SlideShare a Scribd company logo
The Strategic Importance of Building a Resilient Cyber
Defense: Experiences, Cooperation, Perspectives
© Associate professor Metodi Hadji-Janev, Brigadier General
© Adjunct Faculty Member, Ira A. Fulton School of Engineering, Arizona State University, U.S.A.
Member of the North Macedonia Marshall Center Alumni Association,
12th Meeting of the heads of the National Security
Authorities South East Europe
University “Goce Delcev”-Stip
Military Academy
“General Mihailo Apostolski-Skopje”
Ira A. Fulton School of Engineering, Arizona State University, ASU, U.S.A.
Ira A. Fulton Schools of Engineering
AGENDA
1. Cybersecurity trends & Western Balkans
2. Digital transformation and Western Balkan: Why
cybersecurity will continue to be a top security
concern?
3. Way forward for Western Balkan Leadership: building
resilience to cyber threats
4. Conclusion
© Associate professor D-r Metodi Hadji-Janev
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
AGENDA
1. Cybersecurity trends & Western Balkans
2. Digital transformation and Western Balkan: Why
cybersecurity will continue to be a top security
concern?
3. Way forward for Western Balkan Leadership: building
resilience to cyber threats
4. Conclusion
© Associate professor D-r Metodi Hadji-Janev
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
The ongoing digital transformation
interconnection and interdependence
converging the cyber and physical world
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber crime
Cyber attack
Cyber
espionage
© D-r Metodi Hadji-Janev
The overall approach
1. Cybersecurity trends & Western Balkans
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Financial
effects
Terrorism
War?
Cyber crime
Cyber attack
Cyber
espionage
© D-r Metodi Hadji-Janev
What you know about cybersecurity today may not be relevant tomorrow
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
1. Cybersecurity trends & Western Balkans
Cyber crime
Cyber attack
Cyber
espionage
Financial
effect
Terrorism
Financial
effect
Terrorism
War?
© Dr. Metodi Hadji-Janev
Session II
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
What you know about cybersecurity today may not be
relevant tomorrow
Cyber attacks
Cyber Crime Cyber Espionage
Cyber War
Terrorist use
of cyberspace
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved
- Viruses,
- Worms,
- Trojan
horses and
- Simple DOS
-Malware
- Phishing
- SQL Injection Attack
- Cross-Site Scripting
(XSS)
- Distributed Denial of
Service (DoS)
- Session Hijacking
and
- Man-in-the-Middle
Attacks
- Credential Reuse
1. Cybersecurity trends & Western Balkans
2000’s 2010’s
-Ransomware;
Malware;
-Cryptojacking;
-E-mail related
threats;
-Threats against data;
-Threats against
availability and
integrity;
-Disinformation –
misinformation;
-Non-malicious
threats;
-Supply-chain attacks
2020-2021
How does cyber security affect WB cyberspace ?
Emotional
Societal
Economic
Safety
Political/ security
© D-r Metodi Hadji-Janev
1. Cyber security trends & Western Balkans
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
During the Kosovo campaign,
for example, NATO has
arguably experienced the
first ever organized cyber
attacks
© D-r Metodi Hadji-Janev
Cybersecurity evolution
1. Cybersecurity trends & Western Balkans
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Although not a regional trend
per se,
Leavitt Lydia, (January 25, 2011), “Cybercrime writer mysteriously
disappears in Bulgaria”, http://www.tgdaily.com/security-
features/53558-cybercrime-writer-mysteriously-disappears-in-bulgaria
Danco Dancev
Although not a regional trend
per se, mysterious disappearing
of a cyber crime writer in
Bulgaria in 2010 and 2011
speaks that actions in SEE
cyberspace has significant
influence to the security
© D-r Metodi Hadji-Janev
1. Cybersecurity trends & Western Balkans
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Young hacker from Macedonia
back in 2012 was detained due
to the cyber crime allegations
(i.e. attempting to penetrate
illegally several security
websites in the US).
________, (November 20, 2012), “FBI Arrested Young Hacker from
Struga” Press 24, from: http://star.press24.mk/story/poznato/foto-fbi-
uapsi-mlad-haker-od-struga-sin-na-poznata-struzhanka
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
1. Cybersecurity trends & Western Balkans
Reports about working in a network with hackers from
different countries also indicate the threat in the SEE
Cyberspace
________, (December 13, 2012), “10 arrested in cyber-crime probe”,
Express UK, retrieved 24.03.2014 from:
http://www.express.co.uk/news/world/364435/10-arrested-in-cyber-
crime-probe © D-r Metodi Hadji-Janev
“Individuals from Britain, the
US, Bosnia and Herzegovina,
Croatia, Macedonia, New
Zealand and Peru were arrested
in an operation carried out with
the assistance of Facebook and
international law enforcement
agencies”
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
DD4BC cybercrime
group DDOs for Bitcoin
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
How Bosnia and Herzegovina: Crackdown on 'Cyber
Blackmail' Group
buka.com,” “istinito.com,” “e-
novine,” “federalna.ba,”
“fena.co.ba,” “kurir.rs” and
“blic.net.”
