59
Wieslaw Goździewicz, Cyprian Gutkowski, Lior Tabansky, Robert Siudak Editor: Dominik Skokowski Security through innovation Cybersecurity sector as a driving force in the national economic development

Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

Wiesław Goździewicz, Cyprian Gutkowski, Lior Tabansky, Robert SiudakEditor: Dominik Skokowski

Security through innovation Cybersecurity sector as a driving force in the national economic development

© The Kosciuszko Institute 2017ISBN: 978-83-63712-26-6

Partner

Page 2: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

Wiesław Goździewicz, Cyprian Gutkowski, Lior Tabansky, Robert Siudak

Editor: Dominik Skokowski

Security through innovation. CyberseCurity seCtor as a driving forCe in the national eConomiC development

Page 3: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

Security through innovation. Cybersecurity sector as a driving force in the national economic development

Wiesław Goździewicz, Cyprian Gutkowski, Lior Tabansky, Robert Siudak

Editor: Dominik Skokowski

© The Kosciuszko Institute 2017. All rights reserved. Short sections of text, not exceed two paragraphs, may be quoted in the original language without explicit permission provided that the source acknowledged.

Icons from the Noun Project: European Union, Nato, Poland, Israel, Pirate by anbileru adaleru, Partnership, Internet, Organization, Product Research by Gregor Cresnar, Euro by Estelle Philibert, Mortar Board by PJ Souders, Programmer By Kid A, Successful Programmer by Gan Khoon Lay, Poland by Hea Poh Li Union Jack by Christian, Shield by Kimmi Studio, Partnership by Delwar Hossain, Handshake by Becris, Black Hat Hacker by Luis Prado, Global User by icon 54, Teamwork by Becris, arrow by Vladimir Belochkin, Shield by Creative Stall, PK.

Translation & proofreading: Justyna Kruk

The Kosciuszko InstituteUl. Feldmana 4/9-10 31-130 Kraków, Polande-mail: [email protected]: +48 126329724ww.ik.org.pl ISBN 978-83-63712-26-6

The views expressed in this publication are those of the authors and do not necessarily reflect any views held by the Kosciuszko Institute and the publication partners. They are published as a contribution to public debate. The  authors are responsible for their own opinions and contributions and do not necessarily support all of the opinions made by the other authors in the report.

Page 4: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

contentS

Executive summary .......................................................................................................................................4

Between security and economy: the public sector as a driver of growth in the cybersecurity industry ― Cyprian Gutkowski ............................................................................9

Cyber defence and beyond: the role of the military in the national cybersecurity ― Wiesław Goździewicz ....................................................................19

Innovation made possible: government-business cooperation national case studies ― Lior Tabansky ...................................................................................................29

From source code to export: advanced private ICT sector as a crucial part of the national cybersecurity ecosystem ― Robert Siudak...............................................................43

About Authors .............................................................................................................................................55

Page 5: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

4

2016 2021 2017

$120 bn

est.$240 bn

est.$3tn

Global cybersecurity market1, 2 Cost of global cybercrime3

Cybersecurity is not only about cost. If built properly, it may also generate revenue for the

country. A strong national cybersecurity sector does not only help protect the state, but it

can also be an important export commodity and a driver of economic growth.

executive summary

The national cybersecurity sector cannot thrive without an active involvement of the

government in both the civilian and the military domain. From a meticulously designed

and executed national cybersecurity strategy through adequate partnership mechanisms

to proper R&D programme, the government should support the cybersecurity industry

throughout this chain.

public-private partnerships (2009-2016)5

PPP investments are cheaper by

15-17 %on average.4

5.6 PLN bn5

($1.4 bn)

0focused on

cybersecurity5

112

Page 6: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

5executive summary

There are countries which went down that road and they are already reaping the benefits of

the rapidly growing global cybersecurity market.

Poland has the potential to join and profit from the exponential rise of this market. It has a

strong ICT sector, adept workforce, and a thriving academic community.

$3.75 bnrevenue generated by Israel’s cyberecurity industry in 2015

(>1% GDP)7

$2 bnexport

of cyber products from the UK8

100,000jobs in

cybersecurity sector8

$ 8.5 bnPolish ICT

sector in 20169

Polish developers are ranked 3rd

best in the world.10

Polish universities produce 30,000 ICT graduates

every year.11

As a member of NATO Poland can utilise such mechanisms as

The NATO-Cyber Industry Partnership

As a member of EU Poland can benefit from European Comission’s plan to invest

EUR 1.8 bn by 2020 in cybersecurity industry.

Furthermore, Poland can benefit from its membership in the supranational organisations.

Page 7: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

6

However, in order to fully embrace the opportunity, Poland must undertake action. The key

conclusions of the following report lead us to propose:

Developing public-private cooperation mechanisms• adapting the existing public-private cooperation mechanisms to include cybersecurity-

oriented projects, e.g. the public-private partnership,

• seizing the existing opportunities for cooperation that stem from the Polish membership in

NATO and the EU,

• creating new mechanisms, especially for dealing with emergency situations such as large-

scale cyberattacks.

Developing military-inDustry cooperation mechanisms• developing methods of cooperation between the military and the private sector in times of

war and peace,

• engaging skilled individuals for cyberdefence purposes,

• creating long-term partnerships between the Armed Forces and national ICT companies.

Devising a robust r&D programme• providing grants,

• procuring R&D services from commercial partners,

• providing tax incentives for companies conducting R&D.

Developing markets• boosting the domestic cybersecurity market by making the central administration and

state-owned enterprises more open to cooperation with national companies of all sizes,

• changing the legal framework to increase the competitiveness of national ICT companies

(including startups and SMEs) in public bids,

• helping national companies access foreign markets by preparing and executing a long-term

PR strategy to promote Poland as a cybersecurity centre of excellence.

Cyberspace and threats arising from it are here to stay if we like it or not. It is up to us if we

decide to benefit from it or fall behind.

Page 8: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

7executive summary

1. Abomhara M., Geir M. Køien. 2015. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, “Journal of Cyber Security and Mobility” 2015, 4 (1),pp. 65–88; Camhi J., Business Insider, BI Intelligence projects 34 billion devices will be connected by 2020, 2015, [online] www.businessinsider.com/bi-intelligence-34-billion-connected-devices-2020-2015-11?IR=T (access: 12/05/2017).

2. Intel Security, Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II, June 2014, [online] https://www.mcafee.com/tw/resources/reports/rp-economic-impact-cybercrime2.pdf (access: 12/05/2017).

3. Cybersecurity Ventures, 2016 Cybercrime Report, [online] www.cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (access: 12/05/2017).

4. Value for Money Drivers in the Private Finance Initiative, Arthur Andersen and Enterprise LSE 2000

5. The Institute for Public-Private Partnerships, PPP market analysis for the period from 2009 to 31 December 2016.

6. OECD Portal, https://data.oecd.org/rd/gross-domestic-spending-on-r-d.htm (access: 12/05/2017)

7. Israel’s National Cyber Bureau data.

8. HM Government, The UK Cyber Security Strategy 2011-2016: final report.

9. PMR, Rynek IT w Polsce 2016. Analiza rynku i prognozy rozwoju na lata 2016-2021, 2016, [online] www.pmrpublications.com/product/Rynek-IT-w-Polsce-2016 (access: 12/05/2017).

10. HackerRank, Which Country Would Win in the Programming Olympics?, 2017, [online] www.blog.hackerrank.com/which-country-would-win-in-the-programming-olympics/ (access: 12/05/2017).

11. Dziennik Internautów Technologie, Polska kształci za mało informatyków. Umiejętność programowania najbardziej poszukiwaną kompetencją na rynku pracy, 2015, [online]www.di.com.pl/polska-ksztalci-za-malo-informatykow-umiejetnosc-programowania-najbardziej-poszukiwana-kompetencja-na-rynku-pracy-53442 (access: 12/05/2017).

Page 9: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

8

Page 10: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

9

Secure cyberspace is one of the most serious challenges of the

modern world. It applies to all across the board, with no excep-

tion: the government and local administration, all the sectors

of the economy, the ordinary citizens, even those who do not

use a computer at all. The dynamics of the changes taking

place in cyberspace makes it necessary to draw special atten-

tion to the need for enhanced protection of data resources.

This protection should be structured and provide three basic

security components, i.e. confidentiality, integrity and avail-

ability (the so-called CIA triad).

Any cybersecurity assurance activities must comply with

the constitutional order established in accordance with the

principle of law and the resultant accountability and com-

petence of the relevant public authorities. We need to bear

in mind, however, that the mere engagement of the state in

creating systemic solutions and a legal framework to combat

cyberthreats is simply not enough. What is required is the

synergy between the state and the private sector. It is totally

unacceptable for the public administration to impose various

obligations and expectations on the private sector and at the

same time have no competencies facilitating effective col-

laboration in their implementation. Cyber exercises carried

out by the Cybersecurity Foundation - Cyber-EXE Polska,

Between Security and economy: the publiC seCtor as a driver of growth in the CyberseCurity industry

Cyprian gutkowski

Page 11: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

10

2014 perfectly exemplify the problem.

During the exercises, telecommunications

operators were required to report secu-

rity incidents to multiple authorities of the

state administration. Unfortunately, they

had trouble getting any support from these

authorities to coordinate the crisis situation.1

For these reasons, it is necessary to build

different models of cooperation between

operators and public administration in cyber-

security as well as to develop good practices.

Building synergy through public-private partnership2

One of the potential forms of effective

cooperation between the state and private

sector representatives is a public-private

partnership (PPP). Although Poland has never

applied the mechanism to cybersecurity pro-

jects, it has significant potential. From 2009

to December 2016 a total of 112 contracts

map of relationships and flow of information between the publiC and the private seCtor during Cyber-eXe poland eXerCises, 2014

ABWInternal Security Agency

UKEOffice of Electronic

Communications

GIODOInspector General

for Personal Data Protection

POLICE

MAiCThe Ministry

of Administration and Digitization

RCBGovernment

Centre for Security

ISP-2

ISP-1

ISP-3

ISP-4

ISP-5

ISP-6

ISP-7

VENDOR

Page 12: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

11Between security and economy

worth PLN 5.6 billion (USD 1.4 billion) were

concluded under the public-private partner-

ship. Unfortunately, none of them represents

an example of cooperation to improve the

cybersecurity of the civil public sector. We

can only presume that cybersecurity is an

element of some of these undertakings at

best. The list of completed tasks includes

projects related to the provision of broad-

band Internet services. However, there

were only 13 projects like that, worth PLN

1.9 billion (0.5 billion USD), which stands

for only 11.6% of all contracts. On the other

hand, this makes up 34% of all PPP funds.

However valuable and necessary from the

point of view of country digitization, this

initiative does not, strictly speaking, address

the issue of security in Polish cyberspace.

By synergising the potential of the public

entity and its private partner, a public-private

partnership enables them to develop new

infrastructures more effectively and effi-

ciently as well as to improve the standard

and efficiency of public service delivery. As

far as the public administration is concerned,

PPP in Poland is being implemented mainly

by the local authorities who have managed

to conclude 103 of 112 contracts (92%).

Conversely, the government administra-

tion finalised only 5 contracts (4.5%) until

the end of 2016. The dominant position of

local governments determines the present

shape of the PPP mechanism. Local govern-

ments are interested in the implementation

of tasks at the local level, whereas cyber-

security must be seen far more broadly.

The benefits of PPP• Lowerpublicspending

oninvestments,bringingsavingstothebudget

• Speedinguptheconstructionofpublicutilitiesandthesupplyofrelatedservices

• Provisionofhigherqualitypublicservices

• Greatercompetitivenessofprivatecapitalinthepublicservicedeliverysector

• Investmentrisk-sharingbetweenthepublicauthorityandtheprivateentrepreneur

• Additionalgrowthprospectsforprivatecompanies

The benefits of “ad hoc partnership”:• Flexibilityindetermining

thetermsandconditionsaswellastheformulaofcooperation

• Smoothallocationofspecialistsintheeventofacrisissituation

• Cost-effectiveness• Thedevelopmentof

goodpractices

Page 13: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

12

Employing the PPP mechanism in the field of

cybersecurity could bring many benefits. First,

in contrast to typical privatisation of public

services, the PPP model leaves the responsi-

bility for the quality of service delivery with

the public administration by only outsourcing

the actual execution of the task to private

entities. In the case of such a sensitive issue

as the cybersecurity of state resources, this

constitutes a key factor allowing the public

administration to retain the necessary degree

of authority over the realization of a priva-

tised public task. Second, the PPP investments

are cheaper by 15-17% on average.3 In addi-

tion, implementation delays in PPP schemes

are less common compared to public projects

carried out by the public administration. They

are also far more likely to stay on budget.4

Beyond strategic documents: flexible forms of cooperation

A public-private partnership on secure cyber-

space cannot be understood in purely statutory

terms, i.e. as cooperation between government

authorities and local governments (public

administration) and private actors based on

long-term agreements made to develop infra-

structure components to enable the provision

of public services. This collaboration should

result in establishing good practices, including

the exchange of information and cooperation

with the business community in the event of a

cyberthreat not provided for in agreements.

