SAME THREAT, DIFFERENT ANSWERS? COMPARING AND ASSESSING NATIONAL CYBER DEFENCE STRATEGIES IN CENTRAL-EASTERN EUROPE

Alexander NIEDERMEIER
2017 Security and Defence Quarterly  
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states are compared and assessed. After it had become evident that a variety of crucial new threats to national security had emerged over recent years, virtually all states reacted with national strategies. Th ese strategies are aimed at securing national cyberspace from cyber threats through legal, operational, technical and policy-related measures. Th ey exist in addition to general national security
more » ... strategies and are meant to support these. Even if most countries have National Cyber Security Strategies, the author demonstrates that these strategies show, at least in part, remarkable diff erences. Th e role national particularities play is explained, whether they are really this specifi c and whether they might be generalised and transferred to other national contexts and what approaches turned out best under what circumstances. Based on these results, existing strengths, weaknesses and best practices are explained to open avenues for improving existing strategies and generate a higher degree of strategy interoperability in an environment that maybe like no other requires international cooperation. It is evident that precise defi nitions of terms and concepts are essential. However, not all strategies provide those defi nitions, which might lead to misunderstandings and complicate cooperation both on domestic and international level. While some strategies off er clear cut responsibilities for the actors involved, others remain unclear. Even if laws are there to specify concrete procedures, the NCSS should not be too superfi cial. Th e NCSS itself should already make clear statements, particularly when it comes to the crucial aspect of coordinating the various cyber actors and stake holders. Th e author demonstrates that National Cyber Security Strategies ought to be detailed enough to clearly determine actors and responsibilities, but open and fl exible enough for adaptability to fast developments.
doi:10.35467/sdq/103184 fatcat:k3kjz54t3rfbzdiuilj2jy5mfe