7-10 Jun 2011
7-10 Jun 2011
In 2011 the conference focused on the defensive and offensive aspects of cyber forces, combining different views on cyber defence and operations in current threat environments
The opening address was given by the President of the Republic of Estonia, Toomas Hendrik Ilves, who encouraged nations to develop new strategies and further develop procedures and capabilities. Ilves was followed by Major General Jonathan Shaw, who noted that although cyber awareness has improved, it is important to note that about 80% of cyber problems these days would disappear if people disciplined themselves with what he referred to as "cyber hygiene".
High level speakers warned participants not to over-emphasize any one response mechanism - cyber security is delivered in layers, and the military as the upper layer cannot function without the infrastructure, expertise and lessons learned from intelligence and law enforcement agencies, CERTs and the private sector.
A common theme was the difficulties encountered in the intersection between information sharing and privacy. While Jeff Bardin examined the lack of reciprocity and trust between governments, Hayretdin Bahşi stressed the relevant differences between attackers and defenders in this matter. Attackers have no problem with sharing vital information, but defenders have issues of organisational privacy and potential information loss to contend with.
Another key question is the ability of a nation to purchase the knowledge and skills necessary to combat cyber attacks. While governments cannot afford geniuses, there might be other ways of enlisting private sector brains and assets. Whether the example of the Estonian Cyber Defence league will be followed, or whether other strategies will be used, is a question for the future. On same note, Raoul Chiesa suggested thinking of hackers not only as enemies but as a sort of national resource that could be cultivated.
Charlie Miller, speaking about technical limitations and capabilities, argued that it is quite difficult to produce a completely invulnerable product; and since no regulations exist, it is almost impossible for the consumer to choose the safest product. As Robert Kohn and Charl van der Walt pointed out, the latter is an important issue since attackers often target commonly used applications such as Internet browsers or office software.
Many participants observed that nations will have to rely on help from the private sector, since cyber warfare capability relies on private sector expertise in information and network architecture, and trust. This reemphasized the importance of public-private partnership and their continuing development; a study consisting of a check-list, national lessons learned and guidelines would be a useful next step.
The underground market for malware and cyber criminals is growing with demand. As Ralph Langner reminded participants in his presentation about Stuxnet, it took a lot of resources and a great mind to create the first nuclear bomb, but copying it was an easy feat. The same principle applies to the cyber world; copying Stuxnet will be easier than creating it was.
The conference concluded with a presentation of the NATO cyber defence policy that was endorsed by the NATO defence ministers on Wednesday. A NATO official stressed that NATO's cyber defence capabilities will focus on the protection of its own networks and those networks CRUCIAL to carrying out critical tasks for the Alliance. A detailed action plan has been approved by the defence ministers together with the policy specifying tasks for all NATO bodies involved in cyber defence and the NATO CCD COE.
The conference was supported by European Union Regional Development Fund and Netwitness.
Conference articles and videos are available here.