National Cyber Security Strategies: United States

Similar documents
The Comprehensive National Cybersecurity Initiative

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Middle Class Economics: Cybersecurity Updated August 7, 2015

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

S. ll IN THE SENATE OF THE UNITED STATES

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Defense Security Service

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Cybersecurity Delivering Confidence in the Cyber Domain

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Lessons from Defending Cyberspace

Cybersecurity: Authoritative Reports and Resources

NICE and Framework Overview

How To Protect Yourself From Cyber Crime

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Cyber Security Division Overview

TUSKEGEE CYBER SECURITY PATH FORWARD

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Cybersecurity: Authoritative Reports and Resources

The development of Shinawatra University s international graduate program in joint public and business administration (PBA)

Cybercrimes: A Multidisciplinary Analysis

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

Cybersecurity: Authoritative Reports and Resources

DHS, National Cyber Security Division Overview

Cybersecurity: Authoritative Reports and Resources

Cyber Diplomacy A New Component of Foreign Policy 6

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Preventing and Defending Against Cyber Attacks November 2010

Cybersecurity & Public Utility Commissions

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

Cybersecurity: Authoritative Reports and Resources

CYBERSECURITY POLICY MAKING AT A TURNING POINT

Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Cybersecurity on a Global Scale

No. 33 February 19, The President

U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center

Cyber Security Research and Development: A Homeland Security Perspective

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity Framework: Current Status and Next Steps

Cyber Security Strategy

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

Cybersecurity for Medical Devices

Preventing and Defending Against Cyber Attacks June 2011

Bellevue University Cybersecurity Programs & Courses

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

How To Write A Cybersecurity Framework

Cybersecurity Policy Making at a Turning Point

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

An Overview of Large US Military Cybersecurity Organizations

Cyber Security Strategy of Georgia

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Department of Homeland Security

European Commission Per

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Cybersecurity: Mission integration to protect your assets

PwC Cybersecurity Briefing

Department of Defense DIRECTIVE

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

National Initiative for Cyber Security Education

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Cyber Security Education: My Personal Thoughts. Bharat Doshi

IEEE-Northwest Energy Systems Symposium (NWESS)

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

National Cyber Security Strategies

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Honourable members of the National Parliaments of the EU member states and candidate countries,

EINSTEIN 3 - Accelerated (E 3 A)

ITU National Cybersecurity/CIIP Self-Assessment Tool

IBM Security Strategy

Transcription:

National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013

Trends: National Cybersecurity Strategies New strategies are proliferating and becoming integrated and comprehensive economic, social, educational, legal, law-enforcement, technical, diplomatic and military OECD study finds common elements among 10 countries strategies: Enhanced governmental co-ordination at policy and operational levels. Reinforced public-private co-operation. Improved international co-operation. Respect for fundamental values: all strategies place a strong emphasis on the need for cybersecurity policy to respect fundamental values, which generally include privacy, freedom of speech, and the free flow of information. 2 ICSS 2013

US Timeline 2003 National Strategy to Secure Cyberspace 2008 Comprehensive National Cyber Initiative 2010 Cyberspace Policy Review 2011 International strategy for Cyberspace 2013 Executive Order PPD 23 3 ICSS 2013

2003 National Strategy Priorities Priority I: A National Cyberspace Security Response System Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program Priority III: A National Cyberspace Security Awareness and Training Program Priority IV: Securing Governments Cyberspace Priority V: National Security and International Cyberspace Security Cooperation 4 ICSS 2013

Comprehensive National Cybersecurity Initiative - 2008 Initiative #1 Manage the Federal Enterprise Network as a single network enterprise with trusted Internet Connections Initiative #2 - Deploy n intrusion detection system of sensors across the federal enterprise Initiative #3 Pursue deployment of intrusion prevention systems across the federal enterprise Initiative #4 - Coordinate and redirect research and development (R&D) efforts Initiative #5 Connect current cyber ops centers to enhance situational awareness. Initiative #6 Develop and implement a government-wide cyber counterintelligence (CI) plan Initiative #7 Increase the security of our classified networks. Initiative #8 Expand cyber education. Initiative #9 Define and develop enduring leap ahead technology, strategies, and program Initiative #10 Define and develop enduring deterrence strategies and programs Initiative #11 Develop a multi-pronged approach for global supply chain risk management. Initiative #12 Define the Federal role for extending cybersecurity into critical infrastructure domains 5 ICSS 2013

2011 Cyberspace Policy Review 1. Leading from the Top 2. Building Capacity for a Digital Nation 3. Sharing Responsibility for Cybersecurity 4. Creating Effective Information Sharing and Incident Response 5. Encouraging Innovation 6 ICSS 2013

International Cyberspace Strategy Economy: Promoting International Standards and Innovative, Open Markets Protecting Our Networks: Enhancing Security, Reliability, and Resiliency Law Enforcement: Extending Collaboration and the Rule of Law Military: Preparing for 21st Century Security Challenges Internet Governance: Promoting Effective and Inclusive Structures International Development: Building Capacity, Security, and Prosperity Internet Freedom: Supporting Fundamental Freedoms and Privacy 7 ICSS 2013

Key best practices Take a cross-cutting comprehensive approach Include societal, economic and sovereignty aspects Collaborate closely with global industry Develop implementing action plans Update policies regularly to account for advances in technology 8 ICSS 2013