IGOR SPAIC (January 26, 2016), Bosnia and Herzegovina: Crackdown on 'Cyber Blackmail' Group
OCCPR
developing a software meant to exploit weaknesses of digital
Bitcoin wallets to steal Bitcoins
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Montenegro hit by series of large-scale, sophisticated
and coordinated hacker attacks
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
Over 200 attacks on websites, state
institutions, online fraud and misuse
of personal accounts were reported in
2016, compared with just six in 2012
Dusica Tomovic (February 22, 2017), Montenegro on Alert Over New Cyber Attacks, BIRN
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
North Macedonia hit by Powerful Greek Army
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
leaked dozens of email addresses and passwords from staffers in
North Macedonia’s ministries of finance and economy
Bojan Stojkovski (June 3, 2020), Password hack claim puts cyber security on the public
agenda in North Macedonia, GlobalVoices
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
North Macedonia hit by Anonopsmkd
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
DDoS Attack – vigilante
stile or attention
The denial-of-service attack on TIME.mk, which involved more than
35 million addresses that generated thousands of clicks per seconds,
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
The publication of the salary database for more
than 690 000 Albanians in 2022 is one of the
country’s biggest scandals
runway with
Russian shadows
Defending democratic governance and human
rights in the digital era
Challenges to preserve democratic values
© D-r Metodi Hadji-Janev
dual-use digital technologies
a new dimension of “security vs. liberty challenge”
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from opportunity to disruption
1. Cybersecurity trends & Western Balkans
by mega-corporates whose
“surveillance capitalism” is catalytic
to the accumulation of historically
unprecedented individual power
Challenge to preserve democratic values
© D-r Metodi Hadji-Janev
Shoshana Zuboff, (2014), “Digital Declaration: Big Data as Surveillance Capitalism
there is an accelerated accumulation of power
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
China and Russia, but also other authoritarian regimes
The rise of authoritarian states in digital era
© D-r Metodi Hadji-Janev
recognize that technological edge translates into
diplomatic, economic, military and normative power
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
Understood the importance of competitive advantage
in digital age
© D-r Metodi Hadji-Janev
China - specific program that envisions
world leadership in key strategic
technologies, having already achieved
primacy in 5G connectivity, leading
Artificial Intelligence and facial recognition
State control of the regulations vs self-regulation
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
Understood the importance of competitive advantage in digital age
The rise of authoritarian states in digital era
© D-r Metodi Hadji-Janev
State control of the regulations vs self regulation
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – from crime to political impact
1. Cybersecurity trends & Western Balkans
The danger - these practices can empower authoritarian
regimes to develop their own version of panopticon
regime they can present as equivalent to democracy
We will refer to this later in 2.
Challenge to preserve democratic values
© D-r Metodi Hadji-Janev
Jeremy Bentham
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
1. Cybersecurity trends & Western Balkans
Change in the context – from opportunity to disruption
© D-r Metodi Hadji-Janev
North Macedonia – Veles the capital of Fake News
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – import to export
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Global trends in cyber security/defense exploit WB
vulnerabilities
Clickbait journalism
Anti-vax anti 5 G technologies
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – import to export
1. Cybersecurity trends & Western Balkans
© D-r Metodi Hadji-Janev
Russian meddling inside North Macedonia and
Montenegro
1. Cybersecurity trends & Western Balkans
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks evolved – the whole new level
Change in the context – Avenue of approach
“They have transferred money and they’re also conducting broader
influence campaigns” Mattis for the Washington Post, September 2018
AGENDA
1. Cybersecurity trends & Western Balkans
2. Digital transformation and Western Balkan: Why
cybersecurity will continue to be a top security
concern?
3. Way forward for Western Balkan Leadership
4. Conclusion
© Associate professor D-r Metodi Hadji-Janev, BG
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber attacks could generally be systematized in two
groups Syntactic attacks and Semantic attacks.
Syntactic attacks are straight forward
it is considered malicious software which includes
- viruses,
- worms, and
- Trojan horses
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Cyber attacks could generally be systematized in two
groups Syntactic attacks and Semantic attacks
Semantic
attack is the
modification
and
dissemination
of correct and
incorrect
information.
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber security
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Do all end here?
How about
Hardware theft/and abuse
Service theft
© Dr. Metodi Hadji-Janev
How about
Hardware theft/and abuse
- physical devices such as computer or parts of
computers and multimedia portable devices (cell and
personal assistance devices)
Service theft
– wi-fi spoofing mooching, piggy backing or even war
driving ????
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Do all end here?
© Dr. Metodi Hadji-Janev
The Story of 'Operation Orchard': How Israel Destroyed
Syria's Al Kibar Nuclear Reactor
Erich Follath and Holger StarkThe Story of 'Operation Orchard': How Israel Destroyed Syria's Al Kibar Nuclear
Reactor, Der Spiegel, 2009, retreived 20.04.2014 from:
http://www.spiegel.de/international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-al-kibar-
nuclear-reactor-a-658663.html
Imad Mughniyah
Hezbollah leader, was
assassinated by the Israelis
in February 2008. The
Mossad had obtained
information that
Mughniyah was planning to
avenge the air strike on Al
Kibar with an attack on an
Israeli embassy
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
The challenge!
Consider Stuxnet or Flame!
Cyber weapon limits?
Depends?
