the new problem of cybersecurity policy

35
The New Problem of Cybersecurity Policy

Upload: hertz

Post on 23-Feb-2016

34 views

Category:

Documents


0 download

DESCRIPTION

The New Problem of Cybersecurity Policy. Presentation Outline. General Principles & Definitions Unique Factors Affecting Cybersecurity Policy Brief Assessment of Bush vs. Obama Cybersecurity Policy The Way Forward. I. General Principles and Definitions. Public Policy. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The New Problem of  Cybersecurity  Policy

The New Problem of Cybersecurity Policy

Page 2: The New Problem of  Cybersecurity  Policy

Presentation Outline

I. General Principles & DefinitionsII. Unique Factors Affecting

Cybersecurity PolicyIII. Brief Assessment of Bush vs.

Obama Cybersecurity PolicyIV. The Way Forward

Page 3: The New Problem of  Cybersecurity  Policy

I.General Principles and

Definitions

Page 4: The New Problem of  Cybersecurity  Policy

Public Policy

Definition: Public Policy is a collection of unofficial norms, written laws, and administrative regulations that guide and constrain the behavior of actors within a policy arena.

Page 5: The New Problem of  Cybersecurity  Policy

Policy Arena: Definition

A functional field of action within which disparate actors are guided and obligated to abide by a common policy.

Page 6: The New Problem of  Cybersecurity  Policy

Policy Arena: Typical Actors & Elements

1. Traditional Political Institutions (Congress/Presidency/Courts)

2. National Administrative Agency3. State Administrative Agencies4. Interest Groups (Private/Public5. Norms6. Individuals and Organizations Subject

to Norms of Policy Arena

Page 7: The New Problem of  Cybersecurity  Policy

Creating and Growing a Policy Arena in a

Federal System is Very Difficult

Page 8: The New Problem of  Cybersecurity  Policy

General Rules for Creating & Growing a Federal Policy

Arena

Maximize Support Constituents: Those who be benefit

disproportionately Clients: Those who mildly benefit

Minimize Barriers Victims: Those who suffer from or

significantly coerced by the Policy

Page 9: The New Problem of  Cybersecurity  Policy

Federal Policy Arena Growth Must Be in Two Directions

Page 10: The New Problem of  Cybersecurity  Policy

Vertical Barriers

The U.S. Constitution 10th Amendment Diversity of State Cultures Diversity of Local Culture Private Property Rights

Federal Resources

Page 11: The New Problem of  Cybersecurity  Policy

Vertical Construction:Intergovernmental Command and

Control Hierarchies

Generating Support Sense of Vulnerability Desire to be Regulated $$$$

The Golden Rule Intergovernmental Monetary Transfers

(NIMS)

Page 12: The New Problem of  Cybersecurity  Policy

Horizontal Growth: Construction of Policy Networks

Barriers Mistrust Indifference or Unawareness of the Problem Lack of threat or other incentives to collaborate (Ohio Dept

Agriculture)

Support Strong State/Local/Regional Government Support Strong Private Sector Support Sense that a Regional Problem Exists that Federal

Government Policy does not address (International Symposium on Agroterrorism)

Page 13: The New Problem of  Cybersecurity  Policy

The End Result: US Federal Policy Arenas

Education

Labor

Enviromment

Nuclear

Cyber

Security

Federal

State

Local

Page 14: The New Problem of  Cybersecurity  Policy

II.Unique Factors Affecting the Creation & Growth of

a Cybersecurity Policy Arena

Page 15: The New Problem of  Cybersecurity  Policy

Comparing Policy Arenas

Nuclear Policy: History(65 Years)

Cybersecurity Policy: History(8 Years)

1946: AEC

1947: NSA

1974:NRC

1950:CDA

2003:NSSC--Bush

2009:CPR—ObamaCyber-Czar

Present: 2011

Present: 20112011:DSOC (July)

Page 16: The New Problem of  Cybersecurity  Policy

Nuclear vs Cyber Technology

Nuclear Technology Lethal

Origins: World War II Established Opposition

Groups that oppose Regulation

Centralized Highly Restricted Use

(expensive licenses, strict supervision, extensive training

Cyber Technology Non Lethal

Origins: Peacetime Fulcrum of Domestic

Economy Regulation

Decentralized Unregulated Citizen Use

(no license or supervision or training required)

Page 17: The New Problem of  Cybersecurity  Policy

The Tribble Problem

Page 18: The New Problem of  Cybersecurity  Policy

3 Essential Components of a

Cybersecurity Policy Arena

1. Intergovernmental Authority Hierarchy

2. Voluntary Public/Private Networks3. Citizen Acceptance & Support

of Cybersecurity Policy Norms

The Cybersecurity Triad. Journal of Homeland Security & Emergency Management, 2009, Vol 6, Issue 1, Article 79