After all, the innovation in information and

communication technologies (ICT) simul-

taneously strengthens the arsenal of cyber

criminals and expands the threat landscape

itself. It is therefore impossible to enumerate

all cybersecurity-related aspects in an exhaus-

tive list in a typical cooperation agreement

between the civil public sector and the private

sector. Creating solutions that allow for

tapping into the pool of professionals in the

private sector becomes particularly essential in

the event of a sudden, isolated, yet extremely

dangerous incident jeopardising the country’s

critical infrastructure and requiring rapid

expert support for state human resources.

It is difficult for the public administration

to compete with the private sector for

highly skilled cybersecurity professionals.

According to the SANS Institute, private-

sector wages in this area are 20% higher

on average than those in the public sector.5

Similarly, according to research by the

Private-sector wages in the area of

cybersecurity are 20% higher on average than

those in the public sector. The proposed ad hoc public-private partnership reduces

the identified pay gap, allowing private sector professionals to gain unique experience.

Page 14: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

13Between security and economy

Central Statistical Office of Poland (GUS), IT

professionals in state agencies earn about

33% less than their counterparts in private

companies.6 The proposed ad hoc public-

private partnership reduces the identified pay

gap, allowing private sector professionals to

gain unique experience and ensure that state

resources have an optimal level of cyberse-

curity. A similar solution has been employed

in Estonia, where under the public-private

partnership private sector volunteers are to

support public administration personnel in

the state of emergency. This is discussed in

greater detail in the next chapter. It needs

to be noted that a small country like Estonia

has spent EUR 16 million (USD 17.5 mil-

lion)7 on the implementation of its cyber-

security strategy in the years 2014–2017.

Adapted to Polish circumstances, the ad

hoc public-private partnership could pro-

vide a significant help for the state in a time

of crisis and protect the country’s critical

infrastructure from a sudden and dangerous

incident. It is worth adding that Poland has

also set up a similar structure “Polish Civil

Cyber Defense Association”, which gathers

experts (ranked 3rd in 114 in Cyber Europe

2016 exercises) ready to serve the state.

Public-private cooperation: Polish experience

An interesting example of cooperation is

the National Cybersecurity Centre (NC

Cyber), launched as part of the Research and

Academic Computer Network (NASK) and

designed to ensure the security of cyber-

space of the Republic of Poland through

the development of national ICT security

plans. NC Cyber acts as an early warning

centre which monitors and administers the

reporting mode on network threats. The

centre also manages a hotline for reporting

harmful and illegal content. A number of

private security actors have acceded to the

agreement under NC Cyber, including Citi

Handlowy, Credit Agricole, mBank, PKO

BP, Raiffeisen Polbank, BZWBK, Orange,

T-Mobile, Polkomtel, Energa, PSE S.A., Gaz-

System S.A., PERN S.A. and PKP Informatyka.

The next convenient formula of public-private

cooperation is the Cybersecurity Forum

at the Ministry of Digital Affairs. Founded

in December 2016, this advisory body has

been assigned to diagnose the needs and set

priorities for joint action by all stakeholders

(within the framework of the so-called broad

public-private partnership) in the national

Cybersecurity Forum founded in December 2016 at the Ministry

of Digital Affairs is an advisory body assigned to diagnose the needs

and set priorities for joint action by all stakeholders in the national

cybersecurity system

Page 15: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

14

cybersecurity system. The Forum has also

established expert groups working on spe-

cific topics. One of them, namely NC Cyber

development team, is particularly interesting

from the point of view of fostering coopera-

tion with the private sector. On the one hand,

grouping strategic stakeholders will help gain

knowledge about what is expected of NC

Cyber, and on the other hand, it will provide

an opportunity to offer preferred means of

information exchange and collaboration.

Trusted Profile (Profil Zaufany) is another

example of successful cooperation between

the private sector and the public administra-

tion. The project initiated by the Ministry

of Digital Affairs enables the use of the

Electronic Platform of Public Administration

Services (ePUAP) and gain electronic access

to public services. Electronic banking allows

the citizens to obtain their individual Trusted

Profile, in other words get their identity con-

firmed by means of their bank account, which

subsequently allows them to access public

services over the Internet. A similar coopera-

tion model was used in the programme “Family

500 plus” where the bank was held responsible

for verifying the applicant and protecting

them against risks such as identity theft.

According to the Ministry of Family,

Labour and Social Policy, 20% of nearly

3 million applications for the pro-

gramme were submitted online,8 while

a total of 18 banks reported their readi-

ness to participate in the project.9

Public-private cooperation in light of the National Cybersecurity Policy Framework

So far all cybersecurity activities undertaken

by public and private sector entities and insti-

tutions responsible for countering cybercrime

were largely dispersed, which contributed

to the low efficiency of the entire system.

Currently, in accordance with the National

Cybersecurity Policy Framework of the

Republic of Poland in the years 2017–2022,

these actions are to be consolidated and

harmonised. In this document, the govern-

ment responds to other challenges such as

investing in the expansion of industrial and

technological cybersecurity resources by

facilitating the development of enterprises,

startups, and R&D centres that create innova-

tive solutions for cybersecurity. All actions

for the development of national capacity and

competencies have been given the status of

The European Commission in collaboration with the European Cyber Security Organisation (ECSO) have launched the contractual public-private partnership on cybersecurity. It aims to boost cybersecurity investments in the EU,

which are expected to reach EUR 1.8 billion by 2020.

Page 16: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

15Between security and economy

strategic objectives. To date, the implemen-

tation of these tasks has been viewed only

in technical terms or as a means necessary

to execute tasks within the cooperation for

innovation framework or a public-private

partnership. As it stands, the development

of domestic product and service resources,

support for R&D and public-private coop-

eration have been deemed strategic assets,

recognising that they can become Poland’s

national speciality and export commodity.

Another development programme under

completion is the Cyberpark Enigma which

envisages the recreation and enhancement

of competencies in the production of hard-

ware and software used by all industries. In

addition, it has been appointed with the task

of acquiring new technologies to foster the

growth of domestic undertakings. According to

the National Cybersecurity Policy Framework

of the Republic of Poland 2017–2022, the

implementation of this programme will

not only strengthen Poland’s resilience to

cyberthreats, but it will also provide an impor-

tant stimulus for growth that will help Polish

companies to compete in the European market

of specialized ICT products and services.

Public-private partnership: European approach

On 5 July, 2016, the European Commission

in collaboration with the European Cyber

Security Organisation (ECSO) have launched

the contractual public-private partnership on

cybersecurity. It aims to boost cybersecurity

investments in the EU, which are expected to

reach EUR 1.8 billion by 2020. This objec-

tive is meant to be achieved by appropriately

allocating EUR 450 million of European

funds available under the EU Research and

Innovation Programme “Horizon 2020”.

The contractual public-private partnership

on cybersecurity brings together business

representatives (both large corporations and

SMEs), national, regional and local authori-

ties, and research and academic centres.

The partnership should also contribute to

consolidating the single digital market in

the area of cybersecurity. At present, in

accordance with the treaty-based order, the

primary functions of the state are aimed at

maintaining public order and the protection

of national security (also in cyberspace).

The consequence of this state of affairs is

various restrictions of free market free-

doms or competition, for instance a scant

participation of companies in public pro-

curement outside the country of origin of

the company. This fragmentation of the EU

market strengthens the dominance of non-

European players (the U.S. and Asia). In view

of the above, a wide array of activities are

planned for the consolidation of the single

digital market in the field of cybersecurity,

such as certification, validation (including

the entire ICT sector), marking (quality and

security/privacy mark), and a set of common

specifications for tenders and regulation.

Page 17: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

16

Good practices as an essential component of the national cybersecurity ecosystem

It is necessary to develop and adhere to good

professional practices in public procure-

ment, tendering, or the selection of cyber

service subcontractors in large public institu-

tions like the Social Security Office (ZUS),

the Inspector General for Personal Data

Protection (GIODO), the National Health Fund

(NFZ), etc., or other state-owned companies

of strategic importance. The state should

develop such a legal framework, entrusting

cybersecurity to only verified and reliable

entities. The price should by no means be the

determining factor. Far more important are

the trust and confidence in the selection of

the right partner to properly complete the

assignment. Negligence or letting unauthor-

ized entities handle ICT security may in effect

put the security of the state in jeopardy.

Page 18: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

17Between security and economy

sources:

1. All conclusions from the exercise can be found in the report Cyber-EXE Poland 2014, [online] https://www.cyberexepolska.pl/wp-content/uploads/2015/01/CYBER-EXE2014_RAPORT-PL.pdf (access: 12/05/2017).

2. Based on the report by the Institute for Public-Private Partnerships, PPP market analysis for the period from 2009 to 31 December 2016.

3. Value for Money Drivers in the Private Finance Initiative, Arthur Andersen and Enterprise LSE 2000)

4. Value for Money Drivers in the Private Finance Initiative, Arthur Andersen and Enterprise LSE 2000)

5. Cybrary-Choosing A Career in Cybersecurity: Public Sector or the Private Sector?, 2015, [online] https://www.cybrary.it/2015/11/choosing-a-career-in-cybersecurity-public-sector-or-private-sector/ (access: 12/05/2017).

6. Radzięta S., Sektor publiczny oszczędza na informatykach, 2014, [online] http://wynagrodzenia.pl/artykul/sektor-publiczny-oszczedza-na-informatykach. (access: 12/05/2017).

7. The Ministry of Economic Affairs and Communication Cyber Security Strategy 2014-2017 of Estonia, 2014, [online] https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/Estonia_Cyber_security_Strategy.pdf, p. 13 (access: 12/05/2017).

8. Związek Banków Polskich – Raport NetB@nk, (Q3/2016), 2017, [online] https://zbp.pl/wydarzenia/archiwum/konferencje-prasowe/2017/styczen/raport-netb-nk-polacy-maja-juz-33-mln-rachunkow-bankowych-dostepnych-przez-internet (access: 12/05/2017).

9. Kancelaria Prezesa Rady Ministrów – Premier Beata Szydło: 18 banków dołącza do przyjaciół programu „Rodzina 500 plus”, 2016, [online] https://www.premier.gov.pl/wydarzenia/aktualnosci/premier-beata-szydlo-18-bankow-dolacza-do-przyjaciol-programu-rodzina-500.html (access: 12/05/2017).

Page 19: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

18

Page 20: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

19

Cybersecurity is a multi-faceted and cross-sectoral phenomenon

that requires the involvement of the various sectors – military,

civil, public and private – to counter all foreseeable threats.

It is also an area in which there is a possibility and a vital need

to engage with both the industrial sector and academia as the

potential suppliers of modern software and hardware solu-

tions. There are companies in the world specialised in providing

state customers with cyber tools, including the offensive ones.

As part of a more broadly understood concept of informa-

tion security, cybersecurity will interpenetrate other domains,

including the physical security of the network infrastructure.

Cybersecurity is not possible without ensuring secure com-

munications channels, including classified (secret) com-

munications, and properly secured ICT networks – both

confined, isolated from the Internet, and those connected to

the Internet. In the latter case, effective safeguards are par-

ticularly important, such as data diodes controlling the flow

of data between a protected network and the Internet.

Versatile cyber capabilities

Obviously, cyber defence capabilities must include passive

measures protecting military ICT infrastructure (or the part

of the civilian ICT infrastructure used for military purposes)

from unauthorized access or even hostile activities intended

cyBer defence and Beyond: the role of the military in the national CyberseCuritywiesław goździewiCz

Page 21: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

20

to disrupt military ICT systems. They must

also comprise measures enabling the secure

and encrypted exchange of information

between authorised network users. It is

in the interest of the Ministry of Defence

to ensure that the systems protecting the

military network from unauthorized access

or attempts to break into these networks

as well as encryption algorithms are unique

solutions, relying on commercial prod-

ucts to the minimum extent possible.

