IISS: Cyber Capabilities & National Power Rankings

A two year of study by the eminent think-tank, the International Institute for Strategic Studies (IISS) has produced a report that assesses 15 countries cyber power. It ranks a country’s cyber capacity and effectiveness and its general conclusion is that most countries are not satisfied with the level of their electronic defences. 

Currently, there is a large cyber gap between many countries and at present the US is the world leader in cyber capability and is ranked by IISS as the only country that is ranked in Tier One and is considered to have at least a 10 year cyber advantage over other contenders.

Countries in the IISS Tier Two are Australia, Canada, China, France, Israel, Russia and the UK,  while those in Tier Three are India, Indonesia, Iran, Japan, Malaysia, North Korea and Vietnam.

Overall, the report suggests that national Intelligence Agencies working for countries that are awake to the Information Age will become far more cyber/AI focused and this report provides substantial further evidence that, for many countries, cyber policies and capabilities have moved to centre stage in international security.

  • In 2015, China’s new military strategy declared that ‘outer space and cyber space have become new commanding heights of strategic competition’ between states. 
  • In 2016, the Unites States accused the Russian government, and President Vladimir Putin personally, of ordering a sustained information attack on the US presidential election.In May 2019, then-president Donald Trump foreshadowed a technology war with China if it continued its malign actions in cyberspace.
  • In March 2020, Trump declared a national emergency in cyberspace, the fourth time in five years that a US president had done so. 
  • In April 2021, China referred to the US as the ‘champion’ of cyber attacks. A month later, the G7 foreign ministers’ meeting called on both Russia and China to bring their cyber activities into line with international norms. 

Dominance in cyberspace has been a strategic goal of the United States since the mid-1990s. It is the only country with a heavy global footprint in both civil and military uses of cyberspace, although it now perceives itself as seriously threatened by China and Russia.

In response, it is taking a robust and urgent approach to extending its capabilities for cyber operations, both for systems security at home and for its ambitions abroad in the diplomatic, political, economic and military spheres. 

The US retains a clear superiority over all other countries in terms of its ICT empowerment, but this is not a monopoly position. At least six European or Asian countries command leadership positions in certain aspects of the ICT sector, though all but one (China) are close US allies or strategic partners. 

Australia : Tier Two

Australia’s cyber security strategies have concentrated on national security, commercial cyber security, the industrial base for sovereign capability, workforce development and good international citizenship. The Australian Signals Directorate, the country’s principal cyber-related agency, remains the most influential in national policymaking. The country is still developing its military cyber strategies and policies after setting up an Information Warfare Division in 2017. 

Australia can boast some research and industry credentials in the field of information and communications technology and cyber security, but these are growing from a low base. In part because of its 70-year membership of the Five Eyes intelligence alliance, Australia has more mature cyber capabilities than its modest defence and intelligence budgets might suggest. It is active in global diplomacy for cyber norms and cyber capacity-building. 

India : Tier Three

Despite the geostrategic instability of its region and a keen awareness of the cyber threat it faces, India has made only modest progress in developing its policy and doctrine for cyberspace security. The country is active and visible in cyber diplomacy but has not been among the leaders on global norms, preferring instead to make productive practical arrangements with key states. From the little evidence available on India’s offensive cyber capability, it is safe to assume it is Pakistan-focused and regionally effective. 

Overall, India is a third-tier cyber power whose best chance of progressing to the second tier is by harnessing its great digital-industrial potential and adopting a whole-of-society approach to improving its cyber security. Iran regards itself as being in an intelligence and cyber war with its enemies. 

Iran: Tier Three

In 2010, when the Stuxnet attack on Iran by the United States and Israel was revealed, the country had little access to international cyber security suppliers and only a very small number of domestic researchers in the field. Since then, however, it has become a determined cyber actor against US, Gulf Arab and Israeli interests.

Leading states agree that cyber capability underpins military power and can radically affect decision-making and the control of most military systems. Presentky the IISS conclude that the US currently has superiority, but ther are a growing number of contenders capabable of inflicting damaging intrusions which transcend national borders.

IISS:         IISS:     

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« For Sale - Dark Web Exploits
Autonomous Ships And Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

CoGuard

CoGuard

CoGuard is a patented solution that uses AI driven automation to provide fast, cost effective white-box penetration testing, infrastructure audits and infrastructure design services.