Published on PublicTechnology.net (https://www.publictechnology.net)

Home > Government pledges all public sector bodies will be resilient against common cyberthreats by 2030

Government pledges all public sector bodies will be resilient against common cyberthreats by 2030

Written by PublicTechnology staff on 28 January 2022 in News
News

Strategy outlines short- and long-term objectives

Credit: QuoteInspector [1]/CC BY-ND 4.0 [2]

The government has published a plan for protecting the public sector against cyberattacks and vowed that all organisations will be “resilient to known vulnerabilities and attack methods no later than 2030”.

The Government Cyber Security Strategy: 2022 to 2030 [3] policy paper was published earlier this week; it set out a two-pronged approach to driving improvements in public sector cybersecurity, with the first being to ensure that “government organisations have the right structures, mechanisms, tools and support in place to manage their cybersecurity risks”.

“The second is to ‘defend as one’,” according to the strategy document. “Recognising that the scale and pace of the threat demands a more comprehensive and joined up response, government will harness the value of sharing cyber security data, expertise and capabilities across its organisations to present a defensive force disproportionately more powerful than the sum of its parts.”


Related content

  • Ex-NCSC chief Martin asks whether the new cyber strategy will make the UK safer [4]
  • Cyber national security: how the UK has prepared itself for major attacks [5]
  • Life hacks – a year at the National Cyber Security Centre [6]

The intent of the plan is to ensure that at the public sector’s “critical functions [are] significantly hardened to cyberattack by 2025” and that “all government organisations across the whole public sector [will be] resilient to known vulnerabilities and attack methods no later than 2030”.

In his ministerial foreword to the document, prime minister Boris Johnson wrote that it is crucial the government leads by example if the UK’s ambitions are to be met.

“As well as ensuring that government organisations can protect the services and functions that maintain and promote our economy and society, government must be an exemplar to the private sector, to ensure that the UK continues to enhance its reputation as one of the most secure and attractive digital economies in which to live, do business and invest in,” he said.

Cabinet Office minister Steve Barclay added that around 40% of cyber incidents reported between September 2020 and August 2021 were aimed at public sector organisations.

“Building and maintaining our cyber defences is therefore vital if we are to protect the functions and services on which we all depend,” he said. “As government, we have made a great deal of progress in recent years, but there is much more to do. “To meet the threats we will face in the coming decade we must build on our successes and transform how we approach cyber security in government.”

The paper confirmed that responsibility for ensuring public sector bodies in the devolved nations are resilient to cyber risks will fall to the respective devolved governments.

Its publication comes just a month after the release of the government’s National Cyber Strategy, which set out the ambition to make the UK a leading cyber power. The plan underscored the importance of all organisations increasing internet security and protecting against ransomware attacks that emanate from countries such as Russia and China.

 

Tags
Cybersecurity [7]
Policy [8]
Categories
Business and industry [9]
Defence and Security [10]
#block-views-events-popup-block{ position: fixed; bottom: -30px; padding: 25px 22px; width: 360px; max-width: calc(100% - 30px); text-align: center; border-radius: 0 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; -ms-transform: translateY(100%); -webkit-transform: translateY(100%); transform: translateY(100%); -webkit-transition: all .35s ease-in-out; transition: all .35s ease-in-out; z-index: 2; } #block-views-events-popup-block.show{ bottom:10px; transform:none; -webkit-transform:none; } #block-views-events-popup-block a.btn.btn--outlineWhite { border-color: #fff; color: #fff; background: transparent; } #block-views-events-popup-block .events-popup-close{ position: absolute; cursor: pointer; top: -30px; left: 0; height: 32px; padding: 7px 20px; border-radius: 4px 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; font-size: 13px; } #block-views-events-popup-block .events-popup-close .icon--events-popupClose{ padding-left: 10px; font-family: inherit !important; } #block-views-events-popup-block .icon--events-popupClose:before { content: ''; width: 12px; height: 12px; margin: -1px 7px 0 0; background: url(https://www.publictechnology.net/sites/www.publictechnology.net/themes/pubtech_override/img/close-thin.svg) center no-repeat; background-size: 10px; vertical-align: middle; position: absolute; left: 10px; top: 10px; } #block-views-events-popup-block .views-field.views-field-nid .field-content{ display:none; }

