Summary of “Challenges in International Cyber Security” NDU Conference Report Charles Barry Center for Technology and National Security Policy The National.

Slides:



Advertisements
Similar presentations
CSO/NGO Consultations Report to IATI Signatories, Partner Countries and Steering Committee Paris, 4 July 2011.
Advertisements

ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Principles of Standards and Measures
(The Global Programme of Research On Climate Change Vulnerability, Impacts and Adaptation) Adaptation Knowledge Day V: Climate Change Adaptation Gaps BONN,
GEORGE MASON UNIVERSITY Center for Infrastructure Protection and Homeland Security Integrating Critical Infrastructure into Emergency Management Programs.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
DHS, National Cyber Security Division Overview
Speaker: Tamar Shapatava
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
(Geneva, Switzerland, September 2014)
Advancing Government through Collaboration, Education and Action Financial Innovation and Transformation Shared Services Workshop March 17, 2015.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Runway Safety Teams (RSTs) Description and Processes Session 5 Presentation 1.
Non-governmental Actors in the Compliance with and Monitoring of Multilateral Environmental Decisions.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Mitigating the Social Impact of Oil Operations 18th World Energy Conference Eleodoro Mayorga Alba World Bank October 22, 2001.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Challenges of a Harmonized Global Safety Regime Jacques Repussard Director General IRSN IAEA 2007 Scientific Forum.
Operationalizing the Ruggie Framework Michael Auerbach, V.P., Social Risk Consulting.
Working Group 4: Urban Governance for Risk Reduction: Mainstreaming Adaptation into Urban Planning and Development Chair: Prof. Shabbir Cheema Rapporteurs:
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Working towards responsible business practices in the oil and gas sector Rose Kimotho Programme Manager (East Africa) Institute for Human Rights and Business.
Outcomes of Public Health
Critical Role of ICT in Parliament Fulfill legislative, oversight, and representative responsibilities Achieve the goals of transparency, openness, accessibility,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Corporate Governance in the Caribbean Environment “The Caribbean Corporate Governance Forum” Trevor E Blake General Manager – ECSE.
Armenia and Diaspora Armenia’s investment climate and Diaspora’s participation in development policies. Hayk Sargsyan, Johns Hopkins University.
A complementary view from the DIGOIDUNA study Paolo Bouquet, University of Trento, Italy SMART 2010/0054.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
6 April Research for a secure Europe Christiane BERNARD European Commission - DG Enterprise and Industry Athens.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Session V: Integration of Risk Information and Early Warnings in Emergency, Preparedness, Planning and Response Symposium on Multi-Hazard Early Warning.
Session 6: Summary of Discussion A. Institutional Barriers and Potential Solutions 1. Natural environment does not have national or institutional boundaries,
GEELONG REVISITED FROM ESD TO EBFM - future directions for fisheries management A COMMERCIAL INDUSTRY PERSPECTIVE ON THE ESD FRAMEWORK Neil MacDonald,
New World, New World Bank Group Presentation to Fiduciary Forum On Post Crisis Direction and Reforms March 01, 2010.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Bridging the Gap: The Role of the Private Sector in Climate Change Adaptation Richard Welford Chairman, CSR Asia Adaptation Knowledge Platform Learning.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
FGDC FGDC Homeland Security Working Group Michael Domaratz, Co-chair U.S. Geological Survey.
ICANN Strategic Initiatives for Security, Stability and Resiliency - DNS CERT Posted for Public Comment at 1.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Seminar on the Evolution of National Statistical Systems Panel Discussion: Prospects and Risks for the Future: How to Manage Uncertainties? Eduardo Pereira.
PHDSC Privacy, Security, and Data Sharing Committee Letter to Governors.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
Outcomes of the Namibia Water investment Conference Mr Abraham Nehemia Under Secretary for Water Affairs and Forestry 14 September 2012 Ministry of Agriculture,
1 CIVIL SOCIETY AND CORPORATE SOCIAL RESPONSIBILITY IN VIETNAM: BRIDGING THE GAP Hanoi, March 2013.
Independent Evaluation Office EVALUATION THE ROLE OF UNDP IN ADVANCING THE SDGS Date: Dr. Indran A. Naidoo, Director.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
Strengthening Dialogue and Building Trust April 2017
Supervision of Insurance Market Conduct in Canada
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
8 Building Blocks of National Cyber Strategies
Forth International Forum
Continuity Guidance Circular Webinar
Securing free and fair European elections
Presentation transcript:

