About CSRI

The Cyber Security Research Institute is a research centre specialising in studying the risks in the world of technology and the impact that these have on a world now completely dependent on technology.

We provide concise and timely information in plain English on issues ranging from cyber sabotage and cyber espionage to data awareness and computer crime so everyone is familiar with the latest threats and weaknesses in the technology that we all rely on.

While for many such words may seem to smack of Hollywood and hype the reality is unfortunately coming closer and closer to the science fiction. Cyber espionage may appear to be a loaded term but recent incidents like the 2010 ‘Stuxnet’ attack on the Natanz Uranium enrichment plant in Central Iran by a computer virus claimed to have been developed by computer scientists in Israel and the US and the 23rd of December 2015 attack on the Ukrainian power grid prove that state level cyber sabotage is on the rise. At a business level there are also clear indications of its development, with the deployment of Distributed Denial of Service (Ddos) attacks that slow down internet servers by generating fake information requests from infected computers that have been formed into a botnet. These computers are often inadequately protected household systems connected to the web. The latest manifestation of cyber sabotage is hitting both domestic users and small businesses, known as ‘ransomware’, it is a computer programme that encrypts your data and locks you out of it until you pay a ransom.

It is a technique that in computer terms is as old as the hills and was first known as a logic bomb. Cyber espionage is a relative newcomer in that it was first noticed in 2000 but it has been growing in threat terms ever since and is now grouped under the catch-all term ‘Advanced Persistent Threat’ (APT) and is a name that is applied to a series of high level attacks normally on military targets, defence contractors mining and oil companies and the critical national infrastructure systems of organisations like utilities and communications businesses.

According to those combating the attackers they are mainly from China and come from Chinese military offices and have the sole aim of stealing information. One researcher told the CSRI that they had found exact copies of European production plants in China, in one case exact right down to the an unusual detail, they had installed servers in a refuse bay, unaware that the one’s that had been photos in stolen plans were to be thrown out and were not part of the production process.

While most of us are familiar with computer crime, data awareness is not something that has been adequately fleshed out by the cyber security industry but it is knowing what the value of your data is, how to protect and how to destroy it at the end of use. These are essential skills due to the passing of the European General Data Protection Regulations in 2016 which require information to be only kept for the purposes that it was given, to be adequately protected, and to be effectively destroyed once it has been used for the purpose it was collected for. With penalties that can be as high as €20,000,000 or 4% of global turnover for large companies and other potentially severe outcomes for smaller businesses computer crime is now something that everyone needs to know about.

By producing up to the minute information in a readily accessible way we allow our members to know what threats they face and what they need to do about it.

We use the services of  top academics, leading industry figures and opinion formers to create research produced by journalists and film makers that provides essential information to politicians, decision makers, and industry as a whole.

This is underlined with topical events and webinars to ensure a constant dialogue between members of the CSRI, innovators, the authorities and the media.

Our team of specialists and writers is backed up by an editorial advisory board drawn from academia, industry, Government and the police, and who between them have an unrivalled record in the cyber crime area. This ensures that the information we put out is as good as it can get.

Executive Team

    Matt Warren

    Junior reporter

    Matt Warren – currently studying English at York University, has twice been an intern on the Sunday Times newspaper and regularly writes on cyber for the CSRI.

    Peter Warren

    Chairman

    Peter is a freelance journalist specialising in technology, undercover investigations and science issues. Former technology editor of Scotland on Sunday and the Sunday Express and an associate producer for BBC2, he has worked across a variety of media, including the Guardian, the Daily Mirror, Evening Standard, the Sunday Times, the Sunday Express, Sunday Business, Channel 4, Sky News, the BBC and specialist magazines. He has also advised a number of PR agencies on their technology clients. In 1996 Peter was runner-up in the UK Press Gazette Business Awards for Technology Scoop of the Year. A guest speaker on Technology Ethics to the European Union’s Information Society Technologies conference in Helsinki, Peter, who lives in Suffolk, is an acknowledged expert on computer security issues.

    In 2006, Peter won the BT IT Security News story of the year prize for his work exposing the practice of discarding computer had drives containing sensitive business and personal data.

    In 2007, Peter won the IT Security News story of the year prize again for work done with Future Intelligence showing that Chinese hackers had broken into the UK Houses of Parliament.

