SlideShare a Scribd company logo
1 of 21
Cybersecurity: Increased
Transparency and the Role of
Civil Society
Presented by Sarah Granger
from the Center for Technology, Media & Society
to the Monterey Institute of International Studies
May 7, 2013
Cyber Threats
Reality
Threat Origins
โ€ข State based military cyber offense experts
โ€ข Mercenary hacker networks, hired by
governments or non-state organizations
including terrorist groups
โ€ข Rogue hackers
โ€ข Hactivists
Whoโ€™s on Alert?
โ€ข Military / DoD
โ€ข Critical infrastructure organizations
โ€ข Government agencies
โ€ข Financial Industry
โ€ข Companies with valuable technologies
โ€ข Media
Expanding Concerns
โ€ข No longer in the Containment Era โ€“ new
threats everywhere
โ€ข Technology and hacking tools becoming
easier and cheaper to obtain
โ€ข Critical systems decentralized and often
privately held, security levels unknown
โ€ข Most incidents happen across multiple
boundaries; tracking is difficult & law
enforcement challenging
The New Military
Meanwhileโ€ฆ
โ€ข Greater demand from the public for
government transparency
โ€ข Greater push within government for
increased transparency
โ€ข International pressure for responsible
governance
Walking Transparency
Talk
Transparent
Cybersecurity
โ€ข White House cybersecurity executive order for
improving critical infrastructure
โ€ข Transparent process involving multiple
stakeholders, including civil society leaders
โ€ข Public-private partnerships, information sharing
โ€ข General public providing tips, assistance via social
media
โ€ข Hactivists participating in limited major events
Recent Examples
โ€ข Wikileaks โ€“ hacker group stole
information, published secrets
โ€ข Stuxnet โ€“ military cyber
offensive used for kinetic attack
โ€ข Boston โ€“ public use of social
media assisted in apprehension
Gray Areas
โ€ข Pre-emptive cyber attacks (Iran)
โ€ข Hybrid attacks (Israel)
โ€ข Cyber espionage (China)
โ€ข Propaganda proliferation (North Korea)
โ€ข Surveillance (UK)
โ€ข Censorship (Everywhere)
The New Normal
Global Paradigm
โ€ข Blending of virtual and physical security
โ€ข Assumption of ubiquitous connectedness and
limitless data
โ€ข Creation of resilient, protective defensive networks
โ€ข Adoption of dispersed threat response framework
โ€ข Recognition and preparation of scalable policies
Government Shiftsโ€ฆ
โ€ข Away from coercion, toward credible influence
โ€ข Away from exclusion, toward participation
โ€ข Away from borders, toward networks
โ€ข Away from secrecy, toward transparency
โ€ข Away from reaction, toward resilience
โ€ข Away from containment, toward sustainment
Role of Civil Society
โ€ข Education โ€“ to government, stakeholders, public
โ€ข Participation โ€“ engaged with government
initiatives
โ€ข Innovation โ€“ providing new tools, technologies,
processes
โ€ข Partnerships โ€“ building bridges between
government and industry, academia, general
public
โ€ข Vigilance โ€“ never letting up on the role of
transparency
Major Hurdles
โ€ข Accelerated growth of technology
โ€ข Limited human resources in government
โ€ข Existing bureaucracy, red tape
โ€ข Existing power structures around security
โ€ข Data ownership disputes
โ€ข Silos of open government communities
โ€ข Language barrier between government, public
At the End of the Tunnel
Seeds of Success
๏‚— Weโ€™re learning (ref. recent major hacks, Boston
response)
๏‚— Access to government data and information
becoming easier and cheaper
๏‚— Civil society is becoming closer to government
through social media, crowd sourcing
๏‚— More online services than ever before
๏‚— Rapid response is becoming a reality
Next Steps
โ€ข Increase technology education of government
leaders, work force
โ€ข Build better crowd sourcing and communication
tools for all โ€“ from White House to town councils
โ€ข Adopt smarter policies, including mobile and
social
โ€ข Open data gradually and purposefully
โ€ข Invite officials to participate in the dialogue online
Questions?
Contact:
Sarah Granger
Center for Technology, Media & Society
http://www.cftms.org
Twitter: @sarahgranger @cftms
sarah@sarahgranger.com

