Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Trusting ICT Providers – Can Corporate Cyber Confidence-Building Measures Help?

Klaus, Matthias. "Trusting ICT Providers – Can Corporate Cyber Confidence-Building Measures Help?" Connections: The Quarterly Journal 20, no. 2 (2021): 21-31.

Nations need to trust or ban a vendor from building their Information and Communication Technology (ICT) infrastructure and services. In a world where private companies almost exclusively wield both the technical expertise and means to develop, operate, and maintain the ICT structure, nations increasingly depend on the private sector.

20.2.03_ict_providers_csbm.pdf — Downloaded 1279 times

Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty

Costigan, Sean S.. "Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty." Connections: The Quarterly Journal 20, no. 2 (2021): 9-13.

Global unrest is fast becoming the norm in cyberspace, where cybercriminals operate with relative impunity, and novel technologies allow nation-states to sharpen their practice of influence operations. There is a near-constant rate of hacks against computers – by one recent count every 39 seconds on average for devices connected to the Internet.[1] If cybercrime is not tackled, at risk is nothing less than trust in the government’s ability to deliver on the promise of security.

20.2.01_sovereign_or_global_internet.pdf — Downloaded 1739 times

Countering Crime, Hate Speech, and Disinformation in Cyberspace

Costigan, Sean S., and Todor Tagarev. "Countering Crime, Hate Speech, and Disinformation in Cyberspace." Connections: The Quarterly Journal 20, no. 2 (2021): 5-8.

Today, cyberspace is deeply challenged by a variety of largely political concerns. This new humanizing of cyberspace may seem fitting to some who fretted for years over a relative lack of high-level political interest in the world’s only new “domain.” With cyber now being the topic of the day, it is easy to forget that, however notional, cyber was considered too technical to be worthy of elite policy attention until suddenly it was red hot and everywhere.

20.2.00_cybercrime_disinformation_.pdf — Downloaded 1714 times

Best Practices in the Application of the Concept of Resilience: Building Hybrid Warfare and Cybersecurity Capabilities in the Hungarian Defense Forces

Hugyik, Andras. "Best Practices in the Application of the Concept of Resilience: Building Hybrid Warfare and Cybersecurity Capabilities in the Hungarian Defense Forces." Connections: The Quarterly Journal 19, no. 4 (2020): 25-38.

Introduction: Applying the Concept of Resilience in Hungary

The purpose of applying the concept of resilience is to strengthen the abilities of systems, organizations, policies, and individuals to respond well to external impacts. Many experts agree that “the recent enthusiasm for the concept of resilience across a range of policy literature is the consequence of its fit with neoliberal discourse.

19.4.02_hugyik_hybrid_cyber_hungary.pdf — Downloaded 3312 times

The Concept of Resilience: Security Implications and Implementation Challenges

Fluri, Philipp, and Todor Tagarev. "The Concept of Resilience: Security Implications and Implementation Challenges." Connections: The Quarterly Journal 19, no. 3 (2020): 5-12.

In recent years, the notion of resilience has experienced an astonishing expansion away from the area of its original application and transformation of its meaning.

19.3.00_fluri_tagarev_editorial.pdf — Downloaded 2917 times

Assessing the Maturity of National Cybersecurity and Resilience

Sharkov, George. "Assessing the Maturity of National Cybersecurity and Resilience." Connections: The Quarterly Journal 19, no. 4 (2020): 5-24.

Introduction

Modern digitized societies and economies are globally interconnected and increasingly interdependent as a result of global digital connectivity and dependency on digital infrastructure, communications, and systems. The analysis of these interdependencies and emerging complex vulnerabilities and threats requires a holistic approach, which goes well beyond the personal, the enterprise, or the sectoral cybersecurity measures.

Pages