Wanted: International Cyber Standards

US miltary chiefs and EU political leadesrs are in agreemnet that a lack of international standards for proper behavior in cyberspace is preventing the US and it European allies from policing their adversaries. The protection of data and systems is now badly needed.

Trade and cybersecurity are increasingly intertwined. The global expansion of the Internet and increased use of data flows by businesses and consumers, for communication, e-commerce, and as a source of information and innovation, are transforming international trade. 

Not only are traditional defense and other national security targets at risk of cyberattack, so too is the broader economy. This includes critical infrastructure, such as telecommunications, transport, and health care, which relies on software to network services.

All four US miltiary service chiefs for the Army, Navy. Airforce and Marines are pledged support to Gen. Paul Nakasone, commander of US Cyber Command which under both Presidents Obama and Trumo is growing in its importance. But they have also acknowledged the challenge that comes with the lack of international doctrine. “We have international norms in the maritime; we don’t have those in cyber,” said  Admiral. Michael Gilday, previously US Navy10th Fleet/Fleet Cyber Commander. “It makes it difficult to enforce standard that don’t exist, and to therefore hold nations accountable for nefarious behavior. It’s a challenge.... Those types of agreements take time... Unfortunately they sometimes follow a catastrophic event.”

In mid-2017 NATO confirmed that if a member was under sustained cyberattack it could invoke Article 5, which would mean a full response from NATO.

But while that decision did help inspire the alliance to develop rules of engagement should such an event occur, it did not establish global standards for behavior in cyberspace. Many countries are now adopting policy measures to respond to the threat. According to one estimate, at least 50 percent of countries have adopted cybersecurity policies and regulations.

The fifth generation of communication technologies, or ‘5G’, has arrived, bringing with it the promise of enhanced global internet coverage. This was the main message of an event in the European Parliament in early November entitled “Cybersecurity: What are the real risks?”

It has the ability to connect everything around us, from our phones and fridges to hospitals and energy grids, driving economic growth and improving our everyday lives.

But there are also concerns that this radical transformation is fraught with risks and Europe may be unprepared for its challenges.

Fifth Domain:          Brookings Inst:        Parliament Magazine

You Might Also Read:

The Cyber Effect On Modern Warfare:

UN Chief Urges Global Rules For Cyber Warfare:

 

 

« US Bombarded With Ransomware
Criminals Are Using AI For Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Health Sector Cybersecurity Coordination Center (HC3) - USA

Health Sector Cybersecurity Coordination Center (HC3) - USA

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.

National Protective Security Authority (NPSA) - UK

National Protective Security Authority (NPSA) - UK

NPSA is part of MI5 and is the National Technical Authority for physical and personnel protective security. By making the UK more resilient to national security threats, we help to make the UK safe.