CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. Credit: Shutterstock Cybersecurity membership body CREST and the Information Assurance for Small and Medium Enterprises (IASME) consortium are partnering with the UK National Cyber Security Centre (NCSC) to deliver its new Cyber Incident Exercising (CIE) scheme. The CIE scheme aims to help UK businesses find high-quality service providers that can advise and support them in practising cyber incident response plans. Organisations wishing to join the CIE scheme will be assessed against the NCSC CIE Standard by CREST and IASME, who will manage the onboarding, monitoring, and offboarding of providers. The CIE scheme will launch fully later this year, with registrations now open for organisations to apply to become assured providers. CIE scheme assures cyber incident response plan practice providers The CIE scheme is for organisations providing tailored exercises for client organisations which already have cyber incident response plans in place. Service providers will be assured of two delivery methods, the NCSC wrote. The first is tabletop exercises – discussion-based sessions where representatives from relevant teams meet to discuss their roles and responsibilities, expected activities, and key decision points in accordance with an incident response plan. Discussion is facilitated by the provider and driven by a prepared cyber incident scenario. The second is live play exercises, where team members execute their roles and responsibilities in response to controlled injects which represent a given cyber incident scenario. Different participants will typically receive different sets of injects, while activities and decisions happen in close to real-time with the incident pace and timeline governed by an exercise controller. Live play exercises are best suited to mature organisations looking for in-depth validation of plans. CIE standard covers incidents affecting a single organisation The scope of the CIE standard covers exercises designed to simulate incidents which have a significant impact on a single client organisation. It does not cover incidents spanning multiple organisations or Category 1 and Category 2 incidents, as defined by the UK cyberattack categorisation system. “We are really looking forward to working with companies of all sizes and in all areas of the UK to deliver this important scheme,” said Dr Emma Philpott MBE, CEO of IASME. “We feel strongly about ensuring that the scheme is accessible for smaller cybersecurity companies to become assured providers.” With rising cyberattacks on enterprises of all types, effective cyber incident response is one of the most important parts of building cyber resilience, added Rowland Johnson, president of CREST. Related content news Researcher discovers exposed ServiceBridge database Over 31 million documents from the field service management provider were left open to the internet. By Howard Solomon 26 Aug 2024 4 mins Data and Information Security feature Is the vulnerability disclosure process glitched? How CISOs are being left in the dark Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports. By Cynthia Brumfield 26 Aug 2024 10 mins CSO and CISO Threat and Vulnerability Management Data and Information Security news AWS environments compromised through exposed .env files Attackers collected Amazon Web Services keys and access tokens to various cloud services from environment variables insecurely stored in tens of thousands of web applications. By Lucian Constantin 22 Aug 2024 7 mins Data Breach AWS Lambda Data and Information Security how-to 3 key strategies for mitigating non-human identity risks For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. By Chris Hughes 22 Aug 2024 6 mins Data and Information Security Identity and Access Management Risk Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe