Safeguarding data sovereignty in modern warfare
Sep 12, 2025
At DSEI, Arqit highlights how militaries must safeguard sovereign data while ensuring seamless collaboration with allies.
View Video Transcript
0:00
All right, ladies and gentlemen, one and all, good morning. Oh, there we go. There's the volume
0:03
I really hear it today. Good morning. On a Friday, we are caffeinated and we are feeling great
0:08
Welcome, everyone, to the final day of DSEI and our very exciting panel here this morning
0:13
all about data sovereignty and military operations. I'm JD. Thank you for being here
0:17
And I've got not one but two esteemed panelists with me this morning to kick off a great conversation
0:22
And I'm going to have both of these gentlemen introduce themselves. Sean, I'll kick things off with you down there at the end
0:28
Hi there, my name is Sean Carnu. I am the senior director at a small company called Arkit, responsible for defense, government, and CNI here in the UK and across most of the rest of the world
0:39
Amazing. Hello, I'm Alan Jensen from DXC. I'm a strategic growth and innovation partner in DXC, and we've been working with these guys and a whole raft of others to put the solution in place for these capabilities that we're talking about
0:53
And by the way, I only found this out last night, DXC is the sponsor on all the badges
0:58
Yes. Yeah, we're the platinum sponsor for the whole thing. There you go
1:03
Hey, that's pretty sweet real estate. Every time you look at the badge, I'm like, wait a minute. I know I know this logo
1:07
My gratitude. Yeah, go ahead. And our carpet. That's the color of our company logo is purple
1:13
Wait, even that's part of the spot. Oh, that's a sweet gig. I think it's always purple, if I'm honest
1:18
Well, I think it's purple for DXC. It's just looking at it. It's our purple this year
1:22
Alan, let's go with that. I like it. Thank you, gentlemen, to both of you for being here
1:25
We'll do open-ended questions. And a quick reminder to everyone here in the house, if you would like to ask either Sean or Alan a question, we've got a QR code up here at the podium
1:35
And these pop up on an iPad. Oh, the iPad's here at the podium
1:39
Excuse me. And we'll also be going around with a microphone later on. If you'd like to ask your question in person, you're welcome to do so
1:45
We'll start with an opening question for both our panelists. Why is data sovereignty such a big deal, such a high priority for militaries of the world today
1:54
So as we've transitioned into a digital battle space, data sovereignty becomes a key component of the fighting force
2:02
So maintaining both the control of and the access to data that is inside your network
2:08
whether it's generated data being live on the battlefield or live in operations, or historic data, information about operational capabilities and such
2:16
maintaining control of that as a sovereign nation becomes a critical component
2:21
It is now effectively another pillar within the warfighting space. Yeah. Alan, what does data sovereignty look like and mean to you from where you're positioned at DXC
2:31
So I think it's a really important piece of capability that I have to have
2:38
It not just does what Sean just described. It also enables you to get a much better citizen awareness
2:45
But it also enables you to not reveal your sources, how you've collected the data, what assets you've used for that
2:53
So it's really important from both intelligence, real-time operations, and essentially getting the right information to the right person at the right time so they can take the right action and do the right thing
3:07
And sovereignty is key to all that. It runs through the whole thing. Is data sovereignty about tech
3:13
Is it about trust? Is it about control? A combination of all the above
3:18
I think your comment at the end is it's absolutely everything. So it is about are you able to protect it? Are you able to have access to it
3:26
Are you able to enable that data to be in the right place at the right time
3:30
And are you able to trust it? So it is all of those things. Now to build that though requires technologies themselves
3:38
And we can talk about those in a little bit, where that's going going and some interesting evolution there but it also takes you into areas
3:46
around policy it takes you into areas around training and skill sets and it takes you into areas around areas outside of defense that maybe other
3:53
government policies GDPR and all the rest of it that all have to be considered towards it so it's a it takes a complete 360 view to be able to look at data
4:01
sovereignty it is not simply about saying where is it and who has access to
4:05
it yeah Alan how important is the trust component Sean was just alluding to there
4:09
So the trust component is really, really important, particularly in relation to coalition warfare and interoperability
4:17
It enables you to allow people onto your network that you trust
4:21
So in the UK sense, for example, it could be that you have a British brigade
4:26
They have two British battle groups, but they have a French battle group. And all of those three organizations need to fight together, which means they need to access data that they're allowed to
4:37
and the sovereignty and the management of that sovereignty allows the British command and control systems
4:43
to share exactly what's needed with the French to enable them to be the most effective they can on the battlefield
4:50
Without that, they can't really interoperate. I think something you bring up there, Al, is really, really interesting
4:55
which is I think that's the ultimate friction when you're talking about data sovereignty, which is how do you maintain as a nation or as an entity your sovereignty of your data
