Conference Report * National Cyber Security Framework Workshop supported by the NATO Science for Peace and Security Programme



Similar documents
Toward A Closer Digital Alliance

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

On the European experience in critical infrastructure protection

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

How To Understand And Understand The European Priorities In Information Security

Cyber Security Strategy for Germany

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

How To Write An Article On The European Cyberspace Policy And Security Strategy

Cyber Security Strategy

Cyber Security Strategy

The UK cyber security strategy: Landscape review. Cross-government

Cyber Diplomacy A New Component of Foreign Policy 6

OUTCOME OF PROCEEDINGS

EU Cybersecurity: Ensuring Trust in the European Digital Economy

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

National Cyber Security Policy -2013

Public Private Partnerships and National Input to International Cyber Security

Honourable members of the National Parliaments of the EU member states and candidate countries,

International Relations Networking of the Austrian Armed Forces

National Cyber Security Strategy

Cyberspace Situational Awarness in National Security System

The internet and digital technologies play an integral part

The European Response to the rising Cyber Threat

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

National Cyber Security Strategies

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Report of a Peer Learning Activity in Limassol, Cyprus October School Leadership for learning

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Cybersecurity and the Romanian business environment in the regional and European context

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Five Principles for Shaping Cybersecurity Norms

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Open Source Intelligence Dissemination Conference, Rome, Wednesday 8 th July 2015

Helmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

How To Create A National Cyber Security

J O I N T D E C L A R A T I O N

INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT

Cybersecurity Strategy of the Republic of Cyprus

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and

Cyber Security in the University of Oxford: Collaborating without Conforming?

Working Group Meeting of the

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

The EU s approach to Cyber Security and Defence

Policy Paper. Women and Peace and Security Agenda Progress and remaining challenges after 20 years of implementation

Summer School Women Peace and Security

SECURING PAYMENTS IN THE CYBER WORLD

Critical Information Infrastructures Protection approaches in EU

ITU National Cybersecurity/CIIP Self-Assessment Tool

RUSSIA CHINA NEXUS IN CYBER SPACE

IFE Strategic Plan

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

How To Help The War On Terror

The global challenge

National Cyber Security Strategies. Practical Guide on Development and Execution

Legal Issues / Estonia Cyber Incident

Cyber-Intelligence and Cyber-Espionage

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

The European Security Strategy Austrian Perspective

SUB Hamburg A/ Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Responsible Negotiation Workshop with Alain Lempereur

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

Trends Concerning Cyberspace

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Michael Yakushev PIR-Center, Moscow (Russia)

Icelandic National Cyber Security Strategy Plan of action

- 'Improving Cyber Security in Europe, the way forward

Specific comments on Communication

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

Insurance Distribution in a Changing World

The Danish Cyber and Information Security Strategy

Stakeholders meeting. Ethical protocols and standards for research in Social Sciences today

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER am 1.00pm Green Park Conference Centre, Reading

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016

CyberSecurity Solutions. Delivering

The Challenges of Cyber Security a Government s Perspective

Thank you for your very kind introduction.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Day 3-24 April Day 2-23 April 2013

Transcription:

Conference Report * National Cyber Security Framework Workshop supported by the NATO Science for Peace and Security Programme 12-13 April 2012 Schloss Laudon, Vienna / Austria Philipp Mirtl * This Conference Report was prepared by the Austrian Institute for International Affairs (oiip) and approved by the Cooperative Cyber Defence Centre of Excellence (CCDCOE).

1. Agenda Thursday, 12 April 2012 09:15 Transport leaving Hotel Boltzmann 09:45-10:00 Welcome Coffee & Opening Remarks Dr Helmut Schnitzer Austrian Federal Chancellery Dr Katharina Ziolkowski NATO Cooperative Cyber Defence Centre of Excellence, Legal & Policy Branch, Scientist / Senior Analyst Suleyman Anil NATO Headquarters, Emerging Security Challenges Division, Head, Cyber Defence Section Austrian Institute for International Affairs, Fellow / Senior Adviser 10:00-11:00 Host Introduction: Cyber Security Strategy(ies) in Austria Franz Vock Austrian Federal Chancellery Brigadier Helmut Habermayer Austrian Ministry of Defence and Sport Wolfgang Ebner Austrian Ministry of the Interior 11:00-12:30 Panel I Preliminary Considerations Special Focus: National Security in the Context of Cyber Security Dr Gustav Lindstrom Geneva Centre for Security Policy, Head of the Euro-Atlantic Security Programme Heli Tiirmaa-Klaar European Union, European External Action Service, Cyber Security Policy Advisor Dr Greg Rattray Cyber Conflict Studies Association / Delta Risk LLD, Partner Prof Dr Paul Cornish University of Bath, Department of Politics, Languages & International Studies, Professor of International Security Jason Healey Atlantic Council, Director of the Cyber Statecraft Initiative 2