    Peter can be emailed on peter@csri.info

      Jeremy Jeffs

      Head of Broadcast

      Jeremy began his career working for CSV – a national volunteer & learning charity and then trained with the BBC. He brings 15 years of high-end TV experience with him. His credits include the critically acclaimed Story of India for BBC2, work with Michael Wood and Bill Bryson plus numerous films for Channel 4, BBC TV, National Geographic and PBS.

      Jeremy runs Magneto Films, the production company he founded with his wife Gaby, and works on developing TV and video projects for that and for the CSRI

      When he’s not making films, he loves baking bread, making pizza, cycling and taking pictures. To contact Jeremy email the office on info@csri.info

      Advisory Board

        Len Hynds

        Len, who rose to the rank of Chief Constable is the former head of the UKs first National High Tech Crime Unit, which he set up with the aid of Neil Barrett, which was notably successful in that it managed to sell the concept of cyber police to a sceptical business community.

          Professor Andrew Blyth

          Andrew is Head of the Information Security Research Group & GSC-CSIRT at the Faculty of Advanced Technology (FAT), University of Glamorgan. Professor Blyth is one the leading researchers in Information Security in the UK.

              Professor Andy Jones

              After a long military career during which he gained a background in information security and computer forensics, Andy moved into Defence Research. He currently holds the post of Director of the Security Research Centre at the University of Hertfordshire, where he moved from his post as head of information security research at BT Martlesham Heath Labs.

                  Professor Fred Piper 

                  Professor Fred Piper – BSc PhD (London) CEng CMath FIEE ARCS DIC FIMA M.InstIISP

                  Fred was appointed Professor of Mathematics at the University of London in 1975 and has worked in information security since 1979. In 1985, he formed a company, Codes & Ciphers Ltd, which offers consultancy advice in all aspects of information security.

                  He has acted as a consultant to over 80 companies including a number of financial institutions and major industrial companies in the UK, Europe, Asia, Australia, South Africa and the USA.

                  He has lectured worldwide on information security, both academically and commercially, has published more than 100 papers and is joint author of Cipher Systems (1982), Fred also wrote some of the first books to be published the protection of communications,  Secure Speech Communications (1985),  Digital Signatures – Security & Controls (1999) and Cryptography: A Very Short Introduction (2002).

                  Fred has been a member of a number of DTI advisory groups. He has also served on a number of Foresight Crime Prevention Panels and task forces concerned with fraud control, security and privacy. He is currently a member of the Board of Trustees for Bletchley Park and the Board of the Institute of Information Security professionals.

                  In 2002, he was awarded an IMA Gold Medal for “services to mathematics” and received an honorary CISSP for “leadership in Information Security”. In 2003, Fred received an honorary CISM for “globally recognised leadership” and “contribution to the Information Security Profession”.In 2005 he was elected to the ISSA Hall of Fame. He was named Professional of the Year at the Communications in Business Awards 2005. In 2008 he was elected to be a Fellow of (ISC)2. In 2008 he was the first person to be elected to the InfoSecurity Europe Hall of Fame. In 2008 he was elected to the International Advisory Board of IMPACT (the International Multilateral Programme Against Cyber Threats).

                      Patrick Tyrrell

                      Patrick is a former Royal Navy Commodore and the United Kingdoms’s first Cyber adviser in 1996. In a paper he wrote at the time Patrick outlined the potential for the Cyber War threat, he is currently a director of Vale Atlantic.

                          Professor John Walker

                          Professor John Walker – MD of Secure-Bastion Ltd, a specialist company in the area of IT Security Research, Forensics, and Security Analytics. John is a practising IT expert witness and a Visiting Professor of Science and Technology at the School of Computing and Informatics, Nottingham Trent University.

                          In the academic arena, John is the originator, and author of a CPD/MSc Module covering Cyber/Digital Forensics, and Investigations.

                          He is a Fellow of the British Computer Society (FBCS), a Chartered Information Technology Practioner (CITP (BCS)), Certified Information Security Manager (CISM (ISACA)), Certified in Risk & Information Systems Control (CRISC (ISACA)). and Certification under the UK Government ITPC Scheme.

