I received an email from Scott Borg, Director and Chief Economist of the U.S. Cyber Consequences Unit which is an independent research group that supplies the U.S. Department of Homeland Security with information on the consequences of cyber-attacks and evaluate the cost-effectiveness of countermeasures in place to prevent such attacks. As part of this research, the U.S. Cyber Consequences Unit recently published its “Cyber-Security Check List” and Scott was advising me that the final version is now available.
This list is a comprehensive guide to help those responsible for managing the security of their information and is broken down into the following categories, hardware, software, networks, automation, humans and suppliers.
I reviewed earlier drafts of this document and provided feedback and insight which has been incorporated into the final version. Indeed Scott went to say in his email that “Your comments on the early drafts were among the most astute and useful that we received!” and “We are very grateful for your contributions to improving the world’s cyber security!“
The US Cyber Consequences Unit have made the list available for posting on any responsible website and is available for download at BH Consulting’s site here.
The US CCU are also interested in hearing from people who might want to translate this check list into other languages and who have the technical understanding necessary to do so. If you know of anyone who would be willing to translate the checklist so that it can be used by others please let me know and I will pass their details onto Scott Borg.