2018 - 2020 1. BUILDING PUBLIC CONFIDENCE IN THE DIGITAL ENVIRONMENT 2. PROTECTING DIGITAL INFRASTRUCTURES 3. PROMOTING THE ECONOMY
Guideline 1. strengthening public confidence in the digital environment
- Knowledge-sharing between all stakeholders - Disseminating information on risks - Raising awareness of all the parties concerned - Responsible disclosure - Combating cybercrime
Guideline 2. digital infrastructure protection
- Census of essential and critical digital infrastructure - Security policies - Crisis management - Standardization - Strengthen international cooperation - Cyber defense - Strengthening the resilience of the Stateâs digital infrastructure
Guideline 3. promotion of the economy
- Creating new products and services - Pooling security Infrastructures - Requirement benchmarks and contractor - Creation of the Cybersecurity Competence Centre (C3) - Risk management and informed governance - Training and training aid - Collaboration between parties in charge of information security - Collaboration between experts in incident response - Priority for research: start-ups - Code disassembly and identifying vulnerabilities
Guideline 1. strengthening public confidence in the digital environment
- Knowledge-sharing between all stakeholders - Disseminating information on risks - Raising awareness of all the parties concerned - Responsible disclosure - Combating cybercrime
Guideline 2. digital infrastructure protection
- Census of essential and critical digital infrastructure - Security policies - Crisis management - Standardization - Strengthen international cooperation - Cyber defense - Strengthening the resilience of the Stateâs digital infrastructure
Guideline 3. promotion of the economy
- Creating new products and services - Pooling security Infrastructures - Requirement benchmarks and contractor - Creation of the Cybersecurity Competence Centre (C3) - Risk management and informed governance - Training and training aid - Collaboration between parties in charge of information security - Collaboration between experts in incident response - Priority for research: start-ups - Code disassembly and identifying vulnerabilities