5:04
yet enable interoperability with allies and coalitions, which are often, there are long-term allies
5:12
we know that, the Five Eyes community, NATO and the such, but we often stand up very short notice
5:16
working with other companies or organizations or other entities. And how do you do those two things at once
5:22
Because the easiest answer around data sovereignty is to lock it all down, make it absolutely almost impossible to access and get people to it
5:28
That doesn't allow you then to maintain that interoperability that is how we deliver operations
5:34
especially here in the UK with a NATO-first policy, we have to find a way to be sovereign, protect our own data
5:41
protect our models, our AI models, and all the rest of it, but also be interoperable with our allies
5:47
Walk and chew gum at the same time. Alan, go for it. I don't think you can achieve the aim that Sean's described
5:53
without really handling two very, very specific but closely interrelated things. One is a zero trust
5:59
what are you going to allow other allied nations see in your data sets
6:06
and where are you going to allow them to see that? It could go all the way from the core HQ to the div to the brigade to the battle group
6:13
It could go from the in an air sense from the deployed operating bases
6:18
to the forward operating bases where you may have French aircraft working with British aircraft
6:22
And it definitely applies in the sea environment where you're going to have multi-nation vessels
6:28
and how do they operate. So the command and control depends on really decide who can see what
6:34
and they have to have that zero trust access, the role-based access, the attribute-based access to data
6:42
knowing who's coming in, who's going out, and controlling who can see that
6:46
And equally important, which I'm sure Sean's going to talk about, because he absolutely should, is enabling the security model
6:52
to enable that and work across that. You can't achieve that without both of those things
6:58
And I guess the third component is a network that allows them to do that and survive on a battlefield, which is actually a third leg of the stool
7:09
You can do the control, you can do the access, you can do the data, sitting on top of all that
7:14
But without a network, you're not really going to be able to do a great deal. And the network's key to move the information around
7:20
Gentlemen what is at stake if a nation loses control of its own data I think rather than kind of waxing their cool about going down the deep in real simple terms data is the lifeblood of an organization whether it is a commercial organization or a military or a government
7:39
maintaining control, maintaining more and more, maintaining a trust in the data, in what it's telling you
7:48
and that it's valid, is going to become effectively, I believe, the core component in warfare, but in government as a whole
7:56
And losing control of that is effectively losing the lifeblood of an organization
8:02
I would concur with that. I think it's really key to fighting and the logistics
8:09
the whole end-to-end operation of modern warfare in the changing character of war that we're facing
8:14
The data is the core of everything. You lose control of your data, you lose control of the battle space
8:20
And it's controlling the battle space and being one step ahead, making those decisions quicker than the enemy
8:26
getting inside their OODA loop, making decisions and taking effective action quicker than they do
8:33
is key to surviving. What would you gentlemen say are the biggest gaps right now
8:38
in protecting our sovereign data, the biggest gaps in the process? For myself, I think there's three primary ones
8:47
and then the fourth one is one where we as an organization focus, obviously our intention and the like
8:51
but I think all four of them kind of lay the foundation. The first being that there are really fragmented standards
8:58
Within the UK, we have different standards that are being used across different parts of the military
9:02
as different pillars and the commands have gone in different directions and then between coalition partners
9:08
And if you think about how in commercial industry, standards enable commercial entities to interoperate
9:14
and to be able to do that very, very quickly. So standards that they can integrate into their components or their technologies
9:19
which means when they sell them, the interoperability with other components that an organization may purchase is already there
9:25
So we have a problem with that interoperability when it comes to data. We have a massive set of legacy systems
9:32
If you look at any of the commands and you go back into it, what we think probably, you know, on my iPhone, what I have at home and all the rest of that
9:41
those systems are nowhere near up to date like that across the entire defense spectrum
9:45
And that creates problems because it's not as easy to move your data around or give access to it or connect systems together
9:51
And there's a huge interoperability problem there. There's also, I think, limited visibility of what data we have
9:56
I know when I was in uniform, we were constantly relearning the lessons over and over again
10:02
And it's not that we hadn't learned them or recorded them. It was often getting access to those kind of record records and finding out that data
10:10
So that sort of limited viability to that environment, which is only going to become a very more complex environment when you start talking about multi-cloud providers
10:19
You talk about data at the edge. You talk about different commands you're working into and the like
10:23
