China’s National Cyber Security Powerhouse Strategy

China has a strategy to become a cyber security powerhouse. Since 2017, it has been building a National Cybersecurity Center (NCC) - a 15-square-mile campus in Wuhan that will serve as school, research lab, incubator, and talent cultivator. 

The site includes seven centers for research, talent cultivation, and entrepreneurship; two government-focused laboratories; and a National Cybersecurity School. 

In particular,  China aims to reduce its reliance on foreign cyber technology and new report by Georgetown University’s Center for Security and Emerging Technology (CSET), examines the NCC.

Currently China’s military faces a shortage of cyber operators as the country has a deficit of at least 1.4 million cyber security professionals which is a problem for the military’s ability to recruit qualified candidates. The NCC will help address the shortage by cultivating talent. The center’s “leading mission” is the National Cybersecurity School, whose first class of 1,300 students will graduate in 2022. Ultimately, China's policymakers hope to see 2,500 graduates each year, though by when remains unclear. 

Combined, both components of the NCC could train more than a half-million professionals in a decade. Even half that number would still help overcome the talent gap. However, currently China’s current system for innovation in the cyber domain will not meet its strategic goals. Chinese strategists say that disrupting communications within these systems is key to deterring military engagement. No single tool will establish an asymmetric advantage. Instead, China must reliably produce attack types for each system targeted. There are no silver bullets, but a workforce capable of significant innovation is critical to implementing the strategy. Students and startups can solicit business guidance and investment funds at the NCC’s Incubator. Besides supporting private-sector innovation, two other components of the NCC support government-focused research. 

Leaked documents revealed occasional close cooperation between the US government and technology companies and China wants have effective local replacements for foreign software to protect its military and critical infrastructure from foreign interference. 

If the NCC is successful at spurring innovation, the pipeline may ease adoption of locally made products and facilitate the replacement of foreign technology. 

Over the long run, the NCC’s talent cultivation efforts will likely impact the dynamics of nation-state cyber competition. China’s competitors should be prepared to respond to, but not to mimic, these developments. US policymakers could turn toward machine-learning to identify intrusions and defend network defenses. But it must determine a course of action quickly. 

Georgetown University CSET:      Perma:      Perma:       DefenseOne:        Wired

You Might Also Read: 

Data Privacy Is Key To The Technology Battle With China:

 

« CYRIN's New Cyber Security Training Partnership
Hackers Steal UK Firearms Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.