SlideShare a Scribd company logo
The National Cyber Security Centre at
Your Service
Hannah H
23rd March 2021
Helping to make the UK the safest place to live and work online
2
The NCSC:
• understands cyber security, and distils this
knowledge into practical guidance for all
• responds to cyber security incidents to
reduce the harm they cause to organisations
and the wider UK
• uses industry and academic expertise
to nurture the UK's cyber security capability
• reduces risks to the UK by securing public
and private sector networks
Introducing myself and my role
You may know us from products and
services such as….
Cyber Essentials
and Cyber Essentials Plus
IASME as sole certification body now
Readiness tool - https://getreadyforcyberessentials.iasme.co.uk/
Any feedback?
1.Strong and separate passwords for email
2.Strong passwords by using three random words
3.Save passwords in your browser
4.Turn on 2FA (two factor authentication)
5.Update your devices
6.Back up your data
Cyber Aware campaign – the basics
Covid-related advice – and new topics
Moving from physical to digital
Video conferencing
Guidance on Cyber Insurance
Staff awareness training
Top Tips for Staff e-learning
Can be embedded in your own ELM system
Being updated
What about students?
Alerts and Advisories
Through our website
CiSP?
Weekly bulletins on open source cyber security stories
https://www.ncsc.gov.uk/section/keep-up-to-date/
Weekly threat reports
Exercise in a Box
Simulated and table-top exercises
Free!
Scenarios based on common cyber incidents
Gives advice afterwards
The Cyber Security Toolkit for Boards
• Guidance to support board members get up to speed on a topic they may not be
familiar with
• Designed primarily for corporate boards - but messages relevant to any board in
any sector (e.g. school governors, charity trustees)
• Nine key modules on key cyber security topics
• Followed by questions board members may wish to ask their technical experts
12
Suspicious Email Reporting Services
report@phishing.gov.uk
Looks at reporting emails to see if there is suspicious activity
(i.e. looks to be phishing emails sent via a domain, investigates
it and, if UK based, looks to take it down)
4 million reports in the first year1
Reporting / Incidents
Do you have an incident management plan?
Who would you report to?
• Police Scotland
• Jisc?
• us?
• Scottish government
Our incident management info
For more technical staff
Ten Steps to Cyber Security
Detailed guidance on how larger organisations can protect themselves
in cyberspace.
Currently being updated
‘Active Cyber Defence’ – My NCSC
Web Check – for common website vulnerabilities
Mail Check – to protect against mail spoofing
Early Warning – soft launch – automated alerts if network abuse
activity is seen or suspected, so warns of potential threats
against the network.
Read all about it…
Ransomware alert for the sector: Sept 2020
Ransomware alert for the sector: March 2021
Mitigating ransomware & malware attacks
Which have you heard of?
Which are you using?
What else do you need?
What are the barriers?
How else can we reach you?
Hannah.h@ncsc.gov.uk

More Related Content

What's hot

Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
Kevin Duffey
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
Craig McGill
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
Matthew Rosenquist
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
Olivier Busolini
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
RishalHalid1
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
Manjushree Mashal
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
Kevin Duffey
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Netpluz Asia Pte Ltd
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
Kevin Duffey
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 

What's hot (20)

Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 

Similar to Virtual Bridge Sessions: The National Cyber Security Centre at Your Service

Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
SURFnet
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
Institute of Chartered Secretaries and Administrators
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
Calvin Sam
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
Cyber Safe Southwark
Cyber Safe SouthwarkCyber Safe Southwark
Cyber Safe Southwark
The Integrate Agency CIC
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
robbiesamuel
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
Infosectrain3
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
APNIC
 

Similar to Virtual Bridge Sessions: The National Cyber Security Centre at Your Service (20)

Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cyber Safe Southwark
Cyber Safe SouthwarkCyber Safe Southwark
Cyber Safe Southwark
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 

More from College Development Network

Virtual Bridge Sessions: Making Delivery Online Work for Everyone
Virtual Bridge Sessions: Making Delivery Online Work for EveryoneVirtual Bridge Sessions: Making Delivery Online Work for Everyone
Virtual Bridge Sessions: Making Delivery Online Work for Everyone
College Development Network
 
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & MoodleScottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
College Development Network
 
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & MoodleScottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
College Development Network
 
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
College Development Network
 
MIS Network Event: Sector Update
MIS Network Event: Sector UpdateMIS Network Event: Sector Update
MIS Network Event: Sector Update
College Development Network
 
MIS Network Event: SFC Update
MIS Network Event: SFC UpdateMIS Network Event: SFC Update
MIS Network Event: SFC Update
College Development Network
 