More Related Content

What's hot

Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
ย 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBoston Global Forum
ย 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
ย 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theoriesTajanik Oliver
ย 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
ย 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentationreporter1120
ย 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
ย 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
ย 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
ย 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
ย 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social MachineUlrik Lyngs
ย 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationmikeecholscyber
ย 
Social Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesSocial Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesMathias Klang
ย 
Internet governance
Internet governanceInternet governance
Internet governanceGhazala Ajami
ย 
Virtual government engagement technologies
Virtual government engagement technologiesVirtual government engagement technologies
Virtual government engagement technologiesChuck Brooks
ย 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
ย 

What's hot (20)

Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
ย 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
ย 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
ย 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
ย 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
ย 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
ย 
Wsis unesco-2015
Wsis unesco-2015Wsis unesco-2015
Wsis unesco-2015
ย 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
ย 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
ย 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
ย 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
ย 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
ย 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social Machine
ย 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
ย 
Social Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesSocial Governance: Social Media & Public Authorities
Social Governance: Social Media & Public Authorities
ย 
Internet governance
Internet governanceInternet governance
Internet governance
ย 
Virtual government engagement technologies
Virtual government engagement technologiesVirtual government engagement technologies
Virtual government engagement technologies
ย 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
ย 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security
ย 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
ย 

Viewers also liked

Problemรกtica urbana y sostenibilidad 23 06-16
Problemรกtica urbana y sostenibilidad 23 06-16Problemรกtica urbana y sostenibilidad 23 06-16
Problemรกtica urbana y sostenibilidad 23 06-16Solange Garcia Solo
ย 
CSHO Accident Investigation
CSHO Accident InvestigationCSHO Accident Investigation
CSHO Accident InvestigationBryan Richardson
ย 
Siviilit kriisejรค hallitsemassa
Siviilit kriisejรค hallitsemassaSiviilit kriisejรค hallitsemassa
Siviilit kriisejรค hallitsemassaRiina Kopola
ย 
Bbc risk-assessment
Bbc risk-assessmentBbc risk-assessment
Bbc risk-assessmentlaurenp97
ย 
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"Iryna Heiets
ย 
Latest design proposals as at 10.2.14
Latest design proposals as at 10.2.14Latest design proposals as at 10.2.14
Latest design proposals as at 10.2.14Colin Revans
ย 
Radio drama script
Radio drama scriptRadio drama script
Radio drama scriptlaurenp97
ย 
Digital Leadership
Digital LeadershipDigital Leadership
Digital LeadershipSarah Granger
ย 
Dmni dmg 2016 1 s07 - prototipado y testeo
Dmni dmg 2016 1 s07 - prototipado y testeoDmni dmg 2016 1 s07 - prototipado y testeo
Dmni dmg 2016 1 s07 - prototipado y testeoCursoDMNI
ย 
Powering Successful Marketing Campaigns with Accurate, Safe Data
Powering Successful Marketing Campaigns with Accurate, Safe DataPowering Successful Marketing Campaigns with Accurate, Safe Data
Powering Successful Marketing Campaigns with Accurate, Safe DataJessica Kao
ย 
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„ ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„  ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„  ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„ ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„ฮงฯฮฎฯƒฯ„ฮฟฯ‚ ฮงฮฑฯฮผฯ€ฮฎฯ‚
ย 

Viewers also liked (12)

