Wanted: International Cyber Standards

US miltary chiefs and EU political leadesrs are in agreemnet that a lack of international standards for proper behavior in cyberspace is preventing the US and it European allies from policing their adversaries. The protection of data and systems is now badly needed.

Trade and cybersecurity are increasingly intertwined. The global expansion of the Internet and increased use of data flows by businesses and consumers, for communication, e-commerce, and as a source of information and innovation, are transforming international trade. 

Not only are traditional defense and other national security targets at risk of cyberattack, so too is the broader economy. This includes critical infrastructure, such as telecommunications, transport, and health care, which relies on software to network services.

All four US miltiary service chiefs for the Army, Navy. Airforce and Marines are pledged support to Gen. Paul Nakasone, commander of US Cyber Command which under both Presidents Obama and Trumo is growing in its importance. But they have also acknowledged the challenge that comes with the lack of international doctrine. “We have international norms in the maritime; we don’t have those in cyber,” said  Admiral. Michael Gilday, previously US Navy10th Fleet/Fleet Cyber Commander. “It makes it difficult to enforce standard that don’t exist, and to therefore hold nations accountable for nefarious behavior. It’s a challenge.... Those types of agreements take time... Unfortunately they sometimes follow a catastrophic event.”

In mid-2017 NATO confirmed that if a member was under sustained cyberattack it could invoke Article 5, which would mean a full response from NATO.

But while that decision did help inspire the alliance to develop rules of engagement should such an event occur, it did not establish global standards for behavior in cyberspace. Many countries are now adopting policy measures to respond to the threat. According to one estimate, at least 50 percent of countries have adopted cybersecurity policies and regulations.

The fifth generation of communication technologies, or ‘5G’, has arrived, bringing with it the promise of enhanced global internet coverage. This was the main message of an event in the European Parliament in early November entitled “Cybersecurity: What are the real risks?”

It has the ability to connect everything around us, from our phones and fridges to hospitals and energy grids, driving economic growth and improving our everyday lives.

But there are also concerns that this radical transformation is fraught with risks and Europe may be unprepared for its challenges.

Fifth Domain:          Brookings Inst:        Parliament Magazine

You Might Also Read:

The Cyber Effect On Modern Warfare:

UN Chief Urges Global Rules For Cyber Warfare:

 

 

« US Bombarded With Ransomware
Criminals Are Using AI For Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.