{"id":43638,"date":"2023-08-31T11:51:39","date_gmt":"2023-08-31T10:51:39","guid":{"rendered":"https:\/\/www.elixirr.com\/?p=43638"},"modified":"2025-11-07T17:11:24","modified_gmt":"2025-11-07T17:11:24","slug":"cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations","status":"publish","type":"post","link":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/","title":{"rendered":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations"},"content":{"rendered":"\n<p><strong><em>This piece is written by Elixirr\u2019s cybersecurity experts, in collaboration with <a href=\"https:\/\/www.linkedin.com\/in\/johnlash\/\" target=\"_blank\" rel=\"noreferrer noopener\">John Lash<\/a>, Founder of specialised security consultancy, Darkhorse. John has worked with our team for several years on a number of strategic and tactical cybersecurity projects, bringing his deep expertise and knowledge to support across multiple client engagements.<\/em><\/strong><\/p>\n\n\n\n<p>Today, the nations of the world have integrated so much so that digital technology is both apparent in every man-made structure and beamed across the globe wirelessly, and invisibly, by satellites and other devices. All these interconnections present a tremendous opportunity, but also a pathway for bad actors. Cyber threats and incidents are front-page news, causing public humiliation and financial loss to governments and organisations alike. These threats must be dealt with in a way that safeguards national security, protects economic stability and ensures personal privacy.<\/p>\n\n\n\n<p>As global economic conditions continue to be volatile, the landscape for investments, mergers and acquisitions, and other forms of capital markets activity, remains highly dynamic. However, considering the current geopolitical environment, market participants must recognise that not all capital is treated equally \u2013 whether a company seeking to raise funds, or investors looking to deploy funds into opportunistic investments worldwide, it varies significantly. A key component of the risk in these investment activities relates to cybersecurity risks, including how resilient a company may be to potential cyber threats and how mature a company&#8217;s cybersecurity posture is to protect and defend against a new era of emerging risks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-learning-from-past-data-breaches\"><strong>Learning from past data breaches<\/strong><\/h2>\n\n\n\n<p>In 2022,\u00a0<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">83%<\/a>\u00a0of organisations experienced more than one data breach. What\u2019s more, companies suffered an average decline of\u00a07.5%\u00a0in their stock values after a breach. One well-known example, the \u2018<a href=\"https:\/\/www.wired.com\/story\/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever\/\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds Supply Chain Attack\u2019<\/a>\u00a0of 2020, is widely regarded as one of the most audacious cyber espionage campaigns. State-sponsored attackers compromised the software supply chain of SolarWinds, a prominent IT company, which led to the infiltration of numerous government agencies and private corporations, highlighting the far-reaching consequences of compromised supply chains.<\/p>\n\n\n\n<p>Learning from SolarWinds, it\u2019s clear that a National Security Investment Review (NSIR) is hugely important \u2013 a NSIR assesses foreign investment in sensitive industries, seeking to minimise risks and prevent adverse national security outcomes. Read on for insights and lessons learned from NSIRs with global institutions across the US, UK and Europe.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The origin of NSIRs&nbsp;&nbsp;<\/strong><\/h2>\n\n\n\n<p>The creation of NSIRs can be traced to a variety of contributing factors: national security concerns, foreign investment and risk associated with sensitive technologies.<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/home.treasury.gov\/policy-issues\/international\/the-committee-on-foreign-investment-in-the-united-states-cfius\/cfius-enforcement-and-penalty-guidelines\" target=\"_blank\" rel=\"noreferrer noopener\">Committee on Foreign Investment in the United States<\/a>&nbsp;(CFIUS) is the main governing body that assesses foreign investments for national security risks. The committee dates to 1988 and the Exon-Florio amendment, which empowered the President of the United States to suspend or prohibit certain merger and acquisition deals that could pose a threat to national security. Since that time, the authority of CFIUS has been expanded twice: once in 2007 by the Foreign Investment and National Security Act of 2007 (FINSA) and again in 2018 by the Foreign Investment Risk Review Modernization Act (FIRRMA). In 2022, President Biden issued the first-ever presidential directive&nbsp;<a href=\"https:\/\/www.bclplaw.com\/en-US\/events-insights-news\/fdi-regulation-in-the-us-uk-france-and-germany.html\" target=\"_blank\" rel=\"noreferrer noopener\">(Executive Order 14083)<\/a>&nbsp;to further address evolving national security risks and enforcement guidelines; the directive focused on key areas including cybersecurity risks, sensitive data, and US technological leadership.