Regardless of the domain, effective and robust

defence requires the availability of offen-

sive measures in order to run active defence

operations and launch counter-attacks, or

retaliatory “hacking” (“hacking-back”) of

the opponents’ systems and, if necessary,

to launch a pre-emptive cyberattack.

Poland admits more or less openly to

seeking offensive cyber capabilities.1 In

2013, the National Centre for Research and

Development in Poland announced a compe-

tition for “Developing software and hardware

solutions for conducting information warfare [...]”

including “[taking over] control over network

devices [...] and [the disintegration of] com-

munication nodes by deliberately changing their

operating parameters or deactivating selected

functions.” Further, we read that “[i]n order to

take over components of the enemy’s network,

it is necessary to install software (malware)

and electronic equipment either openly or

covertly [...]” and, that “[...] creating one’s own

military botnets [...]”was being predicted.2

The estimated value of this project was

over PLN 6.5 million (USD 1.7 million).

Commercially developed malware FinFisher

is said to be used by intelligence agencies

in several countries, allegedly including the

Czech Republic and Slovakia.3 Furthermore,

the German secret services are believed

to have been using commercially deliv-

ered malware R2D2 for several years.4

The Technical Modernisation Programme

(TMP) of the Polish Armed Forces for the

years 2017–2022 stipulates that the Polish

the resolutions of the two recent nato summits

Warsaw 8-9 VI 2016

1. Cyberattack can trigger Article 5of the Washington Treaty;

2. International law applies to cyberspace;

3. Cyber operations must comply with international law.

1. Cyberspace recognised as a fully-fled-ged operational domain;

2. NATO members must build effective cyber defence capabilities;

3. Cyber Defence Pledge;4. Obligations under Article 3 of the

Washington Treaty include cyberspace.

Newport 4-5 IX 2014

NATO SUMMITS

Page 22: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

21cyBer defence and Beyond

army will allocate 1% of the total TMP’s

resources, which amounts to approximately

PLN 1 billion (USD 0.3 billion) in total, to the

development of its cyber capabilities in the

period 2017–2019, as well as throughout

the five-year period covered by the TMP.

Although this figure looks impressive nomi-

nally, it pales in comparison with the funds

designed for other priority programmes,

such as the modernisation of air defence,

for which the Polish Ministry of National

Defence intends to allocate 14% of the

TMP’s value in the years 2017–2019, and a

total of 24% in the entire five-year period.

For the development of mechanised and

armoured infantry, the Ministry is plan-

ning to allocate 14 and 20% respectively.5

Strengthening the military in cyberspace: cooperation and commercialisation

Building effective cyber capabilities requires

broad cooperation of the Ministry of Defence

and the Armed Forces, both with national

and international partners. It is necessary

to establish mechanisms for coordina-

tion and the exchange of information with

civilian authorities and entities engaged

in the country’s cyber defence, including

private sector, most notably the opera-

tors of critical infrastructure systems.

The importance of such cooperation has been

appreciated by many states. For example,

Estonia’s Cyber Security Strategy 2014–2017

provides for the creation of conditions to

facilitate the organisation and provision

of cybersecurity training, workshops and

research, as well as to intensify cross-sectoral

activities. In addition, given the mutual

dependencies and connections (including

physical networks) between infrastructure

and ICT services, this document recognises

that the cooperation among public, private,

and academic sectors is essential to building

cybersecurity in a coordinated manner.6

The French digital security strategy for-

mulates similar theses, but it goes a step

further by suggesting, just like the present

study, that it is necessary to promote the

competitiveness of the domestic cyberse-

curity industrial and research sectors in

order to ensure national digital sovereignty.

France is committed to fostering innova-

tion and a research-friendly environment

by mobilising and coordinating all available

public and private resources to give French

cybersecurity solutions competitive advan-

tage, which in effect will tangibly benefit

both the private sector and the state.7

Possible directions for military-industrial cooperation

The cooperation between public, private,

and academic sectors may considerably

reduce the duration of research and devel-

opment work, provided that appropriate

information exchange and sharing mecha-

nisms are created in the first place.

Page 23: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

22

NICP can serve as a model for cooperation with academia and the industrial sector.

The partnership is based on a legitimate assumption that close cooperation between

the contracting authority (NATO) and the supplier (the industry) is the key to stream-

lining cybersecurity solutions, while the inclusion of the academic sector in this coop-

eration will grant access to the latest achievements in science and technology.

The NICP brings together NATO institutions, national CERTs and industry rep-

resentatives of NATO Member States, including medium- and small-sized ICT

companies, as well as academic centres. Facing common cybersecurity threats and

challenges, all these actors share the belief that cooperation and exchange of infor-

mation, notably with regard to the latest R&D solutions developed by private busi-

ness and research centres, can significantly accelerate NATO’s efforts to develop

robust cyber defence capabilities.8

As part of the NICP framework, the NATO Communications and Information Agency

(NCIA) has created Information and Cyber Incident Coordination System (CIICS), the

development of which was contracted to the Rhea Group, the Belgian subsidiary of

the Canadian ADGA Group.9 With an annual budget of EUR 600 million (USD 657.3

million) for ICT infrastructure projects,10 the NCIA is planning to spend between

2016 and 2019 a total of about EUR 3 billion (USD 3.3 billion) on a variety of ICT

projects in support of command and control systems as well as satellite communica-

tions, air defence, and cyber defence systems.11

ThE NATO-CybEr INduSTry PArTNErShIP

• The implementation of the NATO Computer Incident Response Capability

(NCIRC) Full Operational Capability (FOC); contract worth EUR 134,353.77 (USD 147,190.36) was awarded to SELEX Communications SpA;

• The implementation of the NCIRC interface at Ramstein missile defence unit; contract worth EUR 411,173.64 (USD 450,458.50) was awarded to SELEX Communications SpA;

• The installation of the Active Network Electronic Security System – ANWI ESS for NCIRC; contract worth EUR 352,166.22 (USD 385,813.32) was awarded to SELEX SpA;

• TrendMicro license renewal for NCIRC; contract worth EUR 101,481.02 (USD 111,176.84) was awarded to Insight Technology Solutions Belgium Inc.;

• McAffee license renewal for NCIRC; contract worth EUR 498,627.34 (USD 546,267.80) was awarded to UNI BUSINESS CENTRE B.V.;

• The central purchase of TEMPEST level B workstations; contract worth EUR 1,662,375.58 (USD 1,821,204.31) was awarded to Airbus Defence and Space AS;

• The purchase of communications and IT equipment for the NATO Force Integration Units – NFIUs; contract worth EUR 2,762,779.00 (USD 3,026,743.82) was awarded to Airbus Defence and Space AS;

• The purchase of cryptographic equipment for NATO’s communication infrastruc-

ture; contract worth EUR 941,334.89 (USD 1,031,273.06) was awarded to Thales

Norway AS.12

ExAmPlES OF CybEr dEFENCE PrOCurEmENTS INCludE:

Within the NICP framework (see NICP

case study), such mechanisms function on

the basis of Industry Partnership Agreements

(IPAs) that the NCI Agency concludes

with the industrial sector. The Agency

has entered into such agreements with

FireEye or RSA Security, to name just a

few. The aim of the IPA is to allow for rapid

exchange of information on cyber threats

in order to improve the situational aware-

ness of the parties to the agreement and to

strengthen the protection of their networks.

Mutual benefits yielded by the coopera-

tion among the military, industrial partners

and academia are not to be underesti-

mated, especially when this cooperation is

extended to include national entities. It will:

• enable domestic companies and aca-

demic centres to obtain R&D funding

to develop solutions requested

by the Ministry of Defence.

• allow for customising the solutions

being developed by the industry

Page 24: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

23cyBer defence and Beyond

and academic sectors to the specific

needs of the contracting authority.

• help increase the security of the

designed solutions and systems.

Relying on national entities in the industrial

and academic sectors to develop cyber capaci-

ties, particularly cryptanalytic and crypto-

graphic solutions, will help create truly secure

products and services. This can be done by

drafting the terms and conditions of the pro-

curement in such a way as to oblige the author

of the solutions to make the contracting

authority the sole recipient and user of the

source codes and solutions they create. The

most important aspect here is to become less

dependent on widely available commercial

products that are often riddled with security

vulnerabilities, in some cases left there delib-

erately by the manufacturers, as was the case

with the RCS system purchased by the secret

services in a number of countries, including

the Polish Central Anti-Corruption Bureau.

Authors of commercial solutions reluctantly

NICP can serve as a model for cooperation with academia and the industrial sector.

The partnership is based on a legitimate assumption that close cooperation between

the contracting authority (NATO) and the supplier (the industry) is the key to stream-

lining cybersecurity solutions, while the inclusion of the academic sector in this coop-

eration will grant access to the latest achievements in science and technology.

The NICP brings together NATO institutions, national CERTs and industry rep-

resentatives of NATO Member States, including medium- and small-sized ICT

companies, as well as academic centres. Facing common cybersecurity threats and

challenges, all these actors share the belief that cooperation and exchange of infor-

mation, notably with regard to the latest R&D solutions developed by private busi-

ness and research centres, can significantly accelerate NATO’s efforts to develop

robust cyber defence capabilities.8

As part of the NICP framework, the NATO Communications and Information Agency

(NCIA) has created Information and Cyber Incident Coordination System (CIICS), the

development of which was contracted to the Rhea Group, the Belgian subsidiary of

the Canadian ADGA Group.9 With an annual budget of EUR 600 million (USD 657.3

million) for ICT infrastructure projects,10 the NCIA is planning to spend between

2016 and 2019 a total of about EUR 3 billion (USD 3.3 billion) on a variety of ICT

projects in support of command and control systems as well as satellite communica-

tions, air defence, and cyber defence systems.11

ThE NATO-CybEr INduSTry PArTNErShIP

• The implementation of the NATO Computer Incident Response Capability

(NCIRC) Full Operational Capability (FOC); contract worth EUR 134,353.77 (USD 147,190.36) was awarded to SELEX Communications SpA;

• The implementation of the NCIRC interface at Ramstein missile defence unit; contract worth EUR 411,173.64 (USD 450,458.50) was awarded to SELEX Communications SpA;

• The installation of the Active Network Electronic Security System – ANWI ESS for NCIRC; contract worth EUR 352,166.22 (USD 385,813.32) was awarded to SELEX SpA;

• TrendMicro license renewal for NCIRC; contract worth EUR 101,481.02 (USD 111,176.84) was awarded to Insight Technology Solutions Belgium Inc.;

• McAffee license renewal for NCIRC; contract worth EUR 498,627.34 (USD 546,267.80) was awarded to UNI BUSINESS CENTRE B.V.;

• The central purchase of TEMPEST level B workstations; contract worth EUR 1,662,375.58 (USD 1,821,204.31) was awarded to Airbus Defence and Space AS;

• The purchase of communications and IT equipment for the NATO Force Integration Units – NFIUs; contract worth EUR 2,762,779.00 (USD 3,026,743.82) was awarded to Airbus Defence and Space AS;

• The purchase of cryptographic equipment for NATO’s communication infrastruc-

ture; contract worth EUR 941,334.89 (USD 1,031,273.06) was awarded to Thales

Norway AS.12

ExAmPlES OF CybEr dEFENCE PrOCurEmENTS INCludE:

Page 25: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

24

(if at all) grant their customers access to the

software source codes, and often sell them

as the so-called “black box” that allows for

no user modifications or enhancements. The

lack of access to source codes can effectively

render the identification and elimination of

potential security vulnerabilities impossible.

recruiting cybersoldiers: manpower shortage

It is impossible to think of building cyberse-

curity potential without harnessing national

human capital. The military structures will

“own” this human capital only to a limited

extent – the vast majority of cybersecurity

experts will be absorbed by the civil sector,

where the demand for these professionals is

virtually unlimited. It is therefore necessary

to create systemic solutions to either attract

professionals to state institutions, including

the military, or to put them under mobilisa-

tion assignment programmes to be deployed

in the event of a crisis or an armed conflict,

when strengthening the state’s defence

capabilities, including cyber military capabili-

ties, becomes absolutely critical. Examples

of such solutions can be found in France

where Cyber Civic Reserve (Reserve Citoyenne

Cyber)13 has been launched or in Estonia,

where the Cyber Defence Unit of the Estonian

Defence League has been incorporated into

the national defence system, giving the entire

Estonian Defence League the status analo-

gous to that accorded to the Armed Forces of

Estonia in the event of an armed conflict.14

Page 26: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

25cyBer defence and Beyond

8200, have often succeeded in commercial

cybersecurity business. They remain allocated

to mobilisation assignment programmes, and

are regularly called up for reserve training

during which they can use their knowledge

and experience gained both in military

service and subsequent business activity.

