NATO & Cyber Conflict: Background & Challenges
|
|
|
- Joanna Scott
- 10 years ago
- Views:
Transcription
1 NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented at The Shadow NATO Summit III May. George Washington University. Washington, D.C.] Introduction The goal of this paper is to provide a broad overview of cyber conflict with an eye towards the challenges that NATO faces in trying to address it. I will begin with a typology of cyber conflict. Second, I will provide a brief, historical overview of four instances in which NATO has experienced cyber conflict of one form or another. Third, I will provide a brief overview of NATO s current stance in relation to cyber conflict, including relevant organizations, principles, and activities. Finally, I will end by highlighting just a few of the challenges that NATO faces in its attempts to respond to the advent of cyber conflict. Typology of Cyber Conflict I will begin with a typology of cyber conflict. I will present these in the order of least to most damaging or dangerous. This also happens to be the order of most common to least common. Cyberspace has become a domain for political activity. It allows activists to collect and publish information, to engage in dialogue, to coordinate their actions, and to lobby those in power. We see this most recently in the important use that Occupy Wall Street activists have made of the Internet for all of these purposes. Though the Anonymous hacker collective has engaged in actions on behalf of the Occupy movement, the vast majority of Occupy s use of the Internet has not involved hacking. But the relationship between Anonymous and Occupy does remind us that the lines between these categories are blurry. Next is hacktivism. Dorothy Denning defines hacktivism as the convergence of hacking with activism, where hacking is used here to refer to operations that exploit computers in ways that are unusual and often illegal, typically with the help of special software (Denning 2001: 263). Hacktivist methods include distributed denial of service (DDoS) attacks, website defacements, breaking into websites and stealing personal information, and use of malware like viruses and trojans.
2 The most well-known recent examples include the exploits of Anonymous and LulzSec. These groups are generally against the state, of course. But there are patriot hackers as well. In the United States, this includes one hacker who calls himself Th3J35t3r. He uses various techniques to take down jihadist web forums. He has also used targeted malware against the mobile phones of those that he believes are sympathetic to Anonymous and the Occupy movement, which he sees as anti-american. Cyber crime is the use of the various hacking tools and techniques for criminal purposes, including theft and extortion. For example, organized crime groups often use DDoS to carry out online protection rackets against e-commerce sites. Fake antivirus scams are used to steal victims money and personal identities. spam and so-called phishing attacks are used for similar purposes. The fact that the tools and techniques used for criminal purposes are the same as those used for political purposes by hacktivists is another way in which the boundaries are blurry between these categories. Cyber espionage includes the use of many of the same techniques mentioned above, especially website break-ins, targeted phishing attacks (called spear phishing), social engineering, and targeted use of malware to surreptitiously collect information on an adversary or competitor. There are two types of cyber espionage: economic and political-military. In economic espionage, we see competing corporations, often from different countries, who engage in espionage against one another online. It is believed that countries like China and Russia encourage their own patriotic hackers to engage in this kind of activity. Political-military espionage is the traditional, state-vs-state espionage we typically think about when we think about espionage. This includes attempts to steal national security information. Again, the boundaries are blurry between the categories. States like China and Russia will enlist the help of cyber crime syndicates and patriotic hacktivists for the purposes of cyber espionage. Dorothy Denning (2000) defines cyberterrorism as attack[s] against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. 2
3 Were it to occur, non-state actors would carry out cyberterrorism. However, most observers, including Denning, concede that we have not yet seen real-world examples of cyberterrorism. Cyberwar is the use of computer network attack by one state against another where such attacks cause damage to military capabilities or civilian critical infrastructure. Like cyberterrorism, to be considered a stand-alone armed attack, such attacks should result in injury, death, damage, or destruction of people and property (Schmitt 1999; Dunlap 2011). Many tools and techniques of cyber conflict might be used in the context of traditional warfare as supporting capabilities. We saw this in the cyberattacks that accompanied the Russian invasion of Georgia in However, that does not make these tools or techniques cyberwar if they are used outside the context of wider warfare. Like cyberterrorism, we have seen few if any stand-alone acts of cyberwar to date. The Stuxnet worm that damaged Iranian nuclear facilities might be an exception, however, which is why it is so significant. NATO & Cyber Conflict The 1999 Kosovo operation served as NATO s first experience with cyber conflict. During that conflict, activists and belligerents on all sides used the web to spread and/or counter propaganda. There were also a number of notable website break-ins and defacements, again usually for propaganda and protest purposes. In some cases, hacktivists sent virus-laden attachments. Beyond the immediate parties to the conflict, hackers from China became involved after the accidental U.S. bombing of the Chinese Embassy in Belgrade (Denning 2001). The 2007 cyber attack against Estonia is the most well-known, NATO-related incident of cyber conflict. After a Soviet war memorial was moved, ethnic Russians in Estonia took to the streets in protest. The protest spread online and resulted in denial of service attacks against government, news, and bank websites. Rain Ottis (2010: 72) of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn reports that the immediate effects to people in Estonia were minimal, and in many cases nonexistent and that [n]o critical services were permanently affected. Nonetheless, the attacks were a wake-up call for both Estonia and NATO, leading to changes in policy for both, including the creation of the CCDCOE by NATO. In April 2011, The Cyber Security Forum Initiative, which provides cyberwar information and advice to the U.S. and NATO, published its Project Cyber Dawn: Libya report that assessed Libyan vulnerabilities to cyber attacks. 1 The report came to light as a result of the hacktivist group LulzSec s breach of a defense contractor s (Unveillance) servers and theft of internal s. The report described several possibilities for cyber 1 More information about the organization can be found at 3
4 attack against Libya. The New York Times and Washington Post reported that the U.S. did consider cyber attacks against Libyan air defense systems to clear the way for the NATO mission to protect civilians from Muammar Qaddafi s forces. The U.S. rejected the use of these capabilities because of doubts about the ability to deploy them in a timely and effective manner (Schmitt & Shanker 2011; Nakashima 2011). The revelation of Project Cyber Dawn: Libya was not NATO s only encounter with hacktivists in In July of that year, the hacktivist group Anonymous claimed to have hacked NATO servers and stolen 1 GB of sensitive information. Of that information, the group only released three PDFs. The hack was in part a response to a Spring 2011 NATO report that had listed hacktivism as a growing threat to national security. 2 NATO Cyber Policy NATO has further developed its cyber defense policies and capabilities in response to each of these incidents. It s most recent cyber defense policy statement highlights a number of principles and goals for NATO s cyber defense efforts. 3 The primary focus of the policy remains the defense of NATO s own networks and systems. Actions in this area include centralizing the defense of NATO networks and systems. But it also includes identifying critical dependencies on national networks and systems of member states and developing minimum cyber defense standards for these national systems that intersect with NATO networks. Though recognizing the inevitability of cyber attacks, NATO policy emphasizes the need to prevent attacks where possible and build resilience to rapidly recover from attacks when they do occur. Finally, NATO retains the option to assist member nations that ask for assistance in the face of a cyber attack. To maintain flexibility, however, NATO cyber defense policy states that response will not be automatic or predefined in terms of its actions and scope. The policy seeks to maintain strategic ambiguity. Implementing these principles and achieving these goals involve a number of activities that are being addressed by several organizations within NATO. The North Atlantic Council provides political oversight to the development and implementation of policy and also plays a crucial role in decision making about responses to cyber attacks on NATO or its members. The Defence Policy and Planning Committee provides advice to member nations in their efforts to develop their own strategies and to meet NATO minimum standards. The Cyber Defence Management Board works to coordinate cyber initiatives within the NATO organization. Finally, the Computer Incident Response 2 That report be Lord Joplin, Information and National Security, can be found at 3 See Defending the Networks: The NATO Policy on Cyber Defence, available from 4
5 Capability works at the technical end of things to respond to incidents affecting NATO networks and systems. 4 Because NATO is partly dependent upon the networks and systems of its members, it has created Rapid Reaction Teams that can be dispatched to assist members who are the victim of cyber attack. The Co-operative Cyber Defence Centre of Excellence was established in 2008 to be a center of excellence for research and training. The center has hosted several international conferences and published a number of papers exploring the evolution of cyber conflict and challenges for strategy and international law. Finally, NATO cyber defense policy recognizes that the larger interdependencies of the global cyber commons require cooperation with partners outside of NATO. There is no dedicated NATO cyber organization for this activity, however. Challenges NATO faces a number of challenges in its attempts to formulate and implement a cyber defense strategy. These are not challenges that are entirely unique to NATO. Each of its member states faces many of the same challenges. First is whether or not cyber attacks should be identified as attacks