Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.
 
The Polish parliament has appointed the country's Ministry of Digital Affairs as the sole entity responsible for overseeing Poland's key personal data registers. The law is part of broader efforts by the government to bolster the country's cyber-security policies and allocate its management to the Digitisation Ministry.

“This is due to the increased threats for national IT systems… and the lack of an entity which would coordinate personal data protection at government levels,” states the law, which was sponsored by MPs from Poland's ruling Law and Justice (PiS) party.

The MPs also said that further automatisation of the national personal data registers services requires coordination by a single entity, the Digitisation Ministry.

Mirosław Maj, president of the Warsaw-based Cybersecurity Foundation, sys that the latest move is expected to contribute to enhancing Poland's cyber-security. 

“I can say that personally, I consider the plans related to the taking over of supervision over these systems by the Digitisation Ministry as a positive development. Digitisation minister Anna Streżyńska says that this modification will not only improve the functioning of these systems, but also optimise their financing,” Maj said. “This move is also a positive step from the point of view of cyber-security.”

However, Maj also cautions that centralising such supervision has its own risks. “Minister Streżyńska is perfectly aware of this, but she has also mentioned certain staff and budgetary constraints related to cyber-security.

In my opinion, it would be worthwhile to develop precise fields of competences for all stakeholders in Poland. These include the Ministry of Defence and the Digitisation Ministry. Other stakeholders include relevant institutions responsible for prosecuting cyber-crimes, the Ministry of the Interior and Administration and the Government Centre for Security.”

According to Maj, it “would be beneficial if two strong institutions were created to handle civilian and military affairs in this field, such as a National Cyber-security Centre and a new military body.”

Meanwhile, Poland's Digitisation Minister said that the government is aiming to bolster the country's cyber-security policy amid fears of Russian meddling.

"We recently had incidents, and even serious cyber-security threats [in Ukraine] which were probably inspired by Moscow. We don't know whether our networks were infiltrated. And if they were, then how and by whom," Strezynska told local news weekly Wprost in an interview on 14 February.

Local observers confirm that the Polish government is highly concerned that it must ensure that state-run institutions are enabled with enhanced cyber-security capabilities, and note that Russia's intervention in neighbouring Ukraine is a driving force behind these efforts.

“Many Polish decision-makers fear that hybrid warfare could be used against Poland, including a potential cyber-attack,” professor Marek Jablonowski, a political scientist from the University of Warsaw, told SC. “The conflict [in Ukraine] has significantly moved this issue up the political agenda in Poland.” 

SC Magazine

 

« FBI Can Unlock iPhone Without Apple’s Help
NSA Hacked Penatgon Command-Control In 4 Days »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.