Czechs Must Get Ready for Offensive Cyberwar

The Czech Republic should create the necessary capacities with which to attack its enemy's cyber infrastructure in the case of an online attack, saysDaniel Bagge, from the National Cyber Security Centre (NKCB).

The number of cyber-attacks is growing and the situation will further worsen in the future, Bagge said.

He said the Czech Republic was technologically well prepared for the defence of its critical cyber infrastructure and the NCKB was trying to enhance the information in the civil service so that both individuals and institutions protect more the security of their systems.

"However, it is obvious from foreign experience that one has to take a step beyond the national border if we are attacked by a cyber actor," Bagge said.

The Czech Republic should have the capacities to be able to attack and disarm a cyber infrastructure used by the assailant in the attack, he added.

Bagge said the security situation in the cyber space was worsening. There is a growing number of attacks as dangerous activities are acquiring e-form.

At the same time, the costs of an attack are falling and its organisers are more able to hire some hackers to infiltrate the systems or to commission the producers of malware, Bagge warned.

Bagge said the authorities should not consider it shameful if they are attacked and should not try to hush up such an incident.

"The attack must be dealt with. If this is swept under the carpet, perhaps for political reasons, we will be unable to warn other ministries and international partners," Bagge said.

Ein News:

You Might Aslo Read:

NATO Cyber War Games 2017: Czechs Win:

Germany May Go Offensive After Russian Cyber Attacks:

 

« Getting Threat Intelligence Right
Intel's Data Solutions For Military & Commercial Use »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.