Toward A Closer Digital Alliance

Similar documents
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

EU policy on Network and Information Security and Critical Information Infrastructure Protection

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Michael Yakushev PIR-Center, Moscow (Russia)

National Cyber Security Policy -2013

Cyber Security Recommendations October 29, 2002

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

Cyber Security Strategy of Georgia

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Public Private Partnerships and National Input to International Cyber Security

The European Response to the rising Cyber Threat

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

CONSULTING IMAGE PLACEHOLDER

Cyber security Building confidence in your digital future

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CYBER RISK INTERNATIONAL COMPANY PROFILE

2 Gabi Siboni, 1 Senior Research Fellow and Director,

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

April 10, Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms.

OUTCOME OF PROCEEDINGS

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cyber Security Strategy for Germany

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

GENERAL BIENIEK, DEPUTY COMMANDER SUPREME ALLIED COMMAND VICE-ADMIRAL FRANK PANDOLFE, COMMANDER OF STRIKEFORNATO

Active Engagement, Modern Defence

On the European experience in critical infrastructure protection

working group on foreign policy and grand strategy

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

The Landscape of Cyber, critical infrastructure and how Regulation fits in

Internet Governance and Cybersecurity Patrick Curry MACCSA

Joint statement on supply-chain security

THE WORLD IS MOVING FAST, SECURITY FASTER.

Cybersecurity: Mission integration to protect your assets

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Arent Fox Telecommunications

North Texas ISSA CISO Roundtable

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

CYBER-ATTACKS THE GLOBAL RESPONSE

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Cybersecurity and Privacy Hot Topics 2015

Best of Breed Opinion

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Cyber security Building confidence in your digital future

Cybersecurity, Foreign Policy, and Business

ACTIVE ENGAGEMENT IN COOPERATIVE SECURITY: A MORE EFFICIENT AND FLEXIBLE PARTNERSHIP POLICY

Risk and responsibility in a hyperconnected world: Implications for enterprises

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES

Mainstreaming European Military Cyber Defence Training & Exercises

Federal Communications Commission Public Safety and Homeland Security Bureau

Thank you for your very kind introduction.

Horizon 2020 Secure Societies

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

CYBERSECURITY INDEX OF INDICES

DOD DIRECTIVE CLIMATE CHANGE ADAPTATION AND RESILIENCE

DoD Strategy for Defending Networks, Systems, and Data

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

BSA GLOBAL CYBERSECURITY FRAMEWORK

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

The promise and pitfalls of cyber insurance January 2016

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Statement of James Sheaffer, President North American Public Sector, CSC

Australian Government Cyber Security Review

SECRETÁRIA DE ESTADO ADJUNTA E DA DEFESA NACIONAL

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The internet and digital technologies play an integral part

Partnership for Cyber Resilience

TUSKEGEE CYBER SECURITY PATH FORWARD

SEC-19-BES-2016: Data fusion for maritime security applications

Legal Issues / Estonia Cyber Incident

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

How To Write An Article On The European Cyberspace Policy And Security Strategy

Assessing the strength of your security operating model

How To Protect The Railway From Attack

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Promoting Cross Border Data Flows Priorities for the Business Community

Cyber Europe Key Findings and Recommendations

Seamus Reilly Director EY Information Security Cyber Security

The EU s approach to Cyber Security and Defence

HOMELAND SECURITY INTERNET SOURCES

Cyber Diplomacy A New Component of Foreign Policy 6

Use Logics. The Customer Benefits of Separation. Nick WHITE INTUG

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Final reports on deepened defence cooperation between Finland and Sweden

8970/15 FMA/AFG/cb 1 DG G 3 C

Transcription:

Toward A Closer Digital Alliance Presented at: GOVCERT.NL Symposium 2010 by: Melissa Hathaway HathawayGlobalStrategies@gmail.com

2020 Visions are Not Aligned NATO 2020: ASSURED SECURITY; DYNAMIC ENGAGEMENT ANALYSIS AND RECOMMENDATIONS OF THE GROUP OF EXPERTS ON A NEW STRATEGIC CONCEPT FOR NATO 17 MAY 2010 17 May 2010 19 May 2010

Reinforce Coordination of Economic and Security Policies Harmonize information communications technology initiatives Promote greater digital interoperability Enhance Internet trust, access, and security Enable broadband (high speed Internet access) Focus and fund research and development Provide for mutual assistance through better information sharing Undertake crisis response operations within, along, and beyond borders

Mobile Connectivity Drives New ways to do Old things faster, cheaper, better. More Connected--Real-time 24x7 connectivity, in palm of hand More Affordable--WiFi nearly ubiquitous in many developed markets Faster--low latency for boot-up, search, connect and pay Fun to Use--Social, casual gaming, advanced marketing Access to Everything--Music, video, data, stuff in cloud

Gives Way to Faster Exploit and Attack Paths The cross border flows of goods, services, people, technology, ideas and information are being limited by those who want to exploit these channels for crime and conflict.

