Category: Uncategorized
-
Molly Johnston Graduation
Molly Johnston, our new Business Assistant, has graduated from Robert Gordon University with a First Class Honours Degree in International Business Management. We are really excited for Molly and very proud to have her on the team. We know that this is just the beginning for Molly: her ability can take her wherever she wants…
-
Capgemini Knowledge Transfer
CyberPrism have just completed a series of multi-day knowledge transfer sessions with a total of 50+ delegates in syndicates of 8 from the Capgemini Inverness Security Operations Centre who undertook a mixture of lectures and practical exercises to reinforce the aims of the courses. With the expansion of their Operational Technology (OT) offering, Capgemini called…
-
CyberPrism is now a Technical Member of ISASecure
We are pleased to announce that CyberPrism is now a Technical Member of ISASecure, the standards and membership organisation which supports IEC 62443 – the key international standard for the security of operational technology. We are delighted to join the ISA community,which has been instrumental in establishing vital benchmarks for our industry.
-
Dan Ballin joins CyberPrism’s Board
We are delighted to announce that Dan Ballin has joined the Board of CyberPrism as a Senior Board Advisor. Dan is the founder of Ideas Crucible, and has a fantastic track record in supporting growth and innovation, having helped win more than £1 billion worth of profitable revenue for new businesses. His background in AI,…
-
Artificial Intelligence Applied to Cyber Modelling
Nick McLauchlan, our CTO, was at NATO’s MSG-179 Symposium on Emerging and Disruptive Modelling and Simulation Technologies with QinetiQ’s George Skrobanski, presenting their paper on Artificial Intelligence Applied to Cyber Modelling, based on the work they have done for DSTL. In the modern military domain, timely information is increasingly critical. However, attacks are becoming more…
-
Thought piece – Has the time come to consider using a new CIA triad for Operational Technology?
Ask any IT professional about information security and most will probably mention the CIA triad of Confidentiality, Integrity and Availability. The CIA triad is widely accepted as fundamental to an organisation’s information security practice. Simply put, Confidentiality is about protecting your data from unauthorised viewing or access. Integrity means that your data is protected, reliable…
-
CyberPrism has successfully gained JOSCAR Supplier Accreditation
The JOSCAR Registration Mark is highly valued amongst some of the largest businesses in the aerospace, defence and security industry. The platform is a single repository for pre-qualification and compliance information. Dane Clackworthy, Head of Sales said: “We wanted to demonstrate our commitment and credentials to the Security industry. By receiving JOSCAR accreditation, CyberPrism have…
-
CyberPrism Joins the Aberdeen & Grampian Chamber of Commerce (AGCC)
CyberPrism has joined the Aberdeen & Grampian Chamber of Commerce (AGCC) to forge closer ties to the region. The AGCC, which represents more than 1,100 organisations collectively employing 125,000 people across all sectors, has done an amazing job supporting members and shaping a strong future economy. Dane Clackworthy, Head of Sales and Business Development, said:…
-
Molly Johnston joins CyberPrism
We are very pleased to have secured the services of Molly Johnston as our marketing assistant. She joins us part time as she completes her studies in international business at Robert Gordon University, and has already initiated new marketing activities which will increase client awareness as we grow the business. Molly brings a sharp mind…
-
CyberPrism takes on the role of OT Cyber Security Technical Authority for ODE’s Global Assets
We are delighted to take on a key Technical Authority role for ODE Asset Management, hugely respected operators of Oil & Gas and Renewables facilities Worldwide. We look forward to helping ODE discharge its Duty Holder responsibilities, maintain its cyber security compliance requirements and secure its vital processes against an increasing array of cyber threats.