Israel Gets 20% Of Global Cybersecurity Investment

Cyber enemies can “hack our airlines and our fighter planes,” but cyber is also “creating unimaginable benefits” Prime Minister Benjamin Netanyahu said last month. Speaking at the Cyber Week conference at Tel Aviv University,

Netanyahu was only confirming what others have said, but it was the first time that the prime minister publicly admitted the scope of the threat to Israeli aviation.

Such hacking threats globally, “is not theoretical, but has already happened in the present.” Playing a mock video for the packed auditorium telling them that all of their financial information had been hacked and their trade secrets had been sent to their competitors, Netanyahu heavily emphasised the cyber threat to the country “in all the new areas” of technology.

However, at the same time, he said that Israel can succeed at the “ever-present race” of cyber and that “we are absolutely committed to protecting ourselves.”

He mentioned that, “Israel gets 20% of global investment in cyber security, punching 200 times above our weight.” Netanyahu said that he had purposely moved IDF unit 8200 (the Israeli NSA), cyber businesses and cyber academics to an area of Beersheba where they can work within 200 meters of each other.

The prime minister said that putting them all together “has tremendous advantages,” adding that there were also risks to the move, but that he was “willing to take risks because cyber security grows through cooperation” and because of the major potential business gains.

Further, he said that the country “spends enormous amounts of money” on the Shin Bet, Mossad and other Israeli cyber intelligence capabilities, but that getting business to do a portion of the cyber defense investment could be a strategic budget bonus in saving from government spending on cyber defense.

JPost

You Might Also Read: 

Hackers Threaten To Attack Israel's Cyber Infrastructure:

Hamas Upgrades Cyber Espionage Capability:

 

« By 2020 US Immigration Will Be Digitised
Google AI To Predict Patient Healthcare Outcomes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

PT Kubus Hitam Indonesia

PT Kubus Hitam Indonesia

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.