Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.
 
The Polish parliament has appointed the country's Ministry of Digital Affairs as the sole entity responsible for overseeing Poland's key personal data registers. The law is part of broader efforts by the government to bolster the country's cyber-security policies and allocate its management to the Digitisation Ministry.

“This is due to the increased threats for national IT systems… and the lack of an entity which would coordinate personal data protection at government levels,” states the law, which was sponsored by MPs from Poland's ruling Law and Justice (PiS) party.

The MPs also said that further automatisation of the national personal data registers services requires coordination by a single entity, the Digitisation Ministry.

Mirosław Maj, president of the Warsaw-based Cybersecurity Foundation, sys that the latest move is expected to contribute to enhancing Poland's cyber-security. 

“I can say that personally, I consider the plans related to the taking over of supervision over these systems by the Digitisation Ministry as a positive development. Digitisation minister Anna Streżyńska says that this modification will not only improve the functioning of these systems, but also optimise their financing,” Maj said. “This move is also a positive step from the point of view of cyber-security.”

However, Maj also cautions that centralising such supervision has its own risks. “Minister Streżyńska is perfectly aware of this, but she has also mentioned certain staff and budgetary constraints related to cyber-security.

In my opinion, it would be worthwhile to develop precise fields of competences for all stakeholders in Poland. These include the Ministry of Defence and the Digitisation Ministry. Other stakeholders include relevant institutions responsible for prosecuting cyber-crimes, the Ministry of the Interior and Administration and the Government Centre for Security.”

According to Maj, it “would be beneficial if two strong institutions were created to handle civilian and military affairs in this field, such as a National Cyber-security Centre and a new military body.”

Meanwhile, Poland's Digitisation Minister said that the government is aiming to bolster the country's cyber-security policy amid fears of Russian meddling.

"We recently had incidents, and even serious cyber-security threats [in Ukraine] which were probably inspired by Moscow. We don't know whether our networks were infiltrated. And if they were, then how and by whom," Strezynska told local news weekly Wprost in an interview on 14 February.

Local observers confirm that the Polish government is highly concerned that it must ensure that state-run institutions are enabled with enhanced cyber-security capabilities, and note that Russia's intervention in neighbouring Ukraine is a driving force behind these efforts.

“Many Polish decision-makers fear that hybrid warfare could be used against Poland, including a potential cyber-attack,” professor Marek Jablonowski, a political scientist from the University of Warsaw, told SC. “The conflict [in Ukraine] has significantly moved this issue up the political agenda in Poland.” 

SC Magazine

 

« FBI Can Unlock iPhone Without Apple’s Help
NSA Hacked Penatgon Command-Control In 4 Days »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

GlobalSign

GlobalSign

GlobalSign is an identity services company providing cloud-based, PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.