May 7, 2015

US Cyber Security Trade Mission All Set For Eastern Europe

By Penny Swift

US Cyber Security Trade Mission

A US Government cyber security trade mission, on its way to Eastern Europe this weekend, aims to minimize cyber attacks and boost cooperation between the two regions in fighting cyber crime. It also aims to increase cyber security-related business between the US and Eastern European countries.

The one-week mission that will be lead by US Deputy Secretary of Commerce, Bruce Andrews, will visit Bucharest in Romania and Warsaw in Poland. In a media statement, Andrews said he would be accompanied by Assistant Secretary for Industry and Analysis, Marcus Jadotte, as well as representatives of 20 American companies. While some were large companies like Microsoft, IBM, Cisco Systems and Hewlett Packard, others were small, but they all had the interests of cyber security at heart.

Andrews said they would be meeting business and Government leaders in the two cities and hosting “regional dialogue” with a number of other countries from around Eastern and Central Europe.

We want US businesses to sign deals with companies and with governments in that region to help improve their cyber security and create jobs here at home,” he said.

In its official mission statement,  Export.gov said the primary purpose of the upcoming cyber security trade mission was to introduce US trade associations and businesses to Central and Eastern European information and communication technology (ICT) security and critical infrastructure protection markets. This would help US companies find new business partners so they could export products and services to this region. In addition to Poland and Romania, the statement said the mission would reach at least ten other potential Eastern and Central European markets: Bosnia, Bulgaria, Croatia, Hungary, Macedonia, Moldova, Montenegro, Serbia, Slovakia and Slovenia. There would also be virtual introductions to government officials and companies that were not able to attend the trade mission meetings.

Vital Security Properties

Export.gov, which is managed by the Department of Commerce’s International Trade Administration, was set up to assist US businesses plan international sales strategies.

Their mission statement points out that cyber security is used to safeguard the “vital security properties” of organizations’ and users’ financial, intellectual and infrastructure assets against any cyber security risks in the international cyber environment. In addition, the “critical information infrastructure” could not be separated from physical infrastructure systems, including basic services such as electricity, energy and water supply, safety and security, and even traffic management systems.

With the ever-increasing sophistication and growth of cyber-attacks in recent years, “strict compliance and unified security packages” were being prioritized. This was to try and protect the critical data, safety and infrastructure of businesses, as well as that of governments, the military, ports, public utilities, banking and other financial services, the statement said.

The damaging effects of cyber-threats can be felt on many levels from the business to the individual and can spill across borders.”

As a result of recent cyber attacks in the region, attempts had been made to improve cyber security protection. Governments in Eastern and Central Europe had made cyber security a “policy priority” by creating task forces and participating with the US government in an attempt to improve their defenses.

Ultimately the trade mission would introduce US companies to what has become a “rapidly expanding market for cyber security products and services in Eastern and Central Europe.” Those businesses participating would have the opportunity to gain market insights, solidify business strategies, make industry contacts, and advance projects in an official US delegation, which would strengthen their abilities to secure meetings and get better exposure to the region.

Participants in the trade mission arrive in Bucharest on Sunday May 10 and leave from Warsaw the following Saturday, May 16.

By Penny Swift

Penny Swift

Penny has been a professional writer since 1984 - Penny has written more than 30 general trade books and eight college books. She has also written countless newspaper and magazine articles for: Skills on Site, Popular Mechanics (SA) and SA Conference, Exhibitions and Events Guide.

Penny has a BA in Social Sciences and currently resides in Cape Town, South Africa.

Common Malware Anti-Analysis Techniques and How to Counter Them

Common Malware Anti-Analysis Techniques Malware analysis forms the backbone of proactive cybersecurity, making it possible [...]
Read more
Alex Dean

Privacy in Personalization: Strategies for Trust & Compliance

Enabling Privacy and Personalization (Updated: 02.16.2024) Most businesses today rely on data collected online to [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more
Gary Bernstein

Unleash the Power of Your Website with These 25 VPS Providers

Simplify Your Website Management with VPS Hosting Updated 10.17.2023 VPS stands for Virtual Private Server, [...]
Read more
Daniel Barber

Q&A Daniel Barber – 2024 AI + Data Privacy Predictions

2024 AI + Data Privacy Predictions In a recent interview with CloudTweaks, Daniel Barber, Co-Founder [...]
Read more
Nagaraj Kuppuswamy

Next-Generation Threats: Securing Multi-Cloud Environment

Next-Generation Threats Using cloud services from multiple cloud service providers is the fundamental tenet of [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.