Certainly, such solutions will also require an

appropriate training system to be created

in order to enable these civilian special-

ists to phase in relatively smoothly and get

accustomed to operating in hierarchical

state structures. One of the possible solu-

tions is to announce volunteer “conscription”

of professionals to participate in military

and civilian crisis management exercises

and trainings. Taking into account the salary

ranges in the Polish Ministry of National

Defence, it is quite safe to assume that in

most cases civilian specialist will not con-

sider the financial incentive as the main

factor when taking decision to engage in

activities to strengthen national cybersecu-

rity. In accordance with the provisions of the

Collective Labour Agreement for Employees

of Military Budgetary Sector Entities,17 the

maximum salary of the Ministry civil service

personnel is PLN 8000 gross (USD 2083.82).

However, it is highly unlikely that cybersecu-

rity professionals will earn the highest salary

given the hierarchical structure of civilian

posts in the Ministry of National Defence.

The emoluments for reservists who are called

up for military exercise do not look particularly

attractive either. The net salary for a 30-day

Israel stands at the opposite extreme. To

date, its defence forces are based on general

conscription, which also includes women. Set

up to conduct cyber operations, Unit 8200

brings together experts being both profes-

sional soldiers and conscripts. When asked

about the human capital and the pay gap

between the officers and non-commissioned

officers and privates engaged in cyber opera-

tions, the former head and architect of the

unit, Brig. Gen. Danny Bren said that the main

motivation behind the decision to remain on

active duty in Unit 8200 is after all the desire

to face the challenges the service offers.15

The Israel Defense Forces scout universities

for young candidates who have exceptional

analytical skills and at the same time can work

as true team players to serve in Unit 8200.

As part of the compulsory military service,

instead of learning the drill, weapon handling

or tactics, successful candidates undergo

training in Unit 8200’s comfortable, air-

conditioned facilities where they learn how

to collect intelligence, use state-of-the-art

electronic surveillance or data mining tech-

niques. The skills acquired in training have

also helped ex-8200 soldiers to succeed in the

commercial market.16 They are the master-

minds behind establishing such companies

as Check Point, CloudEndure, CyberReason,

ICQ, LightCyber, the NSO Group, Palo Alto

Networks, indeni, NICE, AudioCodes, Gilat,

outbrain, Leadspace, EZchip, Onavo, Singular,

CyberArk or Fortscale. The Israeli army has

heavily invested in its professionals who,

capitalising on the knowledge gained in Unit

Page 27: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

26

exercise amounts to PLN 2100 (USD 547)

for a private, PLN 2512.50 (USD 654.45) for

Master Corporal, and PLN 3150 (USD 820.50)

for Second Lieutenant. Lieutenant Colonel of

the reserve can receive about PLN 5600 (USD

1458.68) for a 30-day exercise,18 whereas his

German counterpart about EUR 3500 (USD

3834.40) plus extras for possessing qualifica-

tions and skills particularly useful for the army.

The salaries offered by the Polish Ministry

of National Defence are hardly competitive

compared to the private sector offerings,

which was repeatedly emphasized (also by the

representatives of the Polish government) at

the Polish Cybersecurity Forum in 201619 and

the European Cybersecurity Forum in 2015.20

An option worth considering is to search for

specialists of the young generation who stand

out in various competitions or hackathons,

thus confirming their knowledge and skills that

may be useful from cybersecurity perspec-

tive. Increasing the number of such initiatives,

both nationally and internationally, is para-

mount to effectively address the problem.21

In order to maximally utilise the human

capital, without “pulling it out” of the work

environment, cooperation with cybersecurity

entrepreneurs willing to share their potential

to enhance the state’s cyber defence capabili-

ties should be considered. Such cooperation

could include participation in dedicated cyber

defence exercises. There have been cases of

entrusting private companies with conducting

security checks, including penetration tests

of the ICT systems owned by ministries of

defence. Another scenario to consider is to

utilise the potential of companies and entre-

preneurs associated in organisations similar

to Polish Civil Cyber Defense Association,

both by involving them in intersectoral and

interministerial cybersecurity exercises

and requesting them to conduct penetra-

tion tests or simulated cyberattacks on key

ICT systems. These entrepreneurs could be

engaged in developing effective methods

and techniques to secure critical ICT systems

by tapping into their experience in repel-

ling cyberattacks on their own systems.

net salary for a 30-Day exercise

PLN 2100(USD 547)

Private

PLN 2512.50(USD 654.45)

Master Corporal

PLN 3150(USD 820,50)

Second Lieutenant

PLN 5600(USD 1458.68)

Lieutenant Colonel

Page 28: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

27cyBer defence and Beyond

sources:

1. Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, National Security Bureau, 22 January 2015, ISBN: 978-83-60846-25-4, p. 9.

2. Own translation, http://www.ncbir.pl/gfx/ncbir/pl/defaultopisy/575/6/1/polaczony.pdf, p. 42–46.

3. WikiLeaks ujawnia klientów rządowego szpiegowskiego oprogramowania FinFisher, 2014, [online] https://niebezpiecznik.pl/post/wikileaks-ujawnia-klientow-rzadowego-szpiegowskiego-oprogramowania-finfisher/?similarpost (access: 11/05/2017).

4. Niemiecka policja infekuje rządowym trojanem (R2D2), 2011,[online] https://niebezpiecznik.pl/post/niemiecka-policja-infekuje-rzadowym-trojanem-r2d2/ (access: 11/05/2017).

5. Dmitruk T., Projekt nowego Planu Modernizacji Technicznej, 2016, [online] http://dziennikzbrojny.pl/artykuly/art,2,4,10262,armie-swiata,wojsko-polskie,projekt-nowego-planu-modernizacji-technicznej (access:11/05/2017).

6. Cyber Security Strategy 2014-2017, Estonian Ministry of Economic Affairs and Communication, p. 7.

7. French National Digital Security Strategy, Agence nationale de la sécurité des systèmes d’information (ANSSI), 2015, [online] https://www.ssi.gouv.fr/uploads/2015/10/strategie_nationale_securite_numerique_en.pdf, pp. 30-31 (access: 11/05/2017).

8. Who will be involved in the NATO Industry Cyber Partnership?, [online] http://www.nicp.nato.int/nicp-stakeholders/index.html (access: 11/05/2017).

9. Tigner B., NATO tests cyber alerting tool, [online] http://www.nicp.nato.int/nato-tests-cyber-alerting-tool/index-2.html (access: 11/05/2017).

10. Why bidding on NATO contracts can boost your bottom line, [online], http://tradecommissioner.gc.ca/canadexport/157947.aspx?lang=eng (access: 11/05/2017).

11. NATO announces 3 billion EUR investment in defence technology, 2016, [online] https://www.ncia.nato.int/NewsRoom/Pages/160726_Announcement_3billion_investments.aspx (access: 11/05/2017).

12. Based on the announcement of contract awards published at https://www.ncia.nato.int/Industry/Pages/NCI-Agency-Procurement.aspx(access: 11/05/2017).

13. Réserve citoyenne cyber: une démarche originale, 2013, [online] http://www.defense.gouv.fr/actualites/communaute-defense/reserve-citoyenne-cyber-une-demarche-originale/(language)/fre-FR (access: 11/05/2017).

14. The Estonian Defence League Act, 2013, [online] https://www.riigiteataja.ee/en/eli/525112013006/consolide (access: 11/05/2017).

15. Wulman S., IDF unveils new cyber defense HQ, 2016, [online] http://www.ynetnews.com/articles/0,7340,L-4820035,00.html (access: 11/05/2017).

16. Tendler I., From The Israeli Army Unit 8200 Is Silicon Valley, 2015, [online] https://techcrunch.com/2015/03/20/from-the-8200-to-silicon-valley/ (access: 11/05/2017).

17. http://www.wbe.wp.mil.pl/plik/file/akty/oslony/akt_199.pdf (access: 11/05/2017).

18. http://sandomierz.wku.wp.mil.pl/pl/7373.html (access: 11/05/2017).

19. CYBERSEC PL 2016 Rekomendacje, 2016, [online] https://cybersecforum.pl/files/2016/06/rekomendacje_cspl2016_pl.pdf, (access: 11/05/2017), pp. 3-4, 10-11.

20. CYBERSEC 2015 Rekomendacje, 2015, [online] https://app.box.com/s/o0nb9edtybgxqo9apkjxuium2m6vq9gy, (access: 11/05/2017), pp. 12, 16, 21.

21. Ibidem, p. 21.

Page 29: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

28

Page 30: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

29

As the environment evolves at Moore’s Law speed (overall pro-

cessing power for computers doubles every two years), effective

cybersecurity requires innovation that transforms the current

practices and processes. Innovation generally arises from research

and development (R&D), which comprises:1

While the business sector performs the vast majority of

applied research and experimental development in ICT, aca-

demia engages predominantly in basic research. Innovation,

however, largely hinges upon the cooperation among all these

innovation made poSSiBle: government-business Cooperation national Case studies

lior tabansky

innovation

EXPERIMENTAL DEVELOPMENT (new products or

processes)

APPLIED RESEARCH (new knowledge towards

a speci�c practical aim)

BASIC OR FUNDAMENTAL RESEARCH (science, creating new knowledge

with no speci�c application in view)

Page 31: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

30

actors: the government, business, and

academia. Having originated in economics

and management in the late 1980s, the

National Innovation System (NIS) concept

allows us to analyse the entire range of

stakeholders and interactions between

them.2 A common proxy for innovation is to

measure expenditure on R&D as a per-

centage of Gross Domestic Product (GDP).

r&d intensity in oeCd Countries and other eConomies3

GE

RD

as

% o

f GD

P

ISR

OECD

SGP

GBR

POL

2010

1

2

3

4

2011 2012 2013 2014 2015

This chapter analyses three case studies

of Government-business Cooperation in

Innovative National Cybersecurity Strategies:

Israel, the UK, and Singapore. These three

countries are ranked among the top 10 in

innovation (5th, 8th, and 10th respectively),

with Israel and the UK considered world

class powers, thus providing a useful ref-

erence point for Poland ranked 25th.4

overall rank in the bloomberg innovation indeX 20154

USAJapan

South Korea

United KingdomCanada

AustraliaIsrael

SwedenPoland

SingaporeFrance

GermanyFinland

Denmark

1 2 3 4 5 6 7 8 9 10 11 12 13 25

Page 32: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

31government-Business cooperation national case studies

Israel has emerged as one of the leading global cyber powers in

recent years.5

Since 2014, over 100 new cybersecurity companies have

sprouted up in Israel, with 78 of them attracting nearly

USD 400 million of investment in this period. At the gov-

ernment assembly held on 15 February 2015, the head of

Israel National Cyber Bureau (INCB) stated that the Israeli

cyber industry made record achievements in 2014.

• Approximately 30 early-stage cyber firms raised over

USD 200 million – a 40% increase over 2013.

• Eight Israeli cyber companies were pur-

chased by foreign investors for an overall sum

of approximately USD 700 million.6

Exports by Israeli companies in the cyber field were later esti-

mated at approximately USD 3 billion in 2013, three times

greater than the United Kingdom’s. The Economist published that

the volume of Israeli cybersecurity exports rose to USD 6 bil-

lion in 2014, second only to the U.S., and three times higher than

the target the UK set for 2016.7 Israel currently attracts some

15–20% of global commercial cyber R&D investment. Counting

3,100 to 4,200 active tech startups, this makes Tel Aviv rank fifth

in the world for best startup cities, the first outside the U.S.8

iSrael: how to beCome a world-Class Cyber power in 5 years 250

cyber-security companies

5cyber-research centres

$3.5−$4bnIsraeli’s cyber-security

sales in 2015

20%Global share of private-sector cyber investment

100%Rise in share of cyber

investment compared to 2014

Page 33: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

32

The National Cyber Initiative was the expert

committee which Prime Minister Netanyahu

tasked in 2010 with a review of cybersecurity

and Israel’s policy. The key question the com-

mittee scrutinised was how to incentivise and

develop cyber technology in Israel, so it ranks

among the top five world leaders by 2015.9

The bottom line of the recommenda-

tions made by 80 experts from all sec-

tors working in 8 subcommittees for 6

months was to boost collaboration in the

Israeli ecosystem involving the govern-

ment, defence, academia, and industry.