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Across the pond<\/strong><\/h2>\n\n\n\n<p>In the UK, an equivalent governing body exists, established by the&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/publications\/national-security-and-investment-act-2021-guidance-on-compliance-and-enforcement\/national-security-and-investment-act-2021-guidance-on-compliance-and-enforcement\" target=\"_blank\" rel=\"noreferrer noopener\">National Security and Investment Act of 2021 (NSIA)<\/a>, which granted the government the power to scrutinise and potentially block or modify investments that pose a threat to national security.<\/p>\n\n\n\n<p>Throughout Europe, NSIRs vary country to country, as there is no pan-European framework for national cybersecurity regulation; although the European Union heavily encourages that member states follow foreign investment screening regulations. As of&nbsp;<a href=\"https:\/\/www.linklaters.com\/en\/insights\/blogs\/foreigninvestmentlinks\/2023\/june\/us-and-eu-outbound-investment-where-are-we\" target=\"_blank\" rel=\"noreferrer noopener\">June 2023<\/a>, 18 member states now have new or revised regimes in place and 5 are expected to follow suit later this year, leaving&nbsp;<a href=\"https:\/\/www.linklaters.com\/en\/insights\/blogs\/foreigninvestmentlinks\/2023\/june\/us-and-eu-outbound-investment-where-are-we\" target=\"_blank\" rel=\"noreferrer noopener\">Bulgaria<\/a>&nbsp;as the only member state with neither an existing nor proposed foreign investment screening regime.&nbsp;<\/p>\n\n\n\n<p>The common thread across NSIRs worldwide is an expansive focus on cybersecurity as it relates to the protection of critical infrastructure, sensitive data and intellectual property of companies and their customers, as well as protecting government operations. Throughout the review process, companies and investors must be able to define how their cybersecurity programs deter and prevent cyberattacks, protect their infrastructure and sensitive data, and remain free from outside interference.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Practical&nbsp;advice<\/strong><\/h2>\n\n\n\n<p>Global interconnectivity and reliance on technology is not slowing down, and therefore cybersecurity will remain the lynchpin of security and compliance efforts. While many companies are already investing heavily in cybersecurity, many of the security conditions imposed by governments during NSIRs involve an expansion of these efforts with respect to cybersecurity posture and model maturity. When considering investment activity that will fall within NSIR regulations, businesses must consider the following:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implementing strong security controls consistent with global frameworks.<\/strong>&nbsp;This includes considering how the control environment aligns with guidelines and frameworks such as ISO 27001, the Center for Internet Security (CIS) controls, and the standards developed by the National Institute of Standards and Technology (NIST). These frameworks should address the following categories of controls, including but not limited to access controls, inventories of authorised devices, secure configurations, data recovery, log controls, penetration testing, security training, and incident handling and response.&nbsp;<\/li>\n\n\n\n<li><strong>Cybersecurity education across the organisation.<\/strong>&nbsp;Employees are often the weakest link in the security chain, and it is important to train them on how to identify and avoid cyberattacks.&nbsp;<\/li>\n\n\n\n<li><strong>Cyber resilience and response.<\/strong>&nbsp;Companies must have a plan for responding to cyberattacks that will not only address the issue but also ensure business continuity, returning them to business as usual as quickly<strong>&nbsp;<\/strong>as possible.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>For companies that receive regulatory approval at the conclusion of their NSIR, there may be an agreement in place with the governmental authority to maintain certain cybersecurity protocols to mitigate against national security risks. In these cases, the company must develop and operationalise a robust cybersecurity program to comply with that agreement. If the company does not meet those obligations, governmental authorities can impose penalties for non-compliance.