I propose to take Questions Nos. 172, 173, 174 and 175 together.
In relation to my Department, I wish to advise that ICT services are provided by the Office of the Government Chief Information Officer (OGCIO) under the Department of Public Expenditure and Reform. On behalf of my Department, OGCIO implements a defence-in-depth security strategy which is achieved through the effective combination of People, Processes, and Technology to support the implementation of appropriate security measures and provisions. Included in this defence-in-depth security strategy are policies and plans to address risks from malicious software such as ransomware. These ensure that a consistent and effective approach is followed in the management of cyber security threats and incidents.
For operational and security reasons, my Department does not disclose specific information relating to cyber security tools, spend, training, in house expertise and specific strategies employed to counter and combat the threats posed to information security.
I can advise the Deputy that a reciprocal shared services arrangement is in place between my Department and D/PENDR. As part of this, D/PENDR provide Internal Audit Unit services to my Department. D/PENDR engaged consultants to perform a joint cybersecurity audit for both Departments in 2023 with the cost borne by DPENDR.
My Department recognises the importance of maintaining strong cyber security awareness and ensures staff stay up to date on evolving cyber security threats including malware, phishing attacks and social engineering deception schemes.
Finally, my Department works closely with OGCIO and the National Cyber Security Centre which is a division of the Department of Communications, Climate Action and Environment, and encompasses the State's national/governmental Computer Security Incident Response Team (CSIRT-IE). CSIRT-IE is an internationally accredited response team focusing on enhancing both situational awareness and providing incident response for national cyber security incidents (including ransomware attack).