| GARMISCH-PARTENKIRCHEN, Germany -- The light goes out. Residents 
			look to the utility company to fix it, but it's a cyber-attack, and 
			the privately-owned company is not equipped to handle it. The public 
			then looks to the government, which does have the resources for such 
			an attack, but does not provide the electricity. 
		
			| 
			 Marty Edwards, assistant deputy director of National Cybersecurity and Communications Integration Center, and director of Industrial Control Systems, Cyber Emergency Response Team at U.S. Department of Homeland Security, talks about how critical infrastructure is not uniquely or entirely owned by the government so a partnership between the government and the private sector should exist to 81 cyber-security professionals from 22 countries at the International Cyber Summit Sept. 22, 
			2015 at the George C. Marshall European Center for Security Studies at the George C. Marshall European Center for Security Studies in Garmisch-Partenkirchen, Germany. (Marshall Center photo by Karl-Heinz Wedhorn)
 |  “That's the ‘Triangle of Pain,' where nobody quite knows who is 
			responsible for protecting critical infrastructure from 
			cyber-attacks,” said Simon Ruffle, director of Technology Research 
			and Innovation at the Centre for Risk Studies at Cambridge 
			University. “You've got the public looking to and expecting the 
			government to keep the critical infrastructure working. To fulfill 
			that, the government has to talk to the private sector.”
 Government partnership with private industry was one of the main 
			topics covered at the “Protecting Critical Infrastructure and Key 
			Resources in, from and through Cyberspace” summit held Sept. 22 and 
			23, 2015 at the George C. Marshall European Center for Security 
			Studies.
 
 “We have to work together,” said Charles Kosak, 
			deputy Assistant Secretary of Defense for Defense Continuity and 
			Mission Assurance in Washington, D.C. “The cyber threats that exist 
			today are so complicated and bigger than any one individual, 
			directorate, department, agency or even governments. These 
			challenges require governments to work together, to include outreach 
			and partnership with the private sector and industry.”
 
 More than 80 cyber experts working in government 
			agencies and privately-owned companies from 22 countries attended 
			the conference, sponsored by the U.S. European Command and Marshall 
			Center.
 
 “The Marshall Center is a great institution and was 
			key in bringing policymakers and cyber experts together to talk 
			about how we can address cyber-attacks in the future,” said U.S. 
			Army Brig. Gen. Welton Chase Jr., director of Cyber at EUCOM.
 
 In December 2014, the Marshall Center developed a comprehensive 
			program to explore the increasing domestic, international and 
			transnational challenges in cyber security – Program on Cyber 
			Security Studies.
 
 “Our new cyber security course aims very 
			high,” said Dr. Robert Brannon, dean of the College of International 
			and Security Studies at the Marshall Center. “Our objectives are to 
			influence good governance by way of legislation, policy, and 
			strategy. Lots of other institutions are addressing cyber security 
			threats at the technical level – but as far as I know, we are the 
			only ones looking specifically at policy.”
 
 Guest speakers 
			included ministries of interior, ministry of internal security and 
			U.S. Department of Homeland Security officials, as well as private 
			industry professionals.
 
 “For me and our working group, it's 
			been very helpful to hear (other government agencies and private 
			industry) perspectives that we in the DOD don't often hear,” said 
			Dr. John Clarke, professor of leadership, management and defense 
			planning at the Marshall Center, and who led one of the focus group 
			during the conference. “The question I think we all have to answer 
			is what is the proper role of the Ministry of Defense – DOD – in 
			ensuring that not only its cyber security, but also cyber security 
			that is in private hands. It's incumbent upon the military to find a 
			way to work effectively with private industry to ensure the 
			reliability of those systems.”
 
 Presentations and panel 
			discussions covered in the two days included: identification of best 
			practices in the absence of standards; working together to bring 
			best practices forward to industry to be adopted as standards or 
			best practices; risk management and security controls in a mission 
			assurance environment; the industry standards used to perform 
			self-assessments of cyber health and threats; and, the challenges of 
			conducting normal daily activities while under the constant threat 
			of adversaries.
 By Christine JuneGeorge C. Marshall Center for Security 
			Studies
 Provided 
					through DVIDS
 Copyright 2015
 
					
					
					
					Comment on this article |