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The reality of non-compliance<\/strong><\/h2>\n\n\n\n<p>The US government authorises&nbsp;CFIUS&nbsp;to impose monetary penalties (in&nbsp;<a href=\"https:\/\/home.treasury.gov\/policy-issues\/international\/the-committee-on-foreign-investment-in-the-united-states-cfius\/cfius-enforcement-and-penalty-guidelines\" target=\"_blank\" rel=\"noreferrer noopener\">2019<\/a>, the government issued a USD 1 million civil penalty) and to seek other penalties (directed notices, action plans, etc.) for violations of the guidelines. Typical violations include failure to file timely notices, non-compliance with CFIUS mitigations, material misstatement and omission or false certification. CFIUS relies on a variety of sources for information such as the US government, publicly available information and third-party providers, (e.g., auditors and monitors).<\/p>\n\n\n\n<p>In the UK, the enforcement of non-compliance is dealt with by the governmental group called the&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/publications\/national-security-and-investment-act-2021-guidance-on-compliance-and-enforcement\/national-security-and-investment-act-2021-guidance-on-compliance-and-enforcement\" target=\"_blank\" rel=\"noreferrer noopener\">Investment Security Unit (ISU)<\/a>&nbsp;residing within the Department for Business Energy and Industrial Strategy (BEIS). Penalties can apply to individuals, businesses or both. For individuals, the penalty will be based on a percentage of income, whereas for businesses the maximum penalty is greater than 5 percent of annual turnover or an amount up to GBP 10 million.<\/p>\n\n\n\n<p>To highlight two European examples of penalties related to non-compliance with foreign direct investment regulations (France and Germany respectively), an investment made without authorisation can result in the issuance of injunctions to file an application for authorisation, to reverse the transaction or to modify the investment. Penalties of twice the amount of the investment, 10 percent of the target\u2019s annual turnover or EUR 5 million can be imposed, whichever is greatest. In Germany, an intentional breach is punishable by imprisonment for up to 5 years or a fine; however, breaches due to negligence are punishable by an administrative fine of up to EUR 500,000.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Both<\/strong><strong>&nbsp;business imperative&nbsp;and mandated requirement&nbsp;<\/strong><\/h2>\n\n\n\n<p>Ultimately, while cybersecurity should be a business imperative for companies given the potential commercial ramifications, in certain cases with respect to NSIRs, the cybersecurity environment is a mandated requirement with the potential for significant penalties. Given the technological integration of the modern world, the US, UK, Europe and other modern economies across the globe face cooperative challenges including legal frameworks (huge differences regarding data protection laws, liability frameworks and breach notification requirements that hinder collaboration), cultural norms (political considerations that affect the prioritisation of cybersecurity), economic structures and technology landscapes.&nbsp;<\/p>\n\n\n\n<p>Some notable initiatives to promote interregional cybersecurity are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>GDPR (Europe):<\/em><\/strong><em>&nbsp;The General Data Protection Regulation (GDPR) is a significant effort to harmonise data protection regulations across the European Union. It sets a common standard for data protection and privacy, influencing how organisations handle personal data.<\/em><\/li>\n\n\n\n<li><strong><em>NIS Directive (Europe):<\/em><\/strong><em>&nbsp;The EU Directive on Security of Network and Information Systems (NIS Directive) aims to achieve a common level of cybersecurity across EU member states, particularly for critical infrastructure sectors.<\/em><\/li>\n\n\n\n<li><strong><em>EU-US Privacy Shield:<\/em><\/strong><em>&nbsp;While no longer in effect, the EU-US Privacy Shield was an attempt to facilitate the transfer of personal data between the EU and the US by ensuring that American<strong>&nbsp;<\/strong>companies met European data protection standards.<\/em><\/li>\n\n\n\n<li><strong><em>Cybersecurity Information Sharing:<\/em><\/strong><em>&nbsp;Initiatives that promote the sharing of cybersecurity threat intelligence and best practices among nations can indirectly lead to some level of harmonisation; examples include the US Cyber Information Sharing Act (CISA) of 2015 and similar efforts in other regions.<\/em><\/li>\n\n\n\n<li><strong><em>International Standards (ISO):<\/em><\/strong><em>&nbsp;The International Organisation for Standardisation (ISO) develops cybersecurity standards (e.g., ISO 27001) that can provide a common framework for organisations worldwide, encouraging alignment across regions.<\/em><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Take action, today<\/strong><\/h2>\n\n\n\n<p>Based on our collective experience in this space, we urge that you apply these learnings to your businesses. The motivations behind these NSIR regulations include expansive provisions to protect the cybersecurity interests of critical infrastructure, preserving technological leadership and safeguarding sensitive information from foreign control. In all three regions, the creation of these reviews highlights the increasing understanding of national security risks associated with foreign investments.