GCSC Cyberstability Update, 19 July 2019
Your news update on the GCSC, its members, and relevant developments in the field of international cyber affairs. Join the conversation and receive weekly updates by signing up to the newsletter below. For more information about the GCSC, please visit www.cyberstability.org.
|
|
The article by Sue Halpern was published in The New Yorker, 18 July 2019
Planning a cyberattack follows strict military protocol, moving up and down the chain of command as the parameters of an attack are determined, and its benefits and costs are assessed. President Obama had to sign off on all cyberattacks, but in August, 2018, Congress passed a military-authorization bill that allowed some cyberattacks to be authorized by the Secretary of Defense. Around the same time, the Trump Administration issued “National Security Presidential Memorandum 13,” a secret directive which reportedly further eased requirements for Presidential approval in certain cyberattacks.
|
|
This guidance by the U.S. Cyber Command was published in March, 2019
U.S. Cyber Command has developed a set of Technical Challenge Problems to enhance potential solution providers’ ability to fill key mission gaps. These Technical Challenge Problems are significant challenges which will require developers to use existing capabilities in novel ways, add new features, innovate, or drive new research. J9 will use these Technical Challenge Problems to enrich its engagement with capability providers in Industry, Academia, and the Labs.
|
|
This article by Adm. Mike Rogers (retd) was published by ASPI International Cyber Policy Centre, 11 July 2019
At the conclusion of his time as a Distinguished Visiting Fellow with ASPI’s International Cyber Policy Centre, Admiral Rogers shares five factors that government and policymakers should consider as they prepare for the next wave of disruptive technologies.
|
|
INTERNATIONAL CYBER AFFAIRS:
|
|
Juhan Lepassaar elected director of EU Agency for Cybersecurity, ERR.ee
Tags: Estonia, Enisa, cybersecurity cooperation, EU, CERT.
Carnegie Endowment and partners released a cyber capacity building toolbox for financial organizations, Carnegie
Tags: Resilience, capacity building, toolbox, cyber hygiene
New cyberthreats require new ways to protect democracy, Microsoft
Tags: Microsoft, GCSC Norm to Protect electoral infrastructure, multistakeholder approach
Chinese, Russian Cyber Watchdogs Meet in Moscow, Haaretz
Tags: Russia, China, cyber diplomacy, internet governance, internet freedom
Building Resilience in the Fifth Domain, CFR
Tags: Cyber strategies, cyber resilience, policy, GCSC Norm Against Offensive Cyber Operations by Non-State Actors
U.S. Department of Defense Releases Digital Modernization Strategy, U.S. DoD
Tags: USA, cyber capabilities, information technology
A necessary rise: Lithuania bolsters its cybersecurity, catching the attention of other nations, Fifth Domain
Tags: Lithuania, cyber policy, GCSC Norm Against Offensive Cyber Operations by Non-State Actors, cyber capabilities, resilience
How U.S. Tech Giants are Helping to Build China’s Surveillance State, The Intercept
Tags: industry, information technology, internet freedom
|
|
31 July: 5G Innovation & Security, CSIS
3-8 August 2019: Black Hat USA, Black Hat.
8 August 2019: Cyber Games, Wicked6.
8-11 August 2019: DEF CON 27, DEF CON.
4-5 September 2019: 14th BISA US Foreign Policy Working Group Annual Conference, BISA.
2-3 October 2019: CyberCrimeCon/19, Group-IB.
21-25 October 2019: Cyberweek, CyberScoop.
|
|
|
|
|