Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 3 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

UK and US security agencies to contest "War Games" in simulated attacks

by The Gurus
January 16, 2015
in Editor's News
Share on FacebookShare on Twitter

David Cameron and Barack Obama have announced plans to implement a rolling programme of ‘war game’ cyber attacks on each other.
 
The attacks, which will be conducted by GCHQ, MI5 and the FBI, will target critical national infrastructure, and the first test will hit the financial sector later this year. During this exercise, the Bank of England and commercial banks in the City of London and Wall Street will be targeted in a bid to ensure adequate security measures are in place.
 
Agents will also co-operate in “cyber cells” on both sides of the Atlantic. Speaking to BBC News, Cameron said that cyber attacks are one of the “biggest threats we face”, and with expertise in the UK and USA, the capabilities will be combined to share information not only on how to best protect ourselves.
 
He said: “It is happening already, but it needs to be stepped up. We have in GCHQ an asset that is massively expert in preventing cyber attacks, in America they have a similar asset in the NSA and they do work well together, but this is a real signal that it is time to work together to step up the efforts and to do more.
 
“It is not just about protecting companies, it is also about people’s data and people’s finances. These attacks can have real consequences to people’s prosperity.”
 
Richard Cassidy, technical director EMEA at Alert Logic, welcomed the move, saying that activities such as the “War Games” serve a great purpose in raising industry awareness about the real threat posed to businesses across the industry.
 
He said: “Focusing on finance and national infrastructure sector is a good start and represents the most high-profile high-value targets we’ve seen attacked over the past several years. Having the best Government-led minds from both sides of the pond working together to test the threat protection capabilities of some of our most important organisations is a great benefit given that the source is not malicious and any weaknesses found can be rectified to bolster their respective security mechanisms.
 
“Success will be deemed by how the information is shared and the lessons learned by both sides on the outcome of these games. The goal has to ensure better security posture of the targets and raised awareness across the industry of the real danger organisations face into today’s light-speed evolving threat landscape. Hacker cells are becoming far more sophisticated in response to the increased capabilities of our applications and infrastructure and as such taking a great deal more time and effort in targeting their victims of high value.”
 
Andy Settle, chief cyber security consultant and head of practice at Thales UK, said that a successful attack on a country’s financial sector could lead to disastrous consequences throughout the world, with staggering effects on markets. “To this end, it is promising to see that the first drill is targeting the City of London and Wall Street, taking clear precautions to ensure the security of these countries’ economic infrastructure,” he said.
 
Ross Brewer, vice president and managing director for international markets at LogRhythm, said: “The sharing of intelligence between MI5, GCHQ and the FBI will be key in this programme’s success. While, in the UK, we have seen the Waking Shark exercise and the Bank of England employee ethical hackers to test its infrastructure in recent years, it is only worthwhile if the lessons learned are acted upo
n and shared with a wider audience.”

FacebookTweetLinkedIn
Tags: attackCameronFBIUKUSA
ShareTweetShare
Previous Post

British man arrested in connection with investigation into PlayStation and Xbox DDoS

Next Post

Mortgage lenders provide "train wreck of an opportunity" for identity theft

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information