European Cybersecurity: What Happens After Brexit?

Will Brexit actually happen?

If yes, how and when? What will be the terms?

Those questions have been pondered by millions of people around the world for the past 4+ years, even after the historic vote was passed in 2016.

More specifically, questions surrounding technology and cybersecurity cooperation remain complex, and yet the importance of these topics are coming into clearer focus as the upcoming United Kingdom General election on Dec. 12 draws near.

Here’s a rundown of the issues and international coverage that this topic is getting lately:

  • Back in March 2019, Sam Curry offered this analysis of the cyber implications of Brexit in Forbes magazine. “Ironically, this could lead to the worst possible way to trigger growth in the cybersecurity sector in the U.K. Developing new cyber talent in the private sector hasn’t been constrained by nationality within Europe, and there could be issues retaining or recruiting cyber talent repatriating to their countries of origin or to the continent. There could also be a massive run on consulting and talent in the U.K. not only to staff leaving talent, but to prepare for the regulatory gap that will be created by now absent European directives and regulations. …”    
  • In July of this year, Fortune Magazine reported that Brexit is jeopardizing the U.K.’s cybersecurity — and fueling the rise of the “Splinternet.” Here’s an excerpt:

“…The National Police Chiefs’ Council has cautioned that fall-backs to current information-sharing agreements with European law enforcement agencies “will be slower, more bureaucratic and ultimately less effective. …

“‘It’s a huge administrative nightmare,’ says Ann LaFrance, a partner at the law firm Squire Patton Boggs who specializes in data privacy and cybersecurity issues. LaFrance says that some of her firm’s global clients have commissioned time-consuming and expensive 50-country (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: