In terms of the cybersecurity infrastructure, to define appropriate requirements it is useful to make risk analysis connected with data processing or provision of the particular services by the purchaser – write Artur Piechocki and Katarzyna Gorzkowska in Rzeczpospolita