Summary of “Challenges in International Cyber Security” NDU Conference Report Charles Barry Center for Technology and National Security Policy The National Defense University Presented at the 4 th International Forum Garmisch-Partenkirchen, Germany April 2010

Barry/CTNSP-NDU2 Background 2007: NDU launched a research project on Cyberpower and National security. A conference series was planned. One conference addressed challenges in international cyber security. The intent was to ask as many national representatives as possible to share their perspectives on cyber power and cyber security. The conference was held at NDU April The research project results were published in two volumes by NDU Press: “Cyberpower and National Security” and “Military Perspectives on Cyber Space.” NDU continues its research on Cyber Security, including in the international arena, with the goal of increasing the dialogue.

Barry/CTNSP-NDU3 Challenges in International Cyber Security Conference and Report Overview 2 days 260 attended, including 24 non-US 40 speakers – including from ICANN, Russia, India, Brazil, key US stakeholder organizations 6 panels 12 key observations 2 persistent themes 7 recommendations

Barry/CTNSP-NDU4 Key Observations 1 International dialogue on cyber governance, crime and security is imperative, long over due and still embryonic There is essentially only one network in cyberspace – every major stakeholder has a vested interest in securing this common network for all users Developing effective security requires technologies that can provide early detection, increase situational awareness and – critically - track attribution. The development of cyber law is fundamental to determining conduct in cyberspace: types of legal entities, crimes to be prevented and the threshold of acts of war. By its nature, cyber law is international law.

Barry/CTNSP-NDU5 Key Observations 2 Threats to cyber security are naturally asymmetrical. Credible deterrence may call for the capacity to respond in kind. But constitutes a legitimate response to cyber attacks? There are three general levels of ‘bad’ conduct in cyber space: individual hackers, organized criminal behavior and acts of warfare on states, by other states or non-states. Nations generally deal with the first two through law enforcement bureaucracies and the third by defense ministries – but is this division wise, creating two cyber defense capabilities? The international community needs agreed definitions in order to coalesce around effective cyber space governance. A common lexicon forms the basis of international understanding. Nations, including the US have not established fully national governance over cyber space matter. It is unclear where responsibility lies for network security. Overcoming national ambiguity is a precursor to international agreement.

Barry/CTNSP-NDU6 Key Observations 3 Globalization has brought an age of cyber interdependency between national security and financial stability. In determining areas of mutual interests, threats and vulnerabilities, global financial stability should be the common denominator. Cyber security is not only infrastructure security but content security. International monitoring efforts should be federated among governments as well as across the public-private sector divide. Commercial goals and national security goals should be meshed through collaboration, especially with multinational industries, to establish a culture of ethics and responsibility regarding cyber security

Barry/CTNSP-NDU7 Two Persistent Themes Thus far no international code of conduct for cyber space. Standards, ‘rules of the road’ in the cyber domain should be agreed, beginning where common values, understandings are evident. Coalescing common rules will be long and arduous. It requires continuous dialogue among nations, private sector and international stakeholders – more so than is now taking place.

Barry/CTNSP-NDU8 Conclusions and Recommendations 1 Most players demonstrate large gaps in understanding the positions of other stakeholders. Dialogue helps close these gaps. The concerted efforts at NDU to hear from Brazil, Russia, India and China as well as international organizations and US agencies paid significant dividends, both for formal and informal understanding. NDU should host or participate in at least one international conference on cyber security annually.

Barry/CTNSP-NDU9 Conclusions and Recommendations 2 Future conferences should be expanded to included more major industry players and major cyber countries such as Germany The US and others should consider a major cyber security initiative focused on cooperation among both traditional allies as well as other major cyber countries and organizations. Collaboration should be continued and expanded among the many major cyber powers, as well as across governments, industry, scientific communities and academia.

Barry/CTNSP-NDU10 Summary The NDU conference was a strong contribution to the dialogue among international cyber experts that we all should be determined to maintain and expand Form is far less important than substance – the goal is to build momentum behind an ongoing dialogue through many avenues Multiple international venues will be essential Everyone should be engaged – states, international organizations, industry, think tanks, etc There is a long path ahead – we must roll up our sleeves and get to work We look forward to seeing you back at NDU

Barry/CTNSP-NDU11 Discussion?

Barry/CTNSP-NDU12 International Challenges of Crime, Security and Governance Response to cyber crime has remained unchanged for 25 years while the threat has grown exponentially due to the value of information. The cyber technology industry needs international standards and laws for data protection, privacy. International cyber governance is ambiguous, needs to be clarified.

Barry/CTNSP-NDU13 Policy Challenges in Defending Against Cyber Attack Law enforcement can only work with identification and attribution – this is technology as well as policy challenge. Consensus around a threshold of unacceptable behavior should emerge through international dialogue. The concepts of territorial jurisdiction and integrity, and sovereignty, must be applied to cyber space, information security and the meaning of ‘attacks.’ Concerns over effective countering of attacks against cyber systems and data need to move from the margins to the mainstream, engaging the global expertise of both the public and private sectors.

Barry/CTNSP-NDU14 Critical Cyber Infrastructure Protection Timely sharing of information about vulnerabilities and attacks, between governments and the private sector – more so than at present – will help mitigate losses. The convergence of cyber and communications creates a public- private imperative to promote survivability of critical infrastructure circuits Standards and best practices, generated by public-private collaboration, will encourage investment in risk mitigation and ease the debate over the need for regulation Critical Infrastructure Protection requires not just preparedness but risk assessment to prioritize investment in risk mitigation

Barry/CTNSP-NDU15 Potential Thresholds of War in Cyberspace At present there is no consensus on what constitutes an act of war in cyberspace. Clarification is needed on what differentiates cyber warfare from less severe cyber threats. In order to reach a definition of cyber warfare partnerships are critical – strong ties and open communications among trusted powers and groups are the basis of building broad agreement on unacceptable behavior. The UN Charter may be the place to start: it provides widely accepted distinctions between ‘war’ and ‘not war’ as well as principles of self defense, sovereignty and proportionality.

Barry/CTNSP-NDU16 National Perspectives on Infrastructure Protection, Cyber Crime, and the Potential for War in Cyber Space Cyber security challenges involve a spectrum ranging from the state level to non-state groups to individuals. In Brazil, cyber crime is mainly cell phone based and conducted by organized gangs. A secondary challenge is the serving as a source of global botnets. Russia’s main concern is state-on-state hostilities via the cyber domain and prevention of a cyber ‘arms race.’ India’s place in among major cyber powers has been a rapid rise, however it has managed to avoid an exponential growth in cyber crime. China’s acceptance of cyber as a legitimate domain for business as well as international relations is fully matured. It knows the malicious use of cyber power is a double-edged sword, likely to disrupt its own processes as well as others.

Barry/CTNSP-NDU17 Institutional and Multilateral Governance Initiatives There are gaps in efforts of institutions and multilateral enterprises to counter cyber threats Solutions should be sought at multiple levels, from multinational organizations to small technology innovators. In the US the private sector has shown greater expertise and flexibility in addressing cyber security problems for both private and public sector systems. National governments and ICANN should tap into the private sector and seed informal collaborative networks to develop the best solutions. Governance is a concept best implemented though active, continuous public-private engagement, including at the international level