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
©
D-r
Metodi
Hadji-Janev
Cyber vs. Physical world
Horizontal vs Vertical
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Convergence of cyber and physical worlds challenge
Horizontal
Today, cyberspace is governed in an
environment where decisions are
taken by multiple actors, including
governments, businesses, civil
society, and individuals or briefly
“stakeholders.”
Bottom-up Vertical Top-down
Social Contract Theory -
the political order is simply the means
towards an end—the benefit of the
individuals involved—and legitimate
only to the extent that they fulfill
their part of the agreement
Trade freedom for service and commodity Trade freedom for security
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© D-r Metodi Hadji-Janev
Anarchy
Tyranny
General
Natural
Universal
Limited in two ways (the
right of the others and public
safety)
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Convergence challenge – The human Rights perspectives
Governing Human rights context
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Executive
Judiciary
Legislative
© D-r Metodi Hadji-Janev
Anarchy
Tyranny
Human Rights influence
Government
is organized
Government is
limited
Local vs. Central
Constitutional Law
Criminal Law
Personal data protection
International Law
Convergence challenge
Governing Human rights context
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Ius ad bellum Ius in bello
Ius contra bellum Ius post bellum
LAW
POLICY
Preventive
diplomacy
Conflict
management
Conflict
Resolution
Transition
from conflict
to peace
OPERATIONS
Shape
Maneuver/surve
illance/exercises
SASO/IW/
PSO/COIN/(
MCO)
Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut.
Maneuver/surv
eillance/movem
ent to contact
MCO/offence
/defense/IW
/COIN
© Dr. Metodi Hadji-Janev
Law, Policy and Military operations
2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security
concern?
-The convergence challenge to the strategic design -
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Cyber space-based threat vectors-cyber security
Ius ad bellum Ius in bello
Ius contra bellum Ius post bellum
LEGAL
POLITICAL
Preventive
diplomacy
Conflict
management
Conflict
Resolution
Transition
from conflict
to peace
OPERATIONAL
Shape
Maneuver/surve
illance/exercises
SASO/IW/
PSO/COIN/(
MCO)
Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut.
Maneuver/surv
eillance/movem
ent to contact
MCO/offence
/defense/IW
/COIN
Cyber space-based threat vectors-cyber security
© D-r Metodi Hadji-Janev
2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security
concern?
-The convergence challenge to the strategic design -
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Ius ad bellum Ius in bello Ius post bellum
LEGAL
POLITICAL
Preventive
diplomacy
Conflict
management
Conflict
Resolution
Transition
from conflict
to peace
OPERATIONAL
Shape
Maneuver/surve
illance/exercises
SASO/IW/
PSO/COIN/(
MCO)
Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut.
Maneuver/surv
eillance/movem
ent to contact
MCO/offence
/defense/IW
/COIN
Cyber space-based threat vectors-cyber security
© D-r Metodi Hadji-Janev
2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security
concern?
-The convergence challenge to the strategic design -
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
© Dr. Metodi Hadji-Janev
State and non state actors are exploiting this challenge
for political purposes - threats are evolving
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
Asymmetric Hybrid Hyper threats
Cyber
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
Coordinated cyber attacks on economic sector – can
derogate states ability to defense itself
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
Asymmetry
Alleged
Theft of data on the F-35
Joint Strike Fighter, the
F-22 Raptor fighter jet,
and the MV-22 Osprey
This espionage reduces cost and accelerates the development of
foreign weapon systems,
enables foreign reverse-engineering and countermeasures
development, and thus reduces the advantage at low costs
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
Cyber and Critical information infrastructure
The Dick Cheney’s case
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
Hybrid threats
… Employing political warfare and blends
conventional warfare, irregular warfare and
cyberwarfare with other influencing methods, such
as fake news, diplomacy, lawfare and foreign
electoral intervention…
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
Hybrid threats – corrupting liberal democracy
The influence operations – “Fake news” and “clickbait”
From individual personal and emotional threats to national
security threats
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Cyber harassment Mis, Dis, Mal information Online violent radicalization
Three main reasons that provide for authoritarian
regimes to emerge
EU & US
disengagement
from the region Captive state
phenomenon
across the
region of WB
Media &
information
illiteracy &/or
disengagement
from the
people
© Dr. Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Research on Authoritarian influence
sponsored by IRI
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Hybrid threats – corrupting liberal democracy
weaponizing social media
The influence operations – “Fake news” and “clickbait”
… Both state and non-
state actors have
figured out how to
manipulate the profit
model of social media
where the user is
treated as a product on
the advertising market
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
“filter bubble”
of the like-minded
Research on Authoritarian influence
sponsored by IRI
© D-r Metodi Hadji-Janev
Global trends in cyber security/defense exploit WB
vulnerabilities example media and information literacy
Research conducted by Cyber security corporate security
and crisis management initiative
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
- use all instruments of power
DIME
- use modern technology as
vectors to achieve strategic ends
corrupt democratic projects and
values
-exploit democratic weaknesses,
are flexible and adaptive
functioning in a decentralized
manner
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Research on Authoritarian influence
sponsored by IRI
© D-r Metodi Hadji-Janev
Research conducted by Cyber security corporate security
and crisis management initiative
https://c3initiative.com/
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
- “synergy between PRC and Russia in the information
influence across the WB”
From isolated proxies and COVID-19disinformation to synergy of
prizing and influence
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
© D-r Metodi Hadji-Janev
Research conducted by Cyber security corporate security
and crisis management initiative
https://c3initiative.com/
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
- “synergy between PRC and Russia in
the information influence across the WB”
Convergence – digital silk road?
