A cyber security expert has told a House of Lords committee that a basic understanding of cyber security among all company employees is critical. Relying on a few cyber security professionals to protect company networks cannot provide the level of reassurance and safety that modern businesses require.
Hugh Boyes, cyber security expert at the Institution of Engineering and Technology (IET), gave evidence to the House of Lords Digital Skills Committee on Tuesday, 28 October, 2014. He stressed the need for continuing professional and personal development on the subject of cyber security.
Featured Download: Social media access at work. Do your employees know the rules?
Hugh said: “With the increasing use of computer-based and digital technologies in all aspects of our lives, engineers and technicians need to have a general understanding of cyber security principles.
“This is essential if we are to improve the security and resilience of our systems. Most modern companies require all their staff to complete basic health and safety training and promote a workplace safety culture; cyber security should be approached in a similar way. It is the responsibility of anyone using computer-based and digital technologies and cannot be left to a relatively small number of specialists.”
As part of its investigation into information and communications technology, competitiveness and skills in the UK, the Committee also heard from other cybersecurity experts, as well as representatives from regional digital hubs such as London’s Tech City UK, and Skillset, the Sector Skills Council for the Creative Industries.
The evidence session can be viewed on-demand at http://www.parliamentlive.tv/Main/Player.aspx?meetingId=16231.
About IET
For over 140 years the IET has been inspiring, informing and influencing the global engineering community, supporting technology innovation to meet the needs of society. With the complexity and diversity of the engineering world the role of the IET is more relevant now than it ever has been.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.