I would concur with Viktor. In terms of the training, you have the next generation of cybersecurity specialists and experts who are coming out of academia right now. We need to put them in a position where they can train in real-world conditions, look at real operational playbooks. My recommendation, if you're asking, is to take a look at how successfully our counterparts in Israel have been with the IDF in maturing their troops. They're doing their necessary military service. They're getting trained by their SIGINT corps, and their cryptography and cyber-scrutiny specialists, and they're going in and working with industry once they graduate and hardening the skill set and commoditizing it globally.
I think we can follow a similar practice here in Canada, adopt that playbook and basically, take academia, and work very closely with industry, government, and also the Department of National Defence to basically align with those efforts. We need to not just churn them out, but start hardening them, give them the opportunity. We need to compare ourselves to the other threat actors in the world.
An APT1 Mandiant report several years ago indicated the Chinese had 130,000 cybersecurity specialists. I would estimate in North America and perhaps in the G7 at best, there are anywhere between 20,000 and 25,000 in the private sector alone, cumulatively. If you look at the Russians, in terms of cybersecurity, you see estimates are in the same ballpark range.
If you look at WikiLeaks and you take a look at what happened with the CIA, with disclosure, with Langley and their infrastructure, you see they have at least six or seven different divisions and the appropriate cyber-supporting structures. We need to look at the fact that we're being out-gunned, and we need to start engaging very early on, at academia, and start producing the next generation of cybersecurity specialists.