SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
CSCSS AND ISC:
A COORDINATED
STRATEGY
FRAMEWORK
ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCE
CSCSS
The Centre for Strategic Cyberspace + Security Science
has created this International Strategy for Cyberspace (ISC)
as a strategic-level policy document offering a practical,
comprehensive, and clear vision for the future of cyberspace.
It sets an agenda for partnering on cybersecurity and
associated initiatives at an international level, and highlights
the importance of international cooperation in advancing
cyberspace as a foreign policy priority.
A CSCSS STRATEGIC
APPROACH TO INTERNATIONAL
CYBERSECURITY
The Centre for Strategic Cyberspace + Security Science (CSCSS)
has developed its International Strategy for Cyberspace (ISC).
In support of this strategy, CSCSS will continue to promote cyber
innovation, initiatives, research, and education in its approach to
international cyberspace issues and policies. CSCSS identifies
the challenges to, and enhances, national, international, and
economic security, focusing on cyber-environments that ar
defined as being:
n OPEN to innovation
n INTEROPERABLE the world over
n SECURE enough to earn people’s trust
n RELIABLE enough to support their work
These characteristics provide a basic framework for international
obligations in cyberspace. They reflect the responsibility and
obligations of states that apply regardless of context.
The principles that should support cyberspace norms include:
n Economic Engagement
n Protecting Networks
n Law Enforcement
n Protection from Crime
n Military Cooperation
n Multi-Stakeholder Internet Governance
n International Cybersecurity Development
n Internet Freedom
n Valuing Privacy
n Upholding Fundamental Human Rights and Freedoms
and the Right to Self Defense
n International Cybersecurity Awareness
and Workforce Education
Driving Security and Technical Capacity through
Cybersecurity Capacity Building
Cooperation, partnership, and credibility are critical to
cultivating a dynamic, international research community able to
take on the development of technologies required to face next-
generation challenges to cybersecurity. It is imperative that we
acknowledge cybersecurity as a global issue that must be
addressed through strategic pan-national efforts on the part
of all countries focused on cybersecurity capacity building. In
recognition of this, CSCSS will expand and regularize initiatives
focused on cybersecurity capacity building and cyber technology
development through:
n High-level bilateral, multilateral, and international
partnerships
n Collaboration with public-private sector and academia
n Enhancement of national-level cybersecurity
n Ongoing promotion of cyber technology development, while
addressing cybercrime and counterintelligence
CSCSS, as part of its vision and mission, and in support of its
International Strategy for Cyberspace, will work in collaboration
with the public-private sector leveraging relationships with
industry, academia, government agencies, and international
cyber-counterintelligence community partners to establish an
environment in which the norms of responsible behavior guide
actions, sustain partnerships, and support the rule of law.
These norms include:
n Global (Cyber) Interoperability
n Cybersecurity Due Diligence
n Multi-Stakeholder Governance
n Upholding Fundamental Freedoms
n Respect for Property
n Valuing Privacy
n Protection from Crime
n Right of Self-Defense
n Network Stability
n Reliable Access
Development: Building Prosperity and Cybersecurity
We believe the benefits of a connected globe are collective.
Through our international relationships, partnerships, and
associations, CSCSS will continue to support strategies that
ensure as many nation-states as possible recognize the virtues
of an open, interoperable, secure, and reliable cyber-environment,
and become responsible stakeholders in cyberspace.
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
International Policy Priorities
The International Strategy for Cyberspace is an invitation to
other nations and peoples to unite in a vision of prosperity,
security, and openness through a digitally interconnected world;
to coordinate their roles in international cyberspace policy, and
to define and execute a specific way forward on the international
cyber-stage.
CSCSS advances its activities across inter-reliant areas of
operation relating to cybersecurity research, development,
and education. Each area demands collaboration with the
public-private sector, academia, and international cyber-counter-
intelligence community partners. Taken as a whole, they form
the action lines of an international strategic framework through
which CSCSS will:
Promote International Standards, Technological
Innovation, and Open Markets Supporting the Economy
and Economic Growth
n Endorse free-trade environments
n Encourage technological innovation on accessible and secure
globally-linked networks
n Protect intellectual property
n Ensure the confidentiality, integrity, and availability
of interoperable and secure technical standards
Protecting Critical Infrastructure
In coordination with industry partners, CSCSS will create
a set of risk-based standards related to industry-critical
infrastructure verticals, and will drive the development
of cybersecurity plans to meet these standards
Promote Cyber-Collaboration and the Rule of Law
n Act as voice for international cybercrime and policy
development
n Work to define and harmonize cybercrime laws,
internationally, through the expansion and adoption
of the Budapest Convention
n Focus, leverage, expand, and endorse cybercrime laws
to fight illegal activities, not to restrict access to the internet
n Deny terrorists and cyber-criminals the means with which
to exploit the internet and cyber technologies for planning,
financing, or attacks
Computer Security Law Enforcement
CSCSS will work globally to clarify and synchronize the fund-
