Wanted: International Cyber Standards

US miltary chiefs and EU political leadesrs are in agreemnet that a lack of international standards for proper behavior in cyberspace is preventing the US and it European allies from policing their adversaries. The protection of data and systems is now badly needed.

Trade and cybersecurity are increasingly intertwined. The global expansion of the Internet and increased use of data flows by businesses and consumers, for communication, e-commerce, and as a source of information and innovation, are transforming international trade. 

Not only are traditional defense and other national security targets at risk of cyberattack, so too is the broader economy. This includes critical infrastructure, such as telecommunications, transport, and health care, which relies on software to network services.

All four US miltiary service chiefs for the Army, Navy. Airforce and Marines are pledged support to Gen. Paul Nakasone, commander of US Cyber Command which under both Presidents Obama and Trumo is growing in its importance. But they have also acknowledged the challenge that comes with the lack of international doctrine. “We have international norms in the maritime; we don’t have those in cyber,” said  Admiral. Michael Gilday, previously US Navy10th Fleet/Fleet Cyber Commander. “It makes it difficult to enforce standard that don’t exist, and to therefore hold nations accountable for nefarious behavior. It’s a challenge.... Those types of agreements take time... Unfortunately they sometimes follow a catastrophic event.”

In mid-2017 NATO confirmed that if a member was under sustained cyberattack it could invoke Article 5, which would mean a full response from NATO.

But while that decision did help inspire the alliance to develop rules of engagement should such an event occur, it did not establish global standards for behavior in cyberspace. Many countries are now adopting policy measures to respond to the threat. According to one estimate, at least 50 percent of countries have adopted cybersecurity policies and regulations.

The fifth generation of communication technologies, or ‘5G’, has arrived, bringing with it the promise of enhanced global internet coverage. This was the main message of an event in the European Parliament in early November entitled “Cybersecurity: What are the real risks?”

It has the ability to connect everything around us, from our phones and fridges to hospitals and energy grids, driving economic growth and improving our everyday lives.

But there are also concerns that this radical transformation is fraught with risks and Europe may be unprepared for its challenges.

Fifth Domain:          Brookings Inst:        Parliament Magazine

You Might Also Read:

The Cyber Effect On Modern Warfare:

UN Chief Urges Global Rules For Cyber Warfare:

 

 

« US Bombarded With Ransomware
Criminals Are Using AI For Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.