Feeds

IT bods to prove their prowess in bed with spooks

Got the talent to fix UK.gov's assets?

Secure remote control for conventional and virtual desktops

The British Computer Society has launched a pilot scheme to certify information assurance professionals in government.

The full scheme will be launched in January 2012 and will focus on developing and delivering an Information Assurance Specialist Certification Scheme for anyone working in a government department or those working on government contracts.

According to the BCS, the scheme will offer three levels of certification for practitioners, senior practitioners and lead practitioners. It will cover six information assurance roles identified by CESG: security and information risk advisor, security architect, accreditor, information assurance auditor, IT security officer, and communications security officer.

The contract to deliver the scheme was awarded to the BCS by CESG, the information assurance agency of GCHQ and the UK's national technical authority for information assurance.

David Clarke, chief executive officer at the BCS, said: "Having won the contract in September, we're now starting a pilot stage to ensure that our processes allow information assurance specialists to achieve the grade of certification they need to work on government projects."

He invited anyone interested in scheme to register their interest so they can receive information when it opens fully next year.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.