La pizza
La pizzaLa pizza
La pizza
ย 
Problemรกtica urbana y sostenibilidad 23 06-16
Problemรกtica urbana y sostenibilidad 23 06-16Problemรกtica urbana y sostenibilidad 23 06-16
Problemรกtica urbana y sostenibilidad 23 06-16
ย 
CSHO Accident Investigation
CSHO Accident InvestigationCSHO Accident Investigation
CSHO Accident Investigation
ย 
Siviilit kriisejรค hallitsemassa
Siviilit kriisejรค hallitsemassaSiviilit kriisejรค hallitsemassa
Siviilit kriisejรค hallitsemassa
ย 
Bbc risk-assessment
Bbc risk-assessmentBbc risk-assessment
Bbc risk-assessment
ย 
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"
ะ”ะŸ "ะœั–ะถะฝะฐั€ะพะดะฝะธะน ะฐะตั€ะพะฟะพั€ั‚ "ะ‘ะพั€ะธัะฟั–ะปัŒ"
ย 
Latest design proposals as at 10.2.14
Latest design proposals as at 10.2.14Latest design proposals as at 10.2.14
Latest design proposals as at 10.2.14
ย 
Radio drama script
Radio drama scriptRadio drama script
Radio drama script
ย 
Digital Leadership
Digital LeadershipDigital Leadership
Digital Leadership
ย 
Dmni dmg 2016 1 s07 - prototipado y testeo
Dmni dmg 2016 1 s07 - prototipado y testeoDmni dmg 2016 1 s07 - prototipado y testeo
Dmni dmg 2016 1 s07 - prototipado y testeo
ย 
Powering Successful Marketing Campaigns with Accurate, Safe Data
Powering Successful Marketing Campaigns with Accurate, Safe DataPowering Successful Marketing Campaigns with Accurate, Safe Data
Powering Successful Marketing Campaigns with Accurate, Safe Data
ย 
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„ ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„  ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„  ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„
ฮœฮตฮปฮญฯ„ฮท ฮ”ฮ„ ฮ•ฯ€ฮฑฮฝฮฌฮปฮทฯˆฮท 1ฮทฯ‚ ฮตฮฝฯŒฯ„ฮทฯ„ฮฑฯ‚: ฮ„ฮ„ ฮ•ฮปฮปฮฌฮดฮฑ - ฮท ฯ‡ฯŽฯฮฑ ฮผฮฑฯ‚ ฮ„ฮ„
ย 

Similar to Cybersecurity: Increased Transparency and the Role of Civil Society

Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMoving Media
ย 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
ย 
Nato2015
Nato2015Nato2015
Nato2015POLIS LSE
ย 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...Ansgar Koene
ย 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
ย 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsPatrick McCormick
ย 
co-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementco-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementPatrick McCormick
ย 
[2011] Citizen techology & Open Government - Jared Ford
[2011] Citizen techology & Open Government - Jared Ford [2011] Citizen techology & Open Government - Jared Ford
[2011] Citizen techology & Open Government - Jared Ford e-Democracy Conference
ย 
Citizen Technology & Open Government
Citizen Technology & Open GovernmentCitizen Technology & Open Government
Citizen Technology & Open Governmentjdeepford
ย 
Social Media Intelligence
Social Media IntelligenceSocial Media Intelligence
Social Media IntelligenceTwittercrisis
ย 
Laouris Yiannis. Future Worlds Center
Laouris Yiannis. Future Worlds CenterLaouris Yiannis. Future Worlds Center
Laouris Yiannis. Future Worlds CenterGlobal Education Futures
ย 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaPatrick McCormick
ย 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
ย 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURDr. Sushma H.B
ย 
Digital divide
Digital divideDigital divide
Digital dividekikoma brian
ย 
Public policy and the information revolution 4.20.12
Public policy and the information revolution 4.20.12Public policy and the information revolution 4.20.12
Public policy and the information revolution 4.20.12Greg Wass
ย 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligenceFrank Smilda
ย 
Strategic Communications lecture
Strategic Communications lecture Strategic Communications lecture
Strategic Communications lecture POLIS LSE
ย 
Truth, Trust and Technology
Truth, Trust and TechnologyTruth, Trust and Technology
Truth, Trust and TechnologyPOLIS LSE
ย 

