Close up of an Air Force cyber warfare specialist with code in the background and reflecting on his face.

Innovative exercises prevent attacks to information systems

The Czech Republic’s Approach to Cyber Security

April 2016, Number 07.02

“The rapid pace of technological innovation makes it difficult for those who aren’t immersed in the cyber security field to fully understand the threats posed by cyber-savvy terrorists and criminals. This is especially true for governments and private institutions that are mostly unaware of the potential impacts when these technological innovations are turned against them. The new methods and sophistication of attacks and the expanding number of targets are frequent topics of public reports and debates. A society exposed to this kind of information expects its government to be prepared by creating a resilient and secure cyberspace. But how can a government stay ahead of evolving technology, particularly when bureaucratic systems tend to be slow in responding to challenges that are mostly unknown to the decision-makers?

Consequently, staying up to date on technology developments, and being able to quickly adapt to new threats, requires being cyber-knowledgeable. However, information technology (IT) experts and those employed in the technology industry cannot be fully aware of the implications that IT products and solutions have on national security...”

Excerpt from Daniel P. Bagge and Martina Ulmanova, The Czech Republic’s Approach to Cyber Security,” per Concordiam: Journal of European Security Defense Issues  7, No. 2, 2016: 46-51.

Daniel P. Bagge is head of strategy and policy at the National Cyber Security Center, National Security Authority of the Czech Republic. He holds a master’s in international security studies from a postgraduate program jointly offered by the Marshall Center and the Universität der Bundeswehr München.

Martina Ulmanova is a cyber security policy specialist at the National Cyber Security Center in the Czech Republic. Her experience focuses on the field of cyber security exercises. In addition, she lectures at universities on the topic of cyber security. She holds a master’s in strategic and security studies from Masaryk University in Brno.

This article reflects the views of the author and are not necessarily the official policy of the United States, Germany, or any other governments.