The Curious Presence of Cyber in Local Government Strategy

Cybersecurity is no longer absent from local government strategy, but according to research from the Local Gov Strategy Forum, it remains structurally subordinate. Despite increased investment and board-level visibility, it does not shape transformation. Instead, it sits behind financial survival and service modernisation, creating a misalignment where systemic risk is acknowledged but not architecturally addressed.

Contents

1. Introduction

When I wrote about “The Curious Absence of Cyber in Local Government Technology Strategy“, the claim was deliberately provocative.

The latest Local Government Strategy Forum research (June 2026) suggests something more precise, and arguably more concerning (“Local Government Strategy Forum, 15th-17th June 2026, Client Research Report” website and PDF).

Cyber isn’t absent. It’s present, visible, and increasingly funded. And yet it still doesn’t appear to matter.

2. Cyber Is Present, But Not Leading

The report shows that 58% of councils are increasing cybersecurity spend, placing it alongside cloud, data, and just behind AI in terms of investment priority. On paper, this looks like progress.

Cyber is now described as “board-level”, tied to governance, regulation, and organisational risk. There is a clear awareness of increasing incident rates, regulatory pressure, and systemic vulnerability. None of that is surprising. What is more interesting is what cyber is not doing. It is not shaping strategy.

3. Strategy Is Still Driven by Service Transformation

The dominant strategic priority across the cohort is not resilience, risk, or assurance. It is the modernisation of service delivery. This is framed in familiar terms:

  • digital access
  • automation
  • AI-enabled services
  • data-driven decision making

The language is about capability, efficiency, and transformation. Cyber does not appear in that framing. It sits adjacent to it.

4. Cyber’s Actual Position in the System

This is not an omission. It is a positioning decision. Cybersecurity is treated as a constraint on transformation, not a determinant of it. It appears in the report in three consistent ways:

  • First, as governance.
    Something to align with frameworks, codes, and upcoming legislation.
  • Second, as a consequence.
    Something that becomes relevant when incidents occur, services are disrupted, and regulators become involved.
  • Third, as a capability gap.
    A shortage of skills, capacity, and internal expertise constrains the ability to manage risk effectively.

All of these are valid. None of them places cyber at the centre of how systems are designed, procured, or operated.

5. The Operating Environment

At the same time, the report is explicit about the conditions in which this strategy is being executed. Councils are operating under significant financial pressure, with multi-billion-pound funding gaps and a requirement to invest in technology to deliver measurable returns within 12–24 months.

They are constrained by legacy systems, fragmented data, and limited internal capacity, and are increasingly dependent on external partners to deliver transformation programmes. These are not marginal factors. They are the environment in which strategic decisions are made.

6. What This Report Actually Is

It is worth being explicit about what this document represents.

This is not a strategic analysis of local government. It is a synthesis of delegate input, survey data, and sector references, produced in the context of a vendor-facing forum. Its purpose is to describe demand, identify constraints, and signal where solution providers can position themselves.

That shapes what it does, and what it does not do.

The report captures stated priorities and perceived barriers. It does not interrogate them. It does not distinguish between different types of authority, levels of maturity, or organisational capability. It does not attempt to explain why these patterns exist, or whether they are internally consistent.

This is not a flaw in the report. It reflects its purpose. The value of the document lies in what it reflects, not what it concludes.

7. Signal versus Interpretation

Read in that context, the report provides a useful signal. It confirms that:

  • AI and automation dominate investment narratives
  • legacy systems and skills gaps remain persistent constraints
  • councils require demonstrable returns within short timeframes
  • delivery capacity, rather than ambition, is the limiting factor

These are not new insights, but they are consistently reinforced. What is less clear, and left unexplored, is whether these conditions can coexist without failure. What the report does not provide is interpretation.

It does not explore the interaction between these factors or the structural implications of pursuing transformation under these conditions. It does not examine whether prioritising service modernisation over resilience is sustainable, or how these choices compound risk over time.

As a result, the document describes a system under pressure without analysing how that system behaves.

8. The Implicit Strategic Hierarchy

Within that environment, the implicit hierarchy becomes clear:

  1. Deliver financial sustainability
  2. Modernise services
  3. Manage cyber risk

Cyber is not ignored. It is simply third.

9. The Unresolved Tension

This matters because the same report also describes cyber risk as systemic, increasing, and operationally disruptive. Incidents do not degrade performance: they stop services.

That includes housing systems, revenues and benefits, and social care delivery. In other words, the failure mode of digital transformation in local government is not inefficiency: it is unavailability.

10. Cyber as Architecture, Not Assurance

There is a tension here that the strategy does not resolve. If cyber risk has the potential to interrupt or disable core services, then it is not just a governance issue. It is an architectural one. It should influence:

  • how systems are integrated
  • how data is structured and shared
  • how suppliers are selected
  • how services are designed and operated

But that influence is not visible in the strategic framing.

11. A Coherent but Fragile Model

Instead, the report reinforces a model in which:

  • transformation is driven by service outcomes and cost pressures
  • technology choices are shaped by delivery constraints and ROI
  • cyber is layered on top as assurance and compliance

This is a coherent model. It is also a fragile one.

