Building Confidence between States

Similar documents
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

How Effective are International Approaches for Global Cyber Security?

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Cyber Diplomacy A New Component of Foreign Policy 6

The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks

Cyber Security Strategy

Cyber Security Strategy of Georgia

Cyber Security Strategy for Germany

Honourable members of the National Parliaments of the EU member states and candidate countries,

International Dimensions of National (In)Security Concepts, Challenges and Ways Forward. Session III: Cyber Security

2 Gabi Siboni, 1 Senior Research Fellow and Director,

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Conclusion. Regional Security Architecture in Oceania: Quo Vadis?

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Tuomioja commenced the event by welcoming Mogherini and presenting the theme of the day: Europe and the construction of peace.

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

Towards closer EU-ASEAN collaboration in cybersecurity

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and

ENABLING BETTER MULTINATIONAL AND INTERNATIONAL MILITARY COOPERATION FOR CYBER-RELATED MATTERS ACROSS ASIA AND EUROPE. Caitríona H.

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

"The European Union's Security Architecture and its role to strengthen Peace and Security"

14TH ASIA SECURITY SUMMIT THE IISS SHANGRI-LA DIALOGUE FOURTH PLENARY SESSION

National Cyber Security Strategies: United States

National Cyber Security Policy -2013

International Relations Networking of the Austrian Armed Forces

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

INTERNATIONAL COOPERATION IN CRIMINAL MATTERS (Practical approach to certain issues which are not regulated by law and international treaties)

CONFIDENCE BUILDING MEASURES AND INTERNATIONAL CYBER SECURITY

An Overview of Large US Military Cybersecurity Organizations

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Research Project RM Assumed role of India in the international community in the short and medium

Hybrid Warfare & Cyber Defence

REPORT. Next steps in cyber security

Developing a robust cyber security governance framework 16 April 2015

TOWARDS PREVENTING VIOLENT RADICALISATION

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Active Engagement, Modern Defence

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

Toward A Closer Digital Alliance

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

The EU s approach to Cyber Security and Defence

Legal Issues / Estonia Cyber Incident

Confidence-building and international agreement in cybersecurity

Public Private Partnerships and National Input to International Cyber Security

Voluntary Principles on Security and Human Rights in Colombia. FRANCISCO JOSE LLOREDA High Presidential Advisor for Public Safety

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

Although the dominant military confrontations of the 20 th century were centered on the

OUTCOME OF PROCEEDINGS

THE ROLE OF ECOWAS IN SECURITY SECTOR & JUSTICE REFORM AND REGIONAL DYNAMICS INFLUENCING EFFECTIVE SSR

Five Principles for Shaping Cybersecurity Norms

The European Security Strategy Austrian Perspective

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber Security Recommendations October 29, 2002

Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes

Self Assessment. Introduction and Purpose of the Self Assessment Welcome to the AdvancED Self Assessment.

Option 1: Use the Might of the U.S. Military to End the Assad Regime

The Alliance's Strategic Concept

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

NATIONAL DEFENSE AND SECURITY ECONOMICS

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

Cyber Security Strategy

Proposed overarching principles for National Standards for Out of Home Care

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

NATO & Cyber Conflict: Background & Challenges

The Comprehensive National Cybersecurity Initiative

The OSCE Chairmanship: Development of an Institution 1

Confrontation or Collaboration?

Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT February Tokyo, Japan

UNCLASSIFIED. HPSCI White Paper on Cyber security December 10, 2008

THE FOREIGN POLICY OF MEXICO. Andres Manuel Lopez Obrador President For a Stronger and Better Mexico

Trends Concerning Cyberspace

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS. Leading Change

Managing cyber risk the global banking perspective

Euro-Med Information and Training Seminars for Diplomats

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

Long Term Defence Study

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

Northrop Grumman / Integrated Cyber Threat Response

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CYBER SECURITY INFORMATION SHARING & COLLABORATION

United States Cyber Security in the 21st Century

Created by Paul Hallett

Is NATO Ready to Cross the Rubicon on Cyber Defence?

