Oral Answers to Questions Debate

Full Debate: Read Full Debate
Department: Ministry of Defence

Oral Answers to Questions

Luciana Berger Excerpts
Monday 12th January 2015

(9 years, 3 months ago)

Commons Chamber
Read Full debate Read Hansard Text Read Debate Ministerial Extracts
Anna Soubry Portrait Anna Soubry
- Hansard - - - Excerpts

I pay tribute to the work that my hon. Friend and others have done, and I will look at all our diaries to see whether we can come up; we would like to if we can. I promise I will look at my diary, and at the diaries of other Ministers as well.

Luciana Berger Portrait Luciana Berger (Liverpool, Wavertree) (Lab/Co-op)
- Hansard - -

9. What assessment he has made of the level of the cyber-security threat to the UK.

Mark Francois Portrait The Minister for the Armed Forces (Mr Mark Francois)
- Hansard - - - Excerpts

Maintaining robust cyber-security is a priority for the UK and of particular importance to the MOD. The threat is continually changing in scope and complexity. All public and private sector organisations have a stake in addressing the cyber threat, and the MOD is one element of the national cyber-security programme, which is co-ordinated by the Cabinet Office.

Luciana Berger Portrait Luciana Berger
- Hansard - -

We know that cyber attacks are often targeted at defence companies themselves. What steps have the Government taken to ensure that security within the UK defence sector is strengthened?

Mark Francois Portrait Mr Francois
- Hansard - - - Excerpts

We have taken very specific steps. With the Office of Cyber Security and Information Assurance, the Centre for the Protection of National Infrastructure and GCHQ, we are working closely with industry to ensure it is aware of the changing nature of the threat and has effective counters in place. The defence cyber protection partnership aims to meet the emerging threat specifically to the UK defence supply chain by increasing awareness of cyber risks, sharing threat intelligence and defining risk-driven approaches to applying cyber-security standards. We are already doing it.