Expert Comments On After Brexit, Europe Wants Cybersecurity Pact With UK

Following the news that Michel Barnier, the chief negotiator on Brexit at the European Commission, has stated that a joint response to security threats will be a key part of the future relationship, cybersecurity expert commented below to highlight the cybersecurity issues because of Brexit.


EXPERTS COMMENTS
Tim Mackey, Principal Security Strategist,  Synopsys CyRC
November 07, 2019
The real exploit is that of lack of awareness of the nature and scope of the threat.
Any interruption in cyber intelligence and threat sharing between organisations creates opportunities for malicious groups to replay a successful attack scenario against multiple targets. This reality is part of why attackers can be so successful exploiting common vulnerabilities – the real exploit is that of lack of awareness of the nature and scope of the threat. Interruptions and uncertainty in cyber data sharing between nations and trading blocks provide those same malicious groups an opportunity to devise attacks knowing that their attack playbook and pattern may not be known by organisations in both states. Solving for this situation requires a level of transparency in information flow, particularly in attack patterns between all trading partners as the underlying digital supply chain is only as weak as the weakest link – which in this case is the link having the least cyber intel.
Ilia Kolochenko, Founder and CEO,  ImmuniWeb
November 07, 2019
Most governmental agencies may require a crystal-clear legal framework to proceed after Brexit.
Unhindered and unimpeded cybercrime data exchange is indeed crucial both for the UK and EU. Most governmental agencies may require a crystal-clear legal framework to proceed after Brexit, especially when the information involves legally-protected data or cases of criminal prosecution. However, given the essential role British law enforcement agencies play in the continental fight with cybercrime, I am pretty confident a solution will emerge in a timely manner. In any case, private parties and cybersecurity companies will likely have a safe harbor to cooperate even before formal agreements are inked.

If you are an expert on this topic:

Dot Your Expert Comments

SUBSCRIBE to alert when new comments are posted on this news. :



Join the Conversation

Join the Conversation


In this article