Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Recommendations and Courses of Action: How to Secure the Post-Covid Future

Tagarev, Todor, Raphael Perl, and Valeri Ratchev. "Recommendations and Courses of Action: How to Secure the Post-Covid Future." In Transatlantic Security: Securing the Post Covid Future, 18-41. Vienna, Austria: Federal Ministry of Defense, 2020.

Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces

Baezner, Marie. "Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces." Connections: The Quarterly Journal 19, no. 1 (2020): 63-72.

Policy Highlights

Like in any other European state, cybersecurity has grown in importance in Swiss politics. And although Switzerland’s cybersecurity and defense policies are still a work in progress, the nation has made tremendous efforts in getting cybersecurity policies, roles, and responsibilities right.

19.1.06_cybersecurity_switzerland.pdf — Downloaded 347 times

Israel Defense Forces and National Cyber Defense

Tabansky, Lior. "Israel Defense Forces and National Cyber Defense." Connections: The Quarterly Journal 19, no. 1 (2020): 45-62.

Michael Warner, the Cyber Command Historian at the U.S. Department of Defense, outlined the main theoretical insights for American policy-makers and officials: Computers can spill sensitive data and must be guarded (1960s); Computers can be attacked and data stolen (1970s); We can build computer attacks into military arsenals (1980s and 1990s); Others might do that to us – and perhaps already are (1990s). But new opportunities to exploit vulnerabilities make this a challenging field.

19.1.05_cyber_defence_israel.pdf — Downloaded 405 times

Responding to the Cyber Threat: A UK Military Perspective

Lester, Phil, and Sean Moore. "Responding to the Cyber Threat: A UK Military Perspective." Connections: The Quarterly Journal 19, no. 1 (2020): 39-44.

In 2015 through the UK National Security Strategy and Strategic Defence Review, the Government recognised the growing threat to our national stability, security and prosperity from activities occurring in, and from, cyberspace.

19.1.04_cyber_reponse_uk_military.pdf — Downloaded 348 times

Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward

Kaponig, Hermann. "Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward." Connections: The Quarterly Journal 19, no. 1 (2020): 21-37.

Policy Highlights: Austria’s National Military Cyber Defense Policy Within a Whole-of-Government Context

The “Austrian Security Strategy: Security for a New Decade – Shaping Security,” adopted by the Austrian National Council in 2013 (ÖSS 2013)  was followed in the same year by the “Austrian Cyber Security Strategy” (ÖSCS 2013), which was produced in accordance with the ÖSS. Both documents were developed at the national level.

19.1.03_cyber_policy_austria.pdf — Downloaded 365 times

Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr

Leinhos, Ludwig. "Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr." Connections: The Quarterly Journal 19, no. 1 (2020): 9-19.

Policy Highlights

In Germany, the provision of cybersecurity—i.e. a condition where risks from cyberspace have been reduced to an acceptable minimum—is a whole-of-government task. This is laid down in the 2016 White Paper, the current basic document on German security policy. There are few areas where internal and external security are as closely intertwined as they are in cyberspace. This includes the joint protection of critical infrastructure.

19.1.02_cyber_defence_germany.pdf — Downloaded 389 times

Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives

Pages