Read transcripts of debates in both Houses
Produced by Commons Library, Lords Library and Parliamentary Office Science and Technology
Search for Members by name, postcode, constituency and party
Learn about their experience, knowledge and interests
Celebrating people who have made Parliament a positive, inclusive working environment
Four staff networks for people to discuss and consider issues.
Contact your MP or a Member of the House of Lords about an issue that matters to you
Sign up for the Your Parliament newsletter to find out how you can get involved
Take a tour of Parliament and enjoy a delicious afternoon tea by the River Thames
See some of the sights you’ll encounter on a tour of Parliament
Book a school visit, classroom workshop or teacher-training session
Access videos, worksheets, lesson plans and games
Joint Committee on the National Security Strategy
Reports published; awaiting Government response.
Note: Table 1 in the report inadvertently omitted some departments when referencing a written evidence source (CNI0013).
The Government's 2016 cyber security strategy states that the cyber security of the UK’s critical national infrastructure (CNI)—from the physical infrastructure to the digital networks and data—is critical, because a successful attack "would have the severest impact on the country’s national security". Yet the strategy also acknowledges that across many priority sectors "cyber risk is still not properly understood or managed, even as the threat continues to diversify and increase". An additional challenge to Government is that most of the UK's CNI is owned and operated by the private sector.
The Joint Committee is holding an inquiry into the Government's approach to ensuring the cyber security of UK critical national infrastructure, exploring in particular how it works together with private-sector operators and industry regulators in doing so.
Read all transcripts, written evidence and other material related to the inquiry on Cyber Security: Critical National Infrastructure.
JCNSS publish correspondence regarding Cyber Security Skills Strategy