Page 19: The New Problem of  Cybersecurity  Policy

1: The Intergovernmental Cybersecurity Hierarchy

Vertical

Construction

Federal Political Institutions & Administrative Agencies

State Political Institutions & Administrative Agencies

Local Political Institutions & Administrative Agencies

Top Down

Bottom Up

Page 20: The New Problem of  Cybersecurity  Policy

2: The Horizontal Network

Horizontal Construction: Policy Networks

No Hierarchy: Voluntary Coordination

Private Corporations

Public Agencies

Example: Infragard

Page 21: The New Problem of  Cybersecurity  Policy

3: Citizen Acceptance of Policy Arena Norms

Essential for Survival of Policy Arena

Facilitated by Educational Campaigns Crisis that Shapes public opinion Citizen Awareness of Threat/Danger

Page 22: The New Problem of  Cybersecurity  Policy

The Components of aCybersecurity Policy Arena

The Cybersecurity Triad

Cybersecurity Cit-izenship Norms

Public/PrivateNetworks

CybersecurityIntergovernmentalHierarchy

Page 23: The New Problem of  Cybersecurity  Policy

III.A Brief Assessment of the Differing Bush and Obama

Approaches to Cybersecurity Policy

Page 24: The New Problem of  Cybersecurity  Policy

Bush Era Cybersecurity Initiatives

National Strategy to Secure Cyberspace (2003)

National Infrastructure Protection Plan NIPP 2006 NIPP IT Sector Specific Plan 2007 NIPP 2009

Comprehensive National Cybersecurity Initiative 2008

Page 25: The New Problem of  Cybersecurity  Policy

The Bush Soft Management Cyber Approach

Managing and Coordinating Sector Responsibilities:As described in HSPD-7, the DHS is responsible for managing and coordinating IT Sector CI/KR protection activities, including leading the development of an SSP for the IT Sector. Within the department, this responsibility has been delegated to NCSD. Sector responsibilities include maintenance and update of the SSP, annual reporting, resources and budgets, and training and education. Public and private sector security partners have common and unique roles and responsibilities

NIPP Information Technology Sector Specific Plan, 2007, p 4

Page 26: The New Problem of  Cybersecurity  Policy

The Bush Era Approach

Minimal Attention to Cybersecurity Citizenship Norms

Extensive Reliance Upon Public/Pri-vateNetworks

Cautious Construc-tion of a Cybersecu-rityIntergovernmentalHierarchy

Page 27: The New Problem of  Cybersecurity  Policy

The Obama Era Approach

Minimal Attention to Cybersecurity Citizenship Norms

Defacto Reliance onPublic/PrivateNetworks

White House Con-trol of the Cyber-securityIntergovernmentalHierarchy

Page 28: The New Problem of  Cybersecurity  Policy

Obama Era Cybersecurity Initiatives

Appointment of Cyber Coordinator, January 2009 Cyberspace Policy Review, March 2009 Legislative Initiative, May, 2011 (déjà vu)

Reinsertion of DHS into Cybersecurity Loop Emphasis of Public/Private Networks

Page 29: The New Problem of  Cybersecurity  Policy

The Obama Top Down Approach

I. Leading from the Top

Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and privacy protections, national security, and the continued advancement of democratic institutions requires making cybersecurity a national priority. Accomplishing this critical and complex task will only be possible with leadership at the highest levels of government.

Cyberspace Policy Review, March 2009

Page 30: The New Problem of  Cybersecurity  Policy

Finding aWhite House Cybersecurity Coordinator

The Nation’s First Cyber-CzarDecember 22, 2009

February to April 2009

Produced Cyberspace Policy Review, March, 2009

Melissa Hathaway

Howard A. Schmidt

Page 31: The New Problem of  Cybersecurity  Policy

The GAO Assessment of CNCI: December 2008 Through March 2010

Agency Roles not Defined No Effectiveness Measures Little Leadership/Transparency Little Progress in Public Education

GAO-10-338

Page 32: The New Problem of  Cybersecurity  Policy

IV.The Way Forward

Page 33: The New Problem of  Cybersecurity  Policy

Combine Incrementalism & Strategic Vision

Page 34: The New Problem of  Cybersecurity  Policy

IncrementalismAccept Limitations Lack of Resources Public Lacks Appreciation for

Cyber Threat The Outline of the

Intergovernmental Hierarchy is barely recognizeable

Page 35: The New Problem of  Cybersecurity  Policy

StrategyBuild the Cybersecurity

Triad Intergovernmental hierarchy Public/Private network Citizen Awareness