Published on PublicTechnology.net (https://www.publictechnology.net)

Home > Public sector cyber procurement quadruples in five years

Public sector cyber procurement quadruples in five years

Written by Sam Trendall on 20 July 2020 in News
News

PublicTechnology research shows a big spike in the number of contracts awarded to IT security specialists by public-sector buyers

Credit: Adobe Stock

The number of cybersecurity-related contracts awarded by the public sector to external specialists has almost quadrupled in the last five years, PublicTechnology research [1] has found.

Analysis of data published on the GOV.UK Contracts Finder site shows that, during the 2015/16 year, the number of tenders and contract-award notices featuring the term ‘cyber’, or a variation thereof, stood at 61. 

Seven of these were worth in excess of £1m – among them the first iteration of the Crown Commercial Service’s Cyber Security Services framework. The buying vehicle, which came with a value of £40m, was created to allow public sector organisations to buy specialist services in seven areas: policy and standards; risk assessment; risk management; security architecture; information assurance methodologies; incident management; and audit and review.

By the 2019/20 year, the number of cyber-related procurement exercises had reached 222 – almost four times as many as in FY16.

The volume and proportion of £1m-plus contracts also shot up to 48 – a sevenfold increase on 2015/16.


Related content

  • How secure is government and should we have a right to know? [2]
  • Whitehall departments reported 500 personal data breaches to ICO in FY20 [3]
  • How big is the UK’s cyber skills gap? [4]

This included the third version of Cyber Security Services – which is now worth £151m – as well as a £250m framework for NHS entities to access incident response, consultancy, and security personnel from a total of 25 suppliers.

“The framework supports improved and enhanced cybersecurity across the public sector, addressing the threats, risks and vulnerabilities that may be encountered and ultimately enabling the safe and secure use of data to deliver improved public services,” NHS Digital said. “It will also offer an additional solution to support the existing portfolio of security solutions currently available.”

The growth in the volume and value cyber contracts awarded by public-sector bodies to external specialists has come alongside a growing awareness of cybersecurity issues and data-protection responsibilities – especially in light of the introduction of GDPR legislation in 2018.

In addition to a full breakdown of security procurement trends, elsewhere in the PublicTechnology research report [1] – based on freedom of information requests and analysis of government data – we reveal how many data breaches are suffered across healthcare, education, central and local government. We also have exclusive insight into what happens after a breach has occurred and what measures are required by the Information Commissioner’s Office.

Click here to download the full, 12-page report free of charge. [1]


The research [1] marks the conclusion of the PublicTechnology Cyber Week [5] project, hosted in association with CyberArk [6]. Click here to access [5] all the interview, feature, and analysis content published as part of the project.

 

About the author

Sam Trendal is editor of PublicTechnology

Tags
Contracts [7]
Cybersecurity [8]
Data [9]
Categories
Business and industry [10]
Defence and Security [11]
Education and skills [12]
Government and politics [13]
Health and social care [14]
Public order, justice and rights [15]
#block-views-events-popup-block{ position: fixed; bottom: -30px; padding: 25px 22px; width: 360px; max-width: calc(100% - 30px); text-align: center; border-radius: 0 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; -ms-transform: translateY(100%); -webkit-transform: translateY(100%); transform: translateY(100%); -webkit-transition: all .35s ease-in-out; transition: all .35s ease-in-out; z-index: 2; } #block-views-events-popup-block.show{ bottom:10px; transform:none; -webkit-transform:none; } #block-views-events-popup-block a.btn.btn--outlineWhite { border-color: #fff; color: #fff; background: transparent; } #block-views-events-popup-block .events-popup-close{ position: absolute; cursor: pointer; top: -30px; left: 0; height: 32px; padding: 7px 20px; border-radius: 4px 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; font-size: 13px; } #block-views-events-popup-block .events-popup-close .icon--events-popupClose{ padding-left: 10px; font-family: inherit !important; } #block-views-events-popup-block .icon--events-popupClose:before { content: ''; width: 12px; height: 12px; margin: -1px 7px 0 0; background: url(https://www.publictechnology.net/sites/www.publictechnology.net/themes/pubtech_override/img/close-thin.svg) center no-repeat; background-size: 10px; vertical-align: middle; position: absolute; left: 10px; top: 10px; } #block-views-events-popup-block .views-field.views-field-nid .field-content{ display:none; }