And then finally, defense has to look at the quantum threat. there are components within how we protect data in defense now that are sufficient against a
10:36
quantum threat but it is not our whole data set and so we're traditionally as we've gone through
10:41
the you know classification standards we've a lot of data has set up lower classification standards
10:47
using public infrastructure and the like to be able to protect that data that all is going to
10:52
have to go through an update cycle to become safe for the future. Al
10:57
I'd agree with that. I think it's about future-proofing security of your data
11:04
The UK military certainly have a concept of fight tonight, fight tomorrow
11:08
What we're really talking about here is getting ready to fight tomorrow and protecting what
11:13
they already have as best as can. And the things that Sean has just mentioned, quantum particular is a threat, quantum decryption
11:21
of existing legacy security is a real threat. They're doing it already
11:28
They'll be doing it better and better as we go forward. So finding a way to counter that
11:32
One might look at the way to beat quantum decryption is to have quantum encryption
11:37
And they would really struggle to do that. So I think keeping future-proof
11:42
and having a plan of how to get there is really key
11:46
I also think the changing security models and the changing security technology allows much better, much faster deployment
11:59
It saves what they call swap, the size, weight and power of your equipment, which means you have to carry less equipment with you
12:06
You have to move less equipment forward. You're using less fuel. You're using less aircraft
12:11
You're using less everything. So there's a real business imperative alongside a security imperative
12:18
And then the two combined give you a sort of survivability imperative
12:22
So it all leads to operational success. And you have to have a whole series of things interconnected, moving forward together, integrated together to allow that to happen
12:34
Yeah, I'll ask you guys a bit more about quantum safe encryption in just a few moments
12:38
But to stick with the more current conversation with regards to existing gaps and challenges, do you both feel that today's coalition systems fit for the demands and sovereignty, the sovereignty demands of tomorrow
12:51
I think it's very clear that they don't. The way that we have traditionally protected our data in a sovereign sense is effectively locking it down and then spending a lot of time and effort figuring out how we connect up temporarily or permanently to be able to share data and do that
13:07
We have, for example, in the UK, a different set of classification levels than some of our allied nations, and that causes just a friction on its own, let alone the IT, the tech, the willingness to share data
13:20
I think it's going to get even more complex because we're moving into a space where there are brilliant companies all around the halls this week specializing in AI, looking at all the development of those sort of technologies
13:32
How do we make data work for us better, both offensively and defensively
13:36
You're just increasing the frictions. You're just making it even more complex, you know
13:41
And when I did spend time in uniform often on a large exercise let alone during combat operations
13:46
A third of your time was figuring out how you even talk to each other let alone transfer high amounts of data and communication
13:52
And we have to get much better at that because as we spoke quite early in the conversation
13:57
It is one of those pillars that if we don't get right the other arms can't deliver
14:03
Yeah, what is the toughest balance sharing with allies or keeping data secure at home
14:13
I think I think we're pretty good in the UK keeping data safe at home and to an extent deployed
14:19
So I would say. Based on what Sean has quite rightly said in the future warfare, I think sharing the right information at the right time as quick as we can with the allies is probably going to be the largest challenge we've got
14:33
Because that undoubtedly is going to be key and getting efficiency and speed into that process is going to be really important
14:43
particularly where we're increasingly fighting alongside them and with them in mixed formations and so on
14:49
That's going to become the real challenge. Is that a balance, Sean, between the two
14:54
Well it going to have to be right We have to have control and access domestically to our own data sets and to our own systems and we have to protect that The world is changing constantly and we have to have that ability
15:07
But we are almost always going to be in operations and deployments with coalitions and with allies
15:13
And so maintaining that sovereign yet interoperability is the biggest friction. And I think it comes down to things like lack of unified standards makes that really, really difficult to do
15:26
And then cross-domain data security. So because we have historically kind of ring-fenced off data based on classification very, very carefully and just completely put walls between those systems
15:39
as we start to be able to share those with Al, it's very difficult even domestically to be able to share that data where we need to across systems
15:47
When we start talking about then doing that with another organization, it becomes even more difficult
15:53
Effectively, a language barrier. A language barrier. Yeah, exactly. How can artificial intelligence protect sensitive data, and where do you think AI may create or pose some newly emerging risks
16:06
You know, at some point we'd mention AI. I wouldn't be doing my job if I had mentioned it at least once
16:11
