Bank of England Partners With US for Cyberattack Simulation

Operation Resilient Shield has been in the works since David Cameron and Barack Obama announced plans for closer co-operation in January

The Bank of England, in partnership with some of the largest US banks, is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

The simulation has been dubbed “Operation Resilient Shield” and will provide a more robust examination of the sector’s defences than the recently implemented Waking Shark tests.

The transatlantic operation was announced by UK Prime Minister David Cameron back in January, after visiting President Barack Obama. It will be co-ordinated by the Computer Emergency Response Team (CERT) in both countries and will look to test communication between banks and governments.

Speaking at the time of the announcement, both the US and UK government reiterated the importance of international co-operation in order to deal with cyberthreats. It is hoped that Operation Resilient Shield will “strengthen threat information sharing and intelligence co-operation on cyber issues, and support new educational exchanges” between the two countries.
A number of high-profile cyberattacks have hit the headlines in recent weeks, serving as a reminder that the threat facing businesses and consumers is ever-present. Both TalkTalk and Vodafone have had to inform customers that their accounts have been compromised, with the former announcing that 21,000 unique bank account numbers and sort codes had been stolen.

More than most other industries, the financial sector must ensure that its security protocols are frequently tested and updated in order to counter the threat posed by cyber attackers. The sensitive information stored by banks and similar institutions means that even a minor security breach could have devastating consequences for businesses and individuals. As well as the threat posed by individuals hackers and collectives, state-led attacks by nations like China and Russia are also now viewed as a serious risk to the UK and US economies.
Ein News: http://bit.ly/1MRO9ze

 

 

« New UK Surveillance Bill Appears In The Wake of Snowden
Can EU Judges Keep NSA Spying in Check ? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.