ŠAVŠ/TAČR Digital Czechia in a Digital Europe

151

RECOMMENDATIONS

• The basic task must be to create a system of centralized state control of cyber security of domestic companies, which represent a strategic sector for the state – typically defense, finance/banking, telecommunications, logistics, energy and healthcare/pharmaceuticals. The responsibility for carrying out this inspection must be clearly defined. • Ensuring regular updates of public administration antivirus programs, regular training of civil servants, and continuous (diligent) monitoring of these two key mechanisms successfully eliminate most (up to 80%) of current cyber threats. • With regard to cyber security, the Czech Republic should create an information website that would provide companies and individuals with advice, recommendations, information on who to turn to in the event of an attack, and thus generally raise awareness of cyber threats. • Strive to create a platform for real-timemonitoring of cyber threats. The essence should be the proactive sharing of information between the Czech public and private sectors, which could significantly help in the ability to respond quickly and effectively to possible cyberattacks. • The Czech Republic should actively support Czech SMEs and startups focused on cyber threats and strive for their deeper involvement in the cyber security of the Czech Republic, as they very often generate completely new solutions and innovations. • The Czech public administration (whether at the state, regional or local level), as well as the private sector, should always seek expert opinion when purchasing ICT products. The staff responsible for current acquisitions are very often not familiar enough with ICT issues to be able to independently identify the quality of purchased products. • The public administration should not only require a higher level of security for its suppliers of ICT products, but actively carry out its control. The responsibility for any failure of these controls must be clearly defined. • The public administration must focus in the long run on retaining talented individuals in the field of cyber security. At the same time, it must be able to provide and provide such financial rewards and benefits that work in the public sector is attractive also with regard to the acquisition of new ICT specialists. The application of table salaries (even with the possibility of potential rewards) is insufficient.

Made with FlippingBook Publishing Software