Britain's National Cyber Security Strategy Beyond 2021

With the UK midway through its second National Cyber Security Programme, focus now needs to consider future strategy beyond the conclusion of the current cycle in 2021. 

Clearly much has been achieved in the UK this decade, from the ever-widening network of GCHQ-accredited Academic Centres of Excellence (ACE) across the country, a gradual re-addressment of STEM  (science, technology, engineering and mathematics) subjects in schools, through to the organisational innovation in setting up the National Cyber Security Centre (NCSC). 

The UK has certainly not rested on its laurels in addressing cyber security at the national level. Despite these strides, however, this overwhelmingly domestic focus has left a critical gap that now needs to be addressed: the international arena. 

The global WannaCry attack of 2017 should serve to reveal a reality not to be ignored; that UK resilience, no matter how well constructed, can only offer a reactive ‘band aid’ in a global environment where cybercrime remains rampant and international law is not respected. That environment cannot be allowed to develop without the influence of leading democracies.

To that end, a series of questions should help shape the agenda for an international approach to the next cyber security strategy, chief among them being ‘in what ways can the UK better influence norms and rules in cyberspace?’ While it is excellent to have a developing pipeline of STEM talent to plug the skills gap across cyber security, the professionals of tomorrow will be overrun if the international environment is either lawless or shaped by fundamentally authoritarian norms. 
Serious and concerted political support to efforts like the UN Groups of Government Experts (GGE) is essential to begin rebuilding momentum on dialogue such as the ‘finding the rules of the road’ initiative championed by then Foreign Secretary William Hague at the 2011 Munich Security Conference. 

Alignment with the efforts of NATO to find suitably applicable international law would be another fruitful avenue of not only finding consensus, but working within existing alliance frameworks. 

Consensus should very much be built among allies to strengthen any hand at future UN GGE processes. The platforms to advance the agenda already exist; what is missing is ‘bandwidth’ at the top level of British politics to contribute as needed.

The Missing Dimension in UK Cyber – Our Values
A critical point should be established in the development of cyber security strategy, by refocusing attention on the values that were set out in the 2011–15 strategy. For the UK to meaningfully contribute in shaping norms, it must promote itself both tangibly through the export of technical expertise and products, but also lead the way in establishing a standard for what behaviour a liberal democracy abides by and expects in cyberspace.

Shaping the international agenda for cyberspace should in the next strategy be as much about aligning the rights of citizens based on core values, the balance between privacy and security paramount among them, as it should be centred on technical requirements such as ‘secure by design’ for consumers of new tech products. What rights and values does a liberal democratic society subscribe to in the Information Age? To focus on technology without also focusing on the rights of the citizenry risks ceding the political ground entirely to a competing political position.

The New Great Game – The Threat from Cyber Sovereignty
While it may seem an indulgence to focus on norms and not purely on technology, the reasoning lies not in pure abstraction, but in the recognition that the liberal view is under direct challenge from a competing political belief set, Cyber Sovereignty. 

Championed by Russia and China, this view directly disputes the multi-stakeholder model that has so far been effective in governing cyberspace, calling instead for direct and exclusive management of cyberspace by nation states. This viewpoint poses a direct threat to the type of cyberspace that was not only originally created by liberal states and underpinned by liberal values, but also any future cyberspace. 

Next Steps and Challenges
Two key challenges must be navigated as the next steps in building towards a 2021 cyber security strategy: Brexit; and strategic alignment. In the first instance, Brexit remains the known unknown in the short term, an issue really only because of its uncertainty. 

One certainty that can be established, however, is that cyber security remains important regardless of Brexit, and thinking can afford to progress in an almost agnostic manner. When the last strategy was written the idea of a Brexit referendum was not even a political likelihood, the next one must be prepared without worrying about how Brexit may conclude.

This leaves the core challenge of establishing broad strategic alignment. Any future strategy needs to be assessed against a clear political vision for what the UK wants to achieve globally, based on a foundational value set. Strategy is instrumental in nature, helping to turn political vision into reality; UK political leaders must specify an international political vision against which a cyber security strategy can orient its mission effectively. 

Without this broad vision underwritten by clear values, the next cyber security strategy risks becoming merely a budgetary exercise that fails to shape the international dynamics framing the development of cyber security for decades to come.

RUSI

You Might Also Read:

Britain Aims To Lead In CyberSecurity:

 

« FBI Takes Too Long To Alert Victims
Top Blockchain Challenges For CIOs »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

SureStack

SureStack

SureStack is an AI-native cybersecurity platform that provides organizations with continuous validation, optimization, and real-time security of their cybersecurity stacks.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.