The Government Resolution No. 3611

of August 7, 2011 ‘Advancing National

Cyberspace Capabilities’10 accepted

the National Cyber Initiative’s recom-

mendations, becoming Israel’s public

National Cybersecurity Strategy.

Stressing the need to advance cyber

R&D, the new Israel National Cyber

Bureau (INCB) was tasked with:

• promoting research and development in

cyberspace;

• boosting the cyber industry in Israel (based

on exports).

As of Q1 2017, five universities estab-

lished Cyber Research Centres supported

by the INCB. Inaugurated in September

2014, Tel Aviv University’s Blavatnik

Interdisciplinary Cyber Research Centre

(TAU ICRC) is the first institutionalised

Israeli government-academia partner-

ship in cyber-related research. The INCB

funds nearly half of the research budget,

but the fund allocation is institutionally

independent and guided by the standard

academic criteria of research excellence.

These are the results of the policy efforts, including the government support

for the business sector in the creation and

absorption of innovation.

To improve the defence of national infrastructures essential for maintaining a stable

and productive life in the State of Israel, and to strengthen those infrastructures

against cyberattack by advancing Israel’s status as a centre for the development

of information technologies while encouraging cooperation among academia,

industry, and the private sector, government ministries and special bodies.

The Government Resolution No. 3611 of August 7, 2011, Advancing National Cyberspace Capabilities recommendation

Page 34: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

33

The government refrains from commanding

innovation processes. In addition to science

and engineering, TAU ICRC also conducts

policy research and public outreach.

The government via the INCB coordinates the

development of the cyber industry, with the

main project being the establishment of an

additional cybersecurity cluster in Be’er Sheva

co-locating the government CERT, military

intelligence and technology units, the Ben

Gurion University, and businesses. As part

of the Be’er Sheva project, the government

provides infrastructure and incentives, such

as the refund of up to 20% of every cyber-

related employee’s gross salary to commercial

cybersecurity entities in order to attract

companies to set up their business there.11

Page 35: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

34

The UK published its National Cyber

Security Strategy in November 2011, just

after Israel did.12 The UK Strategy addressed

economics, not only security, setting a target

of GBP 2 billion (USD 2.6 billion) cyber

security exports to be reached by the end

of 2016. In collaboration with industry, aca-

demic and international partners, this 2011-

2016 Strategy achieved tangible progress.

united Kingdom: europe’s CyberseCurity frontrunner

• In critical national infrastructure protec-

tion, government worked together with

owners and operators, putting plans

in place for managing cyber risks.13

• Businesses of all shapes and sizes can

receive unprecedented levels of govern-

ment-supported expert guidance and

training to help them manage their cyber

risks, such as the Cyber Essentials scheme.14

the uk Cyber seCurity strategy 2011-2016: spending by thematiC areas of work

National Sovereign capability to detect and defeat high end threatsLaw enforcement and comabting Cyber CrimeSupport to full spectrum effects capabilityPrivate sector engagement and awarenessImproving and resilience of the Public Sector NetworkMainstreaming cyber throughout DefenceEducation and skillsIncident management/response and trend analysisInternational engagement and capacity buildingProgramme management, coordination, and policy

£441.8mn

£117.0mn

£80.6mn

£61.1mn

£39.6mn

£40.4mn

£32.8mn£24.4mn

£8.1mn

£7.8mn

Page 36: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

35government-Business cooperation national case studies

London is already ranked sixth in the world

for best startup cities. In addition to sup-

porting the clustering of high-tech com-

panies, HM Government defines success

in developing the business sector as:

• ‘greater than average global growth in the

size of the UK cybersecurity sector year on

year’ and

• ‘a significant increase in investment in early

stage cyber companies.19

HM Government supports fundamental

research in 13 Academic Centres of

Excellence in Cyber Security Research

(ACE-CSR) established at UK universities.20

Moreover, it stimulates companies of all sizes

to join CyberInvest, an industry-Government

partnership in order to invest in academic

research.21 ‘Minimum investment levels

range from GBP 10k (USD 13k) for ‘micro’

companies (companies with less than 10

employees) to GBP 500k (USD 650k) for large

• UK cyber security companies have

increased their global market share.15

The UK domestic cyber security sector

has grown from GBP 10 billion (USD 13

billion) to over GBP 17 billion (USD 22

billion), giving employment to 100,000

people. As a result, the market share of

the UK’s cyber security exports grew

from 3.6% to 4.4%, which amounted

to GBP 1.47 billion (USD 2 billion) in

2014 – up by 35% since 2012.16

The industry has been involved in

various roles throughout the thematic

areas of work depicted.17

The subsequent UK National Cyber

Security Strategy 2016-2021 also

dedicates significant attention to the

government-business cooperation, such

as the creation of a growing, innovative

and thriving cybersecurity sector.18

The Objective 7.2.3. of UK National Cyber Security Strategy 2016-2021• provide testing facilities for companies to develop

their products, together with a fast-track form of assessment for the next generation of cyber security products and services as they emerge, enabling customers to be confident in their use;

• draw on the collective expertise of the industry-government Cyber Growth Partnership to help shape and focus further growth and innovation interventions;

• help companies of all sizes scale-up and access international markets

Page 37: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

36

companies (over 250 employees)’,22 with 24

companies having already committed to invest

a minimum of GBP 8 million (USD 10.5 mil-

lion) over the next 5 years via CyberInvest.23

The most recent development in the pro-

cess of strengthening the UK’s national

cybersecurity system is the establishment

of a new technical authority for cyber-

security – the National Cyber Security

Centre (NCSC)24. The NCSC is part of the

Government Communications Headquarters

(GCHQ) responsible for bringing together

UK expertise in the field of cybersecurity25 in

order to provide assistance and guidance to

both public and private entities in accordance

with a new, unified government approach to

cybersecurity. The NCSC’s main tasks involve

supporting critical services providers and

critical infrastructure operators, responding

and managing major computer incidents

as well as the coordination of information

sharing (by combining the best of government,

industry and academic expertise). The NCSC

runs the Cyber Security Information Sharing

Partnership (CiSP) initiative for entities with

their own networks to share information and

discuss activity on their networks. Finally,

the NCSC cooperates with the private sector

to provide tailored advice and guidance for

specific sectors – mainly the elements of the

UK’s Critical National Infrastructure26. The

NCSC also participates in the CyberFirst pro-

gramme that fosters the development of the

UK’s next generation of cyber professionals.

Page 38: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

37

National Technology

Plan 1995

National Science&Technology

Plan 2000

Science&Technology

2005 Plan

Science&Technology

2010 Plan

Research, Innovation

and Enterprise Plan 2015

Research, Innovation

and Enterprise Plan 2020

-

-

--$2bn

$4bn

$6bn

$13.5bn

$16bn

$19bn

Singapore is the most globalized and con-

nected economy, consistently ranked top

in business freedom, market openness, and

government integrity.27 Singapore’s gross

domestic expenditure on R&D (GERD)

as a percentage of GDP increased from

2.0% in 2013 to 2.2% in 2014. Of this,

business expenditure on R&D (BERD)

as a percentage of GDP increased from

1.2% in 2013 to 1.3% in 2014.28

Singapore is ranked 10th in the world (and first

in Asia) for best startup cities.29 The country

strives to become a ‘smart nation’, which drives

a more holistic perspective on cybersecurity:

In April 2015, Singapore established the Cyber

Security Agency (CSA), a national agency

under the Prime Minister’s Office and adminis-

tered by the Ministry of Communications and

Information (MCI). Over the course of a year,

Cyber security is absolutely essential if we are to become a smart nation. You

can’t have electronic medical records, you can’t have financial technology,

you can’t have large databases with information that could be abused

or misused, you can’t afford a breach of privacy. So  the way I look at it,

cyber security is the flip side of the coin of being a smart nation.

— Vivian Balakrishnan Foreign Affairs Minister and Minister-In-Charge of the Smart Nation Initiative

Singapore: on the path to beCome a smart Cyber nation

public investment in research anD innovation

Page 39: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

38

CSA consulted representatives from over 50

government agencies, business and profes-

sional associations, private companies and aca-

demic institutions with the aim to develop the

country’s Cybersecurity Strategy. In October

2016, Singapore launched its Cybersecurity

Strategy that rests on four pillars: 30 31

Each of the four pillars envisions the business

sector playing a central role. Pillar 3 – a vibrant

cybersecurity ecosystem – explicitly describes

the government’s efforts to support business.

As other National Cybersecurity strategies,

the government invests in R&D. Singapore set

up a five-year SGD 130 million (USD 94 mil-

lion) National Cybersecurity R&D Programme

to promote collaboration among agencies,

academia, research institutes, and the private

sector.32 It is a fraction of SGD 19 billion

(USD 14 billion) commitment in the Research

Innovation Enterprise 2020 Plan (RIE2020)

which seeks to support and translate research

into solutions that address national chal-

lenges, build up innovation and technology

adoption in companies, and drive economic

growth through value creation.33 Around 40%

of the money will be open for competition.

The RIE2020 aims at four primary technology

domains, each entailing cybersecurity efforts:

• Advanced Manufacturing and Engineering

• Health and Biomedical Sciences

• Services and Digital Economy

• Urban Solutions and Sustainability34

The local market is projected to grow at 9%

per year.35 The global cybersecurity market

is expected to grow at a compound annual

growth rate of 11.8% from USD 71 billion

in 2013 to USD 155 billion in 2020.36

CSA started working on initiatives such as the

Cyber Security Associates and Technologies

(CSAT) programme for training and up-skilling

fresh ICT professionals and mid-career profes-

sionals for cybersecurity job roles and the intro-

duction of CREST certifications in Singapore.

CSA has also signed MOUs with Nanyang

Polytechnic (NYP) and the Singapore Institute

Building a ResilientInfrastructure

Creating a SaferCyberspace

Developing a VibrantCybersecurity

Ecosystem

StrengtheningInternationalPartnerships

Developing a vibrant security

ecosystem by working with industry and

academia to grow the cybersecurity

workforce

Strengthening international partnerships,

especially among the ASEAN members, to address transnatio-

nal cybersecurity issues

Building a resilient infrastructure to strengthen the

critical infrastructu-res by working

closely with private sectors and the cybersecurity

community

Creating a safer cyberspace by

promoting government, industry, and

public involvement

Page 40: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

39government-Business cooperation national case studies

of Technology (SIT) to develop cybersecurity

talent. Moreover, the Singapore government

explicitly declared to ‘build up’ local industry:

This quote is especially important. Singapore

is famous for actively seeking best practices

around the globe to tackle their major chal-

lenges and exploit opportunities. Singapore’s

strategy shows that the policy that Israel and

the UK chose years ago – the boost of innova-

tion in cybersecurity business particularly via

the government support for – actually worked.

We will build up the industry by attracting and anchoring companies with advanced capabilities. We will also nurture startups to boost the development of niche and advanced solutions and grow local champions to sustain strategic areas of interest. We will also develop market opportunities to bring made-in-Singapore solutions into the global market.

Official declaration from Singapore’s Cybersecurity Strategy

Singapore enjoys the presence of all major

stakeholders in the city-state: financial services

multinationals, Boeing’s first Cyber Analytics

Centre outside the US, INTERPOL’s Global

Complex for Innovation, NEC’s Public Safety

Business, and dozens more.38 Singapore’s gov-

ernment can afford to procure and effectively

utilise any commercially available solution,

and it does so indeed. Singapore had been

exploiting these advantages to tackle cyber-

security in traditional ways for years. Now it

has decided to follow the UK and Israel’s path

to boost the local cyber R&D and the local

cyber industry. Singapore is the world’s freest

economy, providing exceptionally fair and open

business environment to all. Nevertheless,

Singapore aims for the global market beyond

domestic consumption. This strategic approach

refutes the ideological arguments, which are

often recruited against significant government

support for the domestic business sector.

estimateD growth of singapore’s cybersecurity market, 2015-202037

Mar

ket

Val

ue

(Mill

ion

$$

)

2015

100

300

200

400

600

500

700

800

900

2016 2017 2018 2019 2020

Compound Annual Growth Rate of 9.3 %

417464

511562

617673

154163

176

188

201

216

Cybersecurity Services (e.g. IT outsourcing, consulting)

Cybersecurity Products

Page 41: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

40

All the three National Cybersecurity

Strategies analysed here share strikingly sim-

ilar approaches when it comes to enhancing

administration-business cooperation for the

creation and absorption of cybersecurity

innovation. The UK, Israel and Singapore

have invested significant public funds to

incentivise the establishment of academic

centres for excellence in cybersecurity at

universities to create radical innovation that

involves changes in the current practices and

processes. Regional concentration of compe-

tences is evident in many successful innova-

tions. Israel has created the main IT cluster in

Tel Aviv area, and is developing a new cyberse-

curity cluster in Be’er Sheva. The emergence

of the ‘Silicon Roundabout’ in London and

the ‘Cyber Valley’ in Malvern bears some

resemblance to Israel’s efforts in Be’er Sheva.