12:30-13:45 Lunch 13:45-15:15 Panel II Operational Structures: What International Good Practices Are There? Special Focus: Organisational and Administrative Measures Yurie Ito JPCERT, Director of Technical Operation Suleyman Anil NATO Headquarters, Emerging Security Challenges Division, Head, Cyber Defence Section Jart Armin HostExploit / Cyber Security Foundation, Director Victoria Ekstedt Swedish Armed Forces, Legal Adviser 15:15-15:45 Break Austrian Institute for International Affairs, Fellow / Senior Adviser 15:45-17:15 Panel III Strategic Goals: Who Needs To Do What? Special Focus: Stakeholders of National Cyber Security Jason Healey Atlantic Council, Director of the Cyber Statecraft Initiative Dave Clemente The Royal Institute of International Affairs (Chatham House), International Security Programme, Research Assistant Eric Luiijf Netherlands Organisation for Applied Scientific Research TNO, Principal Consultant C(I)IP Maeve Dion Stockholm University, Faculty of Law, Lecturer Dr Gustav Lindstrom Geneva Centre for Security Policy, Head of the Euro-Atlantic Security Programme 3

Friday, 13 April 2012 09:30 Transport leaving Hotel Boltzmann 10:00-10:30 Special Comment Jeff Moss ICANN, Chief Security Officer 10:30-12:00 Panel IV Political Aims: What Needs To Be Considered In A Strategy? Special Focus: Cyber Threats; What Composes Cyber Security? Austrian Institute of International Affairs, Fellow / Senior Adviser Melissa Hathaway Harvard University, John F. Kennedy School of Government, Belfer Center for Science and International Affairs, Senior Adviser Jeff Moss ICANN, Chief Security Officer John C. Mallery Massachusetts Institute of Technology, Computer Science & Artificial Intelligence Laboratory and Head of MINERVA Project Dr Katharina Ziolkowski NATO Cooperative Cyber Defence Centre of Excellence, Legal & Policy Branch, Scientist / Senior Analyst 12:00-12:30 Special Comment Melissa Hathaway Harvard University, John F. Kennedy School of Government, Belfer Center for Science and International Affairs, Senior Adviser 12:30 Closing Remarks Afternoon (authors only): National Cyber Security Framework Manual Author s Session (concluding ca. 16:00) Special Thanks To: 4

2. Summary The Vienna roundtable on National Cyber Security Frameworks was the first in a series of three workshops supported by the NATO Science for Peace and Security Programme. It will be followed by a second meeting in Stockholm (August 2012) and a final meeting in Geneva (November 2012). All three workshops aim to provide a setting conducive to fostering debate on technical and policy issues among a diverse group of experts ranging from academia, the private sector, military and governments ( geeks and wonks ). The series is considered a vital input to the overall deliverable of a National Cyber Security Framework Manual, which will support both member and non-member states in their approach to cybersecurity. The Vienna Roundtable was hosted in Schloss Laudon (Laudon Palace), the higher academic training institution of the federal Austrian civil service, located on the outskirts of Vienna. The event s venue was facilitated by the Federal Chancellery. Additional support was provided by the Ministry of Defense and Sport (BMLVS) and the Ministry of the Interior (BMI). Finally, the Austrian Institute of Technology (AIT) also provided financial support for the event (incl. for the hosted dinner). All the contributions were greatly appreciated. The host introduction was given by the Austrian Federal Chancellery, the BMLVS and the BMI. The presenters gave an overview of their coordinated strategies for a comprehensive protection of the Austrian cyberspace. The three ministries called particular attention to the ongoing Cyber Security Strategy Process in Austria, of which different mandates were overseen by different ministries: the BMI was emphasising cybercrime, the BMLVS military cyberdefense and crisis management support, and the Federal Chancellery particularly stressed crisis management and critical infrastructure protection (CIP). Each institution emphasized an (increasing) cooperation with one another and highlighted their involvement in national and international fora. Of particular interest to the participants was the existence of a mobilizeable ICT volunteer fire brigade concept. Panel I Following the logic of the roundtable (introduction, tactical, operational, strategic issues) the kick-off panel National Security in the Context of Cyber Security was dedicated to the examination of national cyber security objectively from the unbiased angle of overall national security concerns. The recent initiatives within the EU and the UK were just two examples of how cybersecurity had risen from a position of relative obscurity to newfound prominence within overall national security debates. Despite the increased prominence of cyber within national security the overall agreement was that there was, indeed, no hype if anything, the opposite was true: the top level decision makers still had considerable difficulties grasping the different aspects of national cybersecurity. This was also clearly reflected in the significant understandings of cyber within different European countries the disparity in capabilities (and understandings) is immense. There are additionally varied approaches clearly distinguishable, with some countries going for a (legal) top-down regulatory framework, while other countries are emphasising norms and standard setting as well as voluntary cooperation. There was significant discussion on the different foundation approaches to cybersecurity, including the origins of cyber as a military capability, a prolonged (and often inconclusive) discussion on critical infrastructure protection, a varied understanding of what precisely constituted cybercrime, as well as slowly changing attitude towards product (software) liability and other market instruments influencing national cybersecurity. Two specific trends were, however, dominant: the rising (or increasing awareness) of the importance of non-state actors (both as maintainers of 90% of CI as well as offensive and defensive actors), as well as the militarization (or spookification ) of cyberspace through an increase of intelligence-led activities. Panel II In the panel Operational Structures: What International Good Practices Are There? a key question was posed regarding characteristics of good national cybersecurity. Essentially, all three presenters (Anil Suleyman was taken ill and could not participate) concentrated on communication and information exchange as a key deliverable for all national cybersecurity-relevant efforts. However, the participant s examples suggested speed alone was not the only decisive factor. An international cybercrime gang was, for instance, tackled by an international consortia of experts, and, through facilitators (including Vienna), was able to confront the crisis in short period of time. However, legal concerns on international data 5

