Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.
 
The Polish parliament has appointed the country's Ministry of Digital Affairs as the sole entity responsible for overseeing Poland's key personal data registers. The law is part of broader efforts by the government to bolster the country's cyber-security policies and allocate its management to the Digitisation Ministry.

“This is due to the increased threats for national IT systems… and the lack of an entity which would coordinate personal data protection at government levels,” states the law, which was sponsored by MPs from Poland's ruling Law and Justice (PiS) party.

The MPs also said that further automatisation of the national personal data registers services requires coordination by a single entity, the Digitisation Ministry.

Mirosław Maj, president of the Warsaw-based Cybersecurity Foundation, sys that the latest move is expected to contribute to enhancing Poland's cyber-security. 

“I can say that personally, I consider the plans related to the taking over of supervision over these systems by the Digitisation Ministry as a positive development. Digitisation minister Anna Streżyńska says that this modification will not only improve the functioning of these systems, but also optimise their financing,” Maj said. “This move is also a positive step from the point of view of cyber-security.”

However, Maj also cautions that centralising such supervision has its own risks. “Minister Streżyńska is perfectly aware of this, but she has also mentioned certain staff and budgetary constraints related to cyber-security.

In my opinion, it would be worthwhile to develop precise fields of competences for all stakeholders in Poland. These include the Ministry of Defence and the Digitisation Ministry. Other stakeholders include relevant institutions responsible for prosecuting cyber-crimes, the Ministry of the Interior and Administration and the Government Centre for Security.”

According to Maj, it “would be beneficial if two strong institutions were created to handle civilian and military affairs in this field, such as a National Cyber-security Centre and a new military body.”

Meanwhile, Poland's Digitisation Minister said that the government is aiming to bolster the country's cyber-security policy amid fears of Russian meddling.

"We recently had incidents, and even serious cyber-security threats [in Ukraine] which were probably inspired by Moscow. We don't know whether our networks were infiltrated. And if they were, then how and by whom," Strezynska told local news weekly Wprost in an interview on 14 February.

Local observers confirm that the Polish government is highly concerned that it must ensure that state-run institutions are enabled with enhanced cyber-security capabilities, and note that Russia's intervention in neighbouring Ukraine is a driving force behind these efforts.

“Many Polish decision-makers fear that hybrid warfare could be used against Poland, including a potential cyber-attack,” professor Marek Jablonowski, a political scientist from the University of Warsaw, told SC. “The conflict [in Ukraine] has significantly moved this issue up the political agenda in Poland.” 

SC Magazine

 

« FBI Can Unlock iPhone Without Apple’s Help
NSA Hacked Penatgon Command-Control In 4 Days »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.