that will trigger Article 5 commitments. So far, NATO has not taken this step. But there are some who have argued that it should. However, there are good reasons not to deal with all cyber attacks under Article 5. Because of difficulty with attribution in cyberspace, any deterrent benefit gained by making cyber attack an Article 5 issue would likely be low. What s more, most cyber attacks do not rise to the level of a military attack. NATO would be stretched thin if it were to respond in each instance of cyber attack on a member state. Finally, the most potentially devastating type of cyber attack (one with impacts approximating traditional armed attack) would already fall under Article 5. NATO should continue to resist the temptation to define all cyber attacks as falling under Article 5 (Dunn Cavelty 2011). Second, developing and implementing a cyber defense strategy will be made more difficult by the fact that not all member states share the same perceptions of cyber threats. Though most of the states agree that cyber threats are on the rise and are of great concern, there is variation in the details of these threat perceptions, including in identification of the most important sources, objects, and impacts of these threats. These differences will inevitably pose a challenge and could limit the possible scope of NATO action (Brunner et al 2009). Third, as mentioned above, aggregating all types of cyber attack into a generic category of cyber threat risks stretching NATO s ability to respond. Cyber conflict at the level of 4 For more on the organizational aspects of NATO s response, see NATO and Cyber Defence, available from 5
6 hacktivism, crime, and economic espionage are daily occurrences. They cannot all be dealt with in the same way, and certainly not as an Article 5 issue. On the other hand, disaggregating these threats raises its own challenge, including the question of which organizations are best able to respond to the various types of threats in and through cyberspace. Private actors within member states own most critical infrastructures. It is often difficult enough for member states to deal effectively with cybersecurity within their own borders. This difficulty, the role of private actors, and differing threat perceptions, will all combine to make it difficult for NATO to do more than focus on securing its own networks (Dunn Cavelty 2011). Finally, the case of U.S. reluctance to use offensive cyber attacks during the Libya campaign points to the challenge of deploying offensive cyber capabilities in a timely manner and with certainly of their effects. In turn, this points to potential legal challenges for deploying offensive cyber capabilities during conflict, in particular challenges of using these capabilities in accord with principles of discrimination and proportionality. References Brunner E et al. (2009) Cybersecurity - Recent Strategies and Policies: An Analysis. CRN Reports August. Denning D (2000) Cyberterrorism. Presentation to Special Oversight Panel on Terrorism, Committee on Armed Services, House of Representatives. 23 May. Denning D (2001) Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In Arquilla J, Ronfeldt D (eds) Networks and Netwars: The Future of Terror, Crime, and Militancy Dunlap Jr (ret) MGCJ (2011) Perspectives for Cyber Strategists on Law for Cyberwar. Strategic Studies Quarterly 5(1): Dunn Cavelty M (2011) Cyber-Allies: Strengths and Weaknesses of Nato s Cyberdefense Posture. IP Global Edition 12(3): Nakashima E, (2011) U.S. Cyberweapons Had Been Considered to Disrupt Gaddafi s Air Defenses. Washington Post, 17 October, Available at: Ottis R, (2010) The Vulnerability of the Information Society. futuregov Asia Pacific, August-September, p. 70. Schmitt E, Shanker T, (2011) U.S. Debated Cyberwarfare in Attack Plan on Libya. New York Times, 17 October, Available at: 6
7 Schmitt MN (1999) Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law 37:
Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
The EU s approach to Cyber Security and Defence
Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence [email protected] +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
Legal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Offensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY
Co--t ~~ ~~/ ~V".-b Irr~ CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY Introduction 1. The threat of terrorism has posed an immense challenge in the post Cold War period. Terror attacks in major
A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information
"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
CYBER SECURITY IN INDIA
CYBER SECURITY IN INDIA Introduction In the last couple of decades India has carved a niche for itself in the field of Information technology. Optimization of Information technology in Banking, Defence,
Harmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
VIENNA MODEL UNITED NATIONS CLUB
VIENNA MODEL UNITED NATIONS CLUB STUDY GUIDE APRIL SESSION 2013 CYBER SECURITYAND CYBER WARFARE 1 INTRODUCTION With anever-increasingnumber of technological improvements and the expansion of online services
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
Current Threat to the U.S. from Cyber Espionage & Cyberterrorism
UNCLASSIFIED//FOUO Current Threat to the U.S. from Cyber Espionage & Cyberterrorism Presented by SSA Elvis Chan FBI San Francisco Overall Classification: UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOUO
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
Cyber defence in the EU Preparing for cyber warfare?
Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack
Andrzej Kozłowski Research Fellow Casimir pulaski Foundation The cyber strikes back the retaliation against the cyberattack Road to WARSAW SECURITY FORUM 2015 The growing threat The constant grow of threats
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
CYBER THREATS TO NATIONAL SECURITY. SPECIFIC FEATURES AND ACTORS INVOLVED
CYBER THREATS TO NATIONAL SECURITY. SPECIFIC FEATURES AND ACTORS INVOLVED Anca DINICU [email protected] NICOLAE BĂLCESCU LAND FORCES ACADEMY, SIBIU, ROMANIA ABSTRACT Security is not something given
Estonia 2007 Cyberattakcs
Estonia 2007 Cyberattakcs 2010 Agenda Background April 2007 What is cyberattack Estonia as an information society Cyberattacks Protection measures used Lessons learned What are we doing - measures Background
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
NATIONAL DEFENSE AND SECURITY ECONOMICS
NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace
Cyber Terrorism and Information Security Brett Pladna East Carolina University
1 Cyber Terrorism and Information Security Brett Pladna East Carolina University 2 Abstract Cyber terrorism is the wave of the future for terrorists and extremists. Besides physical attacks such as the
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates
Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates What is Cyber Security? The First Cyber Attack The Threat Landscape The Energy Industry as a Target The Legal & Regulatory
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
The International Context for Cybersecurity
THE TRILATERAL COMMISSION 2011 WASHINGTON MEETING SESSION ON CYBERSECURITY Saturday, April 9, 2011 The International Context for Cybersecurity James A. Lewis Center for Strategic and International Studies
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
NON-STATE ACTORS IN CYBERSPACE OPERATIONS
1 Johan Sigholm, Captain, Ph.D. student, Swedish National Defence College NON-STATE ACTORS IN CYBERSPACE OPERATIONS Abstract The growing importance of cyberspace to modern society, and its increasing use
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
Cyber-Security. FAS Annual Conference September 12, 2014
Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy
New Battlegrounds: The Future of Cyber Security and Cyber Warfare
New Battlegrounds: The Future of Cyber Security and Cyber Warfare Information and communications technologies are part of daily life. They are helping to revolutionize health and education, transform the
Understanding Cyber Defense A Systems Architecture Approach
NDIA 12th Annual Systems Engineering Conference, San Diego, CA, 26-29 Oct 2009 Understanding Cyber Defense A Systems Architecture Approach Tom McDermott Director of Research Georgia Tech Research Institute
CYBER TERRORISM, AN INSTABILITY GLOBAL SOURCE
Military Sciences CYBER TERRORISM, AN INSTABILITY GLOBAL SOURCE Cătălin CIOACĂ Henri Coanda Air Force Academy, Brasov, Romania Abstract: This paper will address what the risks and possibilities are of
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
CYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
Cyber Risk Management with COBIT 5
Cyber Risk Management with COBIT 5 Marco Salvato CISA, CISM, CGEIT, CRISC, COBIT 5 Approved Trainer 1 Agenda Common definition of Cyber Risk and related topics Differences between Cyber Security and IS
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions
SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,
GAO DEFENSE DEPARTMENT CYBER EFFORTS. DOD Faces Challenges In Its Cyber Activities. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters July 2011 DEFENSE DEPARTMENT CYBER EFFORTS DOD Faces Challenges In Its Cyber Activities GAO-11-75 July 2011 DEFENSE
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
GPSG Working Paper #07
GPSG Working Paper #07 Cyber-Security and the Law of War: The Legal and Ethical Aspects of Cyber-Conflict Dr. Andrew Liaropoulos Lecturer in International Relations and Strategy Department of International
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence
ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