exchange put a hold on these efforts illustrating that international legal frameworks could prove to be speed bumps even for the informal information exchange often considered to be key. Within a formal information exchange environment, on the other hand, there were questions as to what escalation procedures would be truly helpful in a time of crisis. In essence, the question was posed if a Confidence and Security Building Measure (i.e. a hotline ) could be operated successfully if the escalation processes occurred only within the technical, and not the political, sphere. A specific in-depth examination of one particular data-sharing regime showed it was important to distinctly separate different types of activities and organisations, especially within the intelligence collecting world, in order to strive for international legal conformity (for instance on the issue of human rights). In essence, the particular example showed that a very wide-ranging informational monitoring scheme could only even be considered if the bodies concerned with the relevant tasks were under strictest legal framework i.e. that god was in the details, and even very intrusive surveillance measures could be undertaken if the data protection measures taken were sufficiently stringent. Panel III In the panel Strategic Goals: Who Needs To Do What? special attention was paid to the major players and their respective authorities. Much to the surprise of many technical experts at the operational level it was stressed that, in times of national crisis, the political level can respond very quickly by making relevant policy decisions. However, if there are no well-established channels of communication between the operational and the strategic level, it is not only difficult to communicate upstream, but also unlikely that state representatives will be capable of having reasonable negotiations with their peers abroad. In this context it was mentioned that the creation of such channels of communication usually requires an investment of considerable financial resources. Due to poor measurements for success, however, these resources are only accessible after having spent a lot of time in their justification. In order not to make the public sector fall behind the private one, governments are increasingly cooperating with private entities to ensure nationwide cybersecurity. Most of the relevant ICT actors are concentrated within the private sector. The information exchange between state actors, telecom operators and Internet service providers is most commonly conducted through Public Private Partnerships (PPP) meeting on a regular basis. Despite of their different value systems in terms of freedom of information, the stakeholders involved must trust and respect one another s rights and obligations if they want their collaboration to be successful. The next critical step ahead is the creation of a legal framework with common principles and laws. It must confront questions about how different laws, expectations and stakeholders can be brought together into a general strategy. National cybersecurity strategies should serve as useful guidelines which are focused and clear about interests and directions so policy can be effective. This includes traditional security concerns, everyday crime and education. Concurrently, they should not be overly detailed in terms of concrete instructions. Panel IV The last panel on Political Aims: What Needs To Be Considered In A Strategy? emphasized the tension between national security and economic growth. Both the public and the private sectors are being targeted by the same threats. However, since private companies run most of the networks, these companies must be involved in any national cybersecurity strategy. One way for governments to encourage such involvement is through market incentives (e.g., through tax reduction). In this context, national cybersecurity has been defined as the focused application of specific regulatory frameworks and information assurance principles to public, private and relevant international ICT systems, and their associated content, where these systems directly pertain to national security. National cybersecurity can be approached differently: through cooperation (whole of nation), collaboration (whole of system) or through coordination (whole of government). The national cybersecuirity debate can be divided into five different mandates including cyberdiplomacy, national crisis management, espionage, CIP/IA, and cybercrime(terrorism). One of the most important things to find out in cyberdefence is the attacker. It must be clear who the threat actor is, and what his capabilities and resources are. The vulnerability of computer networks is not a problem until a threat actor exploits it. Thus, the challenge for cyberdefence is to gain mathematical leverage over the attacker. To do that you need a coordinated vision and a clear set of objectives. Therefore, cyber-security systems ultimately need complicated methods because they are complicated and extremely hard to manage (asymmetrical actors approach). 6

3. Pictures 7