Similar to Cybersecurity: Increased Transparency and the Role of Civil Society (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
ย 
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
ย 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
ย 
Nato2015
Nato2015Nato2015
Nato2015
ย 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
ย 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
ย 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commons
ย 
co-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementco-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagement
ย 
[2011] Citizen techology & Open Government - Jared Ford
[2011] Citizen techology & Open Government - Jared Ford [2011] Citizen techology & Open Government - Jared Ford
[2011] Citizen techology & Open Government - Jared Ford
ย 
Citizen Technology & Open Government
Citizen Technology & Open GovernmentCitizen Technology & Open Government
Citizen Technology & Open Government
ย 
Social Media Intelligence
Social Media IntelligenceSocial Media Intelligence
Social Media Intelligence
ย 
Laouris Yiannis. Future Worlds Center
Laouris Yiannis. Future Worlds CenterLaouris Yiannis. Future Worlds Center
Laouris Yiannis. Future Worlds Center
ย 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social media
ย 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
ย 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
ย 
Digital divide
Digital divideDigital divide
Digital divide
ย 
Public policy and the information revolution 4.20.12
Public policy and the information revolution 4.20.12Public policy and the information revolution 4.20.12
Public policy and the information revolution 4.20.12
ย 
Social media intelligence
Social media intelligenceSocial media intelligence
Social media intelligence
ย 
Strategic Communications lecture
Strategic Communications lecture Strategic Communications lecture
Strategic Communications lecture
ย 
Truth, Trust and Technology
Truth, Trust and TechnologyTruth, Trust and Technology
Truth, Trust and Technology
ย 

More from Sarah Granger

16 Keys to Successful Startups
16 Keys to Successful Startups16 Keys to Successful Startups
16 Keys to Successful StartupsSarah Granger
ย 
Solving the Entrepreneurship Puzzle
Solving the Entrepreneurship PuzzleSolving the Entrepreneurship Puzzle
Solving the Entrepreneurship PuzzleSarah Granger
ย 
Building a Digital Manifesto
Building a Digital ManifestoBuilding a Digital Manifesto
Building a Digital ManifestoSarah Granger
ย 
Maximizing Digital Engagement for Startups
Maximizing Digital Engagement for StartupsMaximizing Digital Engagement for Startups
Maximizing Digital Engagement for StartupsSarah Granger
ย 
Digital Media in Our Lives
Digital Media in Our LivesDigital Media in Our Lives
Digital Media in Our LivesSarah Granger
ย 
Girl Scouts Online Safety Training
Girl Scouts Online Safety TrainingGirl Scouts Online Safety Training
Girl Scouts Online Safety TrainingSarah Granger
ย 
Social media secret sauce
Social media secret sauceSocial media secret sauce
Social media secret sauceSarah Granger
ย 
Online Engagement Strategies for Candidates, Electeds & Activists
Online Engagement Strategies for Candidates, Electeds & ActivistsOnline Engagement Strategies for Candidates, Electeds & Activists
Online Engagement Strategies for Candidates, Electeds & ActivistsSarah Granger
ย 
First steps toward successful blogging
First steps toward successful bloggingFirst steps toward successful blogging
First steps toward successful bloggingSarah Granger
ย 
Startup.gov: Reworking Government Through Technical Innovation
Startup.gov: Reworking Government Through Technical InnovationStartup.gov: Reworking Government Through Technical Innovation
Startup.gov: Reworking Government Through Technical InnovationSarah Granger
ย 
Open Government: Are We There Yet?
Open Government: Are We There Yet?Open Government: Are We There Yet?
Open Government: Are We There Yet?Sarah Granger
ย 
Social Media for Junior League Communications
Social Media for Junior League CommunicationsSocial Media for Junior League Communications
Social Media for Junior League CommunicationsSarah Granger
ย 
Netroots CA: Using New Media for Campaigns & Advocacy
Netroots CA: Using New Media for Campaigns & AdvocacyNetroots CA: Using New Media for Campaigns & Advocacy
Netroots CA: Using New Media for Campaigns & AdvocacySarah Granger
ย 
Using New Media in Political Campaigns
Using New Media in Political CampaignsUsing New Media in Political Campaigns
Using New Media in Political CampaignsSarah Granger
ย 

More from Sarah Granger (14)