<\/p>\n\n\n\n<p>Importantly, having a well-established and maintained cybersecurity program within an organisation will help a company navigate a national security review from the onset. The ability to provide an evidence-based and programmatic approach will provide regulators with key information necessary to help achieve a positive outcome. At the conclusion of a merger, acquisition, or foreign investment deal, enhancing the maturity of your cybersecurity program will aid in preventing any future issues which may cause commercial harm or incur regulatory penalties.<\/p>\n\n\n\n<p>Our teams of experts at both Elixirr and Darkhorse have the ability and experience to help you navigate the complex process of national security investment reviews in a constantly evolving, technologically connected world.&nbsp;<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>This piece is written by Elixirr\u2019s cybersecurity experts, in collaboration with John Lash, Founder of specialised security consultancy, Darkhorse. John has worked with our team for several years on a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":43656,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[116],"tags":[107],"related_service":[344],"related_industry":[],"class_list":["post-43638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber-national security: understanding the importance of National Security Investment Reviews and regulations - Elixirr<\/title>\n<meta name=\"description\" content=\"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today&#039;s world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations\" \/>\n<meta property=\"og:description\" content=\"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today&#039;s world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\" \/>\n<meta property=\"og:site_name\" content=\"Elixirr\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-31T10:51:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T17:11:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"edx\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"edx\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\"},\"author\":{\"name\":\"edx\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1\"},\"headline\":\"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations\",\"datePublished\":\"2023-08-31T10:51:39+00:00\",\"dateModified\":\"2025-11-07T17:11:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\"},\"wordCount\":1764,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\",\"keywords\":[\"Cyber Security\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\",\"url\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\",\"name\":\"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations - Elixirr\",\"isPartOf\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\",\"datePublished\":\"2023-08-31T10:51:39+00:00\",\"dateModified\":\"2025-11-07T17:11:24+00:00\",\"description\":\"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today's world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage\",\"url\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\",\"width\":2400,\"height\":1440,\"caption\":\"Cyber-national security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.elixirr.com\/en-gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#website\",\"url\":\"https:\/\/www.elixirr.com\/en-gb\/\",\"name\":\"Elixirr\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.elixirr.com\/en-gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#organization\",\"name\":\"Elixirr\",\"alternateName\":\"Elixirr International PLC\",\"url\":\"https:\/\/www.elixirr.com\/en-gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2025\/11\/elixirr-logo.png\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2025\/11\/elixirr-logo.png\",\"width\":200,\"height\":200,\"caption\":\"Elixirr\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1\",\"name\":\"edx\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g\",\"caption\":\"edx\"},\"sameAs\":[\"http:\/\/elixirr.vps.staging.elixirrdigital.com\"],\"url\":\"https:\/\/www.elixirr.com\/en-gb\/person\/edx\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations - Elixirr","description":"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today's world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/","og_locale":"en_US","og_type":"article","og_title":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations","og_description":"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today's world.","og_url":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/","og_site_name":"Elixirr","article_published_time":"2023-08-31T10:51:39+00:00","article_modified_time":"2025-11-07T17:11:24+00:00","og_image":[{"width":2400,"height":1440,"url":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg","type":"image\/jpeg"}],"author":"edx","twitter_card":"summary_large_image","twitter_misc":{"Written