The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit deal, but what does this man for cyber security in the UK? 
 
Analysts have begun to dig in to the detail of the newly published trade deal that will govern commercial relationships between the two sovereign entities after the 31st of December and amongst the tortured legal language, the overall aim is to promote cooperation on cyber security while ensuring the autonomy of the  European Union and the United Kingdom's decision-making processes.
 
On page 363 of the Agreement there is a section TITLE II: CYBER SECURITY  Article CYB.1: Dialogue on cyber issues where the text reads as: ‘The Parties shall endeavour to establish a regular dialogue in order to exchange information about relevant policy developments, including in relation to international security, security of emerging technologies, internet governance, cybersecurity, cyber defence and cyber crime. 
 
1. Where in their mutual interest, the Parties shall cooperate in the field of cyber issues by sharing best practices and through cooperative practical actions aimed at promoting and protecting an open, free, stable, peaceful and secure cyberspace based on the application of existing international law and norms for responsible State behaviour and regional cyber confidence-building measures. 
 
2. The Parties shall also endeavour to cooperate in relevant international bodies and forums, and endeavour to strengthen global cyber resilience and enhance the ability of third countries to fight cyber crime effectively. 
Cooperation with the EU Computer Emergency Response Team
 
The EU and the national UK computer emergency response team shall cooperate on a voluntary, timely and reciprocal basis to exchange information on tools and methods, such as techniques, tactics, procedures and best practices, and on general threats and vulnerabilities. 
 
The relevant national authorities of the United Kingdom may participate at the invitation, which the United Kingdom may also request, of the Chair of the Cooperation Group in consultation with the Commission, in the following activities of the Cooperation Group: 
 
  • Exchanging best practices in building capacity to ensure the security of network and information systems; 
  • Exchanging information with regard to exercises relating to the security of network and information systems; 
  • Exchanging information, experiences and best practices on risks and incidents; 
  • Exchanging information and best practices on awareness-raising, education programmes and training; and 
  • Exchanging information and best practices on research and development relating to the security of network and information systems. 
Any exchange of information, experiences or best practices between the Cooperation Group and the relevant national authorities of the UK will be voluntary and, where appropriate, reciprocal. 
 
1. With a view to promoting cooperation on cyber security while ensuring the autonomy of the Union decision-making process, the United Kingdom may participate at the invitation, which the United Kingdom may also request, of the Management Board of the EU Cybersecurity Agency (ENISA), in the following activities carried out by ENISA: 
  • Capacity building; 
  • Knowledge and information
  • Awareness raising and education. 
2. The conditions for the participation of the United Kingdom in ENISA’s activities referred to in paragraph 1, including an appropriate financial contribution, shall be set out in working arrangements adopted by the Management Board of ENISA subject to prior approval by the Commission and agreed with the United Kingdom. 
 
3. The exchange of information, experiences and best practices between ENISA and the United Kingdom shall be voluntary and, where appropriate, reciprocal.’
 
In summary, cybersecurity issues were unlikely to be severely affected unlike other more contentious data sharing on criminal datasets, for instance. This proves to be the case. So there appears to be limited immediate impact on cyber security from this deal. However, it is likely to limit anything fruitful for the UK in the years to come, and it will depend on evolving legislation in the two jurisdictions on whether voluntary participation will continue (especially on things like the NIS Directive). 
 
The UK as a lone jurisdiction that will find itself increasingly steered by the EU’s movements on cyber security and global conditions rather than being at a larger table. 
 
This means that although little will change in the short to medium term - apart from detailed sharing of data, which could impact immediate threats - as cyber security is rapidly evolving, national influence in cyber security will be increasingly limited and will force the UK into equivalence if it wishes to compete in some areas.
 
At the hardest end of the spectrum of cyber threats, cooperation between national intelligence agencies will not be directly affected by Brexit. GCHQ will continue to play its role, including through its extensive network of international partnerships. The UK will still wield significant influence.
 
Overall, however, the picture is mixed. There are ways to mitigate the disruption to the excellent cooperation on cyber security built up with European Partners over recent years, but it will require imagination and  effort and there is an important industrial and commercial dimension, around digital standard setting, that shouldn’t be overlooked, even as we work though issues of quotas, tariffs and rules of origin.
 
AC Dwyer:            European Union:           UK In A Changing Europe:
 
You Might Also Read:
 
Britain's New Regime For Online Platforms:
 
« How to Close the Global Cybersecurity Skills Gap: Two Easy Steps
Cyber Security In 2021 - Predictions & Trends »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.