jQuery(window).load(function() { if(jQuery('#event-popup-nid').length){ var eventId = jQuery('#event-popup-nid').text(); jQuery.cookie('eventPageId',eventId); var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; var combinedValueValue = eventId+'-'+countCurrentValue; var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; jQuery.cookie('combinedValueName',combinedValueValue); const result = combinedValueValue.split('-'); if( result[1] <= 3 ) { jQuery('section#block-views-events-popup-block').addClass('show'); countCurrentValue = parseInt(result[1]) + 1; jQuery.cookie('countCurrentName',countCurrentValue); combinedValueValue = eventId+'-'+countCurrentValue; jQuery.cookie('combinedValueName',combinedValueValue); } jQuery('.events-popup-close').click(function(){ jQuery('section#block-views-events-popup-block').removeClass('show'); }); } });

(function(e,t,o,n,p,r,i){e.visitorGlobalObjectAlias=n;e[e.visitorGlobalObjectAlias]=e[e.visitorGlobalObjectAlias]||function(){(e[e.visitorGlobalObjectAlias].q=e[e.visitorGlobalObjectAlias].q||[]).push(arguments)};e[e.visitorGlobalObjectAlias].l=(new Date).getTime();r=t.createElement("script");r.src=o;r.async=true;i=t.getElementsByTagName("script")[0];i.parentNode.insertBefore(r,i)})(window,document,"https://diffuser-cdn.app-us1.com/diffuser/diffuser.js","vgo"); vgo('setAccount', '253344499'); vgo('setTrackByDefault', true); vgo('process');
Close
Sign up for our free daily newsletter
Register here
6472
Dods PublicTechnology.net is a Merit Group plc title

Quick Links

  • Home
  • News
  • Opinion
  • Features
  • Private Sector Insight
  • Cyber Week
  • White Papers
  • Events
  • On Demand Webinars
  • Partner Directory
  • About
  • Contact

Services

Dods People Dods Political Intelligence Dods ResearchDods EventsDods Training

Media & Publishing

PoliticsHome Parliament MagazineHolyroodThe House MagazineCivil Service WorldTraining Journal

About Dods

Dods Group Part of Merit Group Privacy Policy Terms & Conditions Advertising Sponsorship
Privacy PolicyTerms & ConditionsAdvertisingSponsorship Subscriptions
  • Registered office: 11th Floor
  • The Shard
  • 32 London Bridge Street
  • London SE1 9SG
  • Company number: 04267888
  • © Merit Group plc 2021

Source URL: https://www.publictechnology.net/articles/news/government-pledges-all-public-sector-bodies-will-be-resilient-against-common

Links
[1] https://www.quoteinspector.com/images/credit/credit-lock-keyboard/
[2] https://creativecommons.org/licenses/by-nd/4.0/
[3] https://www.gov.uk/government/publications/government-cyber-security-strategy-2022-to-2030
[4] https://www.publictechnology.net/articles/opinion/ex-ncsc-chief-martin-asks-whether-new-cyber-strategy-will-make-uk-safer
[5] https://www.publictechnology.net/articles/features/cyber-national-security-how-uk-has-prepared-itself-major-attacks
[6] https://www.publictechnology.net/articles/features/life-hacks-%E2%80%93-year-national-cyber-security-centre
[7] https://www.publictechnology.net/tags/cybersecurity
[8] https://www.publictechnology.net/tags/policy
[9] https://www.publictechnology.net/categories/business-and-industry
[10] https://www.publictechnology.net/categories/defence-and-security