The Cyber Growth Action Plan – what’s in it for you?

The Cyber Scheme brand image depicting a woman growing lightbulbs

The UK government has announced a £16 million Cyber Growth Action Plan, designed to strengthen the country’s cyber security sector through investment in research, skills, and start-up support. It ties directly into wider ambitions under the Plan for Change and the forthcoming Cyber Security & Resilience Bill – all aimed at ensuring the UK remains a leading global player […]

Tips from an Assessor

Kim Croft ChCSP, Live Service Lead, Security Incident Response Team at DWP, is an Assessor for the Incident Response specialism for The Cyber Scheme. Kim has provided some excellent tips for maximising success during a Professional Title application. Tip 1 – Understand the UK Cyber Security Council’s ‘Vision & Mission’ It’s important, before you start […]

The quality of your Professional Title application is a reflection of you…

(Information below provided by Andrew Jones, Strategy Director at The Cyber Scheme. Andy has been appointed as an assessor by the UK Cyber Security Council, and undertakes assessments against all specialisms in competence areas B-E). Don’t apply for a Professional Title until you understand the competence you will need to demonstrate… Make your evidence countWe […]

The Route to a Chartered Title as a Red Team Manager

The Cyber Scheme sat down recently with Shaun Peapell, VP of Global Threat Services at Rootshell Security, to discuss his recent achievement: becoming the first person to earn both the new CSRTM (Cyber Scheme Red Team Manager) certification and the Chartered Cyber Security Professional (ChCSP) title, under the Security Testing specialism, using the CSRTM as a measure of technical […]

A case for the collaborative recruitment approach – The Cyber Scheme and NCC

“I’m over the moon about joining NCC Group, and I’m confident that they’re the right place for me, and I’ll be right for them. I’d also like to say a huge thank you to The Cyber Scheme for making the introductions”. Richard Evans, Security Consultant, NCC Group. We’ve known for many years that the individuals […]

The Cyber Advisor Scheme

Setting the Standard that recognises technical knowledge and the competence to recommend solutions. The NCSC (National Cyber Security Centre) is committed to expanding The Cyber Advisor Scheme with its Delivery Partner IASME, and also with The Cyber Scheme as the only assessment body for the programme. Recently IASME created an informative webinar that featured staff […]

Professional Registration – what level is right for you?

Our Strategy Director Andy Jones looks at what you should take into consideration when applying for professional registration. Embarking on Professional Registration is a key milestone in your career and it is important to prepare your evidence and ensure it meets the required standards being sought.  Our advice is don’t aim higher than the level […]

The ethos behind our pilot studies

About The Cyber Scheme

Running a pilot study prior to the full-scale roll out of a new assessment, training course, or any measure of competency is an essential component in the development of The Cyber Scheme’s services. As a Licensed Body, we are trusted by the UK Cyber Security Council to run pilots which reflect verifiable outcomes and provide […]

Cyber Advisor-tips

Learn from our Cyber Advisor assessor Sarah Knowles The role of the Cyber Advisor is to work with micro, small and medium sized businesses to improve their cyber resilience. Being a cyber advisor means that you have passed an assessment where you have demonstrated that you are able to provide sound, quality advice to a customer […]

Living the dream, in the red team at The Cyber Scheme…

A staff image depicting Paul Richards of The Cyber Scheme

By Paul Richards, Head of Education at The Cyber Scheme “Today I was invited to a meeting regarding our new Cyber Scheme Red Team Manager assessment. (CSRTM). Up until today I have had very little involvement; I’m not a red teamer, my specialism is in training and assessing security testers (previously known as pen testers). […]

Skip to content