amental legislative elements of cybercrimes and cyber-law and
to create standardized penalties for violations of the law
Data Breach Notification
CSCSS will actively promote provisions that would establish
a national data breach reporting system. The provisions are
aimed at standardizing the requirements for reporting security
breaches by, among other things, establishing statutory
definitions of a ‘security breach’ and ‘sensitive personally
identifiable information’
Promote National Security:
Facing Emerging Security Challenges
n Collectively and internationally defend our national and
economic interests, citizens, and allies everywhere they might
be threatened
n Recognize, distinguish, and adapt to national security
requirements for increasingly reliable, resilient, and
secure networks
n Build-on, enhance, and expand cooperation existing between
national, international, intelligence, and military alliances to
confront potential threats in cyberspace and to increase
collective cybersecurity
Promote Effective Internet Governance
and Frameworks
n Promote internet governance structures that effectively serve
the needs of all global internet users
n Drive openness, ethical competition, and innovation
on the internet
n Protect global internet security and stability
n Endorse and enhance a multi-stakeholder stage in a global
theater for the discussion of internet governance issues and
challenges relating to cybersecurity, spotlighting cooperation
and collaboration
Coordination of Information Security Policies
CSCSS will work at a global level to establish a coordinated
approach to information security policies relating to existing
cyber-efforts as well as established international polices such as
the Convention on Cybercrime of the Council of Europe (also
known as the Budapest Convention on Cybercrime), the leading
treaty to combat cybercrime internationally
International Cybersecurity Awareness
and Workforce Education
As part of its mandate, CSCSS will focus on building a
responsible and competent workforce through cybersecurity
awareness and education research programs.
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
International Development: Building Capacity,
Security, and Prosperity
n Provide the essential and required knowledge, awareness,
training, and resources to effectively build comprehensive
technical and cybersecurity capacity, globally
n Develop and disseminate effective and practical international
cybersecurity best practices on an on-going basis
n Improve the ability, through international-national law,
to fight cybercrime on a global level
n Define, focus, and develop critical relationships with policy-
makers to enhance technical capacity building through regular
and ongoing contact with industry experts and partners
Support Fundamental Freedoms and Privacy in Cyberspace
n Support the goals of achieving reliable, secure, and safe
platforms for freedoms of expression and association
n Collaborate with civil society and non-government
organizations to establish safeguards protecting their internet
activity from unlawful digital intrusions
n Encourage international collaboration and cooperation for
effective data, information platforms, and systems privacy
protections
n Ensure the end-to-end interoperability of an internet
accessible to all
Cybersecurity Information Sharing
CSCSS will strive to encourage, incentivize, and protect global
collaboration and sharing of cybersecurity research and cyber-
incident information with government agencies, public-private
industry, and academia
Privacy and Civil Liberties
CSCSS will promote cybersecurity reforms that define and
implement cybersecurity laws in accordance with privacy
standards and globally defined cyber-civil liberties
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
About CSCSS
The Centre for Strategic Cyberspace + Security Science / CSCSS
is a multilateral, international not-for-profit organization that
conducts independent cyber-centric research, development,
analysis, and training in the areas of cyberspace, defence
intelligence, cyber security, and science while addressing the
threats, trends, and opportunities shaping international security
policies and national cyberspace cyber security initiatives.
CSCSS, as a strategic leader in cyberspace, works jointly with
key partners to address, develop, and define cyber technologies,
cyber defence force capabilities, information dominance, and
concept operations. We deliver practical recommendations and
innovative solutions and strategies to advance a secure
cyberspace domain.
Internationally, CSCSS operates in the United Kingdom, Europe,
United States, South America, Australia, and Canada.
CSCSS Collaborative Partners
The Centre for Strategic Cyberspace + Security Science operates
in a collaborative partnership with agencies and organizations
that share our commitment to the advancement of Cybersecurity,
National + International Security, Cyber Education and
Awareness, and Cybersecurity Research and Initiatives.
Contact Us
For more information on the C3i Group, the Centre for Strategic
Cyberspace + Security Science, its programmes or to find out
how we can help you please contact us.
CSCSS / Centre for Strategic Cyberspace + Security
C3i Group
Washington D.C + 571.451.0312
London, United Kingdom +44 2035141784
North America +877.436.6746
Middle East +855.237.8767
Australia +61 2.8003.7553
Email information@cscss.org
CSCSS.org
The Centre for Strategic Cyberspace + Security Science
will continue to engage with industry and national
partners in our work to build collaboration on
cyberspace issues. This is essential in order to support
international and multi-national stakeholder efforts to
enhance national-level cybersecurity, build confidence
in globally inter-connected networks, and collaborate
across borders to fight the criminal exploitation of
information technologies.
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCECSCSS

