The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit deal, but what does this man for cyber security in the UK? 
 
Analysts have begun to dig in to the detail of the newly published trade deal that will govern commercial relationships between the two sovereign entities after the 31st of December and amongst the tortured legal language, the overall aim is to promote cooperation on cyber security while ensuring the autonomy of the  European Union and the United Kingdom's decision-making processes.
 
On page 363 of the Agreement there is a section TITLE II: CYBER SECURITY  Article CYB.1: Dialogue on cyber issues where the text reads as: ‘The Parties shall endeavour to establish a regular dialogue in order to exchange information about relevant policy developments, including in relation to international security, security of emerging technologies, internet governance, cybersecurity, cyber defence and cyber crime. 
 
1. Where in their mutual interest, the Parties shall cooperate in the field of cyber issues by sharing best practices and through cooperative practical actions aimed at promoting and protecting an open, free, stable, peaceful and secure cyberspace based on the application of existing international law and norms for responsible State behaviour and regional cyber confidence-building measures. 
 
2. The Parties shall also endeavour to cooperate in relevant international bodies and forums, and endeavour to strengthen global cyber resilience and enhance the ability of third countries to fight cyber crime effectively. 
Cooperation with the EU Computer Emergency Response Team
 
The EU and the national UK computer emergency response team shall cooperate on a voluntary, timely and reciprocal basis to exchange information on tools and methods, such as techniques, tactics, procedures and best practices, and on general threats and vulnerabilities. 
 
The relevant national authorities of the United Kingdom may participate at the invitation, which the United Kingdom may also request, of the Chair of the Cooperation Group in consultation with the Commission, in the following activities of the Cooperation Group: 
 
  • Exchanging best practices in building capacity to ensure the security of network and information systems; 
  • Exchanging information with regard to exercises relating to the security of network and information systems; 
  • Exchanging information, experiences and best practices on risks and incidents; 
  • Exchanging information and best practices on awareness-raising, education programmes and training; and 
  • Exchanging information and best practices on research and development relating to the security of network and information systems. 
Any exchange of information, experiences or best practices between the Cooperation Group and the relevant national authorities of the UK will be voluntary and, where appropriate, reciprocal. 
 
1. With a view to promoting cooperation on cyber security while ensuring the autonomy of the Union decision-making process, the United Kingdom may participate at the invitation, which the United Kingdom may also request, of the Management Board of the EU Cybersecurity Agency (ENISA), in the following activities carried out by ENISA: 
  • Capacity building; 
  • Knowledge and information
  • Awareness raising and education. 
2. The conditions for the participation of the United Kingdom in ENISA’s activities referred to in paragraph 1, including an appropriate financial contribution, shall be set out in working arrangements adopted by the Management Board of ENISA subject to prior approval by the Commission and agreed with the United Kingdom. 
 
3. The exchange of information, experiences and best practices between ENISA and the United Kingdom shall be voluntary and, where appropriate, reciprocal.’
 
In summary, cybersecurity issues were unlikely to be severely affected unlike other more contentious data sharing on criminal datasets, for instance. This proves to be the case. So there appears to be limited immediate impact on cyber security from this deal. However, it is likely to limit anything fruitful for the UK in the years to come, and it will depend on evolving legislation in the two jurisdictions on whether voluntary participation will continue (especially on things like the NIS Directive). 
 
The UK as a lone jurisdiction that will find itself increasingly steered by the EU’s movements on cyber security and global conditions rather than being at a larger table. 
 
This means that although little will change in the short to medium term - apart from detailed sharing of data, which could impact immediate threats - as cyber security is rapidly evolving, national influence in cyber security will be increasingly limited and will force the UK into equivalence if it wishes to compete in some areas.
 
At the hardest end of the spectrum of cyber threats, cooperation between national intelligence agencies will not be directly affected by Brexit. GCHQ will continue to play its role, including through its extensive network of international partnerships. The UK will still wield significant influence.
 
Overall, however, the picture is mixed. There are ways to mitigate the disruption to the excellent cooperation on cyber security built up with European Partners over recent years, but it will require imagination and  effort and there is an important industrial and commercial dimension, around digital standard setting, that shouldn’t be overlooked, even as we work though issues of quotas, tariffs and rules of origin.
 
AC Dwyer:            European Union:           UK In A Changing Europe:
 
You Might Also Read:
 
Britain's New Regime For Online Platforms:
 
« How to Close the Global Cybersecurity Skills Gap: Two Easy Steps
Cyber Security In 2021 - Predictions & Trends »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.