Cybersecurity

Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces

Baezner, Marie. "Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces." Connections: The Quarterly Journal 19, no. 1 (2020): 63-72.

Policy Highlights

Like in any other European state, cybersecurity has grown in importance in Swiss politics. And although Switzerland’s cybersecurity and defense policies are still a work in progress, the nation has made tremendous efforts in getting cybersecurity policies, roles, and responsibilities right.

19.1.06_cybersecurity_switzerland.pdf — Downloaded 138 times

Israel Defense Forces and National Cyber Defense

Tabansky, Lior. "Israel Defense Forces and National Cyber Defense." Connections: The Quarterly Journal 19, no. 1 (2020): 45-62.

Michael Warner, the Cyber Command Historian at the U.S. Department of Defense, outlined the main theoretical insights for American policy-makers and officials: Computers can spill sensitive data and must be guarded (1960s); Computers can be attacked and data stolen (1970s); We can build computer attacks into military arsenals (1980s and 1990s); Others might do that to us – and perhaps already are (1990s). But new opportunities to exploit vulnerabilities make this a challenging field.

19.1.05_cyber_defence_israel.pdf — Downloaded 171 times

Responding to the Cyber Threat: A UK Military Perspective

Lester, Phil, and Sean Moore. "Responding to the Cyber Threat: A UK Military Perspective." Connections: The Quarterly Journal 19, no. 1 (2020): 39-44.

In 2015 through the UK National Security Strategy and Strategic Defence Review, the Government recognised the growing threat to our national stability, security and prosperity from activities occurring in, and from, cyberspace.

19.1.04_cyber_reponse_uk_military.pdf — Downloaded 141 times

Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward

Kaponig, Hermann. "Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward." Connections: The Quarterly Journal 19, no. 1 (2020): 21-37.

Policy Highlights: Austria’s National Military Cyber Defense Policy Within a Whole-of-Government Context

The “Austrian Security Strategy: Security for a New Decade – Shaping Security,” adopted by the Austrian National Council in 2013 (ÖSS 2013)  was followed in the same year by the “Austrian Cyber Security Strategy” (ÖSCS 2013), which was produced in accordance with the ÖSS. Both documents were developed at the national level.

19.1.03_cyber_policy_austria.pdf — Downloaded 143 times

Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr

Leinhos, Ludwig. "Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr." Connections: The Quarterly Journal 19, no. 1 (2020): 9-19.

Policy Highlights

In Germany, the provision of cybersecurity—i.e. a condition where risks from cyberspace have been reduced to an acceptable minimum—is a whole-of-government task. This is laid down in the 2016 White Paper, the current basic document on German security policy. There are few areas where internal and external security are as closely intertwined as they are in cyberspace. This includes the joint protection of critical infrastructure.

19.1.02_cyber_defence_germany.pdf — Downloaded 167 times

National Cyber Defence Policies and the Role of International Cooperation

Tarien, Jaak. "National Cyber Defence Policies and the Role of International Cooperation." Connections: The Quarterly Journal 19, no. 1 (2020): 5-7.

Digitalization has made our societies vulnerable to cyber threats – from electric grids to elections. This is also true for militaries, and cyber defence has become a natural task for all defence organizations. Cyber threats cannot be considered as new threats anymore. However, the cyber threat landscape is changing rapidly, and will continue to do so. Malicious viruses, hackers, hacking, etc., are still part of this landscape, but cyber weapons and cyberattacks originating from nation states are the primary security concerns today.

Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives

Pages