Balancing Cybersecurity and Trade

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
Development and Cooperation Preparing the Communication on Civil Society Organisations in Development.
Implications for the Regions EU-Regional Policy 1 Governance White Paper Introduction Adoption of White Paper on European Governance, July 25, 2001 Aim:
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
Gender Perspectives in Introduction to Competition Policy Gender Module #6 ITU Workshops on Sustainability in Telecommunication Through Gender & Social.
Western Balkans and Europe 2020 Western Balkans and Europe 2020 Towards Convergence and Growth – Draft Conclusions Brussels, March 2011.
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
E-commerce Strategies
EU SME policy The “Small Business Act” for Europe and its Review
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Office of the U.S. Trade Representative Kira M. Alvarez CHIEF NEGOTIATOR AND DEPUTY ASSISTANT U.S.T.R. For intellectual property enforcement.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
The International Trade Administration: Clean Energy Priorities and Programs Mary Saunders Assistant Secretary of Commerce for Manufacturing and Services.
Business Services in Europe: Raising the Game Norman Rose Vice-Chairman High Level Group on Business Services & Chairman European Business Services Round.
United States-Canada Regulatory Cooperation Council United States-Canada Regulatory Cooperation Council January 30, 2012 Washington D.C
WIPO’s Strategies on Intellectual Property and Economic Development WIPO’s Strategies on Intellectual Property and Economic Development United Nations.
European Regulatory Environment (just a part!) Mark Thomas, ECO Director CEPT Workshop on European Spectrum Management and Numbering 4 th June 2014.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Energy Efficiency Policy, Strategy and New Initiatives 15 th World Electronics Forum Meeting November 2009 | Shenzhen, CHINA.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
INTERNATIONAL COOPERATION PUBLIC CONSULTATION FIRST OVERVIEW EXPORTIC 27 March 2008 JF SOUPIZET HEAD OF INTERNATIONAL RELATIONS DG INFSO These view are.
Deepak Maheshwari Director – Corporate Affairs Microsoft India.
European Commission Preparation of the Innovation Union Flagship Initiative European Commission Presentation to ERAC 11 June 2010.
Global Standards for a Global Industry ANSI/SAC Symposium May 30, 2007 Laura E. Hitchcock Standards Strategy and Policy The Boeing Company Chair, The Strategic.
Introducing the ITAA Top Ten Public Policy Issues List.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Practitioners Network for European Development Cooperation Key messages from the workshop on Post-Busan implications for Practitioners (20 March) Paul.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
E-Transformation Turkey Project State Planning Organization March 17, 2005 Interoperability and Metadata Workshop Ankara, Turkey.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
National Aeronautics and Space Administration Presentation to the NASA Goddard Academy National Aeronautics and Space Administration 3. Commerce Space.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
Yangon, Myanmar, November 2013 Cybersecurity-Related Standardization Initiatives in the EU and the U.S.: Lessons for Developing Countries Nir Kshetri.
United States Standards Strategy Updating a Standards Strategy for Manufacturers in the Global Marketplace March 30, 2005 National Assn. of Manufacturers.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
IP Offices and the Implementation of the WIPO Development Agenda: Challenges and Opportunities September 18, 2009 Geneva Irfan Baloch World Intellectual.
Medical Technologies and Pharmaceuticals Industry Growth Centre CHAIR: Dr Bronwyn Evans Presentation Pack June 2015.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
© 2011 Underwriters Laboratories Inc. Conformity Assessment Best Practices and Advancing GRP in EAC: The Value of Public-Private Partnerships EAC Workshop.
Standards Coordination Office NIST presentation to the FGDC September 25, 2014.
ANSI – ESOs meeting Washington February 2017
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
ITU PLENIPOTENTIARY CONFERENCE GUDALAJARA - MEXICO October 2010
An Overview: The American National Standards Institute, the U. S
Cybersecurity in Belarus a general overview of support areas
Claudia Uribe Colombian ambassador to the WTO
Overview Rationale Context and Linkages Objectives Commitments
2018 Autonomous Vehicle Summit
Washington Update with Kevin Hickey
AGA Advocacy Priorities
Trust and Security Unit
3rd UNFSS Flagship Download at:
Improving Australia’s Competitive Position
Product Stewardship Institute Advisory Council Meeting The Lenox Hotel – Boston, MA September 14, 2012.
Overview Rationale Context and Linkages Objectives Commitments
COMPETITION POLICY AND IP
Director «Components & Systems»
WCIT12 Update Planning & International Relations Department
ITU PLENIPOTENTIARY CONFERENCE GUDALAJARA - MEXICO October 2010
Presentation transcript:

Balancing Cybersecurity and Trade Danielle Kriz Director, Global Cybersecurity Policy Information Technology Industry Council Digital Agenda Assembly Brussels – June 21, 2012

About ITI One of the main high-tech trade associations in Washington 50 of the largest companies in the world Hardware, software, and services Mostly U.S., 4 European, 5 Japanese members Companies have facilities all over the world Expertise in cyber: Cybersecurity Committee Expertise in standards: Standards Policy Committee Expertise in trade: Trade Policy Committee

ITI Member Companies Apple, Inc.

