CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES

Officially Supported By: Defence Contracts International Supply2Defence

Official Media Partners for:

Resilience: Is it time to reconsider Information Assurance thinking, given the pace of changes we are seeing in cyber and communications? 

In the second in our special features marking Cyber Awareness Week, James Gray, Managing Director - Cyber and Intelligence at Raytheon UK, takes a look at a number of different strategies that could be employed to strengthen the Ministry of Defence’s cyber security. 

The Ministry of Defence’s Cyber Vulnerability Investigation (CVI) Programme has been a welcome and sensible investment to help the MOD understand its cyber risk profile across platforms and systems. 

Whilst the programme’s focus continues to evolve more towards the understanding of cyber risk and its operational impact across the MOD’s enterprise, and potentially towards investment into mitigations, the emerging wider cyber defence strategy could also consider a number of other thought leadership aspects to enhance the MOD’s security posture. 

One of the accepted premises behind CVIs is that ‘the adversary hackers do not read the IA manual; they think ‘out of the box’ in a way that IA professionals and security architects have been unable to, often because of prescriptive processes. There is now an increasing sense that traditional IA and pen-testing are not holistic enough and are based on antiquated processes and thinking; processes which are focused towards proprietary systems where the authority ‘owns’ a system end to end. Modern IoT or IPenabled, or even Modular Open System Architecturebased systems have different risks and benefits. 

As an example, there is increasing awareness about how much information the West publishes online about their systems, capabilities, operations and personnel. Are we making it easy for adversaries to target individuals and to gain access to our Military IPR and systems? Because of the legal jurisdictions in the UK, our adversaries may exploit us more easily and rapidly than we can them. We could consider it time to review law such as the Computer Misuse Act, for instance. Is it time that List-X companies should be able to look for vulnerabilities for the greater good? 

Should we also consider that in a rapidly evolving Modular Open System Architecture and Software Defined Agile environment, we are faced with IA practices that often take years to gain accreditation, which is often prohibitively expensive. IA is also challenged with the modular nature of modern systems. Often by the time accreditation has been gained, the rest of the world’s technology has moved on and the MOD has to work out how to keep up with this pace of change. Conversely the pace of change in itself may be a useful element of security. If the MOD’s IT and communications were at the cutting edge within Software Defined systems, it would take time for adversaries to develop exploits. By the time they do, systems could have evolved, and the exploits would no longer be relevant. These new Software Defined systems offer both new vulnerabilities and also new security advantages.  

Considering Secure by Design, before new systems are devised is also an area which is under consideration. Could MOD’s capability and supply chain be enhanced by having access to information about the top ten risks which the CVI Programme has unearthed? Conventional wisdom suggests that these will closely mirror the NCSCs top ten risks, but perhaps by baking in these lessons the MOD supply chain could help add cyber security earlier in due processes, reducing cost and cyber risk. Conversely, it is also worth considering the possibility that basic cyber hygiene factors such as knowing your base-line and patching, whilst often not seen as the cutting edge of cyber security, offer a greater return than investing in hot topics like Machine Learning. 

We should perhaps also learn from the Enigma story from a different angle, in that failing to think ‘outside the box’ and to invest in more secure communications led to disaster for both sides during World War II. Whilst German communications were turned against them by the genius of Bletchley Park, a lack of investment in secure communications for the Royal Navy and merchant shipping left them vulnerable to German signals interception in the first place, with the Wolf-packs being vectored to allied shipping.  

Perhaps it is time we turn some of that still evident UK genius towards the resilience challenge, and to think ‘outside the box’ to gain information advantage in this rapidly changing field. 

If you would like to join our community and read more articles like this then please click here.

Cyber Essentials is a government-backed, industry-supported scheme. It helps businesses win more public sector contracts, by ensuring that they comply with mandatory requirements for cyber security. To learn more click here.

Cyber Vulnerability Investigation Ministry of Defence Raytheon

Post written by: Matt Brown


LATEST STAKEHOLDER

Become a Stakeholder today and benefit from an exclusive marketing package which will allow you to:

  • Engage with active defence buyers and key supply chain partners
  • Create your own branded micro-site which within Defence Online which is managed by you
  • Have a dedicated Digital Account Manager to help enhance your Stakeholder page
  • Promote your news, products, press releases, eBooks and Videos as a Defence Online partner which feeds through to our homepage and social media channels
  • Have your company promoted on our partner website Defence Contracts Online (DCO)
  • All news promoted in mynewsdesk, a major hub for all of our news articles which enables news to be picked up from trade magazines, national newspapers and many other publications which offers extra exposure at no additional cost!

Contact us today or call us on 0845 557 1315 to take advantage of this exclusive marketing package


.

RELATED ARTICLES

Industry and academia asked to join £1 billion drive to bolster UK hypersonic capability

December 13, 2023

Air - Industry and academia asked to bolster UK hypersonic capability

Industry and academia interested in developing advanced hypersonic missile capabilities have been encouraged to apply for a place on the

MOD signs infrastructure contracts at RAF Waddington

December 11, 2023

Air - MOD signs infrastructure contracts at RAF Waddington

The MOD have signed contracts to provide new and refurbished infrastructure for the Red Arrows at their new home of