In April 2007 a series of cyber attacks targeted Estonian information systems and

Transcription:

OSCE Workshop on Cyber/ICT Security in the Context of Regional and International Security Tashkent, 20-21 May 2015 Building Confidence between States Karsten Geier Head, Cyber Policy Coordination Staff Federal Foreign Office Berlin, Germany Karsten Geier / 1

Numerous states are pursuing military cybercapabilities. Cyber capabilities are not limited to great military powers. Cyber security is not a problem that is limited to rich Western countries and some Far-Eastern Tigers. Cyber security goes beyond cyber-crime. Cyber stability is affecting international security. Karsten Geier / 2

Four scenarios for cyber conflict: (1) All-out cyber-war. (2) Limited use of cyber capabilities as part of a larger warfighting effort. (3) Use of cyber capabilities as an element in hybrid conflicts. (4) International military crisis developing from a cyber-action. Karsten Geier / 3

Cyber action is not limited to cyber space. It can create real damage in the physical world. Diplomats and international security experts have to ask themselves how to respond. Karsten Geier / 4

Cyber capabilities do not fit well into traditional political-military strategies: Deterrence and denial require that the consequences of any attack be clearly and credibly communicated to any potential adversary; this is difficult in cyberspace. Empirical data on mutual entanglement is ambiguous at best. If political-military strategies fail to account for cyber capabilities, so does traditional arms control. Karsten Geier / 5

Cyber capabilities make offense easy, while defence is difficult. They introduce a degree of uncertainty into international relations, which has the potential to be destabilizing. Karsten Geier / 6

Things we can do: 1. Make our systems more resilient, reducing vulnerability. 2. Define norms and principles of responsible state behavior in cyber space to enhance transparency and predictability. 3. Agree regional security- and confidence building measures. Karsten Geier / 7

Regional organizations bring together those states that are most likely to have difficult relations. Regional organizations provide a forum for such neighbors to talk, and, ideally, to resolve their grievances. This is especially valuable regarding cyber-conflict. Karsten Geier / 8

Increasing transparency: Exchanging information on relevant domestic structures and institutions, Sharing their national cyber security strategies, and Exchanging white books or national doctrines relevant to cyber security. Karsten Geier / 9

Trust building: Sharing views on the rules of international law that apply to cyber conflict, Designating points of contact, and Establishing channels of communication for crisis situations. Karsten Geier / 10

Risk reduction and stabilization: Establishing Computer Emergency Response Teams (CERTS), Exchanging experiences and promoting cooperation between national CERTS, And conducting joint CERT exercises. Karsten Geier / 11

three-step approach : 1. December 2013 Agreed first set of cooperative measures aiming at transparency-building. 2. Since 2014 engaging in the implementation of these measures, while discussing a second set, aiming at trust-building and cooperation. 3. Beyond 2015 hope to arrive at a third set geared toward increasing stability. Deliberative process aiming at identifying those measures to which all can agree. Karsten Geier / 12

Agreed transparency-building measures: Providing national views; Facilitating co-operation; Holding consultations; Sharing information; Using the OSCE as a platform for dialogue; Nominating contact points; Providing a list of relevant national terminology. Karsten Geier / 13

should make better and more systematic use of the information exchanged: Systematic processing of information exchanged. Results of such analysis could feed expert talks to prepare policy discussions and negotiations by more senior officials. Better focus the provision of information: Developing questionnaires, to which Participating States would respond. Karsten Geier / 14

trust- Ideas for the second set aiming at building and cooperation: Organizing workshops, seminars, trainings and roundtables; Conducting joint trainings or exercises; Promoting (information) exchanges/visits; Sharing information on newly discovered risks; Promoting public-private partnerships. Discussions on a third set of Confidence Building Measures for stabilization are at a very early stage. Karsten Geier / 15

Thank you for your attention. Karsten Geier / 16