New Times,
New Thinking.

Advertorial feature by Raytheon
  1. Science & Tech
20 September 2016updated 09 Sep 2021 8:52am

Flick Drummond MP and Chair, APPG on Cyber Security

The New Statesman will be producing a collection of online features to accompany the New Statesman & Raytheon’s fringe events. This series, on cyber security, will include guest features from a cross-party group of parliamentarians and subject experts.

By Flick Drummond

Cyber security is rapidly becoming a massive issue for the UK and the World as a whole. In just over a few years we have gone from a society that uses the Internet to one that is completely dependent upon it. This of course has enabled really valuable and feature rich services, however it also allows a darker side to flourish. All too often we see headlines about systems being hacked, bank and service accounts being compromised and personal privacy undermined, but this is just the tip of the iceberg. Every moment of the day our computers and personal devices are fending off innumerable attacks including viruses, malware and ransomware.

Against this backdrop, it is important that government facilitates open and informed debate to understand the complex issues, and identify the most serious matters on which to take action for the protection of the country and its citizens. For this reason I am pleased to have initiated the All Party Parliamentary Group on Cyber Security, with the help of the Information Security Group (ISG), Royal Holloway University of London which provides the secretariat.

Our first speaker meeting took place in Westminster on the 19th July 2016, with guest speakers; Professor Keith Mayes, Director of the Information Security Group at Royal Holloway, and Professor Paul Dorey, Director CSO Confidential Ltd., and coordinator of the electricity and gas cybersecurity committee for UK critical national infrastructure. The talks presented fascinating insights into the evolution of information/cyber security towards the big issues of today, and highlighted worrying future developments, especially around the Internet of Things (IoT).

It was clear from discussions that the roots of security attacks are linked to human behaviour and can therefore be traced back thousands of years. However, it is recent advances in technology that have dramatically increased the speed, scope and value of attacks; and with too few attackers brought to justice. Cloud storage is much talked about and used, and like most technology advances can be seen as good or bad depending on your viewpoint. It is a means to improve accessibility, maintain integrity and reduce costs for data storage and processing. However, in reality there is no abstract cloud; it is essentially formed of shared physical servers operated by a variety of commercial providers and situated in various countries/jurisdictions. Users may store all their private data within the cloud and so place a great deal of trust in the cloud providers and risk losing ownership and control of their own data. Even if selected providers are trustworthy, it is almost impossible for users to detect unauthorised data gathering by other parties in and amongst the authorised data transfers. Data privacy and indeed ownership and control of personal/corporate data is clearly a great challenge, however it is by no means the most worrying cyber security problem; for that we turn to IoT.

In concept the IoT is very simple; basically a future where almost everything is somehow Internet enabled. There are numerous IoT devices for home use, often incompatible with each other and many have security vulnerabilities that have been practically attacked. Although these home scenarios are often trivialised there are some major security and safety risks, especially when we consider IoT as part of more critical infrastructures. The IoT is becoming a part of the supply of water, gas and electricity or in telemedicine or indeed in cars that have intelligent control of brakes, lights, engines and even steering. What is happening is the connection of cyber and physical systems; so an IT attack is no longer just about loss of privacy or money, but potentially something that can cause serious damage and injury.

Select and enter your email address Your weekly guide to the best writing on ideas, politics, books and culture every Saturday. The best way to sign up for The Saturday Read is via The New Statesman's quick and essential guide to the news and politics of the day. The best way to sign up for Morning Call is via
  • Administration / Office
  • Arts and Culture
  • Board Member
  • Business / Corporate Services
  • Client / Customer Services
  • Communications
  • Construction, Works, Engineering
  • Education, Curriculum and Teaching
  • Environment, Conservation and NRM
  • Facility / Grounds Management and Maintenance
  • Finance Management
  • Health - Medical and Nursing Management
  • HR, Training and Organisational Development
  • Information and Communications Technology
  • Information Services, Statistics, Records, Archives
  • Infrastructure Management - Transport, Utilities
  • Legal Officers and Practitioners
  • Librarians and Library Management
  • Management
  • Marketing
  • OH&S, Risk Management
  • Operations Management
  • Planning, Policy, Strategy
  • Printing, Design, Publishing, Web
  • Projects, Programs and Advisors
  • Property, Assets and Fleet Management
  • Public Relations and Media
  • Purchasing and Procurement
  • Quality Management
  • Science and Technical Research and Development
  • Security and Law Enforcement
  • Service Delivery
  • Sport and Recreation
  • Travel, Accommodation, Tourism
  • Wellbeing, Community / Social Services
Visit our privacy Policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications.

Government has a role to play in helping to ensure that appropriate security guidelines, standards and legislation exist, and that system designers and service providers adhere to them. The Cyber Security APPG is an ideal vehicle for raising awareness, and for open and informed cross-party discussions on this topic. I would urge you to attend our future meetings when we will explore selected topics in more detail. More information can be found on our website:

Flick Drummond, MP

The New Statesman in association with Raytheon are hosting events at this year’s Labour & Conservative Party Conferences.

From government to home: A Cybersafe UK? with Chi Onwurah MP will be held in the New Statesman Hub at 1.10pm, Monday 26th September. Sign up for more information here.

From government to home: A Cybersafe UK? with Ben Wallace MP, Minister of State (Home Office, Security) will be held in Library of Birmingham at 1.30pm, Tuesday 4th October. Sign up for more information here.