The Tools Are Common JR02-2009 Tracking GhostNet: Volume 3, Number 1 Investigating a Cyber Espionage Network The State of the Internet 1st Quarter, 2010 Report Information Warfare Monitor March 29, 2009 J A N U A R Y 2 0 1 0 Contested Commons: The Future of American Power in a Multipolar World Edited by Abraham M. Denmark and Dr. James Mulvenon Contributing Authors: Abraham M. Denmark, Dr. James Mulvenon, Frank Hoffman, Lt Col Kelly Martin (USAF), Oliver Fritz, Eric Sterner, Dr. Greg Rattray, Chris Evans, Jason Healey, Robert D. Kaplan Securing Europe s Information Society General Report 2009 http://www.infowar-monitor.net/ghostnet http://www.tracking-ghost.nett UK Security Breach Investigations Report An Analysis of Data Compromise Cases 2010 2009 DRIVING FORCES, UNCERTAINTIES, and FOUR SCENARIOS TO 2025 Conducted by The 7th Annual e-crime Congress Supported By in partnership with!

Opponents Exploit the Mission Seams Governments organize by mission and often defensive strategies in one mission area are not shared with other missions. Securing our national networks and infrastructures requires building trust relationships: Private-Public; Private-Private; and Public Public.

Aligning Private and Public Interests Information communications infrastructure has become valuable to society over and above its value to the corporations that own and control it--and therefore--security must be demanded by the public sector: laws, policies, taxes, procurement incentives, regulations, liabilities, subsidies, or other market levers

Synchronizing May be Difficult Speed or Rhythm? Synchronization is Difficult if Moving at Different Pace with Different Priorities

Contributions to the Partnership Public Sector Private Sector Laws, Policies, Regulation, Incentives Access to Sensitive/ Proprietary Data Access to Classified Information Operational Responsibility of Core Infrastructures Interface/cooperation with other governments (treaty and multilateral agreements) Interface/cooperation with other private sector entities Money Money

Alliance Partners Priorities Differ Internet Service Providers assume more responsibility for hygiene and health of National Infrastructure Corporations assume more responsibility for data protection Governments assume broader mission of continuous surveillance of networks Regulation, Policy, Law...

Mutual Assistance, Information Sharing, Assured Survivability The Alliance must contribute to the broader security of the entire Euro-Atlantic region What is NATO s role as the defender of its own interests when the policies, technologies, and expertise resides in civilian and private holdings-- and not the military s area of influence? How are areas of common concern defined and information shared prior to a time of crisis, when the knowledge resides in private corporations? How do we distinguish between private and public property?

Leveraging the Public Infrastructure Illicit and illegal activities ignore national boundaries Broadband--Telecommunications or Internet? Assured Essential Services Cloud Computing--Rapid provisioning, global access, minimal management--at expense of security? Operation Aurora Cooperative approaches for electronic evidence gathering, jurisdictional adjudication, enlisting private sector talent, conscripting ISPs, and aligning data protection regulatory frameworks

What is an Act of Armed Aggression? Conscripted Computers Use of Civilian Infrastructure Combatant vice Non-Combatant Response Doctrine, Proportional Response, Attribution

Pooling Funds in a Fiscally Constrained Environment The Euro-Atlantic Alliance would benefit from a strategic Agenda of Intellectual Federalization Partner in R&D Nearly 11 bn Pursued by academic institutions, small businesses, and multi-national companies

Pooling Funds in a Fiscally Constrained Environment The Euro-Atlantic Alliance would benefit from a strategic Agenda of Intellectual Federalization Partner in R&D Nearly 11 bn Pursued by academic institutions, small businesses, and multi-national companies

Aligning Strategy with Execution-Europe Restore secure and safety in time of crisis Community research E U R O P E A N COMMISSION Improve security systems integration, interconnectivity, and interoperability, Increase security of infrastructure and utilities FP7 in Brief How to get involved in the EU 7 th Framework Programme for Research a pocket guide for newcomers

Aligning Strategy with Execution-United States Improve trust and integrity of on-line transactions Increase survivability of time-critical systems A Roadmap for Cybersecurity Research Improve situation awareness and attack attribution Determine provenance of data, information, systems software and hardware November 2009

International Alignment is Required Too Secretary-General of the U.N. International Telecommunications Union (ITU), has called for a comprehensive cyber treaty that would have a built-in legal and regulatory framework, as well as crosscontinent contingency plans in the event of large-scale cyber attacks. ICANN appeal for preserving security, stability and resiliency related to matters of DNS and ensuring appropriate contingency planning EU and NATO Lisbon Summits (11/2010) may place Information Security and Cyber Defense as top priority G-20, Council of Europe, others all working aspects

Progress Takes Time Build trust and pursue an inclusive strategy Demand partnership and recognize role of private sector Seek digital interoperability and build digital bridges Gain situation awareness Improve response coordination Improve resiliency

My Ask Identify the seams between economic and national security goals Consider yourself a Security Advisor to the economic initiatives - lead the discussion, tell a simple story Identify at least one industry partner that can improve our defensive posture and act

SAIS Review: Cybersecurity http://www.sais-jhu.edu/publications/ saisreview/current/hathaway.html