Thales Service Definition for Cyber Incident Response - Critical 48 for Cloud Services



Similar documents
DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

Application Guidance CCP Penetration Tester Role, Practitioner Level

INFORMATION SECURITY TESTING

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

The enemies ashore Vulnerabilities & hackers: A relationship that works

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

THALES. corn

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security Incident Response Supplier Selection Guide

IT Security Testing Services

developing your potential Cyber Security Training

Protecting Malaysia in the Connected world

CESG Certification of Cyber Security Training Courses

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

CYBER SECURITY Audit, Test & Compliance

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

IBM Penetration Testing Services

ICT and Information Security Resources

IBM Security in the Software Development Lifecycle

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

Paul Vlissidis Group Technical Director NCC Group plc

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business

THE HUMAN COMPONENT OF CYBER SECURITY

Cyber Security and Data Privacy Acumin Specialist Cloud Services

UK Government IA Recent Changes and Update

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

CESG Certified Professional

Assuria from ZeroDayLab

Growth Through Excellence

How To Help Your Business Succeed

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

A Guide to the Cyber Essentials Scheme

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services

The Next Generation of Security Leaders

CenturyLink Disaster Recovery Service. G-Cloud V Lot 4 (Specialist Cloud Services)

Career Paths in Information Security v6.0

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: G-Cloud@esynergy-solutions.co.

Guide to Penetration Testing

Cyber Security Evolved

G-Cloud III Services Service Definition Accenture Cloud Security Services

An introduction to CNS Group for prospective employees.

Procuring Penetration Testing Services

Is your Organization SAFE?

93% of large organisations and 76% of small businesses

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Australia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September Also Inside

HMG Security Policy Framework

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

CBEST FAQ February 2015

Committees Date: Subject: Public Report of: For Information Summary

Secure by design: taking a strategic approach to cybersecurity

Specialist Cloud Services. Acumin Cloud Security Resourcing

IMPROVE AWARENESS AND SKILLS

National Approach to Information Assurance

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Information governance strategy

External Supplier Control Requirements

Cybernetic Global Intelligence. Service Information Package

Career Analysis into Cyber Security: New & Evolving Occupations

Thales Pricing Schedule for Vulnerability Assessment and Penetration Testing

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

Corporate Security in 2016.

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

CBEST Implementation Guide

The Human Component of Cyber Security

January 2015 Issue No: 2.1. Guidance to CESG Certification for IA Professionals

Digital Forensics G-Cloud Service Definition

Career proposition for software developers and web operations engineers

G-Cloud IV Services Service Definition Accenture Cloud Security Services

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION

Cyber Security Incident Response coordinators. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. January 2014 ALSO INSIDE

IoT & SCADA Cyber Security Services

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV

Qualification details

Treating Customers Fairly. October 2015

Cyber Security Education, Qualifications and Training

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

Cyber Security Incident Response High-level Maturity Assessment Tool

Smart Security. Smart Compliance.

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Internet Governance and Cybersecurity Patrick Curry MACCSA

Security Accreditation: Not Just a Tick in a Box

ESKISP Direct security architecture development

Procurement Policy Note Use of Cyber Essentials Scheme certification

G-CLOUD SPECIALIST CLOUD SERVICES

A NEW APPROACH TO CYBER SECURITY

SIAM Procurement G-cloud 7 framework

Thales Service Definition for NOC Services for Cloud

Unit 3 Cyber security

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

PwC s Advanced Threat and Vulnerability Management Services

Transcription:

Thales Service Definition for Cyber Incident Response - Critical Thales Service Definition for Cyber Incident Response - Critical for Cloud Services April 2014 Page 1 of 7

Thales Service Definition for Cyber Incident Response - Critical CONTENT Page No. Introduction... 3 Overview of Service... 3 Critical... 3 Thales Critical Approach... 4 Our People... 4 Why Thales?... 4 About Thales... 5 Pricing... 5 Terms and Conditions... 5 Contact... 6 Page 2 of 7