12. The Underlying Assumption

A more accurate description of the current state might be this:

  • Local government is not failing to consider cyber.

It is assumed that cyber can be addressed after the fact, without fundamentally altering the trajectory of transformation. That assumption may hold in the short term. It becomes harder to sustain as dependency on digital services increases.

13. The Missing Layer

There is a layer missing from the report, and it is the one that matters most.

The document identifies cyber risk as systemic, increasing, and disruptive. It also shows that digital transformation is accelerating, driven by financial pressure and policy direction.

What it does not do is connect these two observations.

There is no attempt to model how increased dependency on digital services interacts with underdeveloped cyber capability, or how architectural decisions made under delivery pressure affect long-term resilience.

Instead, cyber and transformation are described in parallel. That is not an absence. It is a misalignment.

And it is not theoretical. It is already embedded in how systems are being designed, procured, and operated.

It will only become visible when those systems fail under conditions they were never structured to withstand.

14. Conclusion: Misalignment, Not Absence

The original argument was that cyber was missing from the strategy. The updated position is narrower and less comfortable. Cyber is present, funded, and discussed, but it is not doing the work that its risk profile would suggest. That is not an absence. It is a misalignment. And it is one that will only become visible under stress. The conditions for that failure are already in place.

UK Cyber Policy Ecosystem Mapped: Structure and Evidence

This article maps the core policy architecture and supporting evidence underpinning the UK cyber security ecosystem. By separating system-defining strategies, legislation, and sectoral analyses from the research and technical studies that inform them, it provides a clearer view of how cyber policy, economics, and regional development interact across government and industry.

Continue reading

Lived Experience and the Question of Usefulness

Part 3 of a seven-part series exploring what it feels like to live inside a system that values certain minds for their usefulness. Recognition of neurodivergent strengths in modern industries has created new opportunities, but lived experience reveals a more complex reality. This article reflects on the gap between technical usefulness and social understanding, exploring masking, misinterpretation, and the persistent challenge of belonging in environments built around neurotypical expectations.

Continue reading

No Comfort Here: Muriel Spark, Catholicism, and the Problem of Control versus Self Control

Muriel Spark’s fiction rejects the idea that conversion offers comfort. Instead, it imposes structure, constraint, and limits on human authorship. Through The Driver’s Seat and The Public Image, and in contrast to postmodernism and writers like du Maurier, Spark shows that attempts at total control collapse into termination. Set against lived experience of suicide and ideation, the essay argues that meaning requires shared reality and sustained participation, not imposed closure.

Continue reading

Neurodiversity and the Question of Usefulness

Part 2 of a seven-part series examining how modern societies frame neurodivergent cognition as economically valuable. As neurodiversity gains recognition, autistic and ADHD cognitive traits are increasingly framed as valuable assets in technical industries. This article explores the tension between genuine acceptance and economic instrumentalisation, examining how societies celebrate neurodivergent minds for their analytical strengths while often overlooking the broader realities of neurodivergent experience.

Continue reading

The Spectrum Didn’t Collapse. It Was Flattened. A Response to the Uta Frith Autism Debate.

A response to Dame Uta Frith on autism, diagnosis, and the limits of the spectrum. Dame Uta Frith’s claim that the autism spectrum is “close to collapse” reflects a real tension in modern diagnosis. This article argues that the issue is not over-inclusion, but diagnostic flattening following the DSM-5 consolidation of distinct profiles into a single category. Drawing on a broader series of work, it reframes the problem as structural, shaped by simplification, usefulness, and misalignment between cognitive diversity and fixed systems.

Continue reading

No Cyber Idea: Why I Built Cyber Tzar (and Why I Don’t Buy the Consulting Model)

Cyber risk has become an exercise in interpretation rather than reduction. The industry has over-optimised for modelling, scoring, and explaining exposure, often driven by consulting-led approaches that rely heavily on subjectivity and narrative. This piece argues that the real problem is upstream: data acquisition, normalisation, and comparability. Cyber Tzar was built to industrialise that problem, collapsing the time between discovery and action, and shifting organisations away from “bean counting” risk towards actually reducing it. The distinction is simple: attackers exploit exposure, not models.

Continue reading

JLR Bail Out: When £1.5 Billion Doesn’t Fix the Problem

A £1.5B response to supply chain disruption risks masking a deeper structural problem in UK manufacturing. Cyber risk is systemic, flowing both upstream and downstream across interconnected supply chains, with SMEs bearing a disproportionate impact. The West Midlands, though not yet cyber-affluent, can lead by building coordinated regional capability, shifting focus from reactive recovery to operational resilience, visibility, and cluster-driven economic stability.

Continue reading

Asperger’s Syndrome and the Question of Usefulness

Part 1 of a seven-part series examining how societies understand neurodivergent minds through the lens of usefulness. The uneasy history of a diagnosis born in Nazi-era Vienna. Hans Asperger first described a group of intellectually capable but socially atypical children in Nazi-era Vienna. Later research has shown his work occurred within a medical system shaped by eugenics and the classification of human usefulness. This article examines the difficult history of the Asperger’s diagnosis, the children it helped protect, those it did not, and the lasting implications for how autism is understood today.