Digital ID cards at New College Lanarkshire
Digital ID cards at New College LanarkshireDigital ID cards at New College Lanarkshire
Digital ID cards at New College Lanarkshire
College Development Network
 
Virtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
Virtual Bridge Sessions: Hybrid Delivery - Best of Both WorldsVirtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
Virtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
College Development Network
 
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
College Development Network
 
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
College Development Network
 
Virtual Bridge Sessions: Pedagogy Matters
Virtual Bridge Sessions: Pedagogy MattersVirtual Bridge Sessions: Pedagogy Matters
Virtual Bridge Sessions: Pedagogy Matters
College Development Network
 
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
College Development Network
 
Virtual Bridge Sessions: Messages from international experiences
Virtual Bridge Sessions: Messages from international experiencesVirtual Bridge Sessions: Messages from international experiences
Virtual Bridge Sessions: Messages from international experiences
College Development Network
 
Public Sector Accessibility Guidelines: What you need to know (and do!)
Public Sector Accessibility Guidelines: What you need to know (and do!)Public Sector Accessibility Guidelines: What you need to know (and do!)
Public Sector Accessibility Guidelines: What you need to know (and do!)
College Development Network
 
Enhancing Performance through Data-led Decision Making
Enhancing Performance through Data-led Decision MakingEnhancing Performance through Data-led Decision Making
Enhancing Performance through Data-led Decision Making
College Development Network
 
FES Update Summary
FES Update SummaryFES Update Summary
FES Update Summary
College Development Network
 
MyDay Portal
MyDay PortalMyDay Portal
Online Enrolment and “Onboarding”
Online Enrolment and “Onboarding”Online Enrolment and “Onboarding”
Online Enrolment and “Onboarding”
College Development Network
 
Post-College Destination Data
Post-College Destination DataPost-College Destination Data
Post-College Destination Data
College Development Network
 
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
College Development Network
 

More from College Development Network (20)

Virtual Bridge Sessions: Making Delivery Online Work for Everyone
Virtual Bridge Sessions: Making Delivery Online Work for EveryoneVirtual Bridge Sessions: Making Delivery Online Work for Everyone
Virtual Bridge Sessions: Making Delivery Online Work for Everyone
 
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & MoodleScottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
 
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & MoodleScottish Moodle User Group (SMUG): Blackboard Ally & Moodle
Scottish Moodle User Group (SMUG): Blackboard Ally & Moodle
 
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
Virtual Bridge Sessions: Approaches to Learning and Teaching during Remote De...
 
MIS Network Event: Sector Update
MIS Network Event: Sector UpdateMIS Network Event: Sector Update
MIS Network Event: Sector Update
 
MIS Network Event: SFC Update
MIS Network Event: SFC UpdateMIS Network Event: SFC Update
MIS Network Event: SFC Update
 
Digital ID cards at New College Lanarkshire
Digital ID cards at New College LanarkshireDigital ID cards at New College Lanarkshire
Digital ID cards at New College Lanarkshire
 
Virtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
Virtual Bridge Sessions: Hybrid Delivery - Best of Both WorldsVirtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
Virtual Bridge Sessions: Hybrid Delivery - Best of Both Worlds
 
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
Virtual Bridge Sessions: Social Media, Esports and Copyright - Friends or Foes?
 
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
Virtual Bridge Sessions: Managing and Supporting Staff Who Are Delivering Rem...
 
Virtual Bridge Sessions: Pedagogy Matters
Virtual Bridge Sessions: Pedagogy MattersVirtual Bridge Sessions: Pedagogy Matters
Virtual Bridge Sessions: Pedagogy Matters
 
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
Virtual Bridge Sessions: Key Messages from Research on Blended or Digital Lea...
 
Virtual Bridge Sessions: Messages from international experiences
Virtual Bridge Sessions: Messages from international experiencesVirtual Bridge Sessions: Messages from international experiences
Virtual Bridge Sessions: Messages from international experiences
 
Public Sector Accessibility Guidelines: What you need to know (and do!)
Public Sector Accessibility Guidelines: What you need to know (and do!)Public Sector Accessibility Guidelines: What you need to know (and do!)
Public Sector Accessibility Guidelines: What you need to know (and do!)
 
