China’s National Cyber Security Powerhouse Strategy

China has a strategy to become a cyber security powerhouse. Since 2017, it has been building a National Cybersecurity Center (NCC) - a 15-square-mile campus in Wuhan that will serve as school, research lab, incubator, and talent cultivator. 

The site includes seven centers for research, talent cultivation, and entrepreneurship; two government-focused laboratories; and a National Cybersecurity School. 

In particular,  China aims to reduce its reliance on foreign cyber technology and new report by Georgetown University’s Center for Security and Emerging Technology (CSET), examines the NCC.

Currently China’s military faces a shortage of cyber operators as the country has a deficit of at least 1.4 million cyber security professionals which is a problem for the military’s ability to recruit qualified candidates. The NCC will help address the shortage by cultivating talent. The center’s “leading mission” is the National Cybersecurity School, whose first class of 1,300 students will graduate in 2022. Ultimately, China's policymakers hope to see 2,500 graduates each year, though by when remains unclear. 

Combined, both components of the NCC could train more than a half-million professionals in a decade. Even half that number would still help overcome the talent gap. However, currently China’s current system for innovation in the cyber domain will not meet its strategic goals. Chinese strategists say that disrupting communications within these systems is key to deterring military engagement. No single tool will establish an asymmetric advantage. Instead, China must reliably produce attack types for each system targeted. There are no silver bullets, but a workforce capable of significant innovation is critical to implementing the strategy. Students and startups can solicit business guidance and investment funds at the NCC’s Incubator. Besides supporting private-sector innovation, two other components of the NCC support government-focused research. 

Leaked documents revealed occasional close cooperation between the US government and technology companies and China wants have effective local replacements for foreign software to protect its military and critical infrastructure from foreign interference. 

If the NCC is successful at spurring innovation, the pipeline may ease adoption of locally made products and facilitate the replacement of foreign technology. 

Over the long run, the NCC’s talent cultivation efforts will likely impact the dynamics of nation-state cyber competition. China’s competitors should be prepared to respond to, but not to mimic, these developments. US policymakers could turn toward machine-learning to identify intrusions and defend network defenses. But it must determine a course of action quickly. 

Georgetown University CSET:      Perma:      Perma:       DefenseOne:        Wired

You Might Also Read: 

Data Privacy Is Key To The Technology Battle With China:

 

« CYRIN's New Cyber Security Training Partnership
Hackers Steal UK Firearms Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.