US Cyber Security Trade Mission All Set For Eastern Europe

US Cyber Security Trade Mission

A US Government cyber security trade mission, on its way to Eastern Europe this weekend, aims to minimize cyber attacks and boost cooperation between the two regions in fighting cyber crime. It also aims to increase cyber security-related business between the US and Eastern European countries.

The one-week mission that will be lead by US Deputy Secretary of Commerce, Bruce Andrews, will visit Bucharest in Romania and Warsaw in Poland. In a media statement, Andrews said he would be accompanied by Assistant Secretary for Industry and Analysis, Marcus Jadotte, as well as representatives of 20 American companies. While some were large companies like Microsoft, IBM, Cisco Systems and Hewlett Packard, others were small, but they all had the interests of cyber security at heart.

Andrews said they would be meeting business and Government leaders in the two cities and hosting “regional dialogue” with a number of other countries from around Eastern and Central Europe.

We want US businesses to sign deals with companies and with governments in that region to help improve their cyber security and create jobs here at home,” he said.

In its official mission statement,  Export.gov said the primary purpose of the upcoming cyber security trade mission was to introduce US trade associations and businesses to Central and Eastern European information and communication technology (ICT) security and critical infrastructure protection markets. This would help US companies find new business partners so they could export products and services to this region. In addition to Poland and Romania, the statement said the mission would reach at least ten other potential Eastern and Central European markets: Bosnia, Bulgaria, Croatia, Hungary, Macedonia, Moldova, Montenegro, Serbia, Slovakia and Slovenia. There would also be virtual introductions to government officials and companies that were not able to attend the trade mission meetings.

Vital Security Properties

Export.gov, which is managed by the Department of Commerce’s International Trade Administration, was set up to assist US businesses plan international sales strategies.

Their mission statement points out that cyber security is used to safeguard the “vital security properties” of organizations’ and users’ financial, intellectual and infrastructure assets against any cyber security risks in the international cyber environment. In addition, the “critical information infrastructure” could not be separated from physical infrastructure systems, including basic services such as electricity, energy and water supply, safety and security, and even traffic management systems.

With the ever-increasing sophistication and growth of cyber-attacks in recent years, “strict compliance and unified security packages” were being prioritized. This was to try and protect the critical data, safety and infrastructure of businesses, as well as that of governments, the military, ports, public utilities, banking and other financial services, the statement said.

The damaging effects of cyber-threats can be felt on many levels from the business to the individual and can spill across borders.”

As a result of recent cyber attacks in the region, attempts had been made to improve cyber security protection. Governments in Eastern and Central Europe had made cyber security a “policy priority” by creating task forces and participating with the US government in an attempt to improve their defenses.

Ultimately the trade mission would introduce US companies to what has become a “rapidly expanding market for cyber security products and services in Eastern and Central Europe.” Those businesses participating would have the opportunity to gain market insights, solidify business strategies, make industry contacts, and advance projects in an official US delegation, which would strengthen their abilities to secure meetings and get better exposure to the region.

Participants in the trade mission arrive in Bucharest on Sunday May 10 and leave from Warsaw the following Saturday, May 16.

By Penny Swift

Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...
Crozdesk Business Software
B2B SaaS Comparison Platforms B2B SaaS Comparison Platforms are designed for buyers looking for additional information on a particular vendor and service. These sites help ease the complexities for buyers by providing a detailed breakdown ...
Jim Fagan
Subsea Connectivity Digital transformation and the migration of data and applications to the cloud is a global phenomenon. While we may like to think that the cloud knows no borders, the reality is that geopolitics ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.