<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Polish cybersecurity law - KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</title>
	<atom:link href="https://www.kg-legal.eu/info/tag/polish-cybersecurity-law/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kg-legal.eu/info/tag/polish-cybersecurity-law/</link>
	<description>KIELTYKA GLADKOWSKI LEGAL &#124; CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</description>
	<lastBuildDate>Thu, 16 May 2024 09:56:14 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Global trends of IT methods created by private providers of counteracting cyber-attacks (like Identity orchestration) &#8211; Change of Polish cybersecurity law important for foreign suppliers of IT equipment to the public sector and public utility institutions in Poland due to global threats</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/global-trends-of-it-methods-created-by-private-providers-of-counteracting-cyber-attacks-like-identity-orchestration-change-of-polish-cybersecurity-law-important-for-foreign-suppliers-of-it-equipme/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/global-trends-of-it-methods-created-by-private-providers-of-counteracting-cyber-attacks-like-identity-orchestration-change-of-polish-cybersecurity-law-important-for-foreign-suppliers-of-it-equipme/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 13:35:46 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[IT methods]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[kiełtyka gładkowski]]></category>
		<category><![CDATA[Polish cybersecurity law]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=3751</guid>

					<description><![CDATA[<p> Identification of the hacking problem - study on the example of law firm clients providing cyber security solutions<br />
Global trends of IT methods created by private providers of counteracting cyber-attacks (like Identity orchestration) - Change of Polish cybersecurity law important for foreign suppliers of IT equipment to the public sector and public utility institutions in Poland due to global threats</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/global-trends-of-it-methods-created-by-private-providers-of-counteracting-cyber-attacks-like-identity-orchestration-change-of-polish-cybersecurity-law-important-for-foreign-suppliers-of-it-equipme/">Global trends of IT methods created by private providers of counteracting cyber-attacks (like Identity orchestration) &#8211; Change of Polish cybersecurity law important for foreign suppliers of IT equipment to the public sector and public utility institutions in Poland due to global threats</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="alignleft size-large is-resized"><img fetchpriority="high" decoding="async" src="https://www.kg-legal.eu/wp-content/uploads/2016/12/pay-per-view-1024x546.jpg" alt="" class="wp-image-562" width="321" height="171" srcset="https://www.kg-legal.eu/wp-content/uploads/2016/12/pay-per-view-1024x546.jpg 1024w, https://www.kg-legal.eu/wp-content/uploads/2016/12/pay-per-view-300x160.jpg 300w, https://www.kg-legal.eu/wp-content/uploads/2016/12/pay-per-view-768x409.jpg 768w" sizes="(max-width: 321px) 100vw, 321px" /><figcaption> Identification of the hacking problem &#8211; study on the example of law firm clients providing cyber security solutions  </figcaption></figure></div>



<h4 class="wp-block-heading"><strong>Identification of the hacking problem</strong></h4>



<p>Based on the US Cybersecurity Trends Report (link to an
online source at the end of the article), the hacking phenomenon records an
increase in cyber-attacks in 2019 and 2020. From the legal perspective, what is
particularly interesting is a significant increase in the recorded data loss
events as a result of hacking activities in relation to the number of cases in
individual years in the 2015-2020 prediction. One of the studies in the
indicated report shows two specific moments over the years. The first one took
place in 2016-2017, where we see an increase in hacker attacks by nearly 2,000
violations, but this is not related to a proportional increase in lost data,
which differs from those from 2016 by about 1.5 million. In 2017, there was a
slight increase in infringements, but more importantly, less data was lost. The
second of these important moments indicated by the experts took place in
2018-2019, when there was a drastic increase in lost data with a slight
increase in violations compared to 2018. We are seeing a drastic decrease in
the number of breaches with a simultaneous huge increase in lost data.</p>



<p>From the analysis of the report, a surprising conclusion
can be drawn that currently data breaches by hackers are less and less frequent
compared to previous years, but much more effective.</p>



<p>The report also shows annual global cybersecurity
transactions and equity financing in 2016-2021. In this respect there can be
observed the huge projected increase in cash outlays for the cybersecurity
target compared to 2020. The projected increase is over $ 10 billion. Despite
the increase in spending, there has been a decline in the number of
cybersecurity contracts.</p>