Similarly, Singapore’s Biopolis for biomedical

sciences is among the most ambitious pro-

jects the country has ever embarked on.

Direct government support for com-

mercial companies includes:

• providing R&D grants;

• procuring R&D services from commercial

companies;

• creating domestic market;

• helping access foreign markets;

• sharing government capabilities with com-

mercial R&D companies.39

Indirect government support for the entire

National Innovation System (NIS) includes

fiscal incentives and legal frameworks.

• fiscal support and other incentives for non-

commercial research institutions and IHLs

• legal and financial support for academia-

business cooperation in selected topics

(e.g. technology transfer mechanisms)

• tax incentives for R&D expenditure in com-

mercial companies

• infrastructure for co-location.

findingS: governments of leading Cyber powers support the business seCtor in Creation and absorption of innovation

Designing and building a

robust and resilient

infrastructure

Educating human

capital and developing

skilled workforce

Developing public-private partnerships domestically

and internationally

Seeking opportunities,

such as boosting

macro-economic growth

Page 42: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

41government-Business cooperation national case studies

ThIS ShORT ANAlySIS IllUMINATES ThE FOllOwING FINDINGS:• Innovationisinstrumentalforcybersecurity.All

threeNationalCybersecurityStrategiesanalysedhereseekinnovationforcybersecurity.

• Successfulinnovationlargelydependsonthegovernmentstrategyandpolicies.Thefactthattheworld’sleadingcyberpowersarealsoleadinginnovatorsisnotacoincidence.

• IsraelandtheUKhavebeendedicatingarangeofdeliberategovernmentpoliciesandresourcestosupportenhancedadministration-businesscooperationsince2011.Thesestrategieshaveproducedrealeconomicandsecurityvalue.

• Singaporeiscurrentlyadoptingthisapproach,includingthe‘build-up’ofthelocalindustry.

sources:

1. Organisation for Economic Co-operation and Development, Frascati Manual 2015: Guidelines for Collecting and Reporting Data on Research and Experimental Development (Paris: OECD, 2015).

2. Tabansky, L. and I. Ben Israel. The National Innovation Ecosystem of Israel. Cybersecurity in Israel, Springer International Publishing 2015, pp. 15–30.

3. OECD estimates based on OECD Main Science and Technology Indicators Database, February 2017, www.oecd.org/sti/inno/rd_intensities.xls

4. https://www.bloomberg.com/graphics/2015-innovative-countries/ (access: 11/05/2017).

5. Financial Times, https://www.ft.com/content/dfa5c916-b90e-11e5-b151-8e15c9a029fb (access: 11/05/2017).

6. http://www.pmo.gov.il/English/MediaCenter/Spokesman/Pages/spokeCyber150215.aspx

7. Israel’s Computer-Security Firms: Cyber-Boom or Cyber-Bubble?, Economist 411, 2015, No. 8945.

8. The Global Startup Ecosystem Report 2015 https://ec.europa.eu/futurium/en/system/files/ged/the_global_startup_ecosystem_report_2015_v1.2.pdf (access: 11/05/2017).

9. The Supreme Council on Science and Technology, The National Cyber Initiative – a Special Report for the Prime Minister (Jerusalem: Ministry of Science and Technology National Council on Research and Development, 2011).

10. Israel, G. o. (2011). Government decision 3611: Promoting national capacity in cyber space. Jerusalem, Israel, PMO Secretariat.

11. http://cyberspark.org.il/why-beer-sheva/ (access: 11/05/2017).

Page 43: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

42

12. HM Government, The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World, Cabinet Office, http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf(access: 11/05/2017).

13. HM Government, The UK Cyber Security Strategy 2011-2016: final report.

14. HM Government, The UK Cyber Security Strategy 2011-2016: final report.

15. HM Government, The UK Cyber Security Strategy 2011-2016: final report.

16. HM Government, The UK Cyber Security Strategy 2011-2016: final report.

17. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/516331/UK_Cyber_Security_Strategy_Annual_Report_2016.pdf

18. HM Government, National Cyber Security Strategy 2016-2021, (UK: HM Government, 2016).

19. HMGovernment, National Cyber Security Strategy 2016-2021.

20. https://www.epsrc.ac.uk/research/centres/acecybersecurity/ (access: 11/05/2017).

21. Objective 7.3.9.HMGovernment, National Cyber Security Strategy 2016-2021.

22. https://www.ncsc.gov.uk/articles/cyber-invest (access: 11/05/2017).

23. Ibidem.

24. Britain to enter ‘new era of online opportunity’, https://www.ncsc.gov.uk/news/britain-enter-new-era-online-opportunity (access: 23/05/2017).

25. NCSC consolidates the expertise of the previously existing: CESG (the information security arm of GCHQ), the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related divisions of the Centre for the Protection of National Infrastructure

26. An overview of the National Cyber Security Centre, https://www.ncsc.gov.uk/document/ncsc-overview (access: 23/05/2017).

27. https://www.weforum.org/agenda/2016/11/top-10-global-enabling-trade-report-2016/, http://www.heritage.org/index/country/singapore (access: 11/05/2017).

28. Agency for Science, Technology and Research (A*STAR), Annual Report 2014–2015, https://www.a-star.edu.sg/Portals/81/Data/News%20And%20Events/Publications/Astar%20Yearbook/Files/Astar%20Yearbook/AStar%20Yearbook/ASTAR%20Annual%20Report_1415.pdf, (access: 11/05/2017).

29. The Global Startup Ecosystem Report 2015, https://ec.europa.eu/futurium/en/system/files/ged/the_global_startup_ecosystem_report_2015_v1.2.pdf(access: 11/05/2017).

30. Cyber Security Agency of Singapore, Singapore’s Cybersecurity Strategy, (Singapore2016).

31. Own elaboration based on the official strategy document.

32. https://www.nrf.gov.sg/programmes/national-cybersecurity-r-d-programme (access: 11/05/2017).

33. http://www.channelnewsasia.com/news/business/govt-commits-s-19b-to-new-5-year-plan-for-r-amp-d-initiatives-ri-8214052 (access: 11/05/2017).

34. https://www.nrf.gov.sg/rie2020 (access: 11/05/2017).

35. https://www.forbes.com/sites/stevemorgan/2015/12/20/cybersecurity%E2%80%8B-%E2%80%8Bmarket-reaches-75-billion-in-2015%E2%80%8B%E2%80%8B-%E2%80%8Bexpected-to-reach-170-billion-by-2020/ (access: 11/05/2017).

36. Frost & Sullivan Global, Cybersecurity Market Assessment, 2014

37. https://www.slideshare.net/benjaminang/singapores-national-cyber-security-strategy, 2017 (access: 11/05/2017).

38. http://www.startupdecisions.com.sg/blog/edb-promotes-cyber-security-singapore/, 2015 (access: 11/05/2017).

39. Think U.S. defence mega-contractors and U.S. defence and intelligence agencies

Page 44: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

43

from Source code to export: advanCed private iCt seCtor as a CruCial part of the national CyberseCurity eCosystem

The rising role of the Internet in the economy, Revolution in Military Affairs or the

changing patterns of information ecology due to the new media expansion, all these have

created a new set of challenges for national strategies in both military and civilian sec-

tors. Cyberspace is a novel area for countries which are struggling to apprehend and

secure critical parts of this fast evolving realm – the realm which is gradually becoming

the backbone of our information society.1 In contrast to traditional domains governed

and secured by central governments, such as land, sea and air, the unique characteristics

of this new field can be found in the building blocks of cyberspace which consists of:

• hardware (physical layer)

• software, protocols (syntactic/logical layer);

• storable and transferable information and ideas (semantic layer).2

The novelty of this realm rests on the fact that the first two components are pro-

duced by the private entities operating within the open-market paradigm. This simple

technical fact must be seen as a rudimentary cause for the far-reaching political

consequences, with the most important being that without a large and advanced

national ICT sector, a country has severely limited cybersecurity capabilities.

The bigger the better: ICT sector, cybersecurity and innovation

A mature ICT sector should be perceived as the driving force for both national cybersecurity

and innovation. It is not a coincidence that a similar set of states is listed in the technology

robert siudak

Page 45: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

44

section of the Fortune 500 Global Rank

and Global Cybersecurity Index. The

latest 2016 Forbes edition features 33

tech companies. The leading state is the

U.S. with 11 representatives, followed by

Japan and Taiwan with 5, China with 4,

and 3 from South Korea.3 By comparison,

the latest Global Cybersecurity Index &

Cyberwellness published by International

Telecommunication Union (ITU) and ABI

Research in 2015, ranks the U.S. as the most

prepared country, with Japan and South Korea

coming 5th and China 14th.4 Poland ranks

11th on the ITU list, with the index 0.592.

The private sector is the main source of ICT

solutions in the modern market. The prime

cause for it can be traced to the structure

of the modern economy. As discussed in

the previous chapter, the business sector is

USA

Japan

Taiwan

China

South Korea

Canada

Ireland

Sweden

Germany

Singapore

11

5

5

4

3

1

1

1

1

1

FORBES GLOBAL 500, TECHNOLOGY - COMPANIES BY COUNTRY

Source: Fortune, Global 500, Technology sector, 2016

0.64

0.68

0.66

0.7

0.74

0.72

0.76

0.78

0.8

0.82

USAJapan

South Korea

United KingdomCanada

Australia

MalysiaOman

New ZealandNorway

BrazilEstonia

GermanyIndia

GLOBAL CYBERSECURITY INDEX & CYBERWELLNESS

Source: International Telecommunication Union, Global Cybersecurity Index & Cyberwellness Profiles, 2015

Page 46: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

45from source code to export

harvesting fundamental and applied research

by changing it into experimental develop-

ment of new products or services. Since

the market needs and rules are the cata-

lysers of innovation in the digital economy,

it is no surprise that the high-tech section

of the Bloomberg Innovation Index from

2015 features the same set of states as

the Forbes 500 Global ranking discussed

above: the U.S. (1st), China (2nd), Japan (3rd),

South Korea (4th), and Canada (5th).5

How all of this influences the security of

cyberspace? According to Symantec report,

roughly one million new malwares are

released every day.6 Hackmageddon which

monitors bigger network attacks counted

1061 incidents in the last year, which accounts

for more than 3 large-scale malicious cyber

operations per day.7 Due to a rapidly changing

threat environment, the cybersecurity sector

is one of the fastest evolving realms of ICT.

Nowhere else innovation is so crucial. To keep

up with their adversaries, cybersecurity com-

panies have to be innovative by design. The

analysis of the Cybersecurity 500 list which

ranks the most innovative cyber companies

worldwide confirms that there are two key

indicators which allow for the creation of a

strong national cyber-innovative ecosystem.8

The first one is a mature and internationally

competitive ICT sector; the second is the

existence of the National Innovation System

discussed in the previous chapter. The first

three countries with the highest number

of representatives on the Cybersecurity

500 list in 2017 have them both: the U.S.

with 365 firms, Israel with 36 companies,

and the UK with 23 representatives.

Source: Cybersecurity Ventures, The Cybersecurity 500, 2017

Cybersecurity as a comparative advantage

We are gradually becoming more aware

of how vulnerable yet indispensable our

networks and systems are. Many reports

suggest that 2016 brought about a break-

through in the public’s perception of cyber-

security.9 It is no longer a distant and minor

problem important only for IT departments.

It has become an integral part of our busi-

nesses, our financial activities, and our

personal lives. We have come to realise that

cybersecurity will be one of the fundamental

challenges in the coming decades. But this

challenge might also be a huge opportu-

nity for those who know how to use it.