It's a really fascinating question. It's a really good question. I don't think we it's not completely understood yet where AI could fit with this
16:20
I guess you could look at sort of no coming all the way back from the big headquarters to the very edge of the
16:27
Forward line of troops there's a whole Massive data coming down and it's really wide at one end and really narrow at the other as they need less and less as they get forward
16:37
Conversely to that from the from the frontline coming back the other way
16:41
They're picking up all the information from the sensors and as a flow of data going back the other way
16:46
Which also gets less in the sense that they're aggregating as they go back
16:50
AI is a really fascinating question. There's a lot of discussion around Where does AI at the edge the guy in the trenches the guy on the ship
16:58
I think we've yet to work through where's the best place to conduct a lot of that AI along that journey
17:05
Where do they intersect because for me and what we do? that's where the compute needs to be and AI takes an awful lot of compute and an awful lot of compute takes an awful lot of power
17:17
So where do you decide where you're going to do that AI along that along that spectrum of data
17:22
information flow and And that's going to be I think a key driver for where we use AI and I don't think we're quite
17:30
Understand that fully yet. I don't think enough being thought about where do we need AI
17:35
And I really think it's also true just because she can Doesn't mean you should just because you can doesn't mean you should use it now use it
17:44
I mean, yeah, you just can use it doesn't mean you should use it in any one given place
17:47
Oh, that's great. Sean your thoughts on this especially and man Alan brings up a good point that put the compute power their energy required
17:54
It's got to be part of the serious conversation with regards to leveraging modern AI technologies
17:59
How do you view that so I think AI is like any new technology and whether it's in defense or in a commercial space
18:04
which is it comes with benefits and we focus on those benefits very rightfully so but it often comes with threats or risks are associated with it
18:11
so you know where do your initial kind of question was around where can it help us in the protection of sovereign data
18:16
What role might it take and I think there's you know evolving models that look at automating threat detection
18:22
You know the computer and the AI model being able to work faster than human and understanding what the threats are and
18:27
Initiating responses or providing responses to the human in the loop to do that
18:32
Additionally, we're now going to and continue to generate exponential amounts of data
18:38
The traditional process was a human classifying that data. An AI model could be a very big assistant in doing classification of data
18:45
and being able to filter it into the correct systems that it needs to go to, labeling it, putting it through that
18:50
because a lot of the control of those data sets is going to be based on their classification
18:56
and therefore you're automating that process. Additionally, doing some of that predictive ysis about where data access risks are
19:03
you know, looking for the holes in your defenses faster than you can as an operator yourself
19:08
I think there's a lot of areas there where AI will help us in protection of our data
19:12
in that sovereignty aspect. The flip side of that is what threats are a model is going to do to that
19:17
And I don't mean people just using an AI model against us. It's a lot of our aspect to it
19:23
But AI models that are trained on coalition data, for example, that opened up an avenue for information leakage, something that has to be considered
19:32
So information leakage, you said? Yes. Confirming. So you're sharing information, you're putting it into there, and through doing so, you then potentially, as you're training AI models, expose data to where you don't want to do so or have risks
19:45
And then the sovereignty demands, one of the aspects is going to be around, is your AI model explainable
19:51
Is it audible? Do you have local controls over it? And then also, so that's around that sort of governance and all this
19:58
And then you tie that also into AI infrastructure. Do you actually have your infrastructure in your nation or is it in someone else's nation
20:06
And actually you're dependent on data centers that you don't actually physically have access to control and the like
20:12
So I think it's a double-edged sword and it's one that can highly benefit us in this space
20:17
but also poses a significant amount of risk that we need to really contemplate and to find mitigations for within our deployments
20:25
All right, let's jump back to quantum. That was a fun conversation. Is quantum safe encryption a must-have now or still a few years away
20:35
Well, as a company that focuses on that, we are not at a state where there is a cryptographic relevant or quantum computer
20:43
advice coming from all the governments including NCSC here in the UK is you know that period is now
20:50
and it changes three to five to ten years out the issue is not that there is one today or there isn't
20:56
one today it's the roadmap to make yourself ready for when there is one when it's not a predictive
21:02
date that it is not a one because the likelihood of that being developed in the UK or in the US is
21:07
as likely as it being developed in an adversarial nation so predicting that actual you know Q day
21:13
is very very difficult but the route is not just flicking a switch with the
21:17
technology it is understanding where your risks are understanding what you're using today and being able to do ysis of it and where your risks are