<p>The report presents the share of global cybersecurity
transactions in 2020 by country. The first thing that throws up is that the US
has over a half of shares in global market and is thus becoming a sort of
hegemon in the fight against hackers. China ranks second with 12%. On the other
hand, Israel ranks third with a 10% share, also showing a 4% increase compared
to 2019. With the same trend, it has a good chance of overtaking China in this
respect. The report shows the number of annual departures from the
cybersecurity sector through mergers and acquisitions and stock market debuts.
In the years 2016-2019, an upward trend can be noticed. From year to year, the
number of departures increased by 100. </p>



<p>The report also shows the ratio of the increase in the
number of the so-called megarounds (contracts worth over $100 million), which
results in an increase in the volume of transactions. </p>



<p>All these increases in value did not go unnoticed. The
consequence of the development of this type of industry, which is
cybersecurity, is the creation and development of private companies. There are
already over 30 companies in the world involved in the development of
cybersecurity technologies, the value of which exceeds $ 1 billion. In Europe,
for example, Acronis is such a company.</p>



<p>Almost 75% of cyber defenders are based in the United
States, most of them in California. Second place, with almost 20% concentration
of cyber defenders, is Israel. Canada and Ireland boast one &#8220;cyber
defender&#8221; within their borders. In Canada it is the company
&#8220;Isara&#8221;, and in Ireland &#8220;Tines&#8221;.</p>



<h4 class="wp-block-heading"><strong>Methods of counteracting cyber attacks</strong></h4>



<p>There can be differentiated various methods of counteracting cyber-attacks. Most innovative ones are presented below:</p>



<span id="more-3751"></span>



<h4 class="wp-block-heading"><strong>&#8220;Identity orchestration&#8221;</strong></h4>



<p>This method is based on managing access to multicloud
environments and enforcing the least privileged framework.</p>



<p>Two companies specialize in this method: &#8220;Ermetic&#8221;
and &#8220;STRATA&#8221;. It is worth remembering that companies operating in
on-premise systems and many clouds lack one, unified solution for identity
management and limiting access to data and systems. The report shows how often
companies dealt with an incident related to the security of a public cloud. In
almost all of the countries surveyed, this problem exceeds 50%. Managing
identity and access for any cloud and on-premises application can be a problem,
so startups of all kinds take up the challenge of unifying identities across
their IT infrastructure. As for identity orchestration, Ermetic inventories
identities and assets across multiple clouds. Identifying risky permissions and
behaviors across all cloud platforms and applying uniform rules can reduce the
impact of cyber attacks. In turn, as for &#8220;STRATA&#8221;, it provides an
abstraction layer for consolidating divergent identity management systems. By
providing a single identity solution for on-premise applications and multicloud
deployments, &#8220;STRATA&#8221; helps reduce security risks.</p>



<h4 class="wp-block-heading"><strong>&#8220;Data Firewalls&#8221;</strong></h4>



<p>It consists in classifying, monitoring and controlling
access to the most valuable data of the enterprise. Companies specializing in
this protection are, for example, &#8220;Cyral&#8221; and &#8220;Open Raven&#8221;.</p>



<p>Companies face financial and reputational costs when
their data is stolen by hackers or disclosed to the public. The report shows clearly
that the 3 sectors that have the greatest problem with data theft or data
leakage to the public are healthcare, energy and finance. 80% of data breaches
contain customer identification information. In turn, 32% of data breaches
concern intellectual property.</p>



<h4 class="wp-block-heading"><strong>&#8220;Security Creds&#8221;</strong></h4>



<p>The above method is met by meeting compliance standards
and conducting security audits. The companies &#8220;Vanta&#8221; and
&#8220;Drata&#8221; specialize in this area.</p>



<p>The description of the methods in the report is guided by
the rule that “a company is only as strong as its weakest partner”. In adapting
to this new threat landscape, companies strive to differentiate themselves from
the competition and gain customers by displaying their security credentials. In
order to verify the attitude in the field of cybersecurity and acquire
customers, companies undergo audits in order to obtain security certificates.</p>



<h4 class="wp-block-heading"><strong>&#8220;Outsourced Security&#8221;</strong></h4>



<p>It stands for putting cybersecurity into the hands of external contractors. Detection and response service providers often use artificial intelligence to help companies identify and respond to threats. Their view of all customers can provide a better understanding of the threat landscape. The companies &#8220;ActZero&#8221; and &#8220;Confluera&#8221; specialize in this method.</p>