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
- Organized crime and geostrategic context
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
Research conducted by Cyber security corporate security and crisis management initiative
https://c3initiative.com/
-A failure of imagination?
© Dr. Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The Convergence challenge - two folded
The future is coming
Hyper threats – are coming
2. Digital transformation and Western Balkan: Why cybersecurity will
continue to be a top security concern?
The ability to increase velocity and the volume of
processing data and causing radical shifts in the
decision making require greater attention on fixing the
governance in the digital age
AGENDA
1. Cyber security trends & Western Balkans
2. Digital transformation and Western Balkan: Why cyber
security will continue to be top security concern?
3. Way forward for Western Balkan Leadership
4. Conclusion
© Associate professor D-r Metodi Hadji-Janev, BG
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The focus of enhancing structural changes in the WB
societies has largely been driven by the EU and to certain
degree NATO initiatives
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
New technologies and capabilities are already beginning
to turn speculative fiction into reality
New ways of thinking, organising and
acting
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
NATO's main focus in cyber
defence is to protect its own
networks, operate in cyberspace
(including through the Alliance's
operations and missions), help
Allies to enhance their national
resilience and provide a platform
for political consultation and
collective response
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Multilayered resilience - are we up to the challenge?
- Unintended Administrative obstacles –out of the
context case
- Public procurement case example
- Digital forensic dilemma-rule of law what?
- Lack of awareness case
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Do you think that cyber defense resilience depends on
community resilience (municipality level)?
Strategies on cyber security/defence do not address
community resilience
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
What do you think about smart cities?
Local vs Central governance
A mayor in the city from the WB has run a tender
willing to develop a smart city and the lowest bid
comes from a Chinese vendor-do you see a problem
here?
*Reminder: everything was in accordance with the EU-based rules
for public tenders – a public-private partnership
3. Way forward for Western Balkan Leadership
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Responsibility to the Western aid
How do you spend resources?
Tons of resources to fight disinformation vs eroding
support to Euro-Atlantic values and integration
Recommendations for building resilience
© Dr. Metodi Hadji-Janev
Building cyber-resilient societies – a
hole of society approach
Mobilize local resources
Absorptive
Adoptive
Transformative
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Though given in a different context the former US
Secretary of Defense statement, that
the “success does not go to the country that develops a
new technology first, but rather, to the one that better
integrates it and more swiftly adapts its way of fighting”
© Dr. Metodi Hadji-Janev
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
WB governance must adapt, and escape constrain of
just being reactive to the speed of technological
innovation and exploit the benefits of cyber space and
digital technologies
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Therefore, the WB leadership has an obligation to lead
the way forward amid transitions, disruptions, chaos
and ambiguity
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
The WB leadership should be the driving force in
broadening engagement and mitigating challenges
Based on such a platform WB leadership should craft
tailored regulations that will anchor WB administration
in improving capacities but also, to enhance
transparency, oversight, and accountability.
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
EU should include WB in its rule-setting processes and
should closely coordinate future steps
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
Last but not least, WB leadership must rethink safety
and security
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
cyber hygiene vs national security
Recommendations for future strategists
Finding the right balance
Law enfor. Defense Cris.Man.&CIP Intel & Con Cyb.gov/diplom
economic development vs. improved national security
modernization of infrastructure vs. critical infrastructure protection
private sector vs. public sector
data protection vs. information sharing
individual freedoms vs. public safety
© D-r Metodi Hadji-Janev
3. Way forward for Western Balkan Leadership
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
AGENDA
1. Cybersecurity trends & Western Balkans
2. Digital transformation and Western Balkan: Why cyber
security will continue to be top security concern?
3. Way forward for Western Balkan Leadership
4. Conclusion
© Associate professor D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
4. Conclusion
© D-r Metodi Hadji-Janev
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
-The convergence of cyber and physical world is real
and ongoing influencing the cybersecurity threat
landscape
-Wester Balkan states are not immune to global
challenges coming from cyber space
-Wester Balkan leaders must seriously consider cyber
security among the top priorities and invest in human
capital while building multilayered resilience–anchored
to the whole of society approach
Session II:
The Strategic Importance of Building a Resilient Cyber Defense: Way
forward for the WB leadership
Cyber security
Q & A
© Associate professor Metodi Hadji-Janev
© Adjunct Faculty Member, Ira A. Fulton School of Engineering, Arizona State University, U.S.A.
University “Goce Delcev”-Stip
Military Academy
“General Mihailo Apostolski-Skopje”
Ira A. Fulton School of Engineering, Arizona State University, ASU, U.S.A.
