Britain's National Cyber Security Strategy Beyond 2021

With the UK midway through its second National Cyber Security Programme, focus now needs to consider future strategy beyond the conclusion of the current cycle in 2021. 

Clearly much has been achieved in the UK this decade, from the ever-widening network of GCHQ-accredited Academic Centres of Excellence (ACE) across the country, a gradual re-addressment of STEM  (science, technology, engineering and mathematics) subjects in schools, through to the organisational innovation in setting up the National Cyber Security Centre (NCSC). 

The UK has certainly not rested on its laurels in addressing cyber security at the national level. Despite these strides, however, this overwhelmingly domestic focus has left a critical gap that now needs to be addressed: the international arena. 

The global WannaCry attack of 2017 should serve to reveal a reality not to be ignored; that UK resilience, no matter how well constructed, can only offer a reactive ‘band aid’ in a global environment where cybercrime remains rampant and international law is not respected. That environment cannot be allowed to develop without the influence of leading democracies.

To that end, a series of questions should help shape the agenda for an international approach to the next cyber security strategy, chief among them being ‘in what ways can the UK better influence norms and rules in cyberspace?’ While it is excellent to have a developing pipeline of STEM talent to plug the skills gap across cyber security, the professionals of tomorrow will be overrun if the international environment is either lawless or shaped by fundamentally authoritarian norms. 
Serious and concerted political support to efforts like the UN Groups of Government Experts (GGE) is essential to begin rebuilding momentum on dialogue such as the ‘finding the rules of the road’ initiative championed by then Foreign Secretary William Hague at the 2011 Munich Security Conference. 

Alignment with the efforts of NATO to find suitably applicable international law would be another fruitful avenue of not only finding consensus, but working within existing alliance frameworks. 

Consensus should very much be built among allies to strengthen any hand at future UN GGE processes. The platforms to advance the agenda already exist; what is missing is ‘bandwidth’ at the top level of British politics to contribute as needed.

The Missing Dimension in UK Cyber – Our Values
A critical point should be established in the development of cyber security strategy, by refocusing attention on the values that were set out in the 2011–15 strategy. For the UK to meaningfully contribute in shaping norms, it must promote itself both tangibly through the export of technical expertise and products, but also lead the way in establishing a standard for what behaviour a liberal democracy abides by and expects in cyberspace.

Shaping the international agenda for cyberspace should in the next strategy be as much about aligning the rights of citizens based on core values, the balance between privacy and security paramount among them, as it should be centred on technical requirements such as ‘secure by design’ for consumers of new tech products. What rights and values does a liberal democratic society subscribe to in the Information Age? To focus on technology without also focusing on the rights of the citizenry risks ceding the political ground entirely to a competing political position.

The New Great Game – The Threat from Cyber Sovereignty
While it may seem an indulgence to focus on norms and not purely on technology, the reasoning lies not in pure abstraction, but in the recognition that the liberal view is under direct challenge from a competing political belief set, Cyber Sovereignty. 

Championed by Russia and China, this view directly disputes the multi-stakeholder model that has so far been effective in governing cyberspace, calling instead for direct and exclusive management of cyberspace by nation states. This viewpoint poses a direct threat to the type of cyberspace that was not only originally created by liberal states and underpinned by liberal values, but also any future cyberspace. 

Next Steps and Challenges
Two key challenges must be navigated as the next steps in building towards a 2021 cyber security strategy: Brexit; and strategic alignment. In the first instance, Brexit remains the known unknown in the short term, an issue really only because of its uncertainty. 

One certainty that can be established, however, is that cyber security remains important regardless of Brexit, and thinking can afford to progress in an almost agnostic manner. When the last strategy was written the idea of a Brexit referendum was not even a political likelihood, the next one must be prepared without worrying about how Brexit may conclude.

This leaves the core challenge of establishing broad strategic alignment. Any future strategy needs to be assessed against a clear political vision for what the UK wants to achieve globally, based on a foundational value set. Strategy is instrumental in nature, helping to turn political vision into reality; UK political leaders must specify an international political vision against which a cyber security strategy can orient its mission effectively. 

Without this broad vision underwritten by clear values, the next cyber security strategy risks becoming merely a budgetary exercise that fails to shape the international dynamics framing the development of cyber security for decades to come.

RUSI

You Might Also Read:

Britain Aims To Lead In CyberSecurity:

 

« FBI Takes Too Long To Alert Victims
Top Blockchain Challenges For CIOs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.