<h4 class="wp-block-heading">„<strong>SaaS Security”</strong></h4>



<p>The above-mentioned concept can be interpreted as
securing a growing ecosystem of SaaS applications for enterprises. In recent
years, companies from various industries have increasingly used SaaS
applications, i.e. third-party software operating in the cloud. Managing and
monitoring a growing network of applications provides a unique set of
challenges. In 2020, the leading industry in the use of SaaS applications is
Technology, where as many as 155 applications were in use.</p>



<p>The use of Saas applications comes with an obligation,
namely organizations using Saas applications must develop a plan to manage and
secure their growing application ecosystems, especially for the users who have
access to them. Emerging cybersecurity service providers are tackling this
challenge by mapping corporate SaaS applications and implementing the necessary
measures to secure the application ecosystem.</p>



<p>The above Saas customers responsibilities include:</p>



<ol class="wp-block-list"><li>Securing user access to the application</li><li>Verification of the identity of logging in users</li><li>Data / application integration</li></ol>



<p>What steps does Saas take to protect the data of
customers using the ecosystem of the above-mentioned application?</p>



<p>It does this in 3 ways.</p>



<ol class="wp-block-list"><li>It has
constant access to all SaaS ecosystems.</li><li>It manages
rights to SaaS applications</li><li>It monitors all activity within the limits of the SaaS
application.</li></ol>



<p>Companies specializing in SaaS protection are
&#8220;AppOmni&#8221; and &#8220;Grip&#8221;. &#8220;AppOmni&#8221; monitors the Saas
application ecosystem in search of suspicious activity, and manages user access
to the data and the application itself. On the other hand, &#8220;Grip&#8221;
maps SaaS applications and monitors their use, and helps to identify abuses and
set permissions to reduce the risk.</p>



<h4 class="wp-block-heading"><strong>„Crypto defense”</strong></h4>



<p>This type of cyber protection focuses on protecting the
integrity of blockchain transactions.</p>



<p>What is blockchain?</p>



<p>Blockchain is a technology that stores and transmits
information about transactions concluded on the Internet. This information is
arranged in the form of consecutive data blocks. One block contains information
about a certain number of transactions, then, after it is saturated, another
block of data is created, followed by the next and the next, creating a kind of
chain. Information about various types of transactions, e.g. trading, buying or
selling currencies, including cryptocurrencies, can be sent there. The main
essence of blockchain operation is to maintain a joint and collective
transaction ledger in digital form, distributed over the network, in the same
copies (more about Blockchain technology at: https://www.lazarski.pl/pl/wydzialy-i-jednostki/instytuty/wydzial-ekonomii-i-zarzadzania/centrum-technologii-blockchain/co-to-jest-blockchain-i-jakie-moze-miec-znaczenie-z-punktu-widzenia-ekonomii/
)&nbsp;&nbsp; </p>



<p>It
has to be kept in mind that blockchain is not inherently secure. Although
blockchain has features that support security and privacy (such as an immutable
ledger), it is not immune to cyber attacks. As evidence that blockchain
technology is not secure, it can be demonstrated that more than $ 500 million
was lost or stolen from decentralized financial projects (DeFi) in 2020.</p>



<p>Companies
dealing with this type of protection are &#8220;valid.network&#8221; and
&#8220;CERTIK&#8221;.</p>



<p>The
first organization offers tools for detecting weaknesses in decentralized
application code and monitors and controls transactions in real time. The
latter, on the other hand, uses a formal verification method developed by
scientists at Yale University to mathematically prove &#8220;the correctness of
the program and its resistance to hackers.&#8221;</p>



<h4 class="wp-block-heading">„<strong>Security-infused networks”</strong></h4>



<p>This
method is understood as anti-hacker
protection, mainly concerned with adding security to corporate networks.</p>



<p>Particularly in the environment of remote work, companies
rely on reliable networks to enable safe transfer of information. Historically,
these networks have been protected with numerous point solutions (e.g. VPNs,
firewalls, VPN security brokers, firewalls, cloud access security brokers)
which can frustrate IT teams and employees.</p>



<p>Startups and technology companies implement cyber
security in software-defined network solutions (eg SD-WAN). A unified security
model that is delivered as a service reduces complexity and helps multiple
businesses keep their cybersecurity protocols up to date.</p>



<p>Some examples of the above technology providers are &#8220;Twingate&#8221;
and &#8220;Ananda&#8221;.</p>



