Research Reports & Position Papers
Stress and Burnout in the cyber security industry – This report published by CREST looks for solutions to the increasing problems of stress and burnout among many cyber security professionals, often working remotely in high-pressure and under-resourced environments.
Bug Bounties – Working Towards a Fairer and Safer Marketplace With rapid growth in the bug bounty marketplace, the CREST Bug Bounties Report explores good and bad practice to establish how to better understand bug bounty programmes and how they fit into the wider technical assurance framework. It also highlights the need to provide advice to buyers of bug bounty services and protect the interests.
Autism and the technical security industry – The technical security industry needs to develop the skills of its workforce to combat new threats and encourage new talent into the industry. The industry values some of the attributes associated with autism and already employs people formally on the Spectrum. However, young autistic people do not always realise that the technical security industry exists nor of the career opportunities it presents. CREST’s report looks at the background and opportunities.
CREST and NCA Cyber Crime Report – CREST member companies met the National Crime Agency’s National Cyber Crime Unit (NCA NCCU) to assist in their efforts to prevent young people being tempted to participate in illegal online activities. The discussion paper is now available.
Industrial Control Systems Technical Security Assurance – This Position Paper presents the findings from a CREST project on the Technical Security Assurance of Industrial Control Systems (ICS). It is based on detailed research and includes insights, commentary and analysis garnered from subject matter experts through: Requirements and validation workshops held at CREST member facilities; Desktop review of published literature on ICS security; and ICS security testing.
Closing the Gender Gap in Cyber Security – CREST releases report exploring the reasons behind the lack of gender diversity in cyber security and looking at ways to drive change.