Why Cybersecurity Must Be An International Effort

Why Cybersecurity Must Be An International EffortThe former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.BLACK HAT EUROPE – London, UK – Government cybersecurity won’t improve unless nations begin working together, and with their own technical security experts, to improve their understanding of security problems and the tools used to fix them.
“How many people think we’re better off today than seventeen years ago?” Chris Painter, the former and first-appointed cyber coordinator for the US State Department asked in his keynote at Black Hat Europe, held this week in London. He didn’t seem surprised at the response.
“Okay, that’s nobody … not a single person,” he noted as everyone in the packed room kept their hands lowered.
Painter then asked how many attendees believed governments were speaking with security experts to inform their policies with technical expertise. A few raised their hands in agreement.

It wasn’t too long ago that high-level government officials didn’t want to care about, or understand, cybersecurity. “That has changed, I think, dramatically,” Painter observed, as cyber issues more broadly threaten national security, human rights security, and foreign rights policy.
Governments have, in fact, begun to take cyber more seriously as threats carry greater consequences, he said. The Equifax breach, Sony hack, WannaCry, and Petya/not Petya are only a few recent attacks which have captured the international community. Many have begun to worry about attacks on their critical infrastructure, such as that in Ukraine in 2016.
Nations view technology as a threat to their overall stability, Painter said. He divided cyber threats into two categories: technical threats, and threats to policy. There has been greater emphasis on how we counter these problems both nationally and internationally, he explained, and governments have become more organized around cybersecurity.
He emphasized the need for countries to deal collectively with the threats they have in common. Security issues are usually bigger than one country, he said, noting that conflict arises when different nations have different perceptions of how technology should be used. Some countries leverage the Internet to monitor and control citizens, and suppress their freedom of expression, he added.
As countries strengthen their cyber capabilities, Painter explained, they need a stable environment so the beneficial parts of cyber aren’t undermined by weak security. He said it’s time for nations to discuss cyber policies through the United Nations and multi-government organizations instead of going solo. International law applies in cyberspace, he said; it isn’t a “lawless space” where “anything goes.”
It sounds simple on the surface but is complex in practice. According to Painter, international agreements must focus on how to prevent cyberattacks that don’t necessarily qualify as cyber warfare; right now, policies don’t address these types of threats. States shouldn’t attack the critical infrastructure of other states, for example. They shouldn’t attack one another’s computer emergency response teams (CERTs), something Painter likened to “going after ambulances on the battlefield.”
云计算——没有绝对的安全“要想人不知,除非己莫为”。
几人知晓系统及安全日志审查
We have not done a good job of deterrence in cyberspace, he continued. Sure, there are rules telling actors not to violate other nations. But “those rules are worthless if there’s no action taken if people violate them,” he said, adding that lack of punishment establishes a norm that [an] activity is acceptable.
As part of this, Painter also called for more efficient attribution, which is necessary to take action on cybercrime. “We have to get to attribution quicker, so we can take action quicker, so we can have a deterring effect,” he said. Attribution is “a political issue,” he pointed out, and governments can’t punish a threat actor unless they are sure he/she is responsible.
“We can’t have progress if only a few countries agree,” Painter said. “International security will only come with international acceptance of rules.”
Related Content:
The Rising Dangers of Unsecured IoT Technology
First US Federal CISO Shares Security Lessons Learned
Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches
‘Blocking and Tackling’ in the New Age of Security
携带您自己的设备BYOD进入工作区域,确实会带来一些好处,不过同时也加大了安全风险,在工作场所设备丢失,公司机密数据从私人设备中外泄,都算谁的责任呢?

猜您喜欢

河北省副省长李谦主持召开危险化学品安全综合治理工作领导小组会议
全民网络安全意识教育策略与资源
CyberSecurity Law Introduction 网络安全法宣传视频系列
史上最成功 iPhone X火了:推苹果销量创新高
PCCILLIN APPLECAMHOTTIE
是否需要在企业层面建立信息安全意识月?