Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

National Security Strategy report highlights steady evidence of need for cyber spending

by The Gurus
March 4, 2015
in Editor's News
Share on FacebookShare on Twitter

Cyber is the only area of the National Security Strategy to show efficient evidence of defence spending.
 
According to the Government’s six-monthly Strategic Defence and Security Review (SDSR), funding decisions on conventional defence and cyber capabilities must reflect the need for deterrence.
 
The report claimed that after cyber security was deemed to be a tier one risk in 2010, and with a 20 year timescale for the National Security Strategy, spending on climate change, flooding and cyber may be required to rise substantially above inflation, particularly once infrastructure costs for adaptation work begin.
 
Margaret Beckett MP, chair of the Joint Committee on the National Security Strategy (JCNSS), said that as part of the next National Security Strategy, the Government should look at how spending in security-related areas is likely to have to change over the next 20 years, but cyber is the only area that shows clear evidence for Government spending.
 
Beckett said: “We are very keen to see the next National Security Strategy acting as a truly useful document for cross-Government security planning, particularly as a tool to allow for flexible policy, taking into account potential developments in domestic and international affairs.
 
“We have urged the Government to engage with a range of people – experts, the public and our Committee – when preparing the National Security Strategy, and also to take an active role in public engagement, to ensure that the British public understand the thinking behind our national security strategy.”
 
Mark Brown, executive director in the Cyber Security & Business Resilience at EY, told IT Security Guru: “The National Security Strategy report reaffirms the decision of the UK Government to recognise cyber security and organised crime as a “Tier One” national risk. The ongoing reporting of security breaches both nationally and internationally continues to demonstrate the clear and present danger to organisations across both public and private sector from cyber threats.
 
“The UK national cyber security strategy has therefore provided a proactive vehicle for Government to engage with business leaders across the UK and globally to raise awareness of the threat from cyber crime. The recognition within the National Security Strategy report that spending on cyber crime will continue to rise at levels above inflation reflects the mood across private sector, where spending by organisations also continues to rise.”

FacebookTweetLinkedIn
Tags: CyberGovernmentNSS
ShareTweetShare
Previous Post

SIEM – more than a reporting tool, and useful as a control method?

Next Post

No evidence of FREAK exploits and no patches should not cause complacency

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information