We see a lot of hype about security in today's networks. This presentation outlines where cybersecurity is going, the global paradigm, the role of government and civil society in building transparency as security evolves.
2024: The FAR, Federal Acquisition Regulations, Part 30
ย
Cybersecurity: Increased Transparency and the Role of Civil Society
1. Cybersecurity: Increased
Transparency and the Role of
Civil Society
Presented by Sarah Granger
from the Center for Technology, Media & Society
to the Monterey Institute of International Studies
May 7, 2013
4. Threat Origins
โข State based military cyber offense experts
โข Mercenary hacker networks, hired by
governments or non-state organizations
including terrorist groups
โข Rogue hackers
โข Hactivists
5. Whoโs on Alert?
โข Military / DoD
โข Critical infrastructure organizations
โข Government agencies
โข Financial Industry
โข Companies with valuable technologies
โข Media
6. Expanding Concerns
โข No longer in the Containment Era โ new
threats everywhere
โข Technology and hacking tools becoming
easier and cheaper to obtain
โข Critical systems decentralized and often
privately held, security levels unknown
โข Most incidents happen across multiple
boundaries; tracking is difficult & law
enforcement challenging
8. Meanwhileโฆ
โข Greater demand from the public for
government transparency
โข Greater push within government for
increased transparency
โข International pressure for responsible
governance
10. Transparent
Cybersecurity
โข White House cybersecurity executive order for
improving critical infrastructure
โข Transparent process involving multiple
stakeholders, including civil society leaders
โข Public-private partnerships, information sharing
โข General public providing tips, assistance via social
media
โข Hactivists participating in limited major events
11. Recent Examples
โข Wikileaks โ hacker group stole
information, published secrets
โข Stuxnet โ military cyber
offensive used for kinetic attack
โข Boston โ public use of social
media assisted in apprehension
14. Global Paradigm
โข Blending of virtual and physical security
โข Assumption of ubiquitous connectedness and
limitless data
โข Creation of resilient, protective defensive networks
โข Adoption of dispersed threat response framework
โข Recognition and preparation of scalable policies
15. Government Shiftsโฆ
โข Away from coercion, toward credible influence
โข Away from exclusion, toward participation
โข Away from borders, toward networks
โข Away from secrecy, toward transparency
โข Away from reaction, toward resilience
โข Away from containment, toward sustainment
16. Role of Civil Society
โข Education โ to government, stakeholders, public
โข Participation โ engaged with government
initiatives
โข Innovation โ providing new tools, technologies,
processes
โข Partnerships โ building bridges between
government and industry, academia, general
public
โข Vigilance โ never letting up on the role of
transparency
17. Major Hurdles
โข Accelerated growth of technology
โข Limited human resources in government
โข Existing bureaucracy, red tape
โข Existing power structures around security
โข Data ownership disputes
โข Silos of open government communities
โข Language barrier between government, public
19. Seeds of Success
๏ Weโre learning (ref. recent major hacks, Boston
response)
๏ Access to government data and information
becoming easier and cheaper
๏ Civil society is becoming closer to government
through social media, crowd sourcing
๏ More online services than ever before
๏ Rapid response is becoming a reality
20. Next Steps
โข Increase technology education of government
leaders, work force
โข Build better crowd sourcing and communication
tools for all โ from White House to town councils
โข Adopt smarter policies, including mobile and
social
โข Open data gradually and purposefully
โข Invite officials to participate in the dialogue online