ITU Regional Workshop on Bridging the Standardization Gap (Yangon, Myanmar, 28-29 November 2013) Cybersecurity-Related Standardization Initiatives in the EU and the U.S.: Lessons for Developing Countries Nir Kshetri Professor, The University of North Carolina—Greensboro nbkshetr@uncg.edu Yangon, Myanmar, 28-29 November 2013 Yangon, Myanmar, 28-29 November 2013 2 The EU and US cybersecurity strategies (CSS) Strategy Document Released/ signed Key agencies to implement / roles EC’s CSS and a proposed directive on network/ information security February 7, 2013 US EO February 12, 2013 ENISA: NIST: develop a CS Assist the Member States in framework: finalizing developing cyber resilience voluntary standards and capabilities procedures to help Examine the feasibility ICS- companies address CS CSIRTs risks. Support in Cyber incident Pentagon: recommend exercises to test whether CS standards preparedness/ cope with should be considered in cyber-disruptions. contracting decisions. Kshetri & Murugesan (2013). Yangon, Myanmar, 28-29 November 2013 3 EU CSS Constraints / next steps The European Parliament needs to approve Member States have to write it into national legislation. US EO Weak legal footing It cannot compel firms to comply – only legislation can do that. Vision/pri Achieving cyber resilience Combat cyberattacks Reducing cybercrime, orities and cyber-espionage Developing cyber defense on government policy and capabilities agencies and critical related to the Common sectors such as Security and Defense banking, power and Policy (CSDP) transportation Developing industrial and technological resources for industries and U.S. CS companies. Establishing a coherent international cyberspace policy/promoting core EU Yangon, Myanmar, 28-29values November 2013 4 Key Concerns EU CSS Appropriateness of pan-European rules Compliance costs : concerns of the private sector’s confidentiality, extra costs and possible damage to reputation. Obligation to report cyberattacks: “vague”/ little to protect EU citizens' data stored outside the EU Misdirection of funds away from the police into intelligence agencies Yangon, Myanmar, 28-29 November 2013 US EO Voluntary standards may turn into mandatory regulations (de facto requirements). Too much focus on information sharing/ little to address problems related to insecure system. Firms outside of critical infrastructure: EO does little to enhance CS. 5 Effects on the Private Sector EU CSS Further development of European PPP for resilience/ cooperation/ info. sharing with pub. authorities. Investment on CS/dev. of best practices- TDL/other initiatives. Robust/user-friendly security features in products/services. Cloud providers: reduce reliance on foreign suppliers. Members: compel firms (transport, telecoms, finance energy, health, online infra.) to disclose details of cyberattacks to the national CERT. Yangon, Myanmar, 28-29 November 2013 US EO Defense and intelligence agencies would share classified cyberthreats data with companies. Incentives to follow security standards. Companies are not required to publically disclose breaches unless identifying information (e.g., credit card or Social Security numbers) is involved. 6 Effects on Privacy and Security Interests of Consumers EU CSS Defensible and preferable in promoting privacy and security interests of consumers. Yangon, Myanmar, 28-29 November 2013 US EO White House: shared information would be limited to cyberthreats and would not contain the contents of private emails. The flow of data is one-way: Private-sector firms not required to release information about clients. Better protect privacy than the CISPA (ACLU). “privacy-neutral way to distribute critical cyber information” 7 Discussion of EU and US CSS Both incomplete/lack teeth and legitimacy Companies’ failure to spend sufficient resources/efforts to protect networks: Bloomberg Government study: to prevent 95% of potential cyberattacks, 172 organizations need to spend $47b: 774% higher than current spending. Absence of regulatory requirements: no incentive to spend on cybersecurity. Yangon, Myanmar, 28-29 November 2013 8 Discussion of EU and US CSS Fail to acknowledge: lack of CS professionals. The U.K.’s National Audit Office: 20 years to bridge CS skills gap. NIST: > 700,000 new CS professionals needed in the U.S. by 20 Both inward-oriented Huawei: importance of working globally US-China Business Council: asked US and Chinese governments to work together Yangon, Myanmar, 28-29 November 2013 9 Lessons for Developing Countries Sound cybersecurity standard/ regulatory framework: participation of governments, business, IT industry, law enforcement agencies and the public Common goal: cyberspace safe and secure, leaving their Working with other national govts, political parties: beyond vested national or political party interests Yangon, Myanmar, 28-29 November 2013 10 Conclusions and Recommendations Increasing importance of CSS for developing countries National security, economic growth, trade and investment politics, international relations and other implications Higher degree of vulnerability Manpower challenges a higher concern Yangon, Myanmar, 28-29 November 2013 11