The global threat of cyber-attacks on internet infrastructure has been amplified in recent years, with breaches affecting major financial institutions, the U.S. Department of Defense, and even entire countries. In the U.S., President Obama has declared cybersecurity to be a national priority, stressing the importance of public-private collaboration. Despite this newfound policy attention to the issue of cybersecurity, broad-scale cooperation, both between national entities, and between the public and private sectors has not caught up to the global scale of cyber-attacks. Join Massimo Sarmi and Stephen Flynn, in discussing Poste Italiane's new initiative for global cooperation in ensuring cybersecurity.
About Poste Italiane's cybersecurity initiative:
Poste Italiane intends to create an International Centre of Excellence for Cyber Security, based in Rome, with a strong collaboration with the Ministry of Interiors, National Police and qualified partners coming from public institutions, private bodies, research institutions and international bodies. The objective of the Centre will be to act as a facilitator and collector of knowledge and culture in matters pertaining to Cyber Security, to support Italian and international organizations in acquiring knowledge and experience, to contribute towards the development of technical and regulatory standards for better protection of citizens, the government and private organizations.
Please join Paul Twomey, former president and CEO of the Internet Corporation for Assigned Names and Numbers (ICANN), for a conversation on the challenges posed by the present state of global cyber instability for governance at both the corporate and international levels.
**For additional information, please visit CFR's Policy Innovation Memorandum, " Cyberspace Governance: The Next Step" by clicking here.
**This event is made possible in partnership with CFR's Cyberconflict and Cybersecurity Initiative, the Atlantic Council, and the Cyber Conflict Studies Association.**
Janet Napolitano, U.S. secretary of homeland security, addresses the threat of networked terrorist organizations and the Department of Homeland Security's strategy to prevent and respond.
The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
The U.S. government needs to marshal its cybersecurity resources in support of the private sector and build alliances with international partners, says former CIA director Michael Hayden, member of a new CFR independent task force on digital policy.
The steady theft of U.S. intellectual property by foreign cyberattackers could mean decreased economic growth, reduced competitiveness, and loss of jobs, says McAfee cybersecurity expert Dmitri Alperovitch.
The Pentagon's new strategy for operating in cyberspace breaks little ground and offers few specifics, says CFR's Adam Segal. While the last six months have been busy for U.S. cybersecurity policy, he cautions that "speed is not a measure of efficacy."
See more in Cybersecurity
Reports of Predator drones' data losses in Iraq and Afghanistan should serve as a call to action to upgrade U.S. cybersecurity capabilities, says analyst James Lewis.
The U.S. Air Force is standing up a dedicated command to coordinate offensive and defensive cyber strategy within the Pentagon.
What CFR.org Editors are reading the week of June 1–5, 2015.
"APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. From our observations, it is one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen."
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
This Congressional Research Service report compiles hearings, legislation, data, and other reports on cybersecurity.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
Williams argues that the status quo for peace operations in untenable and that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Ashley's War tells the poignant and gripping story of a groundbreaking team of female American warriors who served alongside Special Operations soldiers in Afghanistan. More
Smith's insightful book explores the policy issues testing the Japanese government as it tries to navigate its relationship with an advancing China. More
This revolutionary new look at volatility and crisis in oil markets explores the conditions in which oil supply fears arise, gain popularity, and eventually wane. More
Learn more about CFR’s mission and its work over the past year in the 2014 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »