IT Security Testing Services

Similar documents
Procuring Penetration Testing Services

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

External Supplier Control Requirements

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Information Security Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

PENETRATION TESTING GUIDE. 1

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

93% of large organisations and 76% of small businesses

Penetration Testing Services Procurement Guide VERSION 1.

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

Cyber Essentials Scheme

Enterprise Computing Solutions

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

developing your potential Cyber Security Training

Lot 1 Service Specification MANAGED SECURITY SERVICES

CYBER SECURITY TRAINING SAFE AND SECURE

IoT & SCADA Cyber Security Services

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

G-Cloud Definition of Services Security Penetration Testing

Top 20 Critical Security Controls

Information Technology Security Review April 16, 2012

Penetration Testing Services. Demonstrate Real-World Risk

Paul Vlissidis Group Technical Director NCC Group plc

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

CESG Certification of Cyber Security Training Courses

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Cybersecurity Enhancement Account. FY 2017 President s Budget

Attachment A. Identification of Risks/Cybersecurity Governance

SECURITY. Risk & Compliance Services

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

Cyber Security. John Leek Chief Strategist

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

INFORMATION SECURITY TESTING

Vulnerability Management

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

DOBUS And SBL Cloud Services Brochure

CBEST Implementation Guide

Professional Services Overview

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MANAGE VULNERABILITIES

Hands on, field experiences with BYOD. BYOD Seminar

Cisco Security Optimization Service

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

NERC CIP VERSION 5 COMPLIANCE

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Cybersecurity The role of Internal Audit

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

External Supplier Control Requirements

CBEST FAQ February 2015

Secure Web Applications. The front line defense

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Cybersecurity and internal audit. August 15, 2014

Protecting Your Organisation from Targeted Cyber Intrusion

2011 Forrester Research, Inc. Reproduction Prohibited

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

SANS Top 20 Critical Controls for Effective Cyber Defense

Assuria from ZeroDayLab

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Penetration Testing //Vulnerability Assessment //Remedy

Secure Mobile Solutions

Cyber Security Metrics Dashboards & Analytics

Security Intelligence Services. Cybersecurity training.

Presented by Evan Sylvester, CISSP

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

THALES. corn

GPG13 Protective Monitoring. Service Definition

Cloud Computing Security Considerations

Information Technology Risk Management

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

PCI Compliance for Cloud Applications

CyberNEXS Global Services

A Guide to the Cyber Essentials Scheme

The Protection Mission a constant endeavor

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

e2e Secure Cloud Connect Service - Service Definition Document

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security Best Practices for Mobile Devices

IT Heath Check Scoping guidance ALPHA DRAFT

Course Descriptions November 2014

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

Guardian365. Managed IT Support Services Suite

Network Test Labs (NTL) Software Testing Services for igaming

Defending Against Data Beaches: Internal Controls for Cybersecurity

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Transcription:

Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security

Contents 1 Introduction to Context Information Security 2 2 Introduction to IT Security Testing Services (Assurance) 3 3 CESG CHECK ITHC 4 4 Application Security Assessment 5 5 External Infrastructure Testing 6 6 Internal Infrastructure Testing 7 7 Build and Configuration Review 8 8 Firewall Rule-Base Reviews 9 9 Code Review 10 10 Mobile Device Security 11 11 Mobile Application Security 12 12 MDM Configuration Reviews 13 13 Wireless Testing 14 14 Bespoke Training Courses 15 15 Cloud Security Assessment Service 16 16 Managed Phishing Service 17 17 Product Evaluation 18 18 CESG Product Assurance (CPA) 19 19 CESG Tailored Assurance Service (CTAS) 20 20 Red Teaming, STAR and CBEST 21 21 Automated Vulnerability Assessment (AVA) 22 22 Why work with Context? 23

1 Introduction to Context Information Security Context is a highly skilled consultancy that supports organisations to meet their ever evolving cyber-security challenges. Context s services include Penetration Testing, Cyber Incident Response, Digital Forensics and Vulnerability Research. Key facts: Context has one of the largest penetration testing teams in Europe The research team regularly features in both the global and national press including the BBC, The Telegraph and CBS New York Context is certified by CESG and CPNI for the Cyber Incident Response scheme to help organisations respond effectively to sophisticated cyber security attacks Context s response team investigate and resolve breaches on a daily basis Context assisted in the development of CREST and its associated standards, and has been a Green Light CESG (CHECK) service provider for over 10 years A significant number of our consultants hold CREST or CESG CHECK accreditations Context is actively involved in the UK Security Researchers Information Exchange (SRIE), OWASP, and regularly presents at industry events such as Black Hat, Hack in the Box, and CanSec West Context is an early adopter to the CBEST and CREST STAR schemes and regularly presents at industry events such as Black Hat, Hack in the Box, and CanSec West Page 2

2 Introduction to IT Security Testing Services Context offers several world class services under the category of assurance, these include but are not limited to: penetration testing, security assurance, design assurance and software engineering security assurance. Within each of these categories Context employs world class security consultants who are trusted by Government clients working within a wide range of governmental departments. Context holds strong levels of accreditation and boasts one of the UK s largest pools of CHECK/CREST resource. In order to ensure your penetration test is sufficiently rigorous you should insist upon utilising a CHECK Green Light Consultancy and CHECK resource. The main aim of penetration testing is to identify known technical vulnerabilities that a potential attacker might exploit in a system or environment. Once identified, Context establishes the relevant impact and weighs this against the skills needed to leverage the vulnerabilities. This in turn allows Context to assign a risk rating and thereafter provide remediation advice for the identified vulnerabilities. The main aim of security assurance and design assurance is to baseline the configuration of our clients devices. Context review configurations against industry best standards (defined by government or industry related bodies). Clients choose to undertake this service to harden their defences against malicious users and provide a heightened level of security. The main aim of software engineering security assurance is to provide a mature understanding of the potential risks posed to environments and systems. These services are based on a range of secure development principles. Page 3

3 CESG CHECK ITHC A CHECK IT Health Check (ITHC) identifies vulnerabilities in HMG IT systems and networks to assure the confidentiality, integrity and availability of information. Using certified, security cleared testers, an ITHC is as much about risk assessment as it is penetration testing, and assesses the security posture of the environment as well as the data stored within. Pre-engagement scoping services to ensure both coverage and value for money Large resource pool of CHECK and CREST penetration testers Security cleared consultants Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on research and response experience) Ability to report using many common vulnerability metrics Identification of vulnerabilities affecting critical infrastructure Assurance to support accreditation of IT systems Accurate threat ratings to assess vulnerability risk Recommendations for remedial actions and strategic management of vulnerabilities Page 4

4 Application Security Assessment Application Security Assessments identify security weaknesses in applications and provide recommendations for their mitigation. They provide assurance that an application is safe, secure and adheres to security best practices. Context draws on years of experience and a tried-and-tested, constantly evolving methodology covering all major and emerging application technologies. Pre-engagement scoping services to ensure both coverage and value for money Assessment of web-based and thick-client applications Large resource pool of CHECK and CREST penetration testers Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Global presence Ability to report using many common vulnerability metrics Identification of vulnerabilities affecting bespoke and COTS applications Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Page 5

5 External Infrastructure Testing External infrastructure assessments aim to answer the question, could an attacker compromise our internet-facing resources?. External infrastructure testing explores the consequences of a hacker carrying out malicious activities from across the internet. It involves surveying available network services, interrogating them for weaknesses, and trying to exploit them to extract information or compromise the network. Pre-engagement scoping services to ensure both coverage and value for money Identification of Internet-facing footprint and attack surface Identification of vulnerabilities affecting Internet-facing systems Large resource pool of CHECK and CREST penetration testers Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Ability to report using many common vulnerability metrics Assurance that critical Internet-facing systems are secure Identification of vulnerabilities and accurate threat rating to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Page 6

6 Internal Infrastructure Testing Internal infrastructure assessments aim to identify what could an attacker do if they had access to an organisations internal network? Internal infrastructure testing is usually conducted at a client s premises and is often scenario and risk-based. An assessment could explore the consequences of a rogue employer or contractor carrying out malicious activities. Pre-engagement scoping services to identify useful attack scenarios, providing coverage and value for money Large resource pool of CHECK and CREST penetration testers Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Ability to report using many common vulnerability metrics Identification of vulnerabilities affecting critical infrastructure Assurance that the risk of internal attack is mitigated Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Page 7

7 Build and Configuration Review Build and configuration reviews ensure that laptops, workstations and servers are configured securely. Insecurely configured environments can allow malicious users to obtain unauthorised access, and if a standard build containing weaknesses is deployed across hundreds or thousands of servers, the impact can be significant. All mainstream operating systems covered (Unix, Linux, Windows etc.) Large resource pool of CHECK and CREST penetration testers Engagements carried out either on-host, or remotely via a delivered script Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Ability to report using many common vulnerability metrics Assurance that specific business-critical systems are configured in a secure manner Provides defence-in-depth assurance that systems are not only secure from a network perspective, but also from on-host threats (e.g. phishing attacks, privilege escalation) Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Page 8

8 Firewall Rule-Base Reviews Many organisations have come to rely on firewalls as a keystone of their network defences, so it is important to ensure that they are fit for purpose and delivering optimum performance. Tried-and-tested methodology covering all firewall vendors Both rule sets and device configuration are assessed (e.g. secure management interfaces, firmware versions) Large resource pool of CHECK and CREST penetration testers Ability to report using many common vulnerability metrics Assurance that perimeter and internal devices are fit for purpose and configured in line with industry best-practice Assurance that firewall implementation adheres to design Recommendations for remedial actions to ensure bare minimum security exposure Page 9

9 Code Review Code reviews aim to provide assurance of complex software where coverage from a black box perspective cannot be guaranteed. During a code review a consultant will combine targeted manual code inspection and automated analysis to identify security risks in software. Code review is often undertaken in support of application security assessments. Expertise in review of code in all major languages, both compiled and interpreted Assessments carried out by experts with extensive industry experience in finding and exploiting flaws in code Identification of critical areas of code Large resource pool of CHECK and CREST penetration testers Assurance that software is free from vulnerabilities arising from coding mistakes, oversights (e.g. buffer overflows), and insecure design Assurance that secure code principles are being adhered to during development An extra level of assurance alongside black box application security assessments Recommendations for remediating code problems and ensuring they are not repeated long-term Threat ratings based on impact and ease of exploitation Page 10

10 Mobile Device Security Mobile Device Security Assessments provide assurance that a device is safe to use in the home or workspace, and provide recommendations on how to configure them in a secure way. Context has a proven track record in performing these assessments for government, telecommunications companies and large businesses. Experience and expertise in assessing all major mobile device platforms (Apple ios, Google Android, Windows, Blackberry etc.) Methodology based upon contributions made towards CESG guidance material supplied to public sector organisations when deploying end user devices for remote working Advances in MDM security features and technologies feedback into mobile device security assessment methodologies Threat ratings based on impact and ease of exploitation Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Advice on secure deployment of mobile devices in the workplace Assurance that risks relating to lost/stolen devices and data are mitigated Analysis of the risks presented to mobile devices from emerging threats including malware Advisory for the practices and policies relating to the integration of mobile devices within the workplace such as for Bring Your Own Device (BYOD). Page 11

11 Mobile Application Security Mobile Application Security Assessments identify security weaknesses in applications running on mobile devices (e.g. smartphones, tablets). Modern mobile applications often re-implement the functionality of traditional web-based applications, which can lead to many security mistakes being repeated. Additionally, modern mobile operating systems open new attack vectors, including cross-application attacks, and accidental disclosure of sensitive data. Experience and expertise in assessing applications on all major mobile device platforms (Apple ios, Google Android, Windows, Blackberry etc.) Modern testing toolset results in time-efficient mobile application security assessments Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on Research and Response experience) Ability to report using many common vulnerability metrics Identification of vulnerabilities affecting bespoke and off the shelf mobile applications Assurance that sensitive application data is securely stored on-device Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Knowledge transfer from mature web application testing pedigree and methodology allows for the identification of often overlooked, traditional threats applied to mobile applications. Page 12

12 MDM Configuration Reviews As mobile devices are increasingly used to access sensitive enterprise data, the security of these devices is of increasing concern. In performing MDM solution security reviews, Context assesses the deployed MDM solution configuration, the supporting network architecture as well as the mobile device security policies and management processes. The assessment is performed via hands-on reviews of the MDM configuration, paper-based review of the design documentation and policy documents as required, as well as conversations with key technical operators. A pre-testing consultancy focused on establishing which personnel to interview and which documents to review Audit review of any documents related to the running of the MDM solution, including security and device policies A review of MDM server configurations, whether it aligns to both security best practices and documented policies Testing the relevant mobile devices to verify the policy and configuration options provide expected device security Assurance that corporate MDM systems and BYOD set-ups are securely Assurance that risks relating to lost or stolen devices and data are mitigated Advisory for the adequate integration of the MDM system into the wider client infrastructure Page 13

13 Wireless Testing Wireless connectivity is now an expectation for many: in the home, in public places and in the workplace. This has long been an area where Context has focused its efforts, in research and development of best practice in the field. Extensive experience in all types of wireless, RF-enabled technologies Identification of rogue devices on wireless networks Analysis of wireless network segregation and passive information leakage. Threat ratings based on impact and ease of exploitation Proven testing methodology to ensure both coverage and depth Cross-discipline expertise to provide assurance against emerging threats (drawing on research and response experience) Ability to report using many common vulnerability metrics Identification of threats affecting corporate and guest wireless networks Assurance that wireless networks are appropriately segregated Assurance that sensitive wireless data is appropriately encrypted Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of vulnerabilities Page 14

14 Bespoke Training Courses Context run a number of training courses for individuals looking to enhance their specialist skills. We also provide courses aimed at non-security specialists, such as training to help organisations cope in the aftermath of a security incident, or raise awareness of security issues. Hands on courses delivered by subject matter experts with industry experience Hosted in a dedicated training suite capable of holding 20 delegates Courses containing industry insight that s not available from other vendors Upskills security teams Reduced development costs in the future Helps security officers drive up best-practice across the estate Certification recognizing completion of training Page 15

15 Cloud Security Assessment Service As a result of the increasing popularity of Cloud computing, clients have frequently requested our support in helping to improve the security posture of their Cloud-based systems. Our Cloud Security Assessment Service analyses the security of the client s Cloud system from multiple perspectives, drawing on expertise from our Assurance team as well as research conducted by Context against several cloud providers. External application and infrastructure penetration testing of cloud environments Scenario testing of cloud node segregation Architecture review Cloud VM hardening assessment Remote administration review Vulnerability Scanning Gain assurance over cloud environment security Multi-perspective assessments covering a range of potential attacks Context have significant experience in this space, for more information see http://www.contextis.com/services/research/white-papers/assessing-cloud-node-security/ Page 16

16 Managed Phishing Service Context s managed phishing service allows an organisation to send simulated phishing emails to their users in a controlled manner. User actions are tracked safely, user awareness is benchmarked and trends can be analysed across regular assessments. This assesses an organisation s resilience to these attacks, both from a technical and staff awareness perspective. Customized phishing assessments ranging from single users to company-wide assessments Assess technical controls to mitigate phishing attacks Measure and track employee awareness of common phishing attacks Educate users to identify and report suspicious emails Assessments tailored to customer environment Benchmark the effectiveness of controls to prevent phishing attacks Approach can include technical assessment and simulated phishing exercise Page 17

17 Product Evaluation Context consultants also conduct comprehensive product security evaluation exercises. These may cover hardware and software products of all types, including, for example, firewalls, telecoms equipment, anti-malware technologies used in the banking sector, voice biometric systems and a range of mobile and wireless devices and technologies. Bespoke tools and methodologies are designed specifically for the device(s) under review Product evaluation approaches are aligned to methodologies and activities conducted by Context s state-of-the-art research team Assess the security stature of the product for its ability to operate safely in specified environments Ability to assess devices for compliance against a variety of evaluation schemes and sensitivity criteria such as CPA Page 18