21:25
and which set of your cryptographic inventories and technologies are the greatest risk and will take the longest implement solutions for it because there
21:33
isn't just one solution we as a company have a solution that we provide and we're
21:38
working into the marketplace but we cannot be the only solution there needs
21:42
to be multiple and there are different ones for different data sets or different systems
21:46
That evolution will take quite a long time. And you can think of it, in my mind, you can almost think of it like the rollout of different
21:53
technologies in say just communication itself. So when we've moved from out 3G to 4G to 5, it's not a flick of the switch and we all go
22:00
There's a lot of change that has to go with that. And it will be the same thing when it comes to Q-Day dealing with the quantum threat
22:08
it is a relevant threat to defense and one that needs to be addressed today or
22:15
starting to be addressed today to enable the operators in the community to be
22:20
ready yeah I'm gonna state the obvious Q day is a really sweet phrase by the way
22:24
I love I hadn heard that one that awesome Alan your views on Q day and quantum safe encryption and our timeline for it I think we going through a transition for that I think everyone recognizing that certainly maybe for the immediate future
22:38
we are where we are and we're on the kit that we've got right now
22:44
But I think it is transitioning and I think the threat is there and I think people are aware that anyone that supposes may well be applying quantum compute
22:53
to decryption of what we've already got. There's most certainly the risk there
22:57
So I think to move forward on it, we've really got to look at the problem and the challenge for the customers
23:03
for the militaries around NATO, and start with the problem and the challenge
23:08
and then work back how the compute and how the quantum can address that
23:13
It's not something you can just jump straight into as Sean's absolutely right
23:17
You can't switch and it's all working. You've really got to look at the problem. Operationally, what's that problem
23:23
There's a whole raft of different things go into that like the whole defense line the development aspect of doing it
23:29
You know the training the operations and then Go as quick as you can to get the best benefit that you can immediately and then have a much longer view of how you're going to be
23:42
Three four five years down the line, so it may be right now today. We're using
23:47
No quantum safe algorithms but that's a very viable thing to do right now today it could be in three times we've moved off that and we're on to
23:56
silicon on the chips and we're doing chip based quantum protection on the chip itself and you don't need other things that it's going to be a
24:04
journey in the technology sense that we just need to make sure we stay aligned to the customer and not promise them no panacea
24:12
to see your answer when it really might not be there just yet. And we take them with us and they take us with them
24:17
As a reminder to everyone here at the panel, if you would like to ask Sean or Alan any questions
24:22
go ahead and scan that QR code. We'll also go around with the microphone in a few minutes if you've got one for us in person
24:27
Just wanted to add to that. Please do. Whilst, yes, we're not at a point today where there is a cryptographic quantum relevant computer
24:35
that can break into, say, AS256 or some of the public infrastructure we have today
24:40
There is a threat though today to certain data sets. And those are the data sets that are long term or have long life data sets
24:46
Because very, very publicly advertised by many agencies and talked about in the press
24:51
is the threat of capturing data in transit today that is not breakable
24:55
or is very, very difficult to break at scale. But then once those computers, once those technologies become available
25:02
reverse engineering and breaking into those data sets or those information five years in the future, eight years in the future
25:07
The problem there is most of that data will have expired or won't have value at that point in time
25:12
But there will be significant data sets within there that do. Think of patent data
25:18
Think of operational long-term planning data. It could be personal data, financial data, and all the rest of it
25:23
So that information is available today. And we do have knowledge of adversarial nations collecting huge amounts of that data
25:30
both in the defense space but also in the commercial space. So the threat is here today for certain individuals
25:36
and dealing with it is something that has to be looked at sooner than later. How important is the partnerships component of all this
25:44
I think of Arkit's relationship with other major tech players, those sorts of partnerships
25:49
Maybe it gets to the broader point Alan made earlier with regards to interoperability
25:53
But Sean, from where you're positioned, does that make a difference, those partnerships
25:58
We won't deliver solutions without them. There is no one company showing up to deliver everything themselves
26:04
so and I look at how we operate right now so our partnerships we have a
26:08
partnership with DXC who has a systems integrator delivers all that sort of
26:13
capability around bringing technologies together for us and delivering that for the customer and then supporting it and enabling and delivering training and all
26:19
the rest of it but underneath that there are numerous organizations there are the
26:23
large equipment providers that provide the boxes and the hardware and the such then there are the public companies such as an Intel who are creating technology