ITI Cybersecurity Principles Inform the public cybersecurity discussion Cybersecurity is rightly a priority for governments Interests of industry and governments are fundamentally aligned Principles provide an important lens for viewing any efforts to improve cybersecurity

Six Principles To be effective, any efforts to improve cybersecurity must: Leverage public-private partnerships and build upon existing initiatives and resource commitments; Reflect the borderless, interconnected, and global nature of today’s cyber environment; Be able to adapt rapidly to emerging threats, technologies, and business models; Be based on effective risk management; Focus on raising public awareness; and More directly focus on bad actors and their threats.

Global Trends in Cybersecurity & Commerce Governments often react to cybersecurity concerns without fully considering the global context or consequences of policy proposals Cybersecurity: Catch-all term for cybersecurity, network security, information security, encryption, security standards, etc Government actions on cybersecurity may create commercial barriers – intentionally or unintentionally Mandating domestic standards or prescriptive technologies, requiring use of domestic intellectual property (IP), forcing technology transfer, source code review

Global Trends in Cybersecurity & Commerce We recognize the need for cyber / national security These concerns must be balanced with commercial interests But many times proposed policies decrease security Unique security standards and other requirements Undermine security and resiliency Raise costs & slow industry’s ability to innovate and meet current and future security challenges Impede global interoperability, fragment the Internet Governments may overlook the tremendous market incentive that the private sector has to secure networks and systems Large concern to ITI member companies and others

U.S. Cybersecurity Policies - Congress Variety of legislative proposals in the Senate and House of Representatives in last 12 months; none have passed We support proposals that would improve cybersecurity while preserving industry’s ability to innovate Cyber threat information sharing, Federal Information Security Management Act (FISMA) reform, cybersecurity R&D, cybercrime, national data breach standard Some proposals are overly regulatory and would decrease security- and also send the wrong message globally Giving Department of Homeland Security additional power (including to write standards), government regulation of ICT supply chains We regularly urge the U.S. Congress to consider the global implications of their proposals and to lead by example

U.S. Cybersecurity Policies - Administration Variety of U.S. Government Departments and Agencies have some responsibility related to cybersecurity White House, Department of Homeland Security, Department of Defense, Department of Commerce, Department of State, National Institute of Standards and Technology (NIST), etc. These Departments/ Agencies have various roles now They also are considering new cyber policies ITI supports some policy ideas, not others We support the Commerce Department helping to promote voluntary cybersecurity efforts in industry We support greater USG cybersecurity R&D We oppose DOD regulating the ICT supply chain Overall, we oppose a regulatory approach because it will decrease security

China Encryption regulations (1999) Rules restrict or ban outright the use of foreign encryption technology    ZUC algorithm for 4G LTE telecom networks Although a globally accepted standard (3GPP), ZUC will be mandatory for the China market, along with invasive testing requirements (source code review)  Multi-Level Protection Scheme (MLPS) For information security in China’s “critical infrastructure” Many requirements (e.g. domestic IP, testing) would keep out foreign ICT products

India New Preferential Market Access (PMA) rules Procurement preference to domestically manufactured electronic goods “due to security considerations and in Government procurement” Assumption that “made in India” is more secure Telecom network security certification Overreach- required source code/ technology transfer, in-country testing (partially resolved in 2011) Telecom Security Policy (draft)- 2012 Includes important principles to effectively address India’s telecommunications security concerns Simultaneously, a push toward Indian-specific security standards and testing or linking security to domestic products/local manufacturing…

EU – Working on New Policies Forthcoming European Strategy for Internet Security Revision of Data Protection Directive and inclusion of “security by design” Industry urges the EU to balance security and commercial/trade interests

Recommendations for the EU, US Pursue policies that recognize the global dimension of Internet security Aim to meet domestic security needs while recognizing the global cyber marketplace The U.S., EU, and other governments should cooperate to promote policies that are a model for rest of the world We don’t want to set bad examples (or decrease security) Pursue global standards and best practices, balance security and economics The best path is via public-private partnerships The ICT industry seeks security – it is our bottom line Sharing of knowledge and experience and promoting cooperation to enhance cybersecurity

Thank you Danielle Kriz Director, Global Cybersecurity Policy Information Technology Industry Council (ITI) dkriz@itic.org, +1-202-626-5731 www.itic.org