Copy

GCSC Cyberstability Update, 19 July 2019

Your news update on the GCSC, its members, and relevant developments in the field of international cyber affairs. Join the conversation and receive weekly updates by signing up to the newsletter below. For more information about the GCSC, please visit www.cyberstability.org.

Sign up
Twitter
Email
Website

HIGHLIGHTS:

The article by Sue Halpern was published in The New Yorker, 18 July 2019

Planning a cyberattack follows strict military protocol, moving up and down the chain of command as the parameters of an attack are determined, and its benefits and costs are assessed. President Obama had to sign off on all cyberattacks, but in August, 2018, Congress passed a military-authorization bill that allowed some cyberattacks to be authorized by the Secretary of Defense. Around the same time, the Trump Administration issued “National Security Presidential Memorandum 13,” a secret directive which reportedly further eased requirements for Presidential approval in certain cyberattacks. 
 
This guidance by the U.S. Cyber Command was published in March, 2019

U.S. Cyber Command has developed a set of Technical Challenge Problems to enhance potential solution providers’ ability to fill key mission gaps. These Technical Challenge Problems are significant challenges which will require developers to use existing capabilities in novel ways, add new features, innovate, or drive new research. J9 will use these Technical Challenge Problems to enrich its engagement with capability providers in Industry, Academia, and the Labs.
 
This article by Adm. Mike Rogers (retd) was published by ASPI International Cyber Policy Centre, 11 July 2019

At the conclusion of his time as a Distinguished Visiting Fellow with ASPI’s International Cyber Policy Centre, Admiral Rogers shares five factors that government and policymakers should consider as they prepare for the next wave of disruptive technologies.
 

INTERNATIONAL CYBER AFFAIRS:

Juhan Lepassaar elected director of EU Agency for Cybersecurity, ERR.ee

Tags: Estonia, Enisa, cybersecurity cooperation, EU, CERT.
Carnegie Endowment and partners released a cyber capacity building toolbox for financial organizations, Carnegie

Tags: Resilience, capacity building, toolbox, cyber hygiene
New cyberthreats require new ways to protect democracy, Microsoft

Tags: Microsoft, GCSC Norm to Protect electoral infrastructure, multistakeholder approach
Chinese, Russian Cyber Watchdogs Meet in Moscow, Haaretz

Tags: Russia, China, cyber diplomacy, internet governance, internet freedom 
Building Resilience in the Fifth Domain, CFR

Tags: Cyber strategies, cyber resilience, policy, GCSC Norm Against Offensive Cyber Operations by Non-State Actors
U.S. Department of Defense Releases Digital Modernization Strategy, U.S. DoD

Tags: USA, cyber capabilities, information technology
A necessary rise: Lithuania bolsters its cybersecurity, catching the attention of other nations, Fifth Domain

Tags: Lithuania, cyber policy, GCSC Norm Against Offensive Cyber Operations by Non-State Actors, cyber capabilities, resilience
How U.S. Tech Giants are Helping to Build China’s Surveillance State, The Intercept

Tags: industry, information technology, internet freedom
THE GCSC IN THE NEWS:
A Former Secretary Makes the Case for the Department of Homeland Security, Aspen Institute

Tags: GCSC Co-Chair Michael Chertoff
Fostering discussion, learning and participation: The APC community’s work in 2018 to support civil society’s role in internet governance, APC

Tags: GCSC Commissioner Anriette Esterhuysen
Europe’s Tech Laws Should Be a Matter of Principle, Bloomberg

Tags: GCSC Commissioner Marietje Schaake
Hacking, Privacy, and Democratic Freedoms in the Information Age, Bush Center

Tags: GCSC Co-Chair Michael Chertoff.
From plaything to player: How Europe can stand up for itself in the next five years, ECFR

Tags: GCSC Special Advisor Carl Bildt
Christopher Painter Awarded Order of the Rising Sun for Achievements in US-Japan Cybersecurity Collaboration, Econ-News Embassy of Japan

Tags: GCSC Commissioner Christopher Painter
EVENTS:
31 July: 5G Innovation & Security, CSIS
3-8 August 2019: Black Hat USA, Black Hat.
8 August 2019: Cyber Games, Wicked6.
8-11 August 2019: DEF CON 27, DEF CON.
4-5 September 2019: 14th BISA US Foreign Policy Working Group Annual Conference, BISA.
2-3 October 2019: CyberCrimeCon/19, Group-IB.
21-25 October 2019: Cyberweek, CyberScoop.
GCSC NORMS:
Copyright © 2018 HCSS, all rights reserved.
Our mailing address is:
info@cyberstability.org
In case you would like to change the way you receive the newsletter, you can update your preferences or unsubscribe from this list.






This email was sent to <<Email Address>>
why did I get this?    unsubscribe from this list    update subscription preferences
Global Commission on the Stability of Cyberspace · Lange Voorhout 1 · Den Haag, ZH 2514 EA · Netherlands

Email Marketing Powered by Mailchimp