26:33
such as the TDX chip which is secure compute moving forward which is required
26:37
to be able to protect AI workloads in the cloud and the like and then there's
26:40
companies like us and SME who come along and how could the innovative technology that goes and how do you secure that in transit or at rest how
26:47
you do that but all those layers together my team will be sick of using
26:51
this ogy it's making a meal and you need to have multiple ingredients in the
26:55
meal we as as our kid are a very very small ingredient in that but we're a
26:59
critical one potentially to making the whole stack of technology deliver that capability which can i
27:06
sorry which ingredient in the meal are you is it that you're an ingredient of the meal or it's like
27:11
this is thanksgiving dinner and you're like you're the cranberry sauce like you're one of the dishes
27:15
well the reference of thanksgiving being slightly american yeah that's true i apologize but i i agree
27:21
with the the ogy it's that sort of we're critical to that so and how that's delivered
27:27
Because within those solutions, within those capabilities, it's not just bringing them together
27:33
You need somebody who can bring them together, have done the testing, have done the work, looked at how it's going to be delivered and operated
27:39
looked at those threats that we talked about earlier and managed those adversities. You need all those aspects
27:43
So this is not a SME versus prime. This is not, you know, it requires that
27:49
And it often requires companies to sit in the same space that might be deemed as competitors to each other
27:54
to work together because actually those technologies together allow us to move faster rather than saying
28:00
I want my part of the pie and you can have yours. And doing that is good. Is it ever, one more follow-up
28:05
is it ever a bit begrudging to have those relationships saying, you know, we are usually competitors
28:09
We usually duke it out. But for right now, we put those differences aside
28:13
in the spirit of collaboration. I think it's easier for smaller companies to do that
28:17
I think because they have that flexibility. They haven't got the large shareholder base behind them
28:22
that maybe has come from a generation where you wouldn't have done that level of collaboration
28:28
without it being contractually driven and the like. So I think it is difficult
28:34
but I think there is the right mentality. I know this week, the conversations I have had
28:38
with lots of our partner companies, I have had conversations with organizations
28:42
that if on the outside you would look that they were our direct competitor to us or we are a threat to them
28:47
to say actually, is there something we should be doing together and exploring
28:51
Those conversations are happening now, and I think events like this are very critical to that because it gives us the opportunities to have those conversations rapidly
28:58
Excellent. Alan, forgive me. Please go. No, I think Sean's right. So we are the systems integrator, and I think we have about 15 companies doing the end-to-end capability and covering a whole range of things
29:11
I think anyone going down this is sort of going through a journey, a sort of set of steps
29:17
Yeah, we've innovated and we've gone through that initiating the tech and we're now into iterating that tech
29:24
We're into, is there a better bonded router? Is there a better radio
29:28
Is there a better anything that we can look at constantly improving? And I think we're now moving into what the National Armaments Directorate
29:36
calls scaling. How do we build it? How do we produce it on an industrial scale
29:40
We're no different to tanks, right? So if we're constantly looking if the if the government any government came back to it and said I need a thousand of these to deploy
29:49
How do we rapidly produce a thousand of these to deploy and it covers
29:54
Software and hardware and it's quite a difficult balance to get that and then you have to worry about how do you maintain
29:59
maintain it in the field. Who does that? How do you train the soldiers to maintain it or the sailors or the airmen
30:06
It's a really complicated thing and we're just sort of all, I think it's fair to say, going up that step
30:12
And the idea is to keep everyone on the same step at least as you go up that level
30:17
But we're getting there. I think we're moving through to what they call a minimal deployable capability
30:22
where you could actually take it out and you could use it in the field. And we're sort of getting there. We'll be experimenting with that in November, I think
30:30
roughly we're all on that so I think it's a journey really I hate to use that words everyone
30:35
says it's a journey don't they but it really is a you know moving up that ladder to get to something
30:41
that's actually really going to work and be deployed and support people and could be replicated
30:45
and it has to be dual use right anyone everyone dual use means it can be used in the mod sense it
30:53
could be used for the army the navy the air force it can be used for smart bases it can be used for
30:58
as many different uses they've got. And in our case, dual use also means we've got a commercial version of it
31:04
that supports Amazon. So 80% of the same tech. The gold and dust is in the 20% that the military use that Amazon don't need
31:12
But we can still industrialize it because we've got a massive footprint
31:16
to deliver that sort of capability so we do economy of scale
31:20
Amazing. We do have a, please. It is a journey. By the way, it's all a journey
31:27
So I appreciate that. We do have a question from someone in the audience, and thank you for this