<p>&#8220;Twingate&#8221; provides users with secure access to
corporate applications. The company secures networks by offering built-in
access control and keeping them invisible to the internet. In turn, &#8220;Ananda&#8221;
offers a cloud-managed, secure global local area network (LAN). The company
enables companies to create their own private networks with security features
such as encryption, microsegmentation and granular access control.</p>



<h4 class="wp-block-heading"><strong>„Cyber automation”</strong></h4>



<p>This concept covers the development of cybersecurity
processes and the automation of workflows. In the context of this type of
protection, attention should be paid to a significant problem. Cyber-attacks,
alerts and vulnerabilities continue to grow while the supply of qualified
cybersecurity specialists remains limited.</p>



<p>The solution to this problem is automation, which
increases the capabilities of cybersecurity workers. Companies using defined
cybersecurity and threat data workflows have automated cyber processes and
integrated with supporting systems such as Slack, Atlassian and SIEM (security
information and event management). Automation of these processes significantly
solves the problem of a small supply of qualified specialists. However, automation
is also a kind of risk as what is automated can also be hacked.</p>



<p>In the context of this new risk, companies that
specialize in protecting &#8220;<strong>cyber automation</strong>&#8220;, namely &#8220;Tines&#8221;
and &#8220;Strike Ready&#8221;, can be named.</p>



<p>The former organization offers a code-less platform for
automating workflow processes. It integrates with many technical tools for
enterprises (e.g. Okta, Slack). Tines can automate tasks such as responding to
phishing (a fraud method in which a criminal impersonates another person or institution
to obtain confidential information), enrich security reports, and receive
alerts.</p>



<p>The second organization, &#8220;Strike Ready&#8221;,
develops digital cyber awareness and response analytics to analyze and resolve
security incidents. The company can help security teams be more efficient and
effective by autonomously prioritizing alerts, conducting vulnerability
testing, and responding to attacks.</p>



<h4 class="wp-block-heading"><strong>„API protection”</strong></h4>



<p>This
is an activity to ensure the visibility of APIs to prevent malicious activity.</p>



<p>In
the last few years, the use of an application programming interface (API) has
grown rapidly in all industries over the past years. This comes with security
risks that require new safeguards. The threats related to the API include:</p>



<ol class="wp-block-list"><li>Code
injection</li><li>Faulty
authentication process</li><li>Overexposure
of data</li><li>No
usage limits.</li></ol>



<p>Companies are emerging, some developing solutions to
secure API development, including vulnerability testing and ensuring proper
configuration, while others monitor and respond to API abuse such as code
injection and unauthorized access.</p>



<p>In the context of this protection, companies &#8220;Noname&#8221;
and &#8220;Traceable&#8221; can be mentioned</p>



<p>Traceable discovers, secures and monitors APIs. Their
product protects against known threats (eg SQL injection, Cross-Site Scripting)
and also provides visibility into API activity to identify, investigate and
solve the threat.</p>



<p>Noname, on the other hand, offers a suite of API security
tools. The API security platform can locate corporate APIs, identify suspicious
activity, and block attacks in real time. It can also test the integrity of
APIs before production.</p>



<h4 class="wp-block-heading"><strong>„Cyber insurance”</strong></h4>



<p>It is cyber risk management and financial securing of
cyber costs.</p>



<p>Over the past 3 years, the impact of hacking on an
affected company has become increasingly costly. Experts in the analysed report
cited estimate that the theft of 10 million records could cost the company $
100 million.</p>



<p>The above problem has created a niche that is efficiently
filled by companies offering risk analysis tools, companies and insurers that
are trying to solve the main challenges hampering market development, i.e. the
lack of historical data on which to base risk models and the possibility of
incurring significant sludge.</p>



<p>The organizations &#8220;Cowbell Cyber&#8221; and
&#8220;Cyber Cube&#8221; specialize in this field.</p>



<p>The former uses data analytics and cybersecurity
monitoring to offer cyber insurance. When defining the range, the company takes
into account factors such as cybersecurity attitude and knowledge of the
so-called &#8220;Dark web&#8221;. It also offers services such as cyber awareness
training to reduce a company&#8217;s cyber risk.</p>



<p>The activity of the second organization consists in
providing insurance companies with cybersecurity analysis and data enabling the
determination of insurance risk. By compiling cybersecurity datasets and
developing risk models, CyberCube provides insight into the development of
cybersecurity insurance products.</p>



<h4 class="wp-block-heading"><strong>„Shift left security”</strong></h4>



<p>This type of protection is dedicated to reducing the
vulnerability of the application development stage.</p>



