Last updated: 
4 months 2 weeks ago
Group Manager

Cyber security has long been an area of activity for those providing, protecting and supporting services in research and education. For many years we have provided security products and services to help preserve the confidentiality, integrity, and availability of the Janet network and everything on it. Over time the services we offer have evolved and grown to meet your changing needs and the different threats that we are all now seeing. 

This Group aims to provide updates and articles about Jisc's security products and services as well as providing relevant news items and links about areas of security that affect Jisc members.

Article

Way back in March 2015 Jisc published its first Cyber security strategy, covering the security products and services that we offered or were planning on delivering over the subsequent three years. A lot has changed over this period, however the objectives of this original strategy have been broadly met, along with other solutions as we constantly revised our plans to best meet the needs of our members.

Article

Building on the success of last year’s Cyber security posture survey, from March to May this year we surveyed Jisc members to better understand their security posture. We had a great responses from 118 different organisations: 65 universities, 49 colleges, 2 research institutions and 2 Arts and Heritage organisations – so thank you to all of you who took the time to respond.

Article

Some of you may remember that last year we issued a survey to learn more about education and research organisation’s cyber security posture and to help Jisc better support your needs in this area. We had a great response last year, but now we want to see what has changed – are your security needs still the same? Have you now achieved Cyber Essentials so feel more confident about your security posture? Are you seeing different threats? Do you now have a strategic lead responsible for cyber security?

Article

Computer Weekly have just published an article written by Jisc's Danny Moules on  "A history of hacking and hackers".

Danny is a security assessment specialist and pen tester and was keen to help get the message out that the stereotypical image of a 'hacker in a hoodie' is outdated and you should be wary if that's the only threat you are concerned about... 

Article

Earlier this year we identified a need to better understand institutions’ security posture in light of the fast changing and increasingly critical area of cybersecurity. So for the past couple of months we have been running a survey to find out what more Jisc can do to help best support and protect institutions and the Janet network.

The survey had the following objectives:

Article

We’d really like your help in finding out what more Jisc can do to help best support and protect institutions and the Janet network and would appreciate it if you would answer some questions about your institution’s security posture.

We’ve put together a short survey that will be used by us to develop new security-related services, to prioritise planned activities and to assist in protecting the Janet network. The survey should take approximately 20 minutes to complete and we’ll provide an anonymised summary back to you if you wish.

Article

As many of you will know, just before Easter we hosted our annual Networkshop conference at the University of Manchester. In case you were – like me – unable to attend, this post contains a roundup of the security related presentations. Where available I have included links to slides and/or videos, but as you would expect, some of the discussions were closed sessions due to the content that was presented.

In the opening plenary, Steve Kennet (Jisc’s Head of network operations and Jisc Group SIRO) provided:

Article

The Strategy and Plan for Jisc security products and services were published last year so we will shortly be updating them to reflect recent activities. The aim of the strategy is to help you address the technical aspects of cyber security (protecting systems, networks and information) and also to help change the attitudes and behaviours of your organisation and the users of your networks.

Article

You might be interested to know that Jisc have the following security-related courses coming up this Summer.

Computers, privacy and the law

19 July - 3 August 2016 

This online course provides an introduction to the privacy and legal issues that arise when designing and operating shared computers, networks and services.

Prev | Next