USA - 365

Israel - 36

United Kingdom - 23

China

Canada - 13

CYBERSECURITY 500 RANK - COMPANIES BY COUNTRY

Page 47: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

46

Cybersecurity is one of the fastest growing

sectors of the ICT market. According to

various reports, in 2017 the worldwide

spending on cybersecurity products and

services is projected to reach more than

USD 120 billion.10 In the last decade, we

were witnessing this market grow by 8–10%

annually, and predictions for 2017–2020

indicate further steady growth with a

cumulative sum of USD 1 trillion being spent

on cybersecurity in this period. Between

2015 and 2020, the compounded value of

products and services securing the Internet

of Things (IoT) is estimated to reach up to

USD 120 billion – the level of the current

overall cybersecurity market value.11

The particularity of this sector lies in the fact

that the aforementioned growth is driven

primarily by the scale of threats that are rising

2004

1000

3000

2000

4000

6000

5000

0

20152013 2017 2021

Global Cost of Cyber Crime Cybersecurity Market

100

50

150

200

2013

12

2004

3,5

2015

75

2017

617

2020

230

CYBERSECURITY MARKET WORLDWIDE

(USD BN)

GLOBAL COST OF CYBERCRIME (ANNUALLY, USD BN)

Source: Own elaboration based on reports by Gartner, Visiongain, Cybersecurity Ventures, Markets and Markets; Cybersecurity Ventures, 2016 Cybercrime Report, 2016

Page 48: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

47from source code to export

exponentially in the cyber domain and to a

lesser extent by technological breakthroughs

or processes optimisation. It is hard to esti-

mate total losses from cybercrimes for the

public and private entities worldwide, but

they are estimated to be currently at the level

of around 1% of global GDP.12 Furthermore,

researchers predict that by 2021 they will

have accounted for more than USD 6 trillion

losses annually.13 We are faced with a rapidly

growing market driven by immanently vulner-

able nature of the connected technologies.

A strong cybersecurity

market might not only

become a high revenue

niche for national ICT

companies, as is the

case with Israel and the

UK. It should also bring

long-term advantages

for the country’s overall

economy by providing

available and affordable

cyber products and ser-

vices for the business and

the public sector. This, in turn, helps to increase

macroeconomic ratings. Announcements like

those by Standard and Poor’s in 2015 about

lowering marks for lenders who fail to protect

themselves against cyberattacks confirm this

dependency.14 Last but not least, a mature

national market providing world-class solu-

tion to protect ICT infrastructure should be

perceived as a technical base and enabler

for any advanced cybersecurity policies and

regulations introduced by governments.

building cyber sovereignty

The benefits that cybersecurity smart

specialisation yields to the market are just

one side of the equation. The other is the

concept of cyber sovereignty. The under-

lying assumption is that ICT has nationality,

which creates important cybersecurity

implications. To be able to secure its own

cyberspace and to make sovereign policy

decisions on the contemporary international

arena, a country needs to have a competitive

national ICT sector at its disposal. Being able

to acquire source codes,

develop cutting-edge and

dedicated products and

services, or cooperate with

the producer to monitor

the implementation of a

bespoke technology under

the umbrella of intelligent

services is a must in many

critical systems. The prime

examples of this problem

might be China’s ban on

Windows 8 operating

system over security matters15 or barring

Huawei from pitching for U.S. government

contracts because of espionage concerns.16

It is important to view the national ICT

sector as more than a mere provider of

products and services to the market. It is

a crucial part of the whole cybersecurity

ecosystem based on four main components

embedded in the cooperation between

the private and the public sector:

It is hard to estimate total losses from cybercrimes

for the public and private entities worldwide, but

they are estimated to be currently at the level of

around 1% of global GDP.

Page 49: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

48

• national cybersecurity human

resources with appropriate

knowledge and expertise;

• hardware and infrastructure

provided by domestic ICT pro-

ducers and operators;

• available software and logical

building blocks (protocols and

standards) created, maintained, and

serviced by national companies;

• cybersecurity nation-wide system

incentivising collaboration between

the private and public stakeholders

and introducing innovative solutions.

Apart from the already discussed supply

side of the domestic ICT market represented

by the 2nd and 3rd component and the sys-

temic role reflected in the 4th element, the

private sector has to actively participate

in educating and training national cyber-

security workforce. The demand for cyber

specialists is growing exponentially, with

predictions of up to 6 million workplaces

and 1.5 million unfilled vacancies globally by

2019.17 Institutionalised education is lagging

behind the fast evolving cybersecurity field,

which creates a need for business involve-

ment in order to utilize private sector’s

aggregated expertise and experience.

Many national players have already appre-

hended the strategic role of the domestic

ICT sector in their pursuit of secure

cyberspace. As presented in the previous

chapter, Israel, the UK and Singapore have

already introduced dedicated programmes

to support national innovation in the cyber

domain. Others such as the U.S., China,

South Korea, and Japan also actively sup-

port their digital industries. The European

Union has recognised that in face of the fact

that ‘Global cybersecurity and ICT market

is dominated by global suppliers from North

America’,18 it has to play a more active role.

As detailed in the first chapter of this report,

in 2016 the European Commission and the

European Cyber Security Organization

(ECSO) signed a contractual public-private

partnership (cPPP) that aims to develop a

competitive European market by triggering

EUR 1.8 billion of investment by 2020.

Poland – untapped potential

In 2016, the Polish ICT market was worth

roughly USD 8.75 billion.19 It was a result of

the steady annual growth of 5-6% on average

in the last two decades, with a high 9-10%

boost observed in the recent quarters. In

2017 ICT is predicted to account for more

than 4.5 % of the total number of employees

in Poland and 6 % of Polish GDP.The transfor-

mation of the Polish economy in the last 28

years resulted in a huge shift from traditional

sectors such as coal mining and shipbuilding

into a more service-oriented GDP com-

position and the rising role of information

technologies.20 The ICT companies which

accumulated expertise over that time had a

Page 50: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

49from source code to export

unique chance to come to the forefront of the

digital transformation of the Polish economy.

The main asset that has been developed in

this process and which could be utilized to

build a national cybersecurity ecosystem

are human resources. Poland’s abundance of

cyber talents has been proven by numerous

rankings and hackathons. Polish developers

and hackers won almost every well-known

cyber contest from Locked Shields (2014)

through Capture the Flag cycle (2014) to

unofficial developers’ world cup – Hello World

Open (2014) and Google Code Jam (2012).

According to HackerRank, Polish devel-

opers rank third, just after their Chinese

and Russian counterparts. When it comes

to Java, Poland tops the list, being followed

by other two CEE countries: Bulgaria and

Hungary.21 Furthermore, Poland stands

second only to Singapore as the world’s

leading developer hub from business and

investors’ perspective.22 This accelerates

the demand for skilled ICT specialist in the

domestic market. Current estimates show

that 40,000 ICT vacancies are still unfilled,

even though Polish universities educate

30,000 new ICT graduates every year.23

Drawing upon the world-class human

resources, ICT is one of the most globally

competitive sectors of the Polish economy.

From startups through medium enterprises

to big companies, Poland is a home country

for dozens of internationally expanding

brands. Many of them are leaders in their

market segment, with their R&D depart-

ments being a source of unique, cutting-

edge technological solutions. Others, due

to their innovative business models, are

able to compete globally with the biggest

players from Silicon Valley or Shenzhen.

100 99.9

98. 97.9

93.9

92.191.2 91.2

90.7 90.2

88.787.1 87.1

84.3

China

Bulgaria

Singapore

GermanyRussia

Poland

Switzerland

HungaryJapan

TaiwanFrance

Czech Republic Italy

Ukraine

WHICH COUNTRY HAS THE BEST DEVELOPERS - HACKER RANK INDEX

Source: HackerRank, Which Country Would Win in the Programming Olympics?, 2017

Page 51: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

50

But world-class human capital and open

business environment are not enough to

make cybersecurity ecosystem truly thrive.

As postulated in the first chapter of this

report, there is a need for a more systemic

public-private partnership which can har-

ness available market and government

resources to strengthen national cyber-

security. This cross-sectoral cooperation

is also a prime requirement for the Polish

commercial ICT sector to grow. According

to numerous reports, in the last years

The former is a particularly problematic issue

for cybersecurity and high-tech startups.

In order to properly scale up their products

and internationalise their offer, they need

to have access to high-risk capital to get the

project off the ground. In many cases, it is

the market itself that forces Polish startups

Poland’s domestic ICT market has struggled with two main obstacles:• Insufficient funding, both

external and internal, including high-risk capital. Enterprises view this factor as ‘the biggest barrier to innovation’.24

• Reduced demand from the public sector, including central and local governments as well as state-owned enterprises.25

to seek investors abroad among American,

French, or British Venture Capital Funds.

The gravity of the latter issue rests on the

fact that in the last year, public spending in

Poland accounted for 42.1% of total GDP.26

This figure shows only central and local

government expenditures, excluding publicly

owned companies which are occupying first

13 places on the list of the biggest enterprises

with Polish capital.27 According to a survey

conducted by the Kosciuszko Institute and

the Cybersecurity Foundation in May 2017

among Polish cybersecurity companies, 88.9%

of enterprises recognised limited demand for

innovative products as the main drawback

of the domestic cybersecurity market. The

strategic importance of both challenges is

confirmed by the fact that there are already

certain public initiatives in place trying to

tackle these problems. The Venture Capital

market is slowly emerging in Poland, partly

thanks to government programmes like ‘Bridge

Alfa’ or ‘Starter’. They combine private and

public capital, which allows for the creation

of new domestic VC funds. Both programmes

are incorporated into a wider agenda of

governmental support for the startup sector

under the umbrella of the ‘Start in Poland’

brand. New initiatives are also emerging in the

state-owned enterprises, many of whom are

planning to establish corporate VCs.28 Others

such as Witelo, a Fund of Funds designed

to reinvest publicly owned assets in Polish

startups through international VC funds,

has already signed deals with partners like

Atomico, Evolution Equity, and DN Capital.29

Page 52: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

51from source code to export

To tackle scarce public interest in domestic

cybersecurity products and services more

systemic solutions are needed. Therefore,

open collaboration platforms must be estab-

lished at central and local levels to match the

demand with the supply side in order to drive

their growth. Once completed, the Cyberpark

Enigma project proposed in the governmental

Responsible Development Plan might become

a core nodal point in the process of fine tuning

public needs to the domestic market offer.30

The goal is to attract private Polish-owned

companies as well as government-owned enti-

ties and academic research centres to coop-

erate at all levels of the supply chain. Local

initiatives such as Cybersec Hub in Krakow,

which connects academia, large companies

and startups with local authorities and other

public partners, might be a workable example

of regional cybersecurity ecosystems.31 This,

as well as others systemic propositions such

as a specially designed startup accelerator

have been repeatedly voiced during the Polish

Cybersecurity Forum – CYBERSEC PL 2017.

Although, as presented above, some ini-

tiatives are already in place, there is a

need for key strategic decisions to be

made to seize the opportunity provided

by the growing cybersecurity market.

Tobecomeoneofthecentresofworld-classexpertiseandproductsincybertechnologies,atleastsixinitialstepshavetobetaken:• Establishnation-widePublic-PrivatePartnershipsoncybersecurity

inordertoboostinvestmentinthedomesticmarket;

• Setuparangeofcybersecurityresearchanddevelopmentprogrammestoattractacademicstoconductfundamentalandappliedresearch;

• IncentiviseentrepreneurstoexpandtheirinvestmentsandR&Dinthefieldbyintroducingspecialbenefitpackagesforcompaniespartneringwithinregionalorcentralcybersecurityhubs;

• Attractthepublicsectortodomesticcybersecurityproductsandmakecentraladministrationmoreopentocooperationwithenterprisesofallsizes:startups,smallandmediumcompanies,andnationalchampions;

• Changethelegalframeworktoenablealldomesticcompanies,includingstartupsandSMEs,totakepartinthepublicbidsforcybersecurityproductsandservices;

• Prepareandexecutealong-termPRstrategytopromotePolandasacentreofexcellenceincybersecurity.

• Singaporeiscurrentlyadoptingthisapproach,includingthe‘build-up’ofthelocalindustry.

Page 53: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

52

The aforementioned initiatives will enable harvesting technology and human resources and

building them into the emerging national cybersecurity ecosystem. Furthermore, smart spe-

cialisation in cyber technologies could become a competitive advantage of the entire Polish

ICT sector. This, in turn, would support the national economy by changing Poland’s position

in the global ICT supply chain. Known for outsourcing simple back- and front-end services,

Poland could transform into a centre of innovative and cutting-edge cybersecurity products.

sources:1. European Commission, DG Justice, Freedom and Security, Final Report On Study

on Critical Dependencies of Energy, Finance and Transport Infrastructures on ICT Infrastructure, 2009, [online]www.ec.europa.eu/home-affairs/sites/homeaffairs/files/e-library/docs/pdf/2009_dependencies_en.pdf (access: 12/05/2017), p. 10.