31:31
So an open question for both of you. What is one immediate step you would take today to address risks to data networks to improve security while ensuring sovereignty and interoperability
31:44
One immediate step you would take today to address risks to data networks in order to improve security
31:52
I think the guidance has actually been given by the NCSC and in the U.S
31:56
by other organizations and all around the world, which is understanding what is actually in your network
32:02
If you think about all the different contracts over the last 30 years that we have led as subcontracts and these and all the rest of it
32:07
all of them have been implemented independently by different organizations. So we don't have one solution deployed today
32:15
Understanding what's in your network, being able to take that inventory, being able to look at where your risks are
32:20
and very quickly go, that's my highest risks, and address those and start to do that prioritization
32:25
I think that would be the absolute first step. It's one that's recommended by the NCSC here in the UK
32:32
And that's both commercially and leads into defense as well. And I think that would do that piece
32:38
Who should take the lead on data sovereignty? Is it governments? Is it industry
32:43
Or is it coalitions, groups like NATO? Or maybe a combination of all the above
32:50
I think it's the government and the coalition partners. It goes back to what I said earlier
32:55
you know we collectively need to understand what their real problem challenge is and what they trying to achieve And it their data not our data They the ones that can tell us what we need to protect solid and what we can protect less
33:11
Whether we're going to have to do it at Mission Assured Secret or whether we're going to be able to do it at OS
33:16
Whether we need to do it at Buff Secret. And I think once they tell us that, then we can work out the technology to do it
33:23
So we sort of go on what we call left to right thinking. If you start with what's your big strategy, what's your outcome, not your requirement
33:31
and then we'll design the tech to address your outcome, which will then align you to your strategy
33:37
And the outcome and the strategy is their data, it's their sovereignty, not ours
33:42
They need to help us help them. Yeah. I'd agree that it's a government-led operation or, you know
33:50
effectively data sovereignty is a nation's ability to deliver it and maintain it
33:56
However, it needs to be holistic. And I'll use that specific example being that traditionally we would say
34:03
we're going to go buy a weapons system or our capabilities. So look at UAVs as an example
34:07
And you go and buy the technology and data then, and the protection of the data is delivered by a different organization
34:12
or a different entity and is not a primary component within the bid process
34:17
or in thinking about the capability. But that doesn't create from the start a secure by design principle
34:24
which is heavily driven by Defence Digital. We've heard them talk about that. That's been a process here in the UK for two years to move to that secure by design
34:31
So it requires everybody to think about this from the start, whether that is when you're designing your capability as an OEM
34:38
when SIs are looking to pull together or small companies are looking to pull together bids to go after aspects
34:43
and also on the authority and on the government entities to be able to say, you need to consider these, you need to meet these standards within the bid process or in the providing capability
34:54
So it's on all of us, I think, to be able to deliver that. And I think the organizations, especially the OEMs, who think about can they, inside their capability, work with other partners, people like ourselves and others, to bring data protection as a core component of what they do and what they deliver
35:09
Not just the innovative tech that flies, sails, dives, whatever it would be
35:14
Because data is now effectively a key component of everything we do
35:19
And often you think of it, the data is actually the more component, an I-star asset
35:24
But the asset is just creating the data that is actually the part of value from that, for example
35:30
Yeah. Sean, you mentioned the GDPR earlier. And I was wondering the broader role that that plays
35:35
And I'm also reminded of what I believe just passed earlier this year, the Digital Operational Resilience Act, or DORA for short
35:42
Do those two initiatives here in the U.K. play a role in this broader conversation as well
35:50
Resilience is a big thing. resilience both at home but also when they're deployed forward
35:56
So you have to have resilience in the field and you have to have resilience back at the bases and in the UK or America or wherever so Absolutely resilience is is key and it means different things at different levels goes back to this What your outcome
36:10
What are you trying to achieve outcome of resilience in the field
36:15
May be very very different to resilience in the HQ in London and how you work that and understand that
36:22
determines what you design and I Think we need to get a little bit smart about that. We need to work out
36:31
You know how we enable that and and security and the resilience and the protection
36:37
There are lots of things. I think I think in where we are right now today. We've sort of traditional security the way we operate in the future
36:46
Can you really afford we've limited bandwidth at the edge to have a security capability that takes 20% of your bandwidth up
36:53
when you need all the bandwidth you've got for your operations and your movement of your data itself
37:00