18 CESG Product Assurance (CPA) Context is qualified to evaluate products on behalf of CESG under the CESG Product Assurance (CPA) service. CPA certification provides a product with entry into an approved list from which government departments and industry partners may purchase. CPA is essentially a certificated accreditation process for products to be used by government, public sector and any industries requiring access to UK government accredited networks. CPA certification enables product vendors to sell their products into government and public sector departments, the wider public sector and associated industry for use in communications networks requiring IL2 and IL3 accreditation. Experience certifying products across a wide-variety of security characteristics CPA provides products with entry into an Government approved list CPA scheme evaluates commercial off the shelf (COTS) products CPA assists COTS developers with published security and development standards CPA consolidates previous schemes to provide simplified, certificate-based assurance One of the first companies on the scheme with CPA lab onsite Provide end-to-end service from producing assurance plans for defined security characteristics to submission to CESG Page 19

19 CESG Tailored Assurance Service (CTAS) The CTAS scheme provides tailored accreditation of customer environments to government standards. Context is a CESG Tailored Assurance Scheme (CTAS) company and has a wealth of experience providing CTAS services on behalf of CESG. Context utilize their CLAS and CHECK teams to deliver an unrivalled breadth of CTAS services. These may range from minor software components to national infrastructure networks. Large pool of CREST and CHECK accredited testers Pre-engagement assistance as needed Creation and implementation of security targets, evaluation work plans and audit maintenance plans Performance of CTAS testing to CESG standards. Highly skilled consultants with experience working within government Bespoke, highly skilled assessment of novel technologies and systems Government accreditation of a system, product or environment Context take a cost effective approach to CTAS environments Project managed by experience personnel Page 20

19 CESG Tailored Assurance Service (CTAS) Page 21

20 Red Teaming, STAR and CBEST Assessments Context s red team engagements emulate real world attacks in a controlled manner. From email phishing campaigns to exfiltration of information, they are an end-to-end simulation of the sophisticated real world threats Context defends against daily. Combining expertise in information security, social engineering, malware and targeted attack analysis, Context is uniquely positioned to perform sophisticated attacks against organisations. Certified to deliver under the CREST STAR scheme and the UK government CBEST Scheme with the largest number of CCSAM and CCSAS testers in the UK Highly specialised and customised engagements, according to customer requirements Attacks based on real world threat scenarios, tailored to the attacks faced by each client Cross-discipline engagements involving attacks on IT systems, physical locations and social engineering of employees Mature risk management and delivery approach drawing from experience delivering red team, STAR and CBEST engagements for over five years. : An assessment of the business mitigations in place against tailored, real-world threat scenarios Identification of weaknesses arising from publicly-available information, staff usage of social media, and security vulnerabilities in IT systems and physical locations Accurate threat ratings to assess vulnerability risk to the business Recommendations for remedial actions and strategic management of weaknesses and vulnerabilities Page 21

21 Automated Vulnerability Assessment (AVA) Context s Automated Vulnerability Assessment (AVA) is designed to analyse an organisation s entire internet facing estate to automatically and regularly detect vulnerabilities and provide remediation advice. Identify new services as they become live, and provide statistical trends on the security posture of the organisation s Internet footprint. Flexible service levels to meet customer requirements Reconnaissance & Network Mapping Vulnerability assessment scanning Vulnerabilities mapped by Context consultants in a handwritten report Manual verification of high and critical impact issues Bespoke, weekly, monthly or quarterly frequency of scans Bespoke Scan algorithms and vulnerability detection mechanisms detect emerging vulnerabilities Ad-hoc scanning available AVA provides statistical reporting on external facing infrastructure All remediation advice is written by senior consultants Frequently provide visibility into technical risk for stakeholders Cost effective entry to security testing Page 22

Why work with Context? Our highly skilled consultants are leaders in their field; their breadth of skills and knowledge enable us to meet the most complex technical requirements Our research has led to the identification and remediation of new vulnerabilities in critical systems We have a large and diverse team strategically situated to work with clients worldwide We are independently operated with the financial backing of a FTSE 100 company We have ample technical resource and the flexibility to schedule complex engagements according to our clients rapidly changing needs We are actively engaged with security industry bodies such as CREST and CESG and regularly hold and speak at key industry events For more information please contact us on +44 (0)207 537 7515 or email gcloud@contextis.co.uk or visit our website www.contextis.com