Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Scottish Cyber Coordination Centre – Organisational Cyber Testing and Exercising Regime: Guidance

Scottish Cyber Coordination Centre – Organisational Cyber Testing and Exercising Regime: Guidance

Outlines a cyber exercising regime to enhance preparedness and recovery from incidents across technical, operational, and strategic levels. It provides guidance for the Scottish public sector, offering a structured approach to testing and exercising, tailored to an organisation’s size.

Related resources

CiSP – The Cyber Security Information Sharing Partnership

The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK […]

Read more CiSP – The Cyber Security Information Sharing Partnership in modal dialog

10 Steps to Cyber Security

This guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.

Read more 10 Steps to Cyber Security in modal dialog

Cyber Essentials Certificate Search

The IASME Cyber Essentials Certificate Search is to verify the Cyber Essentials and Cyber Essentials Plus certification of an organisation. Use this to check whether an organisation holds Cyber Essentials certification to support supplier assurance.

Read more Cyber Essentials Certificate Search in modal dialog

Incident Management

The NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]

Read more Incident Management in modal dialog
Back to top of the page