Speech

Francis Maude speech at IA14

The Minister for Cabinet Office spoke at IA14, the government's 2014 conference for cyber security and information assurance decision makers.

This was published under the 2010 to 2015 Conservative and Liberal Democrat coalition government
The Rt Hon Lord Maude of Horsham

Its a pleasure to speak at IA14.

Much has changed since I spoke at IA12, 18 months ago. Weve some new tools at our disposal. New talent is entering the cyber security profession. Awareness is steadily rising.

But the most obvious change is that growth has returned. The UK is one of the fastest growing economies in the developed world. This presents 2 challenges, which Im going to talk about today.

The first challenge is to redouble our efforts as part of our long term plan for the British economy to make the UK one of the safest places in the world to do business. The economy that emerges from the Great Recession needs to be stronger, more secure and more attuned to the risks than ever before.

The second is to seize the opportunity that cyber presents for innovation and enterprise, and for jobs and prosperity. Often we focus on the threat because we want companies and organisations to take note and take action. Thats important. But cyber security shouldnt be seen as a necessary evil. Its a growth business in its own right and it can be a strength for Britain.

The answer to both these challenges is that businesses and government are better off working together. Pulling in the same direction, with the same goals, makes us stronger and more aware, and leaves us far better placed to mitigate against the threats and maximise the opportunities that cyber presents.

The threat

Those who would do us harm have been busy over the past 2 years.

Perhaps the most high profile example was the recent attack on eBay. All it took was a small number of employee log-in details to be jeopardised for hackers to obtain the entire customer database. As a result 128 million people equivalent to twice the population of Britain had to change their passwords.

Earlier this year, the Heartbleed vulnerability emerged. The origin of that particular problem wasnt even malicious it was caused by a single simple error among reams and reams of code. Im told that the code in question was written late on New Years Eve which Im sure has absolutely no connection whatsoever

Most recently, weve faced Gameover Zeus not just a virus, but a worldwide pandemic with the power to intercept and redirect financial transactions from infected computers. These are just the ones we hear about; the ones that got through others have been thwarted.

I can tell you of a recent case where a state-sponsored hostile group gained access to a system administrator account on the Government Secure Intranet. Fortunately this attack was discovered early and dealt with to mitigate any damage.

For that and in many other cases we can be thankful that we have some brilliant people working to keep us safe. Theyre drawn from GCHQ and the security services, the armed forces, the police and National Crime Agency, the civil service, and of course the private sector too, but they share much in common. Theyre bright, motivated and have bucket loads of expertise.

Many are in the audience tonight and Id like to take this opportunity to thank them. Their work truly represents some of the best Ive seen in the public sector.

Responsibility

But they cant do it alone. Were all responsible for our own security, in government, in business, in our homes and whenever we go online.

An organisation is only as strong as its weakest point. Even the smallest of chinks in a companys armour can have far reaching implications. So the responsibility for good cyber security is shared at every level.

Many of you will be familiar with the 10 Steps for Cyber Security guidance that we published in 2012.

Theres an onus on the most junior employee to protect his or her passwords just as theres an onus on the chief executive and the non-executive directors to ensure cyber security is taken seriously in board meetings.

Weve also developed the new Cyber Essentials scheme, launched on 5 June.

It gives businesses clarity on good basic cyber security practice and will provide protection against the most common threats. After going through a certification process, businesses will be able to show they have the right measures in place by displaying the Cyber Essentials badge, which we hope becomes the cyber equivalent of the MOT certificate.

It already has support from a whole range of organisations including the CBI, Federation of Small Businesses and the Institute of Chartered Accountants. The insurance industry is also supporting the scheme with 2 firms, Marsh and AIG, offering incentives for businesses to become certified.

From October, government will require all suppliers bidding for certain personal and sensitive information handling contracts to be Cyber Essentials certified.

CERT-UK

In March this year, our ability to respond to cyber threats took a massive step forward when I opened our first national Computer Emergency Response Team.

In the past, when Ive met my counterparts overseas, one of the things they always asked me was why there wasnt a single point of contact for cyber security incidents in the UK. CERT-UK fulfils that role. Our international partners now know who to call, as does government, business and academia.

It also means that a single organisation is coordinating our response to cyber issues on a daily basis and can identify and track risks as they bubble up and, when necessary, bring others together to respond.

I visited CERT-UK again a few weeks ago to see the difference theyve made. Since its launch 2 months ago, hundreds of incidents have been reported, of which over 80 have required engagement from CERT-UK.