Weitere ähnliche Inhalte

Was ist angesagt?

Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009Publish What You Pay
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2Elisha Quaye
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Benjamin Ang
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsatlanticcouncil
 
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Rob Blackwell
 

Was ist angesagt? (20)

Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Cyber
CyberCyber
Cyber
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
OECD
OECDOECD
OECD
 
cyber policy in Latvia
cyber policy in Latviacyber policy in Latvia
cyber policy in Latvia
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
 
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016
 

Andere mochten auch (6)

Introduction zicht history
Introduction zicht historyIntroduction zicht history
Introduction zicht history
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
CSCSS Report: Game Netorks, Terrorism and Hacking
CSCSS Report:  Game Netorks, Terrorism and HackingCSCSS Report:  Game Netorks, Terrorism and Hacking
CSCSS Report: Game Netorks, Terrorism and Hacking
 
CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
Eelco Karthaus
Eelco KarthausEelco Karthaus
Eelco Karthaus
 

Ähnlich wie Coordinated Intl Cyber Strategy Framework

International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
NCSS_Global trends in cyberspace (2).pptx
NCSS_Global trends in cyberspace (2).pptxNCSS_Global trends in cyberspace (2).pptx
NCSS_Global trends in cyberspace (2).pptxCakMuhJunior
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxfalknoor56
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfFiyona Nourin
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 

Ähnlich wie Coordinated Intl Cyber Strategy Framework (20)

Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
NCSS_Global trends in cyberspace (2).pptx
NCSS_Global trends in cyberspace (2).pptxNCSS_Global trends in cyberspace (2).pptx
NCSS_Global trends in cyberspace (2).pptx
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Cyber Diplomacy
Cyber DiplomacyCyber Diplomacy
Cyber Diplomacy
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Session 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip PaulwellSession 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip Paulwell
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 

Kürzlich hochgeladen

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Coordinated Intl Cyber Strategy Framework