jQuery(window).load(function() { if(jQuery('#event-popup-nid').length){ var eventId = jQuery('#event-popup-nid').text(); jQuery.cookie('eventPageId',eventId); var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; var combinedValueValue = eventId+'-'+countCurrentValue; var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; jQuery.cookie('combinedValueName',combinedValueValue); const result = combinedValueValue.split('-'); if( result[1] <= 3 ) { jQuery('section#block-views-events-popup-block').addClass('show'); countCurrentValue = parseInt(result[1]) + 1; jQuery.cookie('countCurrentName',countCurrentValue); combinedValueValue = eventId+'-'+countCurrentValue; jQuery.cookie('combinedValueName',combinedValueValue); } jQuery('.events-popup-close').click(function(){ jQuery('section#block-views-events-popup-block').removeClass('show'); }); } });

(function(e,t,o,n,p,r,i){e.visitorGlobalObjectAlias=n;e[e.visitorGlobalObjectAlias]=e[e.visitorGlobalObjectAlias]||function(){(e[e.visitorGlobalObjectAlias].q=e[e.visitorGlobalObjectAlias].q||[]).push(arguments)};e[e.visitorGlobalObjectAlias].l=(new Date).getTime();r=t.createElement("script");r.src=o;r.async=true;i=t.getElementsByTagName("script")[0];i.parentNode.insertBefore(r,i)})(window,document,"https://diffuser-cdn.app-us1.com/diffuser/diffuser.js","vgo"); vgo('setAccount', '253344499'); vgo('setTrackByDefault', true); vgo('process');
Close
Sign up for our free daily newsletter
Register here
6472
Dods PublicTechnology.net is a Merit Group plc title

Quick Links

  • Home
  • News
  • Opinion
  • Features
  • Private Sector Insight
  • Cyber Week
  • White Papers
  • Events
  • On Demand Webinars
  • Partner Directory
  • About
  • Contact

Services

Dods People Dods Political Intelligence Dods ResearchDods EventsDods Training

Media & Publishing

PoliticsHome Parliament MagazineHolyroodThe House MagazineCivil Service WorldTraining Journal

About Dods

Dods Group Part of Merit Group Privacy Policy Terms & Conditions Advertising Sponsorship
Privacy PolicyTerms & ConditionsAdvertisingSponsorship Subscriptions
  • Registered office: 11th Floor
  • The Shard
  • 32 London Bridge Street
  • London SE1 9SG
  • Company number: 04267888
  • © Merit Group plc 2021

Source URL: https://www.publictechnology.net/articles/news/public-sector-cyber-procurement-quadruples-five-years

Links
[1] https://www.publictechnology.net/whitepaper/data-breaches-and-cyber-spending-%E2%80%93-tracking-public-sector-security-trends
[2] https://www.publictechnology.net/articles/features/how-secure-government-and-should-we-have-right-know
[3] https://www.publictechnology.net/articles/news/excl-whitehall-departments-reported-500-personal-data-breaches-ico-fy20
[4] https://www.publictechnology.net/articles/features/how-big-uk%E2%80%99s-cyber-skills-gap
[5] https://www.publictechnology.net/tags/cyber-week-0
[6] http://www.cyberark.com/uk-government
[7] https://www.publictechnology.net/tags/contracts
[8] https://www.publictechnology.net/tags/cybersecurity
[9] https://www.publictechnology.net/tags/data
[10] https://www.publictechnology.net/categories/business-and-industry
[11] https://www.publictechnology.net/categories/defence-and-security
[12] https://www.publictechnology.net/categories/education-and-skills
[13] https://www.publictechnology.net/categories/government-and-politics
[14] https://www.publictechnology.net/categories/health-and-social-care
[15] https://www.publictechnology.net/categories/public-order-justice-and-rights