Central Finland – the Cyber Centre of Finland
The region of Central Finland has strong expertise on ICT solutions related to security through its military data centre (PVJJK), active ICT faculty at the University of Jyväskylä (JYU) and JAMK University of Applied Sciences with a focus on ICT. Jyväskylä City is the coordinator of the national INKA Innovative Cities Programme’s (running 2014-2017) cybersecurity theme, aiming at strengthening the region's status as the centre of cybersecurity-related skills and enterprises.
There is strong ICT related infrastructure, high skilled labour, and a network of subcontractors and universities in Central Finland. The region started to focus more on digital knowledge and security issues already during the programme period of 2000-2007. The military sector in Finland has concentrated the majority of its ICT and cybersecurity development and activities to the region.
JYVSECTEC cybersecurity research, training and development center
JYVSECTEC started as a project in September 2011 in the Institute of Information Technology at JAMK University of Applied Sciences. Jyväskylä security technology project (JYVSECTEC ERDF project 2011-2015) was launched to build a simulation environment for cybersecurity management systems and a development platform, as well as to develop expertise in the use of cybersecurity management systems. The implementation of the JYVSECTEC project has significantly strengthened the preconditions of security and ICT companies to conduct research and development activities in Central Finland.
One outcome of the project was the first national cybersecurity exercise in Jyväskylä. This gave a joint opportunity for the military, Jyväskylä University of Applied Sciences and local companies to test and develop cyber-attack resistant programs. From the project also resulted the development of the cybersecurity auditing system for business (FinCSC), which enables the cybersecurity throughout the supply chain. Third phase of the project included problem solving in IoT-related threats. This led to more detailed information on general cybersecurity vulnerabilities concerning IoT devices and to developing better mechanisms to protect different devices against attacks.
Figure: Project portfolio related to cybersecurity. Source: JYVSECTEC. (Click to enlarge)