  • 1. CSCSS AND ISC: A COORDINATED STRATEGY FRAMEWORK ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE) CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE CSCSS
  • 2. The Centre for Strategic Cyberspace + Security Science has created this International Strategy for Cyberspace (ISC) as a strategic-level policy document offering a practical, comprehensive, and clear vision for the future of cyberspace. It sets an agenda for partnering on cybersecurity and associated initiatives at an international level, and highlights the importance of international cooperation in advancing cyberspace as a foreign policy priority. A CSCSS STRATEGIC APPROACH TO INTERNATIONAL CYBERSECURITY
  • 3. The Centre for Strategic Cyberspace + Security Science (CSCSS) has developed its International Strategy for Cyberspace (ISC). In support of this strategy, CSCSS will continue to promote cyber innovation, initiatives, research, and education in its approach to international cyberspace issues and policies. CSCSS identifies the challenges to, and enhances, national, international, and economic security, focusing on cyber-environments that ar defined as being: n OPEN to innovation n INTEROPERABLE the world over n SECURE enough to earn people’s trust n RELIABLE enough to support their work These characteristics provide a basic framework for international obligations in cyberspace. They reflect the responsibility and obligations of states that apply regardless of context. The principles that should support cyberspace norms include: n Economic Engagement n Protecting Networks n Law Enforcement n Protection from Crime n Military Cooperation n Multi-Stakeholder Internet Governance n International Cybersecurity Development n Internet Freedom n Valuing Privacy n Upholding Fundamental Human Rights and Freedoms and the Right to Self Defense n International Cybersecurity Awareness and Workforce Education Driving Security and Technical Capacity through Cybersecurity Capacity Building Cooperation, partnership, and credibility are critical to cultivating a dynamic, international research community able to take on the development of technologies required to face next- generation challenges to cybersecurity. It is imperative that we acknowledge cybersecurity as a global issue that must be addressed through strategic pan-national efforts on the part of all countries focused on cybersecurity capacity building. In recognition of this, CSCSS will expand and regularize initiatives focused on cybersecurity capacity building and cyber technology development through: n High-level bilateral, multilateral, and international partnerships n Collaboration with public-private sector and academia n Enhancement of national-level cybersecurity n Ongoing promotion of cyber technology development, while addressing cybercrime and counterintelligence CSCSS, as part of its vision and mission, and in support of its International Strategy for Cyberspace, will work in collaboration with the public-private sector leveraging relationships with industry, academia, government agencies, and international cyber-counterintelligence community partners to establish an environment in which the norms of responsible behavior guide actions, sustain partnerships, and support the rule of law. These norms include: n Global (Cyber) Interoperability n Cybersecurity Due Diligence n Multi-Stakeholder Governance n Upholding Fundamental Freedoms n Respect for Property n Valuing Privacy n Protection from Crime n Right of Self-Defense n Network Stability n Reliable Access Development: Building Prosperity and Cybersecurity We believe the benefits of a connected globe are collective. Through our international relationships, partnerships, and associations, CSCSS will continue to support strategies that ensure as many nation-states as possible recognize the virtues of an open, interoperable, secure, and reliable cyber-environment, and become responsible stakeholders in cyberspace. All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
  • 4. International Policy Priorities The International Strategy for Cyberspace is an invitation to other nations and peoples to unite in a vision of prosperity, security, and openness through a digitally interconnected world; to coordinate their roles in international cyberspace policy, and to define and execute a specific way forward on the international cyber-stage. CSCSS advances its activities across inter-reliant areas of operation relating to cybersecurity research, development, and education. Each area demands collaboration with the public-private sector, academia, and international cyber-counter- intelligence community partners. Taken as a whole, they form the action lines of an international strategic framework through which CSCSS will: Promote International Standards, Technological Innovation, and Open Markets Supporting the Economy and Economic Growth n Endorse free-trade environments n Encourage technological innovation on accessible and secure globally-linked networks n Protect intellectual property n Ensure the confidentiality, integrity, and availability of interoperable and secure technical standards Protecting Critical Infrastructure In coordination with industry partners, CSCSS will create a set of risk-based standards related to industry-critical infrastructure verticals, and will drive the development of cybersecurity plans to meet these standards Promote Cyber-Collaboration and the Rule of Law n Act as voice for international cybercrime and policy development n Work to define and harmonize cybercrime laws, internationally, through the expansion and adoption of the Budapest Convention n Focus, leverage, expand, and endorse cybercrime laws to fight illegal activities, not to restrict access to the internet n Deny terrorists and cyber-criminals the means with which to exploit the internet and cyber technologies for planning, financing, or attacks Computer Security Law Enforcement CSCSS will work globally to clarify and synchronize the fund- amental legislative elements of cybercrimes and cyber-law and to create standardized penalties for violations of the law Data Breach Notification CSCSS will actively promote provisions that would establish a national data breach reporting system. The provisions are aimed at standardizing the requirements for reporting security breaches by, among other things, establishing statutory definitions of a ‘security breach’ and ‘sensitive personally identifiable information’ Promote National Security: Facing Emerging Security Challenges n Collectively and internationally defend our national and economic interests, citizens, and allies everywhere they might be threatened n Recognize, distinguish, and adapt to national security requirements for increasingly reliable, resilient, and secure networks n Build-on, enhance, and expand cooperation existing between national, international, intelligence, and military alliances to confront potential threats in cyberspace and to increase collective cybersecurity Promote Effective Internet Governance and Frameworks n Promote internet governance structures that effectively serve the needs of all global internet users n Drive openness, ethical competition, and innovation on the internet n Protect global internet security and stability n Endorse and enhance a multi-stakeholder stage in a global theater for the discussion of internet governance issues and challenges relating to cybersecurity, spotlighting cooperation and collaboration Coordination of Information Security Policies CSCSS will work at a global level to establish a coordinated approach to information security policies relating to existing cyber-efforts as well as established international polices such as the Convention on Cybercrime of the Council of Europe (also known as the Budapest Convention on Cybercrime), the leading treaty to combat cybercrime internationally International Cybersecurity Awareness and Workforce Education As part of its mandate, CSCSS will focus on building a responsible and competent workforce through cybersecurity awareness and education research programs. All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
  • 5. International Development: Building Capacity, Security, and Prosperity n Provide the essential and required knowledge, awareness, training, and resources to effectively build comprehensive technical and cybersecurity capacity, globally n Develop and disseminate effective and practical international cybersecurity best practices on an on-going basis n Improve the ability, through international-national law, to fight cybercrime on a global level n Define, focus, and develop critical relationships with policy- makers to enhance technical capacity building through regular and ongoing contact with industry experts and partners Support Fundamental Freedoms and Privacy in Cyberspace n Support the goals of achieving reliable, secure, and safe platforms for freedoms of expression and association n Collaborate with civil society and non-government organizations to establish safeguards protecting their internet activity from unlawful digital intrusions n Encourage international collaboration and cooperation for effective data, information platforms, and systems privacy protections n Ensure the end-to-end interoperability of an internet accessible to all Cybersecurity Information Sharing CSCSS will strive to encourage, incentivize, and protect global collaboration and sharing of cybersecurity research and cyber- incident information with government agencies, public-private industry, and academia Privacy and Civil Liberties CSCSS will promote cybersecurity reforms that define and implement cybersecurity laws in accordance with privacy standards and globally defined cyber-civil liberties All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved About CSCSS The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. Internationally, CSCSS operates in the United Kingdom, Europe, United States, South America, Australia, and Canada. CSCSS Collaborative Partners The Centre for Strategic Cyberspace + Security Science operates in a collaborative partnership with agencies and organizations that share our commitment to the advancement of Cybersecurity, National + International Security, Cyber Education and Awareness, and Cybersecurity Research and Initiatives. Contact Us For more information on the C3i Group, the Centre for Strategic Cyberspace + Security Science, its programmes or to find out how we can help you please contact us. CSCSS / Centre for Strategic Cyberspace + Security C3i Group Washington D.C + 571.451.0312 London, United Kingdom +44 2035141784 North America +877.436.6746 Middle East +855.237.8767 Australia +61 2.8003.7553 Email information@cscss.org CSCSS.org The Centre for Strategic Cyberspace + Security Science will continue to engage with industry and national partners in our work to build collaboration on cyberspace issues. This is essential in order to support international and multi-national stakeholder efforts to enhance national-level cybersecurity, build confidence in globally inter-connected networks, and collaborate across borders to fight the criminal exploitation of information technologies. CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCECSCSS