Skip to main content

Cybersecurity Ecosystems: A Network Study from Switzerland

  • Chapter
  • First Online:
Cyberdefense

Abstract

The growing need for cyberdefense capabilities and the lack of specialists leave many organizations vulnerable to attacks. This chapter offers a comprehensive analysis of the cyberdefense capabilities of Swiss organizations active in cyberdefense. We also study the extent to which they exchange capabilities, and we produce a map of their informal networks. We find that the ecosystem as a whole is a scale-free network that hosts many capabilities, but they are distributed unevenly across organizations. Further, cooperation between these organizations is limited although opportunities to cooperate exist.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The full questionnaire is available on request from the corresponding author.

  2. 2.

    See https://tmm.dslab.ch/#/home.

  3. 3.

    These comprised the Swiss Cyber Startup Map (https://cysecmap.swiss/), the Top 100 Startup Ranking (https://www.top100startups.swiss/) and the Startup Directory (https://www.startup.ch/startup-directory).

  4. 4.

    For the SATW, see https://www.satw.ch/en/topics/cybersecurity; for the SIRA, see https://sira.swissinformatics.org/sira-members/.

References

  1. Ahuja, G. (2000). Collaboration networks, structural holes, and innovation: A longitudinal study. Administrative Science Quarterly, 45(3), 425–455.

    Article  Google Scholar 

  2. Albert, R., Jeong, H., & Barabási, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.

    Article  Google Scholar 

  3. Bonacich, P. (1987). Power and centrality: A family of measures. American Journal of Sociology, 92(5), 1170–1182.

    Article  Google Scholar 

  4. Burrell, D. N. (2020). An exploration of the cybersecurity workforce shortage. In Information Resources Management Association (ed.), Cyber warfare and terrorism: Concepts, methodologies, tools, and applications (pp. 1072–1081). IGI Global.

    Google Scholar 

  5. Canadian Centre for Cybersecurity. (2020). Role-based framework. https://cyber.gc.ca/en/guidance/role-based-framework

  6. CEN. (2019). ICT Professionalism and digital competences (CEN/TC 428). Brussels: European Committee for Standardization.

    Google Scholar 

  7. Coulter, R., Han, Q. L., Pan, L., Zhang, J., & Xiang, Y. (2019). Data-driven cyber security in perspective–Intelligent traffic analysis. IEEE Transactions on Cybernetics, 50(7), 3081–3093.

    Article  Google Scholar 

  8. de Carvalho, L. S. (2019). Education and training towards innovation and capability building. In Gaycken, S. (Ed.) Cyber defense-policies, operations and capacity building 2018 (NATO science for peace and security series - E: Human and societal dynamics (Vol. 147, pp. 107–112). IOS Press.

    Google Scholar 

  9. ENISA. (2017). Stock taking of information security training needs in critical sectors. Brussels: European Union Agency for Cybersecurity.

    Google Scholar 

  10. Gillespie, C. S. (2014). Fitting heavy tailed distributions: The poweRlaw package. arXiv:1407.3492

  11. Herjavec Group. (2017). Cybersecurity jobs report. Toronto: Herjavec Group.

    Google Scholar 

  12. Japanese Cross-Industry Cyber Security Study Group. (2016). Human resources definition. https://cyber-risk.or.jp/cric-csf/jinzai_reference_2016.html

  13. Koka, B., & Prescott, J. E. (2008). Designing alliance networks: The influence of network position, environmental change, and strategy on firm performance. Strategic Management Journal, 29(6), 639–661.

    Article  Google Scholar 

  14. Mariotti, F., & Delbridge, R. (2012). Overcoming network overload and redundancy in interorganizational networks: The roles of potential and latent ties. Organization Science, 23(2), 511–528.

    Article  Google Scholar 

  15. Mentzas, G., Apostolou, D., Kafentzis, K., & Georgolios, P. (2006). Inter-organizational networks for knowledge sharing and trading. Information Technology and Management, 7(4), 259–276.

    Article  Google Scholar 

  16. Mermoud, A., Keupp, M. M., Huguenin, K., Palmié, M., & Percia David, D. (2019). To share or not to share: A behavioral perspective on human participation in security information sharing. Journal of Cybersecurity, 5(1), tyz006.

    Google Scholar 

  17. Metzger, J. C., Parad, S., Ravizza, S., & Keupp, M. M. (2020). Vulnerability and resilience of national power grids: A graph-theoretical optimization approach and empirical simulation. In M. M. Keupp (Ed.), The Security of Critical Infrastructures (pp. 77–94). Cham: Springer.

    Chapter  Google Scholar 

  18. Nai-Fovino, I., Neisse, R., Hernandez-Ramos, J. L., Polemi, N., Ruzzante, G., Figwer, M., & Lazari, A. (2019). A proposal for a European cybersecurity taxonomy. Joint Research Center Technical Report JRC118089. Luxembourg: Publications Office of the European Union.

    Google Scholar 

  19. NICE, (2021). Navy COOL and MilGears, U.S. Navy Credentialing Programs Naval Education and Training Command. Gaithersburg MD: National Institute of Standards and Technology.

    Google Scholar 

  20. Percia David, D., Keupp, M. M., & Mermoud, A. (2020). Knowledge absorption for cyber-security: The role of human beliefs. Computers in Human Behavior, 106, 106255.

    Article  Google Scholar 

  21. Petersen, R., Santos, D., Smith, M. C., Wetzel, K. A., & Witte, G. (2020). Workforce framework for cybersecurity (NICE Framework). NIST Special Publication 800-181. Gathersburg MD: National Institute of Standards and Technology.

    Google Scholar 

  22. QS. (2021). QS World University Rankings by computer science and information technology. https://www.topuniversities.com/university-rankings

  23. Rashid, A., Chivers, H., Danezis, G., Lupu, E., & Martin, A. (2019). CyBok: The cyber security body of knowledge. London: National Cyber Security Centre.

    Google Scholar 

  24. Sorenson, O., & Stuart, T. E. (2001). Syndication networks and the spatial distribution of venture capital investments. American Journal of Sociology, 106(6), 1546–1588.

    Article  Google Scholar 

  25. SPARTA Project. (2021). Cybersecurity training and awareness. https://www.sparta.eu/training/

  26. Teece, D. J. (2019). A capability theory of the firm: An economics and (strategic) management perspective. New Zealand Economic Papers, 53, 1–43.

    Article  Google Scholar 

  27. Trkman, P., & Desouza, K. C. (2012). Knowledge risks in organizational networks: An exploratory framework. Journal of Strategic Information Systems, 21(1), 1–17.

    Article  Google Scholar 

  28. Valente, T. W. (2005). Network models and methods for studying the diffusion of innovations. Models and Methods in Social Network Analysis, 28, 98–116.

    Article  Google Scholar 

  29. Wang, H., Zhao, J., Li, Y., & Li, C. (2015). Network centrality, organizational innovation, and performance: A meta-analysis. Canadian Journal of Administrative Sciences/Revue Canadienne des Sciences de l’Administration, 32(3), 146–159.

    Article  Google Scholar 

  30. Williams, R., & Leahy, A. (2020). U21 ranking of national higher education systems 2020. The Melbourne Institute of Applied Economic and Social Research: University of Melbourne.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cédric Aeschlimann .

Editor information

Editors and Affiliations

1 Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (zip 6895 KB)

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aeschlimann, C., Cuche, K., Mermoud, A. (2023). Cybersecurity Ecosystems: A Network Study from Switzerland. In: Keupp, M.M. (eds) Cyberdefense. International Series in Operations Research & Management Science, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-031-30191-9_8

Download citation

Publish with us

Policies and ethics