Cyber Security Practitioner

Volume: 3 Issue: 8
(August 2017)


The UK’s Department for Digital, Culture, Media & Sport (‘DCMS’) and the Minister of State for Digital Matt Hancock MP launched on 8 August 2017 a consultation on the Government’s plans to transpose the Network and Information Systems Directive (‘NIS Directive’) into UK law. The Government’s plans include the proposal to designate multiple sector-based competent authorities to oversee and enforce cyber security compliance, which goes beyond the NIS Directive’s requirement that EU Member States nominate at least one competent authority. / read more


Earlier this month two pieces of news pointed to a possible tension between UK Government policy and regulatory policy for security. / read more

A study commissioned by the European Parliament at the request of the LIBE Committee into the ‘Legal Frameworks for Hacking by Law Enforcement: Identification, Evaluation and Comparison of Practices,’ assessing the difficult balancing act being carried out by a number of EU Member States and non-EU countries utilising hacking techniques for law enforcement, was published on 6 April 2017. Giovanni Ziccardi, Professor of Legal Informatics at the University of Milan, who contributed to the study, assesses the findings of the study and the serious issues that are central to the debate about whether law enforcement should be utilising hacking techniques. / read more

In recent years the Bank of England’s Prudential Regulation Authority (‘PRA’) has published a number of documents in an effort to address the continuing uncertainty surrounding the provision of cyber risk insurance in the UK. Justin Tivey and Jonathan Drake, of Bond Dickinson, provide an assessment of the PRA’s guidance to the cyber insurance industry in light of its new Supervisory Statement entitled ‘Cyber insurance underwriting risk’ published in July 2017. / read more

On 10 July 2017, Singapore’s Ministry of Communications and Information (‘MCI’) and the Cyber Security Agency of Singapore (‘CSA’) issued a draft Cybersecurity Bill for public comment that would implement strengthened protections for critical information infrastructure (‘CII’) systems (‘the CII Bill’). Yuet Ming Tham, Partner at Sidley Austin, assesses the application of the draft CII Bill and considers the implications it may have for CII services operating in Singapore. / read more

In the last few years, with the introduction of home and business computers with systems that allow the use of more than 4GB of memory, the growth of 64-bit systems has grown dramatically. According to Microsoft, in 2015 more than 92% of all computers sold around the globe used 64-bit systems. As technology evolves and its adaption increases, malicious actors have started to evolve their techniques too, starting with the appearance of the first cases of 64-bit malware, the banking Trojan Zeus. Francisca Moreno, Security Researcher within McAfee’s Strategic Intelligence Team, provides insight into the growing threat of 64-bit malware. / read more

As the deadline looms for EU Member States to compile a list of ‘essential services’ that will require a national strategy to provide a particular standard of cyber security under the Network and Information Systems Directive (‘the NIS Directive’), Mark Surguy, Partner at Weightmans, dissects the applicability of the NIS Directive and the potential success of Member States working cooperatively to protect such services. / read more

As the scope and impact of cyber attacks grows increasingly severe, affecting businesses and systems all over the world, Paul Pratley, Head of Investigations and Incident Response at MWR InfoSecurity, shares his view from the coalface on the weaponised hacking toolsets being used to unleash potentially devastating enterprise-wide attacks. / read more

About Cyber Security Practitioner:

Cyber Security Practitioner, the most recently launched monthly publication from Cecile Park Media, provides a multi-disciplinary view on the cyber security challenges facing global businesses and delivers insight into operational change. It covers cyber security regulation, data breach, data security, cyber risk, cyber crime, ethical hacking, privacy and data protection, cyber infrastructure, technical solutions, risk management, information assurance, security standards, liability, consumer protection, ransomware and other cyber threats, cyber insurance... /read more

Search Publication Archives

Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed