This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

John Reid welcomes Cyber Security Strategy, but suggests key changes

Share this article:

The cyber security strategy has been welcomed by the chair of the Institute of Security and Resilience Studies, but he claims far more could have been included.

Speaking at the Cyber Security Summit in London, former Home Secretary and former Defence Secretary John Reid said the strategy balances well with the enrichment and endangering power of cyber space.

He said: “The internet brings us huge human opportunity for progress, but also for industrial espionage for terrorist threats and also with the intervention of industrial control systems. These are the beginnings of a grand strategy, particularly economic, to meet a common objective.”

However, he claimed that in the distribution of the £650m fund, he could not understand why the Department of Business, Innovation and Skills would receive only two per cent.

He said: “This is unfortunate because we cannot and will not catch up if investment lacks depth. Cyber investment is not unnecessary, it is an essential element of any growth strategy. Innovation and entrepreneurial skills are not only the centre of security, they are today and tomorrow's growth in our economy.

“I regard the document as a big step forward, but even the biggest step forward leaves us behind the game as cyber is not a new technology; it is more than a medium, it is an environment.

“It brings huge advantages in innovation, but it is difficult to control. The internet is transnational, dynamic and constantly changing, it is inherently subversive, so the government must lead a project – but it cannot manage the challenges on its own.”

Finally he pointed to examples set by the US which the UK should follow, specifically with the economy being included in the strategy, and to create a version of Silicon Valley. “I hope these suggestions are accepted by the government as they will add further steps to addressing the challenges of cyber space,” he said.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Belgacom says alleged GCHQ APT attack cost firm £12 million

Belgacom says alleged GCHQ APT attack cost firm ...

One year on from a nation-state APT which infected 26,000 machines across 124 systems at telecom operator Belgacom and the firm has detailed the cost and manpower involved in the ...

CryptoWall compromises 40,000 UK citizens

CryptoWall compromises 40,000 UK citizens

Research just published claims to show that ransomware - in the shape of CryptoWall - is still generating healthy volumes of income for the cyber-criminals behind the code.

Microsoft pulls Windows 7 and Windows Server 2008 elements of Patch Tuesday

Microsoft pulls Windows 7 and Windows Server 2008 ...

Microsoft has unexpectedly withdrawn a key element of its Patch Tuesday operating system refresh after discovering a flaw in an update for Windows 7 and Windows Server 2008.