Thank you for your very kind introduction.



Similar documents
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

The Comprehensive National Cybersecurity Initiative

Presidential Summit Reveals Cybersecurity Concerns, Trends

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Cybersecurity Framework: Current Status and Next Steps

Preventing and Defending Against Cyber Attacks June 2011

Lessons from Defending Cyberspace

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Preventing and Defending Against Cyber Attacks November 2010

S. ll IN THE SENATE OF THE UNITED STATES

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

the Council of Councils initiative

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Indiana State Government, K-12 Cyber Safety

Legal Issues / Estonia Cyber Incident

Privacy and Security in Healthcare

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Honourable members of the National Parliaments of the EU member states and candidate countries,

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

An Overview of Large US Military Cybersecurity Organizations

CYBERSPACE SECURITY CONTINUUM

Cybersecurity. Canisius College

Ministry of Defence Bosnia and Herzegovina

How To Write A National Cybersecurity Act

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

Middle Class Economics: Cybersecurity Updated August 7, 2015

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Framework for Improving Critical Infrastructure Cybersecurity

How To Write A Cybersecurity Framework

Cyber Security Strategy

Introduction to Cybersecurity Overview. October 2014

Cybersecurity: Mission integration to protect your assets

CYBERSECURITY CERTIFICATION PROGRAMS

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

BSA GLOBAL CYBERSECURITY FRAMEWORK

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

A Reluctant Cyber Security Agreement between the US and China

AT A HEARING ENTITLED THREATS TO THE HOMELAND

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA

Cyber Security Strategy

CERT.AZ description as per RfC 2350

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

How To Make A Speech At The Cyber Defenders Discovery Camp

Cyber security in an organization-transcending way

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

The Danish Cyber and Information Security Strategy

working group on foreign policy and grand strategy

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Computer and Network Security in Higher Education

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Jyväskylä Cyber Security Ecosystem

Bossier Parish Community College

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Microsoft s cybersecurity commitment

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

National Cyber Security Strategies

No. 33 February 19, The President

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Information Technology R&D and U.S. Innovation

Transcription:

AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction. Mr.Mammadov, your Excellencies, ladies and gentlemen, good morning. Let me first of all thank the Ministry of Foreign Affairs, the Organization for Security and Cooperation in Europe, the other contributing partners, and ADA for organizing and hosting this important and highly topical event. It is a pleasure to be here with you today. Over the past 30 years the information revolution has had a tremendous impact on people s lives around the globe in how we live, in how we do business, and in how our systems and our very economics operate. But as President Obama said, It is one of the great paradoxes of our time that the very technologies that empower us to do great good can also be used to undermine us and inflict great harm We only have to think of real-life examples -- an air traffic control system going down and disrupting flights, or blackouts that plunge cities into darkness -- to imagine what a set of systematic cyber attacks might do.

Even on an individual level, cyber security is vital. We have probably all received emails from friends or family members apologizing for the spam sent from their accounts after they were hacked. And we are all familiar with the high profile cases such as the outlandish hacking of Sony Pictures Entertainment by North Korea in November and its release of confidential business and personal information. Yet, while cyber security is clearly a national security issue, much of our computer networks and critical infrastructure are in the private sector, which means government cannot do what is needed by acting on its own. This wish has to be a shared mission. At the national level, cyber security policies, effectively planned and implemented, protect critical infrastructure, our economies, and people from those who seek to exploit them for political, military, financial or other illicit gain. In recent years, the United States has weathered a significant number of attacks on its governmental and private-sector information networks. Officials at the U.S. National Nuclear Security Administration, for example, have reported they are hit with millions of cyber-attacks per day from a full spectrum of sources. I know the United States is not alone in facing this level of threat just ask my Estonian colleague here who knows all too well what the threats are and like other governments, private corporations, and even individuals, we are acting to defend cyber systems and critical infrastructure.

Less than two weeks ago, on April 2, President Obama signed an Executive Order to strengthen U.S. government cyber security measures. This Executive Order provides the U.S. Government with the authority to impose sanctions on individuals or entities who engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health of the United States. Equally important, President Obama has also sought to bring the private sector and government together to deal with this challenge. For example, President Obama hosted a White House Summit on Cybersecurity and Consumer Protection this past February, which focused on four principles for confronting cyber threats: 1) cyber security is a shared mission between government and industry; 2) constantly, government and industry should focus on and complement their respective strengths; 3) we need to evolve our defenses, and 4) we must protect people s privacy and civil liberties. Stronger international cooperation in cyber security is essential. It strengthened cooperation among our governments, businesses, and citizens will help forge stronger economic links, facilitate a growing segment of global commerce, ensure the reliability of electrical utilities and other infrastructure, protect our citizen s personal data and personal safety, and build a more prosperous and secure future.

Azerbaijan is making a real contribution to that more secure future by hosting this conference. In a number of my initial meetings with Azerbaijani leaders, business people, and private citizens, they have flagged the need for increased economic ties not only between Azerbaijan and the United States, but between Azerbaijan and the rest of the world as well. Azerbaijan seeks to become a regional hub for information and telecommunications technology, as well as for transportation and globally-needed energy supplies, and the United States strongly, strongly supports these aspirations. Yet as Azerbaijan becomes a more heavily networked society, its inter-dependencies will increase. And so the security of its increasingly interconnected communications infrastructure will only become more important. Before I conclude, I would like to note that the U.S. Embassy is very pleased to support this conference by sponsoring two speakers to share their experiences and expertise with you. Ms. Melissa Hathaway is a senior advisor at the Kennedy School's Belfer Center for Science and International Affairs at Harvard University, and a former cyber security adviser to U.S. Presidents George W. Bush and Barack Obama. Ms. Hathaway will join you via a digital video conference.

The other speaker is Dr. James D. Cannady, a professor in the Graduate School of Computer and Information Sciences at Nova Southeastern University. Dr. Cannady traveled to Baku to be with us for the conference and will be a panelist. So, in closing, let me thank you for all that you do in this challenging and dynamic field. I look forward to our countries continuing this work together.