Public sector cyber procurement quadruples in five years

Written by Sam Trendall on 20 July 2020 in News
News

PublicTechnology research shows a big spike in the number of contracts awarded to IT security specialists by public-sector buyers

Credit: Adobe Stock

The number of cybersecurity-related contracts awarded by the public sector to external specialists has almost quadrupled in the last five years, PublicTechnology research has found.

Analysis of data published on the GOV.UK Contracts Finder site shows that, during the 2015/16 year, the number of tenders and contract-award notices featuring the term ‘cyber’, or a variation thereof, stood at 61. 

Seven of these were worth in excess of £1m – among them the first iteration of the Crown Commercial Service’s Cyber Security Services framework. The buying vehicle, which came with a value of £40m, was created to allow public sector organisations to buy specialist services in seven areas: policy and standards; risk assessment; risk management; security architecture; information assurance methodologies; incident management; and audit and review.

By the 2019/20 year, the number of cyber-related procurement exercises had reached 222 – almost four times as many as in FY16.

The volume and proportion of £1m-plus contracts also shot up to 48 – a sevenfold increase on 2015/16.


Related content


This included the third version of Cyber Security Services – which is now worth £151m – as well as a £250m framework for NHS entities to access incident response, consultancy, and security personnel from a total of 25 suppliers.

“The framework supports improved and enhanced cybersecurity across the public sector, addressing the threats, risks and vulnerabilities that may be encountered and ultimately enabling the safe and secure use of data to deliver improved public services,” NHS Digital said. “It will also offer an additional solution to support the existing portfolio of security solutions currently available.”

The growth in the volume and value cyber contracts awarded by public-sector bodies to external specialists has come alongside a growing awareness of cybersecurity issues and data-protection responsibilities – especially in light of the introduction of GDPR legislation in 2018.

In addition to a full breakdown of security procurement trends, elsewhere in the PublicTechnology research report – based on freedom of information requests and analysis of government data – we reveal how many data breaches are suffered across healthcare, education, central and local government. We also have exclusive insight into what happens after a breach has occurred and what measures are required by the Information Commissioner’s Office.

Click here to download the full, 12-page report free of charge.


The research marks the conclusion of the PublicTechnology Cyber Week project, hosted in association with CyberArk. Click here to access all the interview, feature, and analysis content published as part of the project.

 

About the author

Sam Trendal is editor of PublicTechnology

Share this page

Tags

Categories

CONTRIBUTIONS FROM READERS

Please login to post a comment or register for a free account.

Related Articles

Home Office and BEIS first departments under the microscope in pilots of new independent cyber audits
16 January 2023

External supplier brought in to run the rule over government systems as rollout begins of ‘GovAssure’ programme

Government must earn public trust that AI is being used safely and responsibly
5 January 2023

Leaders from two of government’s core digital and data units – the CDDO and CDEI – introduce new guidelines intended to promote transparency in the public sector’s use of algorithms

PublicTechnology’s biggest stories of the year
29 December 2022

A reminder of the shocks, scandals and success stories that shaped the world of government technology in 2022

EXCL: Government red team security unit to test departmental defences with hostile reconnaissance
2 December 2022

Specialist supplier will support in searching – and then attempting to take advantage of – ‘vulnerabilities and exploitable information’