China’s National Cyber Security Powerhouse Strategy

China has a strategy to become a cyber security powerhouse. Since 2017, it has been building a National Cybersecurity Center (NCC) - a 15-square-mile campus in Wuhan that will serve as school, research lab, incubator, and talent cultivator. 

The site includes seven centers for research, talent cultivation, and entrepreneurship; two government-focused laboratories; and a National Cybersecurity School. 

In particular,  China aims to reduce its reliance on foreign cyber technology and new report by Georgetown University’s Center for Security and Emerging Technology (CSET), examines the NCC.

Currently China’s military faces a shortage of cyber operators as the country has a deficit of at least 1.4 million cyber security professionals which is a problem for the military’s ability to recruit qualified candidates. The NCC will help address the shortage by cultivating talent. The center’s “leading mission” is the National Cybersecurity School, whose first class of 1,300 students will graduate in 2022. Ultimately, China's policymakers hope to see 2,500 graduates each year, though by when remains unclear. 

Combined, both components of the NCC could train more than a half-million professionals in a decade. Even half that number would still help overcome the talent gap. However, currently China’s current system for innovation in the cyber domain will not meet its strategic goals. Chinese strategists say that disrupting communications within these systems is key to deterring military engagement. No single tool will establish an asymmetric advantage. Instead, China must reliably produce attack types for each system targeted. There are no silver bullets, but a workforce capable of significant innovation is critical to implementing the strategy. Students and startups can solicit business guidance and investment funds at the NCC’s Incubator. Besides supporting private-sector innovation, two other components of the NCC support government-focused research. 

Leaked documents revealed occasional close cooperation between the US government and technology companies and China wants have effective local replacements for foreign software to protect its military and critical infrastructure from foreign interference. 

If the NCC is successful at spurring innovation, the pipeline may ease adoption of locally made products and facilitate the replacement of foreign technology. 

Over the long run, the NCC’s talent cultivation efforts will likely impact the dynamics of nation-state cyber competition. China’s competitors should be prepared to respond to, but not to mimic, these developments. US policymakers could turn toward machine-learning to identify intrusions and defend network defenses. But it must determine a course of action quickly. 

Georgetown University CSET:      Perma:      Perma:       DefenseOne:        Wired

You Might Also Read: 

Data Privacy Is Key To The Technology Battle With China:

 

« CYRIN's New Cyber Security Training Partnership
Hackers Steal UK Firearms Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.