                           

                              Graham Wright

                              Graham Wright -Now Chief Information Security Officer & Head of Digital Risk at National Grid, formerly Director of Intelligence Systems with the defence company Northrop -Grumman. Graham is a former RAF Jaguar pilot and former Deputy Director, Office of Cyber Security and Information Assurance, in the UK’s Cabinet Office. Graham has  30-years of experience gained through a variety of senior positions in the Ministry of Defence and government  directing sensitive operations at the Directorate of Targeting and Information Operations (DTIO) and his high profile tour as the UK Chief of the Defence Staff’s Liaison Officer to the Chairman of the Joint Chiefs of Staff at the Pentagon. Wright held the rank of Air Commodore in the Royal Air Force before joining Northrop Grumman. He was appointed CBE in the 2007 New Years Honours list.

                                  Professor Keith Martin

                                  Professor Keith Martin – Prof. Keith Martin is Director of the Information Security Group (ISG) at Royal Holloway, University of London. He joined the ISG as a lecturer in 2000, following research fellowships at the University of Adelaide and the COSIC research group of the Katholieke Universiteit Leuven in Belgium. His has over 20 years of experience in information security research, with research interests that broadly span aspects of cryptography and its applications, including areas such as key management and wireless sensor network security.

                                      Narayan Neelakantan

                                      Narayan Neelakantan Co-Founder & CEO, Anzen Technologies With more than 16 years of experience in the area of Cyber Security, IT Governance, Risk & Compliance and IT Infrastructure, Narayan is an entrepreneur & an innovative thought leader responsible for strategising, implementing and maturing Risk Management & Cyber Security.

                                      He has successfully established Anzen Technologies Pvt. Ltd., a security consulting and services company.Prior to establishing Anzen Technologies, he worked with National Stock Exchange (NSE)as Head –IT Risk & Compliance & CISO. During his role at NSE, he built robust & successful organization wide security programs,including“Governance, Risk and Compliance” and Security Operations Center (SOC) by leveraging his strong risk acumen and deep technical background in IT infrastructure.

                                      He has been a visionary and driving force in building NSE’s IT Risk Management strategic plan, roadmap, methodology, policies, organizational model, staffing, governance, and reporting from the ground up.

                                      Narayan has been an early adopter of cutting edge technologies and has been amongst the first ones in India to successfully implement technologies such as Security Incident & Event Management (SIEM), Anomaly Detection Systems etc.At the time of leaving NSE, he was working on designing a state of the art mechanism to strengthen the organisation’s Situational Awareness & Response capabilities against advanced threats.

                                      Narayan is a well-known speaker at various national and international conferences where he shares his passion, views & concerns on Cyber Security. He also publishes articles related to Cyber Security.He has also been featured on national newspapers.

                                      He is a member of several cyber security forums such as World Federation of Exchanges, National Securities Depository Ltd. etc. He is also an esteemed member of the ISMG Editorial Advisory Board. Narayan has a Bachelor’s Degree in Engineering. He also has many certifications to his credit such as CISA, ISO 27001 LA, SANS -GSEC, GCIH & GWEB.

                                        Professor Neil Barrett

                                        Neil is one of the worlds leading experts on computer security and is a former adviser to the UK Government and the National High Tech Crime Unit. Neil was also responsible for analysing the capabilities of the Microsoft code and the running of the office of the European Commissions Monitoring Trustee in the European Union Competition Case against Microsoft.

                                            Dr Josef Karthauser

                                            Dr Josef Karthauser – Joe is a seasoned technologist and former hacker who experiments with the limitations of systems for intellectual curiosity.  He was an early pioneer in the commercialisation of the internet and has been a trusted player in the open-source community since it began in the early ’90s.

                                                Professor Bill O’Riordan

                                                Professor Bill O’Riordan– FREng FInstP FBCS FICS (Hon) FBCS FCGI CEng CITPBill was previously Chief Scientist and Head of Research of ICL/FUJITSU, Chairman of the ECRC (European Computer Research Centre) in Munich. Chairman of APM in Cambridge (later acquired by the CITRIX Corporation. Former Chairman of PARC Technologies at imperial College. Bill has held the position of Non Executive Director on several companies. An Advisor to two International Governments on Science and Technology Strategies. He has also had many advisory roles to the European Commission on Science and Technology initiatives especially Bio-computing. Currently concerned with the security of embedded controllers in scientific and engineering systems and as an advisor to several hitech startups”.

                                                   

                                                  Leave a Comment