PGI is championing the eastern region Cybersecurity Information Sharing Partnership (CiSP) that will be launched on Thursday 24th March.
PGI’s Managing Director of Cyber, Brian Lord will be delivering a talk about how PGI is playing its part in encouraging people to use the CiSP platform and how it will assist businesses in the six counties that the eastern region CiSP will cover.
What is CiSP?
CiSP is a secure online information sharing platform and a joint collaboration between industry and government to share cyber threat and vulnerability information. Its objective is to increase overall situational awareness of the cyber threat and reduce the impact upon business.
The Eastern CiSP will be launched by the national policing lead for UK cyber crime and Director of the National Computer Emergency Response Team (CERT-UK) and the Eastern Region Special Operation Units Cyber Crime Unit.
The benefits of belonging to the regional node include:
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.