What Might ‘Brexit’ Mean For Cybersecurity In The UK?

After 43 years of inclusion, the UK has voted to leave the European Union in the historically unprecedented “Brexit” referendum vote. Aside from causing uncertainty in the world’s financial markets and across the political landscape, the result has implications for cybersecurity too.

While some cybersecurity pros say that Brexit will have little ill effect on the space, others aren't so sure. For one, Michaela Menting, research director for ABI Research, noted that the UK will need to review its role Europol and the European Cybercrime Centre (EC3), which is the focal point in the EU’s fight against cybercrime.

“Organized online criminal activities are undeniably best tackled from a cooperative, supra-national perspective, and the UK’s isolation that may result from Brexit would be an unwelcome development in the fight against cybercrime,” she said. “Further to this, new cybersecurity information and asset sharing structures will need to be put in place between the EU and the UK.”

There may also be a dampening impact on the country with regards to the UK workforce skills pool.

Brian Spector, CEO of Miracl, a cybersecurity firm based and operating in UK, told the International Business Times, "The UK has a well-documented shortage of tech talent that means it simply cannot compete globally without tapping into highly-skilled overseas workers. Splitting away from Europe would make it even more difficult for UK tech firms to compete with the US tech giants, because their talent pool would be so much larger than ours. To cut ourselves off from the rest of Europe therefore does nothing to protect the UK's reputation as being open for business."

Companies are also evaluating whether to keep outposts in the post-Brexit capital.

"Our R&D department in Shoreditch, London, comprises of developers from several different EU nations—including Italy, Finland and Germany," Jamie Moles, security consultant for Lastline, American cybersecurity firm, told the International Business Times. “These guys live and work in London and travel around Europe for research purposes—as well as to return home to visit family. 

There is an obvious concern post-Brexit that the rules might change regarding their ability to stay in the UK and or travel freely around Europe. We will have to wait and see if these concerns are founded or not and will of course support our team to remain employed and productive.”

From a data privacy and protection perspective, there’s also the question of whether the UK will align with the upcoming GDPR and NIS Directive. Further, according to Menting, the decision whether to retroactively repeal or keep all past EU legislation adopted to date for data protection and privacy.

“Currently, all EU laws still apply in the UK; at least over the course of the next two years as the UK untangles itself from the Union,” she said. “However, the UK will need to determine not only whether they will (unilaterally) implement similar legislation in the future.”

There are directives on e-commerce and data protection that date back to the early 2000s, the EU Directive on Data Retention from 2006, and the Directive on Attacks against Information Systems, adopted in August 2013. The UK has adapted all of these in some shape or form into national legislation.

“The UK will have to rule on the continued applicability of these instruments, as well as how they will address the incoming GDPR and NIS Directive,” Menting said.

Many US companies find the EU regulations onerous and an impediment to trans-Atlantic commerce; which on the one hand would point to Brexit being helpful from a US trade perspective. However, both the GDPR and the NIS Directive state that operators and data controllers will be covered by the legislative requirements if they operate within EU markets and involve EU citizens—which leaves Britain in a position of little power to forge its own path.

“Seeing the high level of trade that the open market has brought in the UK in the past four decades, many UK organizations will need to comply if they want to continue trading and operating in EU markets,” she said. 

She said that the EU stands to lose in a lack of free-flowing resources too—especially when it comes to the UK’s allocation of funding to cybersecurity startups.

“While the UK government has placed significant investments in the cybersecurity startup scene in the past few years, it is also uncertain whether this funding will continue to be allocated to EU and UK firms indiscriminately as it has in the past,” the analyst noted. “it would be unfortunate, and detrimental to the cybersecurity industry in the long run, for the UK to take a
similar direction with these currently highly successful investment projects.”

Despite the uncertainty around these issues, it's important to keep a level head, according to AN Ananth, CEO of EventTracker. “Brexit is affecting everything," he told Infosecurity via email. "Security always suffers in times of uncertainty. What’s happened is unprecedented and there is a lot of confusion as to the next steps. This is the kind of chaotic environment in which insecurity thrives."

He added, "This is reminiscent of 2008 when the US financial system suffered. That type of environment hurts security, which is already hard enough to maintain. At times like this, process and discipline can help. You should train like you fight, because you’ll fight like you train, as the saying goes. I would recommend that everyone keep calm and carry on.”

Infosecurity

« Lessons Learned From Major Healthcare Breaches
Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.