Ira A. Fulton Schools of Engineering

More Related Content

Similar to The Strategic Importance of Building a Resilient Cyber Defense.pdf

Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
Jarno Limnéll
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
TirthShah760404
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
TopCyberNewsMAGAZINE
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
Kevin Fream
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
CapitolTechU
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
ijtsrd
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
Julie Davis
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
IJNSA Journal
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
YiR2022-External-Final.pdf
YiR2022-External-Final.pdfYiR2022-External-Final.pdf
YiR2022-External-Final.pdf
FernandoJaimeEscobar
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
 
Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016
Jarno Limnéll
 
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Snarky Security
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysis
G3 intelligence Ltd
 

Similar to The Strategic Importance of Building a Resilient Cyber Defense.pdf (20)

Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
THE EVOLVING THREAT LANDSCAPE: AN OVERVIEW OF ATTACKS AND RESPONSE STRATEGIES...
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
YiR2022-External-Final.pdf
YiR2022-External-Final.pdfYiR2022-External-Final.pdf
YiR2022-External-Final.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016
 
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysis
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 

Recently uploaded (13)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 

The Strategic Importance of Building a Resilient Cyber Defense.pdf

  • 1. The Strategic Importance of Building a Resilient Cyber Defense: Experiences, Cooperation, Perspectives © Associate professor Metodi Hadji-Janev, Brigadier General © Adjunct Faculty Member, Ira A. Fulton School of Engineering, Arizona State University, U.S.A. Member of the North Macedonia Marshall Center Alumni Association, 12th Meeting of the heads of the National Security Authorities South East Europe University “Goce Delcev”-Stip Military Academy “General Mihailo Apostolski-Skopje” Ira A. Fulton School of Engineering, Arizona State University, ASU, U.S.A. Ira A. Fulton Schools of Engineering
  • 2. AGENDA 1. Cybersecurity trends & Western Balkans 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? 3. Way forward for Western Balkan Leadership: building resilience to cyber threats 4. Conclusion © Associate professor D-r Metodi Hadji-Janev Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 3. AGENDA 1. Cybersecurity trends & Western Balkans 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? 3. Way forward for Western Balkan Leadership: building resilience to cyber threats 4. Conclusion © Associate professor D-r Metodi Hadji-Janev Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 4. 1. Cybersecurity trends & Western Balkans © D-r Metodi Hadji-Janev The ongoing digital transformation interconnection and interdependence converging the cyber and physical world Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 5. Cyber crime Cyber attack Cyber espionage © D-r Metodi Hadji-Janev The overall approach 1. Cybersecurity trends & Western Balkans Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 6. Financial effects Terrorism War? Cyber crime Cyber attack Cyber espionage © D-r Metodi Hadji-Janev What you know about cybersecurity today may not be relevant tomorrow Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 1. Cybersecurity trends & Western Balkans
  • 7. Cyber crime Cyber attack Cyber espionage Financial effect Terrorism Financial effect Terrorism War? © Dr. Metodi Hadji-Janev Session II The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 1. Cybersecurity trends & Western Balkans
  • 8. © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership What you know about cybersecurity today may not be relevant tomorrow Cyber attacks Cyber Crime Cyber Espionage Cyber War Terrorist use of cyberspace 1. Cybersecurity trends & Western Balkans
  • 9. © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved - Viruses, - Worms, - Trojan horses and - Simple DOS -Malware - Phishing - SQL Injection Attack - Cross-Site Scripting (XSS) - Distributed Denial of Service (DoS) - Session Hijacking and - Man-in-the-Middle Attacks - Credential Reuse 1. Cybersecurity trends & Western Balkans 2000’s 2010’s -Ransomware; Malware; -Cryptojacking; -E-mail related threats; -Threats against data; -Threats against availability and integrity; -Disinformation – misinformation; -Non-malicious threats; -Supply-chain attacks 2020-2021
  • 10. How does cyber security affect WB cyberspace ? Emotional Societal Economic Safety Political/ security © D-r Metodi Hadji-Janev 1. Cyber security trends & Western Balkans Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 11. During the Kosovo campaign, for example, NATO has arguably experienced the first ever organized cyber attacks © D-r Metodi Hadji-Janev Cybersecurity evolution 1. Cybersecurity trends & Western Balkans Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 12. Although not a regional trend per se, Leavitt Lydia, (January 25, 2011), “Cybercrime writer mysteriously disappears in Bulgaria”, http://www.tgdaily.com/security- features/53558-cybercrime-writer-mysteriously-disappears-in-bulgaria Danco Dancev Although not a regional trend per se, mysterious disappearing of a cyber crime writer in Bulgaria in 2010 and 2011 speaks that actions in SEE cyberspace has significant influence to the security © D-r Metodi Hadji-Janev 1. Cybersecurity trends & Western Balkans Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level
  • 13. Young hacker from Macedonia back in 2012 was detained due to the cyber crime allegations (i.e. attempting to penetrate illegally several security websites in the US). ________, (November 20, 2012), “FBI Arrested Young Hacker from Struga” Press 24, from: http://star.press24.mk/story/poznato/foto-fbi- uapsi-mlad-haker-od-struga-sin-na-poznata-struzhanka © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level 1. Cybersecurity trends & Western Balkans
  • 14. Reports about working in a network with hackers from different countries also indicate the threat in the SEE Cyberspace ________, (December 13, 2012), “10 arrested in cyber-crime probe”, Express UK, retrieved 24.03.2014 from: http://www.express.co.uk/news/world/364435/10-arrested-in-cyber- crime-probe © D-r Metodi Hadji-Janev “Individuals from Britain, the US, Bosnia and Herzegovina, Croatia, Macedonia, New Zealand and Peru were arrested in an operation carried out with the assistance of Facebook and international law enforcement agencies” Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level 1. Cybersecurity trends & Western Balkans