Continue reading

Complex Precedence & Out-of-Sequence Safety in Bronze-Layer SCD2 (Regulated FS)

This article defines how to implement SCD2 in the Bronze layer to safely handle multi-source precedence, out-of-sequence data, partial and full loads, deletions, and transaction patterns in regulated Financial Services. It introduces a metadata-driven approach that preserves temporal truth, prevents ingestion-order corruption, and enables deterministic is_current. The result is a defensible, replayable foundation that simplifies downstream Silver layers and supports point-in-time reconstruction under audit.

Continue reading

Stop Making Sense: Semantic Collapse in the Enterprise

Enterprise transformation relies on shared technical language. When terms like API, normalisation, and microservice are redefined inside an organisation, architectural reasoning degrades, and structural ambiguity increases. Semantic drift creates friction, weakens governance, and slows adaptability. Precision in terminology is not elitism but architectural hygiene. Without a stable vocabulary, even modernised estates become harder to understand, coordinate, and evolve.

Continue reading

Hard-Wired Wetware IV: The Case Against Rebalancing: Why The Asymmetrical Integration Model (AIM) May Be Self-Correcting

This paper interrogates the normative extension of the Asymmetric Integration Model by examining whether asymmetrical integration may represent a dynamically stabilised equilibrium rather than a structural failure. It explores market feedback, legitimacy constraints, optimisation adaptation, and functional specialisation as endogenous corrective mechanisms, arguing that asymmetry may be constrained by competitive and economic forces rather than requiring deliberate architectural rebalancing.

Continue reading

The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web

Governments around the world are introducing age-verification and youth social-media laws, but these policies may be doing far more than protecting children. They are quietly pushing identity into operating systems, app stores, and the core infrastructure of the internet, shifting governance down the stack and creating new enforcement chokepoints. Along the way, they reshape platform power, favour large incumbents, and redefine how users access digital environments. As illustrated in “Evolution of Internet Architecture (1990–2035)”, this may signal a transition toward an “identity-mediated” web. This article documents those changes, drawing on historical precedents from UK identity systems (including the UK identity card programme) and US telecommunications, and comparative developments across multiple jurisdictions, to show how independent regulatory efforts are converging on a shared architectural shift.

Continue reading

If Your Enterprise Architect Cannot Draw Your Core Architecture From Memory, What Are They?

Enterprise architecture is not the maintenance of modelling tools or diagram repositories; it is the cognitive ownership of structural intent. An enterprise architect must be able to articulate, from memory, the organisation’s core domains, identity flows, state ownership, and integration topology. When architecture lives primarily in tools rather than in the architect’s internal model, complexity is documented rather than reduced, and structural drift becomes institutionalised.

Continue reading

Hard-Wired Wetware III: Rebalancing The Asymmetric Integration Model (AIM)

This paper introduces the Asymmetric Integration Model (AIM), arguing that in post-LLM digital environments, automation generates conversational scale while humans supply consequence-bearing legitimacy. As optimisation regimes prioritise engagement density and persistence, affective cost is distributed to participants while control remains centralised. The proposed framework shifts debate from content moderation to architectural design, outlining pathways to rebalance asymmetry without rejecting human–machine integration.

Continue reading

Ides of March 2026: Motivational Quotes on Betrayal, Resilience, and Overcoming Hardship

Throughout history, words have served as powerful tools for inspiration, warning, and encouragement. Whether it’s facing betrayal, enduring hardship, or rising above challenges, the right quote at the right time can provide strength and perspective. Below is a collection of timeless motivational quotes that speak to resilience, betrayal, and overcoming adversity.

Continue reading

Re-Legacy: The Debt of Deferred Structure

Cloud migration often preserves rather than eliminates legacy when structural redesign is deferred. Re-legacy occurs when outdated domain boundaries, embedded behavioural coupling, and implicit integrations are rehosted under modern infrastructure abstractions. This compounds structural debt, financialises complexity, and stabilises fragility under the banner of transformation. True modernisation requires deliberate structural intervention (redefining boundaries, clarifying state ownership, and reducing coupling) not merely upgrading the substrate.

Continue reading

The Curious Absence of Cyber in Local Government Technology Strategy

A forthcoming Local Government Strategy Forum event highlights the technology investment priorities of councils representing nearly £2 billion in budgets. The data shows strong interest in AI, automation and service transformation, but no explicit mention of cybersecurity or risk management. This article explores what that absence reveals about how local government frames technology strategy, and why resilience often remains invisible in leadership investment narratives.

Continue reading

Hard-Wired Wetware II: the Post-LLM Web Asymmetric Integration Model (AIM) Defined

The post-LLM web is not replacing humans with machines. It is integrating humans into machine-generated scale. This paper formalises the Asymmetric Integration Model (AIM), arguing that as synthetic systems produce abundant conversational substrate, human participants supply the scarce resource of consequence-bearing legitimacy. Contemporary platforms are shifting from attention extraction toward asymmetrical affective integration.

Continue reading