Sitting as part of CERT-UK is the Cyber Security Information Sharing Partnership (CiSP) platform. Cyberspace is simply too big for any organisation to have sight on everything thats going on and so there is a massive need to pool our information for mutual benefit.

CiSP enables government and business partners to exchange information on threats and vulnerabilities as they occur in real time. It started with 100 partners; but on average 30 new organisations join each month, swelling the current total to over 450. It includes a number of professional organisations like the Law Society and the British Banking Association who are bringing their members into the fold.

Every day they notify members of around 215,000 abused IP addresses, so they can be blocked or dealt with. The secret of its success is very simple. Its about trust.

CiSP works because it has government involvement, but its business-led. Companies are under no compulsion. Information is shared voluntarily.

This enables a fusion cell made up of analysts from business and law enforcement to draw together a single intelligence picture of cyber threats facing the UK. The more businesses that join and the more information thats shared, the better the overall picture and the greater our collective resilience.

Lets look at the experience of BT as an example. Cyber security is absolutely critical to their business which is why theyre part of the Cyber Information Sharing Partnership. In one instance, CERT-UK shared data with BT about UK servers that could be used to perform a distributed denial-of-service attack, meaning BT were able to assess the threat to their own networks. The information originated from a separate CERT in Germany and may not have reached BT had it not been relayed by CERT-UK.

In another instance, BT was alerted by another CiSP member to stolen credentials appearing on the internet, including those of BT employees.

The value of CiSP was really brought to the fore in responding to Heartbleed. CiSP rapidly warned members of the threat, providing signatures that could be used to detect abuse. BT have since told us that amongst all the media frenzy surrounding Heartbleed, CiSP provided a haven where members could cut through the noise and exchange meaningful updates and intelligence with each other.

This is the pattern for success: governments and businesses working together to pool expertise, learn lessons, share capabilities and coordinate action.

Commonwealth Games

A good example of this cooperation is our preparation for the Commonwealth Games. Two years ago the London Olympic & Paralympic Games faced many threats to its digital infrastructure. The organisers, private sector suppliers and the security services worked in unison to defend our networks. Now were sharing the lessons from London with the Scottish government.

CERT-UK has already been assisting with the preparations: walking through incident response arrangements and raising awareness among some of the small and medium sized businesses that are supporting the Games.

Similarly, the Centre for Protection of National Infrastructure has been advising Scottish companies. And when the Games begin Police Scotland will work side by side with the technical staff from the National Cyber Crime Unit to deal with incidents as they occur.

Opportunity

By working together we will also maximise the opportunity that cyber presents to business throughout the UK.

Cyber security demands technical innovation and entrepreneurial ambition, backed by world-class skills and research all of which the UK has in spades. In the past year, Ive discussed cyber security with my counterparts from as far afield as India and Israel, Spain and South Korea and its clear that the phrase Made in Britain has enormous resonance.

In March, I visited the headquarters of Cassidian in Newport, which produces everything from encryption projects for Eurofighter Typhoon aircraft to secure networks for government communications.

Cassidian is one of the giants but Ive also visited small firms like Titania, one of 40 small cyber security companies clustered around Malvern in Worcestershire and, despite its small size, supplies products to organisations in over 50 countries.

Cyber has the potential to create new businesses and to turn small companies into large ones.

Take the Phoenix IT Partnership as an example. Just over 15 years ago it had a turnover of 贈26 million a year and 500 staff. But then it won a contract from Northrop Grumman to help provide automated fingerprint ID services to police forces across England and Wales. Now they have 2,300 staff, in 20 UK locations, with a turnover of over 贈230 million.

We want to support precisely these kind of companies, which is why weve produced the first ever Cyber Exports Strategy. We aim to be exporting 贈2 billion worth of products and services by 2016 thats a sharp increase on the 贈850 million we sold last year.

Conclusion

To conclude, technology moves on the opportunities grow, so do the threats. There will never be a steady state. We cant pause; we cant slow down, even for a minute. Theres always something more we can be doing to protect ourselves.

The internet has revolutionised the way we live and work and it connects people closer together than at any point in human history. However serious the threats, they dont change the central truth that the internet has been, and will continue to be, a massive force for good in the world.

The strength of our partnerships, and the trust that enables us to share information, will allow us to build a safe and secure economy, and grasp the opportunity for future growth, so everyone can prosper from the digital age.

Updates to this page

Published 16 June 2014