Can you afford the sort of security models where if you change one thing, you've got to change everything
37:07
Is that affordable going forward in the current budgets and the climates that everyone knows we're working in
37:12
So I think all of those things need to be sort of holistic, and I think holistic is a great word
37:17
This isn't just about one thing. There's a whole string of things that need to be considered
37:23
together and that's quite hard. That can be quite hard, particularly where you're looking at the HQ in London
37:31
versus somebody that's five miles from the enemy. They're two very different things
37:37
I think, well, whilst not an expert on either of those frameworks
37:40
or those compliance rules and regs, I think the point is more that defense is not exempt from them. We operate within these other frameworks
37:48
And so we have to both understand them, but we also have to be able to influence them and understand that when those new laws are coming into place
37:55
or those changes and amendments, getting ahead and engaging so that we understand
38:00
what are the potential implications on us and making people understand that
38:03
And that's not to say that we don't want those regulations. We think, you know, defense holds a lot of personal information
38:08
for people who serve and the right, and that needs to be protected. So there is an aspect of it's important for us to meet those rules
38:15
because we do need to legally, but also from just doing the right thing by our people and the rest
38:20
So those frameworks have an impact on us. And we need to ensure that those individuals who are writing them and implementing them and bringing them into being understand or at least have insight of what the implication could be on defense and our ability to do what we are asked to do
38:35
But also when we come back to the coalition aspect, we have laws in the UK, but then we're then dealing with other nations that may have different laws
38:42
And that just complicates that picture. All right, we've got a few minutes left
38:46
We're going to do a lightning round. I'm making this up on the spot. Let's have a little let's have a little fun the final day here at DSCI all right first up guys
38:54
What grade would you give European data security today on a scale of a to F
39:02
All right that the only trouble I get myself in with that one No well if you need a hedge you certainly can Or maybe a range I think it definitely not an absolute
39:12
because it is implemented at different levels where you go organizationally, even within a single government
39:18
You know, different departments do this, and it's very skill-based. So I'm going to say we're sitting between that sort of that B and that D
39:25
Okay. Right? Yeah. I would agree with that, I think. and I think it's because we are exceptionally good at protecting some types of data
39:35
without a doubt. In fact, I would say in a lot of cases, the UK, the Five Eyes, the NATO
39:40
they're the best in the world at doing that. But to Sean's point, we're not the best at the world in everything
39:46
And I think the coalition integration and sharing is going to be so key going forward
39:52
It sort of moves us down the B to the F. So we're in between somewhere
39:56
We're really good at some things, not so good at others. reaching that and getting it a
40:01
Good level across a patch got a mixed report card. It's nice to bring that home to my mom all the time
40:07
Yeah, pretty good on these but your math it needs improvement. What should be the biggest priority better tech better people or better policies
40:15
I'm gonna third fourth column to that which is Moving faster to try new solutions to look at what's out there, right
40:23
If we wait three years if we wait five years a lot of the companies that are bringing interesting tech
40:29
may not be here and therefore the tech becomes unavailable but also the
40:34
assumption that the tech is going to be there if defense doesn't engage with
40:38
those companies that provide it is is a dangerous one so I think at the fourth
40:42
one is actually the answer which is in this space we need to be trying more and
40:46
when we find things that it succeed we need to implement them at pace okay
40:50
Alan I think I would say as well I would agree with that but I think there's a
40:56
There's another element which we always seem to overlook is these things need networks, they need communications
41:02
The communications are going to vary depending on where you are. And it's great having all of this capability, but if you don't have the networks that allow them to talk together, you're going to be truly struggling as well
41:12
So it's a combination of tech, I think. If all of that's in tech, it's a tech
41:17
I think we've got quite a lot of good policy. Sure. We've got about 30 seconds left
41:22
One thing you want the audience to remember today about data sovereignty. Data sovereignty is about how do you maintain data sovereignty whilst maintaining interoperability
41:31
That friction is the most difficult one we need to solve and address
41:36
Excellent. Alan? I think it is the biggest, most important challenge. And I think working out how they're going to share that across different nations is a really big challenge that we haven't yet really got to the bottom of how we're going to address
41:50
Alan, Sean, it is a great privilege to share the stage with both of you
41:54
Let's put our hands together one more time for our esteemed panelists here this morning. And a huge thank you to all of you
41:59
You made it. They're like last day at DSEI. We've got to hustle over to the panel. Enjoy the rest of your time here in London, everyone
42:04
And we will see you again soon. Thank you
#news


