Salus Cyber
Speciality: CHECK Penetration Testing
Cybersecurity company based in the United Kingdom; specializes in penetration testing, incident response, data protection, and security strategy; 25 employees with 9.4% YoY growth; founded in 2017; offers comprehensive security services including ethical penetration testing and compliance testing.
CHECK Certification
The CHECK (CHecklist Evaluating Computers and Key security) scheme was established by CESG (the UK government's National Technical Authority for Information Assurance, now part of the National Cyber Security Centre) in 1997. It was created to provide a structured framework for conducting information technology security assessments and penetration testing within UK government and critical national infrastructure environments. The scheme was designed to ensure that individuals performing security testing on sensitive systems possessed verified skills and adhered to established standards and methodologies.
The CHECK certification is highly valued because it represents government-endorsed validation of a security professional's ability to conduct rigorous, methodical security assessments. Organizations handling sensitive government data or operating within critical national infrastructure sectors often require CHECK-certified testers to ensure compliance with UK security standards. The certification's importance stems from its strict vetting process, which includes security clearance requirements and demonstration of technical competency, making CHECK holders trusted to access and test sensitive systems where standard commercial certifications may not suffice.
CREST Cybersecurity Certification
Origin
CREST (Council of Registered Ethical Security Testers) was established in 2006 in the United Kingdom by a group of cybersecurity professionals and industry representatives. It was created to address the growing need for standardized, recognized qualifications in penetration testing and cybersecurity services. The organization emerged from concerns about the quality and professionalism of security testing services, aiming to provide a framework that would certify both individual practitioners and the companies that employ them.
Industry Value
CREST certifications are highly valued in the cybersecurity industry because they demonstrate a practitioner's technical competence and adherence to professional ethical standards. Many government agencies, financial institutions, and large corporations specifically require CREST-certified professionals when procuring penetration testing or security assessment services. The certification provides assurance to employers and clients that certified individuals have been independently verified to possess the necessary skills and knowledge, and that they follow established codes of conduct. This makes CREST credentials particularly important for cybersecurity professionals working in regulated industries or seeking to work with organizations that have stringent security requirements.
Cyber Essentials Plus
Origin
Cyber Essentials Plus was created by the UK Government in 2014 in collaboration with the National Cyber Security Centre (NCSC), which is part of GCHQ. The scheme was developed in response to the growing threat of cyber attacks against UK businesses and organizations. It was designed to help organizations of all sizes implement basic cybersecurity controls to protect against the most common internet-based cyber threats, with the "Plus" variant including hands-on technical verification by qualified assessors.
Industry Value
Cyber Essentials Plus is highly valued because it provides verified assurance that an organization has implemented fundamental cybersecurity controls effectively. Unlike the standard Cyber Essentials self-assessment, the Plus certification requires external testing and vulnerability scanning, making it more rigorous and credible. It's increasingly required for UK government contracts involving sensitive information and is recognized by insurance providers, clients, and partners as evidence of a serious commitment to cybersecurity. The certification helps organizations demonstrate due diligence, reduce cyber risk, and differentiate themselves in competitive bidding situations.
ISO 27001: Information Security Management Certification
Origin
ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.
Industry Value and Importance
ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.
CISM Certification: Origin
The Certified Information Security Manager (CISM) certification was created by ISACA (Information Systems Audit and Control Association) in 2003. ISACA developed CISM to address the growing need for a certification specifically focused on information security management and governance, rather than just technical security skills. The certification was designed to recognize professionals who design, manage, and oversee an enterprise's information security program, filling a gap between technical security certifications and the strategic, managerial aspects of cybersecurity.
Industry Value and Importance
CISM is highly valued in the cybersecurity industry because it demonstrates expertise in security risk management, governance, incident management, and program development from a management perspective. Many organizations, particularly large enterprises and government agencies, specifically seek CISM-certified professionals for leadership roles in information security. The certification is globally recognized and often commands higher salaries compared to non-certified peers. Its focus on aligning security practices with business objectives makes it particularly relevant for professionals aspiring to senior security management positions, including Chief Information Security Officer (CISO) roles.
CISA Certification Overview
Origin and History
The Certified Information Systems Auditor (CISA) certification was created by ISACA (Information Systems Audit and Control Association) in 1978. ISACA developed this credential in response to the growing need for standardized expertise in auditing, controlling, and securing information systems. As one of the oldest IT audit and security certifications available, CISA was designed to validate the knowledge and skills of professionals responsible for assessing an organization's IT and business systems vulnerabilities and implementing appropriate controls.
Industry Value and Importance
CISA is highly valued in the industry because it demonstrates a professional's ability to assess risk, implement controls, and ensure compliance with regulatory requirements. The certification is globally recognized and often required or preferred for roles in IT audit, cybersecurity, risk management, and compliance positions. Many organizations, particularly financial institutions, government agencies, and publicly traded companies, specifically seek CISA-certified professionals to meet internal audit requirements and regulatory obligations. The credential's emphasis on both technical knowledge and practical application makes it particularly relevant for professionals who need to bridge the gap between IT operations and business governance.
- West Ham United
- Global Defence Prime
- The Nelson Trust
- Shaype
- Festival Medical Services
- Department for Environment
- Food & Rural Affairs