<p>When it comes to software development, security
considerations are often the last step before going live. Building software
without security considerations can at best lead to delays and inefficiencies,
and at worst, create serious security holes.</p>



<p>There are many points in the software lifecycle at which
security measures can be added, which can reduce the likelihood of security
vulnerabilities and the time it takes to deploy more secure applications.
Specialized companies have been established that approach these points of
software development with solutions that reduce risk.</p>



<p>These organizations include, among others
&#8220;Cycode&#8221; and &#8220;BlueBracket&#8221;.</p>



<p>The &#8220;Cycode&#8221; company secures the software
development process from source code to cloud configuration. The company
provides tools such as code fingerprinting, misconfiguration scanning and
enforcement of security policies to reduce security risks in the software life
cycle.</p>



<p>The second organization, &#8220;BluBracket&#8221;, protects
the software code by assessing its risk and tracking its usage. By tracking
sensitive code, highlighting misconfigurations and scanning code repositories
for threats such as encrypted secrets or multiple owners, BluBracket brings
security to the software development process.</p>



<h4 class="wp-block-heading"><strong>„Secure data sharing”</strong></h4>



<p>This is an activity to protect the privacy of data shared
with third parties or used for analysis.</p>



<p>In order to use existing data (e.g. to identify new
medical treatments, develop customer personal information in retail, etc.),
companies may seek to share, aggregate and analyze sensitive information, which
may be a potential target for hackers. The protective elements of encrypted
data have historically been at the expense of analysis and collaboration.
However, new techniques have been developed to increase the usability of the
data while maintaining its security.</p>



<p>Privacy preserving computation (PPC) is as follows:</p>



<ol class="wp-block-list"><li>Trusted Runtime</li><li>homomorphic encryption</li><li>differentiated privacy</li><li>secure multilateral computing</li></ol>



<p>Examples of organizations specializing in the
above-mentioned activities are &#8220;Cape Privacy&#8221; and &#8220;TripleBlind&#8221;.</p>



<p>Cape Privacy enables scientists to share and work with
encrypted data. The product allows organizations to train AI models on
encrypted data so that they can be shared without compromising privacy and
security.</p>



<p>&#8220;TripleBlind&#8221; provides a solution for sharing
and analyzing encrypted data. The platform offered by this organization allows
companies to encrypt their data and algorithms to support secure data analysis
and sharing.</p>



<h4 class="wp-block-heading"><strong>„Auto security”</strong></h4>



<p>This type of cyber-protection is about defending
connected vehicles against wireless and proximity attacks. Modern
technologically advanced vehicles not only have access to the Internet, but
also very often store various types of data. As a result, vehicles are becoming
data centers on wheels that open up new opportunities for hackers.</p>



<p>Organizations that protect such vehicles against
cyber-attacks are, for example, &#8220;Upstream&#8221; and &#8220;C2A&#8221;.</p>



<p>The first organization, monitors vehicles to identify and
respond to cyber attacks and abuse. The company&#8217;s platform analyzes automotive
data to detect and respond to cyber threats. The second organization, on the
other hand, provides a tool to monitor the vehicle&#8217;s internal systems.</p>



<p>The company&#8217;s goal is to support car suppliers and
manufacturers by offering security capabilities that identify attacks on
vehicle systems (e.g. powertrain, ADAS).</p>



<h4 class="wp-block-heading"><strong>„Post-quantum cryptography”</strong></h4>



<p>The above can be understood as:</p>



<ol class="wp-block-list"><li>cryptography
based on the so-called &#8220;Trusses&#8221; &#8211; based on the abstract structures
of mathematics.</li><li>Kodac-based
cryptography &#8211; uses error correction codes that allow you to check the reading
of the transmitted data for errors and correct them in real time.</li><li>multidimensional cryptography &#8211; based on solving
multivariate equations. These equations are difficult to solve by brute force.</li></ol>



<p>This type of protection is worked out, among others, by
&#8220;ISARA&#8221; and &#8220;QuSecure&#8221;.</p>



<p>Isara offers tools to protect against future quantum
attacks. In particular, &#8216;Isara&#8217; allows companies to view and manage their
crypto assets or infrastructure with a single tool that can support the
transition to quantum safe algorithms.</p>



<p>On the other hand, &#8220;QuSecure&#8221; also provides
solutions to avoid attacks using quantum computing by using quantum-safe
algorithms. &#8220;QuSecure&#8221; provides solutions for key management and data
security at rest.</p>