2. Martin C. Libicki,Conquest in Cyberspace: National Security and Information Warfare, Cambridge University Press, New York 2007.

3. Fortune, Global 500, Technology sector, 2016, [online] www.beta.fortune.com/global500/list/filtered?sector=Technology (access: 12/05/2017).

4. International Telecommunication Union, Global Cybersecurity Index &Cyberwellness Profiles, 2015, [online] https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf (access: 12/05/2017).

5. Bloomberg Innovation Index, High Tech Companies, 2015, [online] www.bloomberg.com/graphics/2015-innovative-countries/ (access: 12/05/2017).

6. Symantec, Internet Security Threat Report, April 2017, Vol. 22, [online] www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf (access: 12/05/2017).

7. Hackmageddon, 2016 Cyber Attacks Statistics, [online] www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/ (access: 12/05/2017).

8. Cybersecurity Ventures, The Cybersecurity 500, 2017, [online] www.cybersecurityventures.com/cybersecurity-500-list/ (access: 12/05/2017).

9. F-Secure, The State of Cyber Security 2017, Report, 2017, [online] www.business.f-secure.com/the-state-of-cyber-security-2017; PWC, The Global State of Information Security, Survey 2017, [online] www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html (access: 12/05/2017).

10. Gartner, Forecast Analysis: Information Security, Worldwide, 1Q16 Update, 2016, [online] www.gartner.com/doc/3357452;Visiongain, Cyber Security Market Report 2016-2021, 2016, [online] https://www.visiongain.com/Report/1583/Cyber-Security-Market-Report-2016-2021; Cybersecurity Ventures, Cybersecurity Market Report Q1 2017, 2017, [online] http://cybersecurityventures.com/cybersecurity-market-report/; Markets and Markets, Cyber Security Market by Solutions (IAM, Encryption, DLP, UTM, Antivirus/Antimalware, Firewall, IDS/IPS, Disaster Recovery), Services, Security Type, Deployment Mode, Organization Size, Vertical & Region – Global Forecast to 2021, 2016, [online] www.marketsandmarkets.com/PressReleases/cyber-security.asp (access: 12/05/2017).

11. Abomhara M., Geir M. Køien. 2015. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks,“Journal of Cyber Security and Mobility” 2015, 4 (1),pp. 65–88; CamhiJ.,Business Insider, BI Intelligence projects 34 billion devices will be connected by 2020, 2015, [online] www.businessinsider.com/bi-intelligence-34-billion-connected-devices-2020-2015-11?IR=T (access: 12/05/2017).

12. Intel Security, Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II, June 2014, [online] https://www.mcafee.com/tw/resources/reports/rp-economic-impact-cybercrime2.pdf (access: 12/05/2017).

Page 54: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

53from source code to export

13. Cybersecurity Ventures, 2016 Cybercrime Report, [online] www.cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (access: 12/05/2017).

14. SC Magazine UK, S&P could downgrade lenders to standard and poor for cyber-security, 2015, [online] www.scmagazineuk.com/standard-and-poor-to-downgrade-banks-credit-rating/article/534298/ (access: 12/05/2017).

15. OnMSFT, China is reportedly not banning Microsoft Office after all, 2014, [online] www.onmsft.com/news/china-not-banning-microsoft-office-suite (access: 12/05/2017).

16. Brown G., Spying and Fighting in Cyberspace: What Is Which? ”Journal of National Security Law & Policy”2016, 8 (3): 621–43; BBC, Huawei boss says US ban ‘not very important, 2014, [online] www.bbc.com/news/business-29620442 (access: 12/05/2017).

17. CSO, Cybersecurity job market to suffer severe workforce shortage, 2015, [online] www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html (access: 12/05/2017).

18. European Cyber Security Organisation, European Cybersecurity PPP, Presentation of Luigi Rebuffi Secretary General at ECSO, 2016, [online] www.enisa.europa.eu/events/enisa-validation-workshop-market-study-of-nis-products-and -services/3TheDSMandcPPPinitiativeLuigiRebuffi.pdf (access: 12/05/2017).

19. PMR, Rynek IT w Polsce 2016. Analiza rynku i prognozy rozwoju na lata 2016-2021, 2016, [online] www.pmrpublications.com/product/Rynek-IT-w-Polsce-2016(access: 12/05/2017).

20. Ministerstwo Rozwoju, Polski Sektor ICT, 2017, [online] https://www.mr.gov.pl/strony/aktualnosci/perspektywy-rozwoju-polskiej-branzy-ict-do-roku-2025-raport-ministerstwa-rozwoju/

21. Hacker Rank, Which Country Would Win in the Programming Olympics?, 2017, [online]www.blog.hackerrank.com/which-country-would-win-in-the-programming-olympics/ (access: 12/05/2017).

22. Hacker Rank, Where Should You Open Your Next Engineering Office?, 2017, [online] www.blog.hackerrank.com/open-next-engineering-office/ (access: 12/05/2017).

23. Dziennik Internautów Technologie, Polska kształci za mało informatyków. Umiejętność programowania najbardziej poszukiwaną kompetencją na rynku pracy, 2015, [online] www.di.com.pl/polska-ksztalci-za-malo-informatykow-umiejetnosc-programowania-najbardziej-poszukiwana-kompetencja-na-rynku-pracy-53442 (access: 12/05/2017).

24. Lewandowska M.S., Barriers to Innovation in Poland Compared with Other European Countries: Implications for Innovation Policy [in:] Poland Competitiveness Report 2016. The Role Of Economic Policy And Institutions, ed. M.A. Weresa, World Economy Research Institute, SGH Warsaw School Of Economics, Warsaw 2016, [online] www.kolegia.sgh.waw.pl/pl/KGS/struktura/IGS-KGS/publikacje/Documents/Raport_POLAND2016.pdf (access: 12/05/2017), p. 214.

25. PMR, Rynek IT w Polsce 2016…, op.cit.

26. Instytut Badań Strukturalnych, Finanse Publiczne w Polsce – diagnoza na tle innych krajów, IBS policy paper 04/2016, 2016, [online] www.ibs.org.pl/app/uploads/2016/04/IBS_Policy_Paper_04_2016_pl.pdf (access: 12/05/2017).

27. Wprost, 200 Największych Polskich Firm 2015, 2015, [online] www.rankingi.wprost.pl/200-najwiekszych-firm (access: 12/05/2017).

28. WNP portal gospodarczy, Tauron rozważa utworzenie funduszu typu CVC, 2016, [online] www.energetyka.wnp.pl/tauron-rozwaza-utworzenie-funduszu-typu-cvc,275967_1_0_0.html (access: 12/05/2017).

29. Rzeczpospolita, Witelo stawia na innowacje, 2017, [online] www.rp.pl/Ubezpieczenia/303019897-Witelo-stawia-na-innowacje.html (access: 12/05/2017).

30. MinisterstwoRozwoju, Responsible Development Plan, presentation, 2016, [online] www.mr.gov.pl/media/14873/Responsible_Development_Plan.pdf (access: 12/05/2017).

31. Portal CYBERSEC HUB, [online] www.cybersechub.eu (access: 12/05/2017).

Page 55: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

54

Page 56: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

55

Cdr Wiesław Goździewicz (Polish Navy)

Legal Advisor – NATO Joint Force Training Centre (JFTC)

Graduated the Faculty of Law and Administration of the University of Gdańsk in 2002.

He then joined the Armed Forces and started his military career as a junior legal officer at

43rd Naval Airbase in Gdynia.

He has also served in Public International Law Division of the Legal Department of the

Ministry of National Defence.

Since October 2009 he has been assigned as the Legal Advisor to the Joint Force Training

Centre in Bydgoszcz. Apart from providing legal advice related to the daily functioning

of the Centre, his role includes providing training on the practicalities of International

Humanitarian Law (IHL) application and legal aspects of military operations, from conven-

tional warfare to space and cyber operations.

Cyprian Gutkowski

Lawyer

Graduated from the Cardinal Stefan Wyszynski University in Warsaw (Faculty of Law and

Administration). He also has a degree in Data Security Management from Warsaw School

of Economics post-graduate programme. An experienced lawyer, who offers advice on the

law, legal procedures and a wide range of associated issues. He is an expert on personal

data protection and cybersecurity. He cooperates with Polish Government and non-gov-

ernmental organizations on the law and information security.

robert Siudak

Research Fellow, The Kosciuszko Institute

CYBERSEC HUB Manager and Chief Editor of the European Cybersecurity Market

Journal. Cybersechub.eu is a platform linking innovative startups from Central and

Eastern Europe, global investors, academia as well as local and central authorities in the

effort to create regional center of excellence in cybersecurity. Organizer of the startup

section at the annual European Cybersecurity Forum CYBERSEC – one of the main public

about authorS

Page 57: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

56

policy conference on ICT security. Studied cyber in Israel, Ireland and currently is a PhD

candidate at the Jagiellonian University. Author of two monographies and numerous arti-

cles regarding the intersection of new technologies and international security.

lior Tabansky

Cyber Power scholar at Tel Aviv University’s Blavatnik Interdisciplinary Cyber Research

Center (ICRC).

Lior offers a uniquely strategic cybersecurity methodology, facilitated by his Political

Science & Security Studies expertise (PhD expected in 2017), high-level think-tank,

policy and corporate experience, and 15 years of IT-Pro practice. Recently, Lior’s book

Cybersecurity in Israel, co-authored with Prof. Isaac Ben-Israel, was published by

Springer. Cybersecurity in Israel is the first comprehensive “insider” account of decades

of policy evolution, dilemmas and operations. Further, Lior Tabansky develops an original

analysis of the roles grand strategy and national innovation system play in cybersecurity.

publiCation’s partner

Asseco Poland is the largest IT company listed on the Warsaw Stock Exchange. It has devel-

oped technologically advanced software solutions for companies and institutions of all key

sectors of the economy for more than 25 years. Today, Asseco is the number one software

house in Central Europe and the sixth largest software vendor in Europe. Asseco Group

is present in 54 countries, employing over 22,000 people. It has provided IT technologies

to support business operations as well as development at more than 100,000 companies

and organizations. While operating in international markets, Asseco has gained extensive

experience, combining the know-how of all the Group’s subsidiaries. The synergy of these

competencies provides added value to customers who receive the top quality products.

Page 58: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

PUBLISHER

Founded in 2000, the Kosciuszko Institute is a leading, non-governmental and non-profit

think tank and research institute. Our mission is to act in the interest of the socio-eco-

nomic development and security of Poland as a proactive member of the European Union

and NATO.

Specializing making strategic recommendations, our Institute lays down the paths for the

advancement of key public policies offering substantive support for Polish and European

decision-makers alike. Our think tank fellows produce nonpartisan and independent

reports and analyses, and their conclusions are an essential source of information for the

private sector and civil society.

As a leader among Polish non-governmental organisations, the Kosciuszko Institute runs

a range of national and international projects devoted to multifaceted aspects of security,

including energy and economic security as well as cybersecurity. Engaging key policy and

business stakeholders, the representatives of international organisations and the NGO

sector in collaborative efforts, our Institute initiates socio-political debate on the most

pressing challenges facing Poland and Europe.

Due to its leadership position, the Kosciuszko Institute attracts the best analysts from all

over the world to launch multiple pioneering and innovative ventures. The Kosciuszko

Institute is the originator and organiser of the European Cybersecurity Forum –

CYBERSEC, an annual conference dedicated to the strategic aspects of cyberspace. The

first edition of the event was held in 2015. Recognising its pivotal role as a platform for

regular dialogue between key stakeholders, Concise Courses has ranked the event among

the top five cybersecurity conferences in Europe. As part of the CYBERSEC initiative, we

have also rolled out a national edition of the conference: the Polish Cybersecurity Forum

– CYBERSEC PL.

Page 59: Security through innovation - Instytut Kościuszki · initiative does not, strictly speaking, address the issue of security in Polish cyberspace. By synergising the potential of the

Wiesław Goździewicz, Cyprian Gutkowski, Lior Tabansky, Robert SiudakEditor: Dominik Skokowski

Security through innovation Cybersecurity sector as a driving force in the national economic development

© The Kosciuszko Institute 2017ISBN: 978-83-63712-26-6

Partner