by":"edx","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#article","isPartOf":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/"},"author":{"name":"edx","@id":"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1"},"headline":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations","datePublished":"2023-08-31T10:51:39+00:00","dateModified":"2025-11-07T17:11:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/"},"wordCount":1764,"commentCount":0,"publisher":{"@id":"https:\/\/www.elixirr.com\/en-gb\/#organization"},"image":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg","keywords":["Cyber Security"],"articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/","url":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/","name":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations - Elixirr","isPartOf":{"@id":"https:\/\/www.elixirr.com\/en-gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage"},"image":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg","datePublished":"2023-08-31T10:51:39+00:00","dateModified":"2025-11-07T17:11:24+00:00","description":"Explore the essentials of cybersecurity to protect your digital assets and ensure online safety in today's world.","breadcrumb":{"@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#primaryimage","url":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg","contentUrl":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg","width":2400,"height":1440,"caption":"Cyber-national security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.elixirr.com\/en-gb\/"},{"@type":"ListItem","position":2,"name":"Cyber-national security: understanding the importance of National Security Investment Reviews and regulations"}]},{"@type":"WebSite","@id":"https:\/\/www.elixirr.com\/en-gb\/#website","url":"https:\/\/www.elixirr.com\/en-gb\/","name":"Elixirr","description":"","publisher":{"@id":"https:\/\/www.elixirr.com\/en-gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.elixirr.com\/en-gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.elixirr.com\/en-gb\/#organization","name":"Elixirr","alternateName":"Elixirr International PLC","url":"https:\/\/www.elixirr.com\/en-gb\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/logo\/image\/","url":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2025\/11\/elixirr-logo.png","contentUrl":"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2025\/11\/elixirr-logo.png","width":200,"height":200,"caption":"Elixirr"},"image":{"@id":"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1","name":"edx","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-gb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g","caption":"edx"},"sameAs":["http:\/\/elixirr.vps.staging.elixirrdigital.com"],"url":"https:\/\/www.elixirr.com\/en-gb\/person\/edx\/"}]}},"card":"<article class=\"wp-component-card edwp-component wp-component-card--resource            wp-component-card--link js-card-link\n        edwp-fade-in\">\n            <figure class=\"wp-component-card__image-wrapper\">\n                            <img width=\"2400\" height=\"1440\" src=\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg\" class=\"wp-component-card__image\" alt=\"Cyber-national security\" decoding=\"async\" srcset=\"https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security.jpg 2400w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-300x180.jpg 300w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1024x614.jpg 1024w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-768x461.jpg 768w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1536x922.jpg 1536w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-2048x1229.jpg 2048w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-87x52.jpg 87w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-319x191.jpg 319w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-479x287.jpg 479w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-567x340.jpg 567w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-767x460.jpg 767w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1023x614.jpg 1023w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1278x767.jpg 1278w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1378x827.jpg 1378w, https:\/\/www.elixirr.com\/en-gb\/wp-content\/uploads\/2023\/08\/Cyber-national-security-1640x984.jpg 1640w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/>            <div class=\"wp-component-card__preview-icon\">\n                <span class='edwp-svg '><svg width=\"47\" height=\"47\" viewBox=\"0 0 47 47\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g>\n<path d=\"M23.4141 0.539062C36.1232 0.539183 46.4258 10.8416 46.4258 23.5508C46.4257 36.2599 36.1231 46.5624 23.4141 46.5625C10.7049 46.5625 0.402465 36.2599 0.402344 23.5508C0.402344 10.8415 10.7048 0.539062 23.4141 0.539062ZM23.4141 1.68945C11.3606 1.68945 1.55273 11.4974 1.55273 23.5508C1.55286 35.6041 11.3607 45.4111 23.4141 45.4111C35.4673 45.411 45.2743 35.604 45.2744 23.5508C45.2744 11.4974 35.4674 1.68957 23.4141 1.68945Z\" fill=\"currentColor\"\/>\n<path