software testing and development. www.capita-itps.co.uk/novus

Novus. Investing in the future of software testing and development. www.capita-itps.co.uk/novus Novus Investing in the future of software testing and development www.capita-itps.co.uk/novus Our credentials v FTSE 100 v Partnerships with leading IT and computing institutes v Accredited by leading

More information

Tech City Stars is London s most exciting Apprenticeship for young people who want to break into the tech sector.

Tech City Stars is London s most exciting Apprenticeship for young people who want to break into the tech sector. OVERVIEW TECH CITY Tech City Stars is London s most exciting Apprenticeship for young people who want to break into the tech sector. The programme is focused around Tech City - the area of Central East

More information

Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College

Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College Programme Specification BSc Honours Electronic Engineering (Final Year Programme) Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College SECTION 1: GENERAL INFORMATION

More information

CATEGORY INFORMATION AND GUIDANCE ON ENTERING

CATEGORY INFORMATION AND GUIDANCE ON ENTERING CATEGORY INFORMATION AND GUIDANCE ON ENTERING This year marks the ninth annual TJ Awards and our purpose is to encourage and recognise best practice in organisational learning and development. We are delighted

More information

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH

More information

DIPLOMA IN EVENT MANAGEMENT (Dip. Event Man.) with PR, Online PR & Social Media modules (Evening Course - 10 Weeks)

DIPLOMA IN EVENT MANAGEMENT (Dip. Event Man.) with PR, Online PR & Social Media modules (Evening Course - 10 Weeks) DIPLOMA IN EVENT MANAGEMENT (Dip. Event Man.) with PR, Online PR & Social Media modules (Evening Course - 10 Weeks) Please find enclosed the details you requested in reference to the above course. The

More information

REQUEST FOR PROPOSAL. Provision of Content for the Digital Business Academy. Issued by: Tech City UK

REQUEST FOR PROPOSAL. Provision of Content for the Digital Business Academy. Issued by: Tech City UK REQUEST FOR PROPOSAL Provision of Content for the Digital Business Academy Issued by: Tech City UK Date of issue: 23 February 2015 This document is an invitation for proposals to provide content for s

More information

Advertising and Marketing Communications

Advertising and Marketing Communications Advertising and Marketing Communications BA Hons Greenwich Campus gre.ac.uk/business Why study this programme? This programme concentrates on the skills and techniques associated with the specialist area

More information

Resilience and Cyber Essentials

Resilience and Cyber Essentials Resilience and Cyber Essentials Richard Bach Assistant Director Cyber Security Talk outline Why Cyber Essentials: the Policy context What is Cyber Essentials: Scheme background How the Scheme works: accreditation,

More information

Professional Qualifications

Professional Qualifications Corporate Training & Professional Development Professional Qualifications University of Hertfordshire Business School Plug into your true potential Contents Turning potential into performance 3 A leading

More information

Cybernetic Global Intelligence. Service Information Package

Cybernetic Global Intelligence. Service Information Package Cybernetic Global Intelligence Service Information Package / 2015 Content Who we are Our mission Message from the CEO Our services 01 02 02 03 Managed Security Services Penetration Testing Security Audit

More information

The Flying Start Degree Programme Henley Business School at the University of Reading

The Flying Start Degree Programme Henley Business School at the University of Reading The Flying Start Degree Programme Henley Business School at the University of Reading Start your degree Start your career Realise your potential BA Accounting and Business (NN41) Welcome This booklet will

More information

Security Awareness Training Solutions

Security Awareness Training Solutions DATA SHEET Security Awareness Training Solutions A guide to available Dell SecureWorks services At Dell SecureWorks, we strive to be a trusted security advisor to our clients. Part of building this trust

More information

Government Procurement Service

Government Procurement Service www.pwc.co.uk Government Procurement Service PwC and the G-Cloud: knowledge, experience, value V1.0 PwC Service Definition 9: G-Cloud Cyber Security Design and Assurance 06 October 2015 www.pwc.co.uk Table

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

A. Statement of Accountability

A. Statement of Accountability A. Statement of Accountability National Savings is an Executive Agency of the Chancellor of the Exchequer and a Government Department. The Agency manages the issue and distribution of National Savings

More information

Cyber Security Skills. Business perspectives and Government s next steps

Cyber Security Skills. Business perspectives and Government s next steps Cyber Security Skills Business perspectives and Government s next steps March 2014 Contents Foreword... 3 Executive Summary... 4 Chapter 1: Introduction... 8 Chapter 2: Key Findings... 11 Chapter 3: NCSP

More information

Cyber Security Education, Qualifications and Training

Cyber Security Education, Qualifications and Training Cyber Security Education, Qualifications and Training Prof. Keith M. Martin Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK This paper is a postprint of a paper

More information

Careers in Cyber Operations. Defence Signals Directorate

Careers in Cyber Operations. Defence Signals Directorate Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly

More information

Technology in Business Fast Stream Graduate Programme

Technology in Business Fast Stream Graduate Programme Technology in Business Fast Stream Graduate Programme 02 Contents Welcome p.03 What is the Technology in Business Fast Stream? p.04 What are we looking for? p.06 Your Fast Stream career path p.08 Profiles

More information