16 Keys to Successful Startups
16 Keys to Successful Startups16 Keys to Successful Startups
16 Keys to Successful Startups
ย 
Solving the Entrepreneurship Puzzle
Solving the Entrepreneurship PuzzleSolving the Entrepreneurship Puzzle
Solving the Entrepreneurship Puzzle
ย 
Building a Digital Manifesto
Building a Digital ManifestoBuilding a Digital Manifesto
Building a Digital Manifesto
ย 
Maximizing Digital Engagement for Startups
Maximizing Digital Engagement for StartupsMaximizing Digital Engagement for Startups
Maximizing Digital Engagement for Startups
ย 
Digital Media in Our Lives
Digital Media in Our LivesDigital Media in Our Lives
Digital Media in Our Lives
ย 
Girl Scouts Online Safety Training
Girl Scouts Online Safety TrainingGirl Scouts Online Safety Training
Girl Scouts Online Safety Training
ย 
Social media secret sauce
Social media secret sauceSocial media secret sauce
Social media secret sauce
ย 
Online Engagement Strategies for Candidates, Electeds & Activists
Online Engagement Strategies for Candidates, Electeds & ActivistsOnline Engagement Strategies for Candidates, Electeds & Activists
Online Engagement Strategies for Candidates, Electeds & Activists
ย 
First steps toward successful blogging
First steps toward successful bloggingFirst steps toward successful blogging
First steps toward successful blogging
ย 
Startup.gov: Reworking Government Through Technical Innovation
Startup.gov: Reworking Government Through Technical InnovationStartup.gov: Reworking Government Through Technical Innovation
Startup.gov: Reworking Government Through Technical Innovation
ย 
Open Government: Are We There Yet?
Open Government: Are We There Yet?Open Government: Are We There Yet?
Open Government: Are We There Yet?
ย 
Social Media for Junior League Communications
Social Media for Junior League CommunicationsSocial Media for Junior League Communications
Social Media for Junior League Communications
ย 
Netroots CA: Using New Media for Campaigns & Advocacy
Netroots CA: Using New Media for Campaigns & AdvocacyNetroots CA: Using New Media for Campaigns & Advocacy
Netroots CA: Using New Media for Campaigns & Advocacy
ย 
Using New Media in Political Campaigns
Using New Media in Political CampaignsUsing New Media in Political Campaigns
Using New Media in Political Campaigns
ย 

Recently uploaded

VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...SUHANI PANDEY
ย 
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'IsraรซlAntisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'IsraรซlEdouardHusson
ย 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
ย 
Night 7k to 12k Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...
Night 7k to 12k  Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...Night 7k to 12k  Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...
Night 7k to 12k Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...aartirawatdelhi
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
ย 
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
ย 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLSarandianics
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
ย 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...robinsonayot
ย 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterChristina Parmionova
ย 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.Christina Parmionova
ย 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSgovindsharma81649
ย 
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...Dipal Arora
ย 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
A PPT on digital India initiative by Government of India
A PPT on digital India initiative by Government of IndiaA PPT on digital India initiative by Government of India
A PPT on digital India initiative by Government of IndiaMiteshKumar471773
ย 
Call Girls In datia Escorts โ˜Ž๏ธ7427069034 ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts โ˜Ž๏ธ7427069034  ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts โ˜Ž๏ธ7427069034  ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts โ˜Ž๏ธ7427069034 ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...nehasharma67844
ย 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...SUHANI PANDEY
ย 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
ย 

Recently uploaded (20)

VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
ย 
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'IsraรซlAntisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
ย 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
ย 
Night 7k to 12k Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...
Night 7k to 12k  Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...Night 7k to 12k  Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...
Night 7k to 12k Call Girls Service In Navi Mumbai ๐Ÿ‘‰ BOOK NOW 9833363713 ๐Ÿ‘ˆ โ™€๏ธ...
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
ย 
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
ย 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
ย 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
ย 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
ย 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
ย 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
ย 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
ย 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
ย 
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
ย 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
ย 
A PPT on digital India initiative by Government of India
A PPT on digital India initiative by Government of IndiaA PPT on digital India initiative by Government of India
A PPT on digital India initiative by Government of India
ย 
Call Girls In datia Escorts โ˜Ž๏ธ7427069034 ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts โ˜Ž๏ธ7427069034  ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts โ˜Ž๏ธ7427069034  ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts โ˜Ž๏ธ7427069034 ๐Ÿ” ๐Ÿ’ƒ Enjoy 24/7 Escort Service Enjoy...
ย 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
ย 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
ย 