Enhancing Performance through Data-led Decision Making
Enhancing Performance through Data-led Decision MakingEnhancing Performance through Data-led Decision Making
Enhancing Performance through Data-led Decision Making
 
FES Update Summary
FES Update SummaryFES Update Summary
FES Update Summary
 
MyDay Portal
MyDay PortalMyDay Portal
MyDay Portal
 
Online Enrolment and “Onboarding”
Online Enrolment and “Onboarding”Online Enrolment and “Onboarding”
Online Enrolment and “Onboarding”
 
Post-College Destination Data
Post-College Destination DataPost-College Destination Data
Post-College Destination Data
 
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
Integrating Interactivity in Content to Match the Pedagogy (and doing it to s...
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Virtual Bridge Sessions: The National Cyber Security Centre at Your Service

  • 1. The National Cyber Security Centre at Your Service Hannah H 23rd March 2021
  • 2. Helping to make the UK the safest place to live and work online 2 The NCSC: • understands cyber security, and distils this knowledge into practical guidance for all • responds to cyber security incidents to reduce the harm they cause to organisations and the wider UK • uses industry and academic expertise to nurture the UK's cyber security capability • reduces risks to the UK by securing public and private sector networks
  • 4. You may know us from products and services such as….
  • 5. Cyber Essentials and Cyber Essentials Plus IASME as sole certification body now Readiness tool - https://getreadyforcyberessentials.iasme.co.uk/ Any feedback?
  • 6. 1.Strong and separate passwords for email 2.Strong passwords by using three random words 3.Save passwords in your browser 4.Turn on 2FA (two factor authentication) 5.Update your devices 6.Back up your data Cyber Aware campaign – the basics
  • 7. Covid-related advice – and new topics Moving from physical to digital Video conferencing Guidance on Cyber Insurance
  • 8. Staff awareness training Top Tips for Staff e-learning Can be embedded in your own ELM system Being updated What about students?
  • 9. Alerts and Advisories Through our website CiSP? Weekly bulletins on open source cyber security stories https://www.ncsc.gov.uk/section/keep-up-to-date/ Weekly threat reports
  • 10. Exercise in a Box Simulated and table-top exercises Free! Scenarios based on common cyber incidents Gives advice afterwards
  • 11. The Cyber Security Toolkit for Boards • Guidance to support board members get up to speed on a topic they may not be familiar with • Designed primarily for corporate boards - but messages relevant to any board in any sector (e.g. school governors, charity trustees) • Nine key modules on key cyber security topics • Followed by questions board members may wish to ask their technical experts
  • 12. 12
  • 13. Suspicious Email Reporting Services report@phishing.gov.uk Looks at reporting emails to see if there is suspicious activity (i.e. looks to be phishing emails sent via a domain, investigates it and, if UK based, looks to take it down) 4 million reports in the first year1
  • 14. Reporting / Incidents Do you have an incident management plan? Who would you report to? • Police Scotland • Jisc? • us? • Scottish government Our incident management info
  • 16. Ten Steps to Cyber Security Detailed guidance on how larger organisations can protect themselves in cyberspace. Currently being updated
  • 17. ‘Active Cyber Defence’ – My NCSC Web Check – for common website vulnerabilities Mail Check – to protect against mail spoofing Early Warning – soft launch – automated alerts if network abuse activity is seen or suspected, so warns of potential threats against the network.
  • 18. Read all about it… Ransomware alert for the sector: Sept 2020 Ransomware alert for the sector: March 2021 Mitigating ransomware & malware attacks
  • 19.
  • 20. Which have you heard of? Which are you using? What else do you need? What are the barriers? How else can we reach you? Hannah.h@ncsc.gov.uk

Editor's Notes

  1. A brief introduction to the National Cyber Security Centre, what we’re doing for colleges’ cyber security and opening a conversation about what else we should be doing.  We’ll cover a number of (free!) NCSC products and guidance that can really help raise individual colleges’ cyber resilience that you may or may not be aware of, and talk about our future plans.
  2. My role sits with the Education and Academia Engagement team. We seek to raise the cyber resilience of educational settings including Early Years, schools, colleges and universities. We’re not able to give 1-2-1 assistance and support to institutions but instead partner with via umbrella organisations and stakeholder groups to enable us to work at scale. We seek to give guidance, identify and respond to common concerns, and raise the understanding of the importance of cyber security right across the education sector. This means we need to know what we’re doing that is helpful and what we need to improve or to address.
  3. Engagement Working with partners / amplification bodies School governor
  4. The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to allow UK organisations to share cyber threat information in a secure and confidential environment. CiSP is for professionals who have an obligation for cyber security within their organisation. Those individuals must work for a UK registered organisation or UK Government.
  5. Screenshot of home page for toolkit as of March 2021. Due to be updated soon to make it more interactive and easier to navigate. In short, there is an introduction to cyber security to help board members get up to speed with a topic they may be unfamiliar with And then 9 key modules looking at specific cyber security topics.
  6. Why? Link to knowing that you’re ‘alone’ on your network/systems: i.e. the only people there are those who are supposed to be, and only in the parts that they need access to.