  • 15. © D-r Metodi Hadji-Janev DD4BC cybercrime group DDOs for Bitcoin Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level How Bosnia and Herzegovina: Crackdown on 'Cyber Blackmail' Group buka.com,” “istinito.com,” “e- novine,” “federalna.ba,” “fena.co.ba,” “kurir.rs” and “blic.net.” IGOR SPAIC (January 26, 2016), Bosnia and Herzegovina: Crackdown on 'Cyber Blackmail' Group OCCPR developing a software meant to exploit weaknesses of digital Bitcoin wallets to steal Bitcoins 1. Cybersecurity trends & Western Balkans
  • 16. © D-r Metodi Hadji-Janev Montenegro hit by series of large-scale, sophisticated and coordinated hacker attacks Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact Over 200 attacks on websites, state institutions, online fraud and misuse of personal accounts were reported in 2016, compared with just six in 2012 Dusica Tomovic (February 22, 2017), Montenegro on Alert Over New Cyber Attacks, BIRN 1. Cybersecurity trends & Western Balkans
  • 17. © D-r Metodi Hadji-Janev North Macedonia hit by Powerful Greek Army Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership leaked dozens of email addresses and passwords from staffers in North Macedonia’s ministries of finance and economy Bojan Stojkovski (June 3, 2020), Password hack claim puts cyber security on the public agenda in North Macedonia, GlobalVoices Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 18. © D-r Metodi Hadji-Janev North Macedonia hit by Anonopsmkd Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership DDoS Attack – vigilante stile or attention The denial-of-service attack on TIME.mk, which involved more than 35 million addresses that generated thousands of clicks per seconds, Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 19. © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans The publication of the salary database for more than 690 000 Albanians in 2022 is one of the country’s biggest scandals runway with Russian shadows
  • 20. Defending democratic governance and human rights in the digital era Challenges to preserve democratic values © D-r Metodi Hadji-Janev dual-use digital technologies a new dimension of “security vs. liberty challenge” Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from opportunity to disruption 1. Cybersecurity trends & Western Balkans
  • 21. by mega-corporates whose “surveillance capitalism” is catalytic to the accumulation of historically unprecedented individual power Challenge to preserve democratic values © D-r Metodi Hadji-Janev Shoshana Zuboff, (2014), “Digital Declaration: Big Data as Surveillance Capitalism there is an accelerated accumulation of power Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 22. China and Russia, but also other authoritarian regimes The rise of authoritarian states in digital era © D-r Metodi Hadji-Janev recognize that technological edge translates into diplomatic, economic, military and normative power Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 23. Understood the importance of competitive advantage in digital age © D-r Metodi Hadji-Janev China - specific program that envisions world leadership in key strategic technologies, having already achieved primacy in 5G connectivity, leading Artificial Intelligence and facial recognition State control of the regulations vs self-regulation Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 24. Understood the importance of competitive advantage in digital age The rise of authoritarian states in digital era © D-r Metodi Hadji-Janev State control of the regulations vs self regulation Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – from crime to political impact 1. Cybersecurity trends & Western Balkans
  • 25. The danger - these practices can empower authoritarian regimes to develop their own version of panopticon regime they can present as equivalent to democracy We will refer to this later in 2. Challenge to preserve democratic values © D-r Metodi Hadji-Janev Jeremy Bentham Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 1. Cybersecurity trends & Western Balkans Change in the context – from opportunity to disruption
  • 26. © D-r Metodi Hadji-Janev North Macedonia – Veles the capital of Fake News Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – import to export 1. Cybersecurity trends & Western Balkans
  • 27. © D-r Metodi Hadji-Janev Global trends in cyber security/defense exploit WB vulnerabilities Clickbait journalism Anti-vax anti 5 G technologies Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – import to export 1. Cybersecurity trends & Western Balkans
  • 28. © D-r Metodi Hadji-Janev Russian meddling inside North Macedonia and Montenegro 1. Cybersecurity trends & Western Balkans Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber attacks evolved – the whole new level Change in the context – Avenue of approach “They have transferred money and they’re also conducting broader influence campaigns” Mattis for the Washington Post, September 2018
  • 29. AGENDA 1. Cybersecurity trends & Western Balkans 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? 3. Way forward for Western Balkan Leadership 4. Conclusion © Associate professor D-r Metodi Hadji-Janev, BG Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 30. Cyber attacks could generally be systematized in two groups Syntactic attacks and Semantic attacks. Syntactic attacks are straight forward it is considered malicious software which includes - viruses, - worms, and - Trojan horses © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 31. Cyber attacks could generally be systematized in two groups Syntactic attacks and Semantic attacks Semantic attack is the modification and dissemination of correct and incorrect information. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber security 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 32. Do all end here? How about Hardware theft/and abuse Service theft © Dr. Metodi Hadji-Janev How about Hardware theft/and abuse - physical devices such as computer or parts of computers and multimedia portable devices (cell and personal assistance devices) Service theft – wi-fi spoofing mooching, piggy backing or even war driving ???? Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 33. Do all end here? © Dr. Metodi Hadji-Janev The Story of 'Operation Orchard': How Israel Destroyed Syria's Al Kibar Nuclear Reactor Erich Follath and Holger StarkThe Story of 'Operation Orchard': How Israel Destroyed Syria's Al Kibar Nuclear Reactor, Der Spiegel, 2009, retreived 20.04.2014 from: http://www.spiegel.de/international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-al-kibar- nuclear-reactor-a-658663.html Imad Mughniyah Hezbollah leader, was assassinated by the Israelis in February 2008. The Mossad had obtained information that Mughniyah was planning to avenge the air strike on Al Kibar with an attack on an Israeli embassy Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 34. © Dr. Metodi Hadji-Janev The challenge! Consider Stuxnet or Flame! Cyber weapon limits? Depends? Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 35. © D-r Metodi Hadji-Janev Cyber vs. Physical world Horizontal vs Vertical Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Convergence of cyber and physical worlds challenge Horizontal Today, cyberspace is governed in an environment where decisions are taken by multiple actors, including governments, businesses, civil society, and individuals or briefly “stakeholders.” Bottom-up Vertical Top-down Social Contract Theory - the political order is simply the means towards an end—the benefit of the individuals involved—and legitimate only to the extent that they fulfill their part of the agreement Trade freedom for service and commodity Trade freedom for security 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 36. © D-r Metodi Hadji-Janev Anarchy Tyranny General Natural Universal Limited in two ways (the right of the others and public safety) Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Convergence challenge – The human Rights perspectives Governing Human rights context 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 37. Executive Judiciary Legislative © D-r Metodi Hadji-Janev Anarchy Tyranny Human Rights influence Government is organized Government is limited Local vs. Central Constitutional Law Criminal Law Personal data protection International Law Convergence challenge Governing Human rights context Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 38. Ius ad bellum Ius in bello Ius contra bellum Ius post bellum LAW POLICY Preventive diplomacy Conflict management Conflict Resolution Transition from conflict to peace OPERATIONS Shape Maneuver/surve illance/exercises SASO/IW/ PSO/COIN/( MCO) Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut. Maneuver/surv eillance/movem ent to contact MCO/offence /defense/IW /COIN © Dr. Metodi Hadji-Janev Law, Policy and Military operations 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? -The convergence challenge to the strategic design - Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber space-based threat vectors-cyber security
  • 39. Ius ad bellum Ius in bello Ius contra bellum Ius post bellum LEGAL POLITICAL Preventive diplomacy Conflict management Conflict Resolution Transition from conflict to peace OPERATIONAL Shape Maneuver/surve illance/exercises SASO/IW/ PSO/COIN/( MCO) Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut. Maneuver/surv eillance/movem ent to contact MCO/offence /defense/IW /COIN Cyber space-based threat vectors-cyber security © D-r Metodi Hadji-Janev 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? -The convergence challenge to the strategic design - Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 40. Ius ad bellum Ius in bello Ius post bellum LEGAL POLITICAL Preventive diplomacy Conflict management Conflict Resolution Transition from conflict to peace OPERATIONAL Shape Maneuver/surve illance/exercises SASO/IW/ PSO/COIN/( MCO) Deter/Seize the Initiative/Dominate/Stability/En.cv.Aut. Maneuver/surv eillance/movem ent to contact MCO/offence /defense/IW /COIN Cyber space-based threat vectors-cyber security © D-r Metodi Hadji-Janev 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? -The convergence challenge to the strategic design - Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 41. © Dr. Metodi Hadji-Janev State and non state actors are exploiting this challenge for political purposes - threats are evolving Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded Asymmetric Hybrid Hyper threats Cyber 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 42. © Dr. Metodi Hadji-Janev Coordinated cyber attacks on economic sector – can derogate states ability to defense itself Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded Asymmetry Alleged Theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and thus reduces the advantage at low costs 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 43. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded Cyber and Critical information infrastructure The Dick Cheney’s case 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 44. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded Hybrid threats … Employing political warfare and blends conventional warfare, irregular warfare and cyberwarfare with other influencing methods, such as fake news, diplomacy, lawfare and foreign electoral intervention… 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 45. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded Hybrid threats – corrupting liberal democracy The influence operations – “Fake news” and “clickbait” From individual personal and emotional threats to national security threats 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? Cyber harassment Mis, Dis, Mal information Online violent radicalization
  • 46. Three main reasons that provide for authoritarian regimes to emerge EU & US disengagement from the region Captive state phenomenon across the region of WB Media & information illiteracy &/or disengagement from the people © Dr. Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Research on Authoritarian influence sponsored by IRI 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 47. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Hybrid threats – corrupting liberal democracy weaponizing social media The influence operations – “Fake news” and “clickbait” … Both state and non- state actors have figured out how to manipulate the profit model of social media where the user is treated as a product on the advertising market 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? “filter bubble” of the like-minded Research on Authoritarian influence sponsored by IRI
  • 48. © D-r Metodi Hadji-Janev Global trends in cyber security/defense exploit WB vulnerabilities example media and information literacy Research conducted by Cyber security corporate security and crisis management initiative Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership - use all instruments of power DIME - use modern technology as vectors to achieve strategic ends corrupt democratic projects and values -exploit democratic weaknesses, are flexible and adaptive functioning in a decentralized manner 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? Research on Authoritarian influence sponsored by IRI
  • 49. © D-r Metodi Hadji-Janev Research conducted by Cyber security corporate security and crisis management initiative https://c3initiative.com/ Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership - “synergy between PRC and Russia in the information influence across the WB” From isolated proxies and COVID-19disinformation to synergy of prizing and influence 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 50. © D-r Metodi Hadji-Janev Research conducted by Cyber security corporate security and crisis management initiative https://c3initiative.com/ Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership - “synergy between PRC and Russia in the information influence across the WB” Convergence – digital silk road? 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern?
  • 51. - Organized crime and geostrategic context © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? Research conducted by Cyber security corporate security and crisis management initiative https://c3initiative.com/ -A failure of imagination?
  • 52. © Dr. Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The Convergence challenge - two folded The future is coming Hyper threats – are coming 2. Digital transformation and Western Balkan: Why cybersecurity will continue to be a top security concern? The ability to increase velocity and the volume of processing data and causing radical shifts in the decision making require greater attention on fixing the governance in the digital age
  • 53. AGENDA 1. Cyber security trends & Western Balkans 2. Digital transformation and Western Balkan: Why cyber security will continue to be top security concern? 3. Way forward for Western Balkan Leadership 4. Conclusion © Associate professor D-r Metodi Hadji-Janev, BG Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 54. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership The focus of enhancing structural changes in the WB societies has largely been driven by the EU and to certain degree NATO initiatives
  • 55. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership New technologies and capabilities are already beginning to turn speculative fiction into reality New ways of thinking, organising and acting
  • 56. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership NATO's main focus in cyber defence is to protect its own networks, operate in cyberspace (including through the Alliance's operations and missions), help Allies to enhance their national resilience and provide a platform for political consultation and collective response
  • 57. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Multilayered resilience - are we up to the challenge? - Unintended Administrative obstacles –out of the context case - Public procurement case example - Digital forensic dilemma-rule of law what? - Lack of awareness case
  • 58. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Do you think that cyber defense resilience depends on community resilience (municipality level)? Strategies on cyber security/defence do not address community resilience
  • 59. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership What do you think about smart cities? Local vs Central governance A mayor in the city from the WB has run a tender willing to develop a smart city and the lowest bid comes from a Chinese vendor-do you see a problem here? *Reminder: everything was in accordance with the EU-based rules for public tenders – a public-private partnership
  • 60. 3. Way forward for Western Balkan Leadership © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Responsibility to the Western aid How do you spend resources? Tons of resources to fight disinformation vs eroding support to Euro-Atlantic values and integration
  • 61. Recommendations for building resilience © Dr. Metodi Hadji-Janev Building cyber-resilient societies – a hole of society approach Mobilize local resources Absorptive Adoptive Transformative 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 62. Though given in a different context the former US Secretary of Defense statement, that the “success does not go to the country that develops a new technology first, but rather, to the one that better integrates it and more swiftly adapts its way of fighting” © Dr. Metodi Hadji-Janev 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 63. WB governance must adapt, and escape constrain of just being reactive to the speed of technological innovation and exploit the benefits of cyber space and digital technologies 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 64. Therefore, the WB leadership has an obligation to lead the way forward amid transitions, disruptions, chaos and ambiguity 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 65. The WB leadership should be the driving force in broadening engagement and mitigating challenges Based on such a platform WB leadership should craft tailored regulations that will anchor WB administration in improving capacities but also, to enhance transparency, oversight, and accountability. 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 66. EU should include WB in its rule-setting processes and should closely coordinate future steps 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 67. Last but not least, WB leadership must rethink safety and security 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership cyber hygiene vs national security
  • 68. Recommendations for future strategists Finding the right balance Law enfor. Defense Cris.Man.&CIP Intel & Con Cyb.gov/diplom economic development vs. improved national security modernization of infrastructure vs. critical infrastructure protection private sector vs. public sector data protection vs. information sharing individual freedoms vs. public safety © D-r Metodi Hadji-Janev 3. Way forward for Western Balkan Leadership Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 69. AGENDA 1. Cybersecurity trends & Western Balkans 2. Digital transformation and Western Balkan: Why cyber security will continue to be top security concern? 3. Way forward for Western Balkan Leadership 4. Conclusion © Associate professor D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership
  • 70. 4. Conclusion © D-r Metodi Hadji-Janev Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership -The convergence of cyber and physical world is real and ongoing influencing the cybersecurity threat landscape -Wester Balkan states are not immune to global challenges coming from cyber space -Wester Balkan leaders must seriously consider cyber security among the top priorities and invest in human capital while building multilayered resilience–anchored to the whole of society approach
  • 71. Session II: The Strategic Importance of Building a Resilient Cyber Defense: Way forward for the WB leadership Cyber security Q & A © Associate professor Metodi Hadji-Janev © Adjunct Faculty Member, Ira A. Fulton School of Engineering, Arizona State University, U.S.A. University “Goce Delcev”-Stip Military Academy “General Mihailo Apostolski-Skopje” Ira A. Fulton School of Engineering, Arizona State University, ASU, U.S.A. Ira A. Fulton Schools of Engineering