<h4 class="wp-block-heading"><strong>Amendment of the Polish Act on Cybersecurity</strong></h4>



<p>The ongoing revolution of tools to combat cyber-attacks
causes changes in cybersecurity law in such a way as to create legal
instruments for public institutions to define legal rules for assessing which
activities on data are illegal and, consequently, qualified as hacking. In
addition, national regulations on IT service providers provide an opportunity
to specify the criteria for cooperation between entities providing solutions in
this respect.</p>



<p>A good example of such a law-making reaction is the
amendment to the Polish act on cybersecurity. The most important change
introduced by the amendment to the Cybersecurity Act is the introduction of
non-technical supplier assessment criteria, such as a criterion aimed at
analyzing a given supplier in order to check whether this supplier is under the
control of a country outside the EU or NATO or not. If, in relation to a given
supplier, a high risk of remaining under the above-mentioned control is
detected, such supplier is excluded from procurements. The following changes in
the Polish law from the perspective of cybersecurity regulations also include:</p>



<p>&#8211; rebuilding the cooperation model within the national
cybersecurity system. Sectoral cybersecurity teams and cybersecurity service
providers will be replaced by sectoral CSIRTs and SOCs (operational security
centers), respectively, with only slightly changed tasks.</p>



<p>&#8211; the addition of a new type of entity &#8211; ISAC &#8211; which is
to allow small and specialized entities to join the national cybersecurity
system.</p>



<p>&#8211; strengthening the position of the government
representative responsible for cyber security by providing him with specific
powers in the field of issuing critical incident warnings together with the
recommendation of specific behaviors. The said government representative will
also be able to issue recommendations aimed at strengthening the level of
cybersecurity of information systems of the entities of the national
cybersecurity system. In turn, these entities will be required to take into
account these recommendations during the risk management process. It will be up
to these entities to decide whether to follow these recommendations.</p>



<p>&#8211; the establishment of the Polish National Cybersecurity
Certification System under which cybersecurity certificates will be issued.</p>



<p>&#8211; The minister responsible for computerization will
prepare programs on the basis of which it will be possible to conduct
certification. Ultimately, these programs will be adopted by ordinance of the
Council of Ministers.</p>



<p>&#8211; The supervisory authority will audit entities belonging
to the national cybersecurity certification system. In the scope of
certificates referring to the &#8220;high&#8221; trust level, it will also
approve each issued certificate. This solution is intended to be a guarantee
that the assessment of compliance to the highest level of security will be
carried out in accordance with the best standards in this field.</p>



<p>&#8211; Defining procedures for accreditation of conformity
assessment bodies and procedures for issuing certificates.</p>



<p>&#8211; Defining the obligations of the entities of the
national cybersecurity certification system.</p>



<p>Legislation process of Polish Cyber Security Act:</p>



<p><a href="https://legislacja.rcl.gov.pl/projekt/12337950/katalog/12716624#12716624">https://legislacja.rcl.gov.pl/projekt/12337950/katalog/12716624#12716624</a></p>



<p>Draft amendment to the Act with justification:</p>



<p><a href="https://legislacja.rcl.gov.pl/docs//2/12337950/12716624/12716625/dokument493122.pdf">https://legislacja.rcl.gov.pl/docs//2/12337950/12716624/12716625/dokument493122.pdf</a></p>



<p>Link to the website where the analysed Report can be downloaded: <a href="https://www.cbinsights.com/research/report/cyber-defenders-2021/" target="_blank" rel="noreferrer noopener" aria-label="https://www.cbinsights.com/research/report/cyber-defenders-2021/ (opens in a new tab)">https://www.cbinsights.com/research/report/cyber-defenders-2021/</a></p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/global-trends-of-it-methods-created-by-private-providers-of-counteracting-cyber-attacks-like-identity-orchestration-change-of-polish-cybersecurity-law-important-for-foreign-suppliers-of-it-equipme/">Global trends of IT methods created by private providers of counteracting cyber-attacks (like Identity orchestration) &#8211; Change of Polish cybersecurity law important for foreign suppliers of IT equipment to the public sector and public utility institutions in Poland due to global threats</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/global-trends-of-it-methods-created-by-private-providers-of-counteracting-cyber-attacks-like-identity-orchestration-change-of-polish-cybersecurity-law-important-for-foreign-suppliers-of-it-equipme/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