Cybersecurity: Increased Transparency and the Role of Civil Society

  • 1. Cybersecurity: Increased Transparency and the Role of Civil Society Presented by Sarah Granger from the Center for Technology, Media & Society to the Monterey Institute of International Studies May 7, 2013
  • 4. Threat Origins โ€ข State based military cyber offense experts โ€ข Mercenary hacker networks, hired by governments or non-state organizations including terrorist groups โ€ข Rogue hackers โ€ข Hactivists
  • 5. Whoโ€™s on Alert? โ€ข Military / DoD โ€ข Critical infrastructure organizations โ€ข Government agencies โ€ข Financial Industry โ€ข Companies with valuable technologies โ€ข Media
  • 6. Expanding Concerns โ€ข No longer in the Containment Era โ€“ new threats everywhere โ€ข Technology and hacking tools becoming easier and cheaper to obtain โ€ข Critical systems decentralized and often privately held, security levels unknown โ€ข Most incidents happen across multiple boundaries; tracking is difficult & law enforcement challenging
  • 8. Meanwhileโ€ฆ โ€ข Greater demand from the public for government transparency โ€ข Greater push within government for increased transparency โ€ข International pressure for responsible governance
  • 10. Transparent Cybersecurity โ€ข White House cybersecurity executive order for improving critical infrastructure โ€ข Transparent process involving multiple stakeholders, including civil society leaders โ€ข Public-private partnerships, information sharing โ€ข General public providing tips, assistance via social media โ€ข Hactivists participating in limited major events
  • 11. Recent Examples โ€ข Wikileaks โ€“ hacker group stole information, published secrets โ€ข Stuxnet โ€“ military cyber offensive used for kinetic attack โ€ข Boston โ€“ public use of social media assisted in apprehension
  • 12. Gray Areas โ€ข Pre-emptive cyber attacks (Iran) โ€ข Hybrid attacks (Israel) โ€ข Cyber espionage (China) โ€ข Propaganda proliferation (North Korea) โ€ข Surveillance (UK) โ€ข Censorship (Everywhere)
  • 14. Global Paradigm โ€ข Blending of virtual and physical security โ€ข Assumption of ubiquitous connectedness and limitless data โ€ข Creation of resilient, protective defensive networks โ€ข Adoption of dispersed threat response framework โ€ข Recognition and preparation of scalable policies
  • 15. Government Shiftsโ€ฆ โ€ข Away from coercion, toward credible influence โ€ข Away from exclusion, toward participation โ€ข Away from borders, toward networks โ€ข Away from secrecy, toward transparency โ€ข Away from reaction, toward resilience โ€ข Away from containment, toward sustainment
  • 16. Role of Civil Society โ€ข Education โ€“ to government, stakeholders, public โ€ข Participation โ€“ engaged with government initiatives โ€ข Innovation โ€“ providing new tools, technologies, processes โ€ข Partnerships โ€“ building bridges between government and industry, academia, general public โ€ข Vigilance โ€“ never letting up on the role of transparency
  • 17. Major Hurdles โ€ข Accelerated growth of technology โ€ข Limited human resources in government โ€ข Existing bureaucracy, red tape โ€ข Existing power structures around security โ€ข Data ownership disputes โ€ข Silos of open government communities โ€ข Language barrier between government, public
  • 18. At the End of the Tunnel
  • 19. Seeds of Success ๏‚— Weโ€™re learning (ref. recent major hacks, Boston response) ๏‚— Access to government data and information becoming easier and cheaper ๏‚— Civil society is becoming closer to government through social media, crowd sourcing ๏‚— More online services than ever before ๏‚— Rapid response is becoming a reality
  • 20. Next Steps โ€ข Increase technology education of government leaders, work force โ€ข Build better crowd sourcing and communication tools for all โ€“ from White House to town councils โ€ข Adopt smarter policies, including mobile and social โ€ข Open data gradually and purposefully โ€ข Invite officials to participate in the dialogue online
  • 21. Questions? Contact: Sarah Granger Center for Technology, Media & Society http://www.cftms.org Twitter: @sarahgranger @cftms sarah@sarahgranger.com

Editor's Notes

  1. Image source: PC World
  2. Image Source: Sheridan College
  3. Image Source: PressTV/Gizmodo โ€“ likely from Pentagon.
  4. Image Source: Screen shot from White House website
  5. Image Source: NSA Blog
  6. Source: Lorelei Kelly, New America Foundation
  7. Image Source: Out of the Blue Solutions