d=\"M19.2841 33.6992C18.9579 33.6986 18.6374 33.6111 18.3543 33.4454C17.7167 33.0759 17.3203 32.3585 17.3203 31.5797V15.8189C17.3203 15.0379 17.7167 14.3227 18.3543 13.9531C18.6442 13.7827 18.9735 13.6951 19.3078 13.6994C19.6421 13.7037 19.9692 13.7998 20.2548 13.9776L33.4237 22.0406C33.6981 22.2166 33.9244 22.461 34.0812 22.751C34.238 23.0409 34.3203 23.3668 34.3203 23.6982C34.3203 24.0295 34.238 24.3555 34.0812 24.6454C33.9244 24.9353 33.6981 25.1798 33.4237 25.3558L20.2527 33.421C19.9604 33.6017 19.6256 33.6979 19.2841 33.6992Z\" fill=\"currentColor\"\/>\n<\/g>\n<\/svg>\n<\/span>            <\/div>\n                        <\/figure>\n        <div class=\"wp-component-card__content edwp-row-load\">\n                                    <p class=\"wp-component-card__eyebrow\">\n                Articles            <\/p>\n                <a href='https:\/\/www.elixirr.com\/en-gb\/cyber-national-security-understanding-the-importance-of-national-security-investment-reviews-and-regulations\/' class='wp-component-card__title'>\n            <h2>\n                Cyber-national security: understanding the importance of National Security Investment Reviews and regulations\n            <\/h2>\n        <\/a>                                    <div class=\"wp-component-card__description\">\n                    This piece is written by Elixirr\u2019s cybersecurity experts, in collaboration with John Lash, Founder of specialised security consultancy, Darkhorse. John has worked with our team for several years on a&hellip;                <\/div>\n                                                    <div class=\"wp-component-card__meta\">\n                                            <p class=\"wp-component-card__date\">\n                            31 August 2023                        <\/p>\n                                                                <div class=\"wp-component-card__terms\">\n                                                                                                                                                    <div class=\"wp-component-tags edwp-component\">\n                        <div class=\"wp-component-tags__tag\">\n                Cybersecurity            <\/div>\n                <\/div>\n                        <\/div>\n                                    <\/div>\n                                                    <div class=\"wp-component-card__button-wrapper\">\n                    <button class=\"btn btn--link arrow wp-component-card__button\">\n                                                                            Read more                                                                            <span class='edwp-svg '><svg width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Lg\">\n<path id=\"Vector\" d=\"M1.12509 9.50162H15.8648L9.43259 3.06941C9.374 3.0113 9.3275 2.94216 9.29576 2.86599C9.26403 2.78981 9.24769 2.70811 9.24769 2.62559C9.24769 2.54307 9.26403 2.46137 9.29576 2.38519C9.3275 2.30902 9.374 2.23988 9.43259 2.18177C9.54971 2.06535 9.70814 2 9.87328 2C10.0384 2 10.1969 2.06535 10.314 2.18177L17.8151 9.6829C17.8737 9.74101 17.9202 9.81014 17.9519 9.88632C17.9837 9.96249 18 10.0442 18 10.1267C18 10.2092 17.9837 10.2909 17.9519 10.3671C17.9202 10.4433 17.8737 10.5124 17.8151 10.5705L10.314 18.0717C10.1975 18.1871 10.0404 18.2522 9.87641 18.2529C9.79414 18.2534 9.71259 18.2376 9.63643 18.2065C9.56027 18.1754 9.491 18.1296 9.43259 18.0717C9.374 18.0135 9.3275 17.9444 9.29576 17.8682C9.26403 17.7921 9.24769 17.7104 9.24769 17.6278C9.24769 17.5453 9.26403 17.4636 9.29576 17.3874C9.3275 17.3113 9.374 17.2421 9.43259 17.184L15.8711 10.7518H1.12509C0.959309 10.7518 0.800312 10.686 0.683084 10.5687C0.565857 10.4515 0.5 10.2925 0.5 10.1267C0.5 9.96093 0.565857 9.80193 0.683084 9.68471C0.800312 9.56748 0.959309 9.50162 1.12509 9.50162Z\" fill=\"#1D0F25\"\/>\n<\/g>\n<\/svg>\n<\/span>                                            <\/button>\n                <\/div>\n                                            <\/div>\n<\/article>\n","_links":{"self":[{"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/posts\/43638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/comments?post=43638"}],"version-history":[{"count":1,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/posts\/43638\/revisions"}],"predecessor-version":[{"id":56698,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/posts\/43638\/revisions\/56698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/media\/43656"}],"wp:attachment":[{"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/media?parent=43638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/categories?post=43638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/tags?post=43638"},{"taxonomy":"related_service","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/related_service?post=43638"},{"taxonomy":"related_industry","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-gb\/wp-json\/wp\/v2\/related_industry?post=43638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}