Thales Service Definition for Cyber Incident Response - Critical Introduction Overview of Service Our Critical package is a defined, fixed price Cyber incident response service which focuses on the critically important first few hours after the discovery of a cyber incident. During this time, it is likely that you will need to make some essential decisions in order to minimize the impact of an incident on your organisation. We will ensure you are able make informed decisions in a timely manner by providing you with the right information and advice at the right time. The Critical service differs from the other Thales Cyber Incident Response services, offering an immediate response to our customers, ensuring that we provide critical support within 24 hours from the start of the incident. We have a dedicated Cyber hotline which is available 24 hours a day, seven days a week, giving you cyber incident response specialists whenever you need them. Thales Cyber Critical service is specifically designed to: Identify - Types and extent of cyber incident(s) that you are suffering from. Minimise - The impact of an incident on your organisation. Recommend - Most appropriate action plan to recover from the incident. Manage - Execute the action plan. Resolve The incident or produce a report with remediation actions. Return - Your business to normal working in the most cost effective manner. Stop - The incident from recurring. Critical Our Critical package is designed to make it quicker and easier for you to get an immediate specialist response you need to deal with an incident. It recognises the critical nature of this phase, acknowledging that if appropriate decisions and actions are not taken during this period, then your organisation may suffer from irreparable damage. During this phase, your dedicated Cyber Incident Response Manager (CIRM) and the Cyber Incident Response Team (CIRT) will work with you to investigate the extent of the incident while providing advice and regular updates on progress. We can have at least one of our incident response team members to your site within 24 hours. If we can resolve the incident within hours, we will. If not, our reporting will outline the most appropriate action plan required to get you back to business as usual using the approach listed below.. Page 3 of 7

Thales Service Definition for Cyber Incident Response - Critical You will receive regular updates on progress throughout the day and we will offer advice on stakeholder management. If required during this phase, we can deploy state-of-the-art automated malware analysis and digital forensics solutions from our strategic partners FireEye and Guidance Software. Thales Critical Approach Those first few hours after discovery of a cyber incident are critical. Our priority is to identify whether you have suffered from a cyber incident as soon as possible. We accept that during an incident, the scope and impact often cannot be fully understood or defined. The process below outlines the Thales approach to delivering tangible results. During Critical, we will aim to get as far as we can through this process. Our People We have a dedicated team of expert cyber incident responders. They have a wealth of invaluable experience including criminal investigations and mitigating state sponsored attacks on commercial and Government organisations. Our incident response teams are professionally trained with numerous qualifications including certification for the tools used in a response such as FireEye and Guidance Software solutions. The Thales Cyber Incident Response (CIR) team is led by former Police Hi-tech Crime Unit manager with many years of experience in managing serious cyber crime investigations. He is supported by the wider team of cyber specialists, many of whom possess industry standard qualifications and certifications, including CREST Registered Testers (CREST), CESG Listed Advisor Scheme (CLAS), Forensic Investigators, Incident Responders, Certified Information Systems Security professional (CISSP), CESG Certified Professional (CCP), Network Architects, Security Architects and ISO27001 Lead Auditors. Why Thales? Thales has both the breadth and depth of experience to manage any cyber incident and get you back to business as usual, whatever your business or industry sector. We have specialist experience in supporting Defence and UK Critical National Infrastructure (CNI), including Transport, Energy, Water and Nuclear sectors. Page 4 of 7

Thales Service Definition for Cyber Incident Response - Critical Within these sectors we have a wealth of experience in Industrial Control Systems (ICS) and System Control and Data Acquisition (SCADA). We use state-of-the-art tools from FireEye and Guidance Software to ensure that your incident is dealt with quickly and effectively. We have the experience and security clearances necessary to handle the most sensitive data, networks and technology. We have the subject matter and domain expertise to understand your business and focus effort on the information you really need to protect. We will provide post-incident support to make sure your business is in the strongest position to prevent future incidents. We are an approved supplier of cyber security services to HMG, and we are trusted to secure over 80% of the world s financial transactions. We are a trusted Cyber Security practitioner with a global network of over 1,500 accredited cyber and encryption specialists building upon 40 years of experience. We can pull through capabilities from our industry partners and the global Thales Group to ensure maximum service availability. About Thales Thales is a global technology leader in the Aerospace, Transportation and Defence & Security markets. In 2013, the company generated revenues of 14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners. Pricing Thales Critical Service is a defined, fixed price service which enables your organisation identify critical incidents. Our Service is a cost effective one off fee of 10,000 and ensures we get a specialist to your organisation within 24 hours. Please refer to the individual rate cards and pricing schedules for further details on pricing information. Terms and Conditions Please see the individual terms and conditions card for further information on our Terms and Conditions. Page 5 of 7

Thales Service Definition for Cyber Incident Response - Critical Contact To discuss or speak to Thales about our Gateway cloud services, we would be delighted to hear from you. We can be contacted on: thalesg cloud5@uk.thalesgroup.com Page 6 of 7