EU ISA CSCG Position Paper
EU ISA CSCG Position Paper
SUMMARY
We need new, more flexible and dynamic models to address the enormous
unfamiliar challenges that arise from the ubiquitous nature of digital technology
and the inherent vulnerabilities that come with it. These challenges are simply
too complex for governments to manage alone. We need to develop and exploit a
new partnership between governments and the businesses that own and operate
the critical infrastructure, that provide the services essential to a modern
economy and that hold the personal data of almost all European citizens.
We also need to understand the cyber threat in a broader context. It is not just
about technology, but also has significant economic and public policy
implications.
The Internet Security Alliance (ISA) and the Cyber Security Council Germany
(CSCG) propose a modern “Social Contract” between industry, governments and
citizens. This “Social Contract” will leverage market economies to create a
1
sustainable system of cyber security while incentivizing innovation, investment
and economic development.
The point is that technological analysis can only describe HOW cyber-attacks
occur. If we want a sustainable system of cyber defence, we also need to
understand WHY the attacks occur and WHAT the real damage is. Designing
technology security policy without considering economics is as misguided as
constructing economic policy without considering technology.
Discussions on the interplay between economics and cyber security have often
been characterized by superficial analysis and unsubstantiated assumptions.
What we need is a detailed and careful analysis of this interplay in order to
develop policies, which will assure Europe’s economic future as well as
safeguarding our systems, and the personal data they hold.
So WHY are our cyber systems under attack? The answer is straightforward: it is
because all the incentives favour the attackers:
2
- Cyber-attack methods are cheap and easy to access - they can be
purchased on the Internet for just a few hundred Euros. And looked at
from the “business” perspective of the criminal, even the so-called
“Advanced Persistent Threats (APTs) are comparatively cheap. This is
particularly true when digitalization allows the same attacks to be used
repeatedly on thousands of different targets.
- Modern cyber attackers can quickly and cheaply adapt their attack methods
in response to the defensive systems they encounter (one of the main
reasons why imposing a static regulatory regime is completely ineffective).
On the other hand, the economics of digital defence are much less attractive:
- Law enforcement has had virtually no impact on the problem. Less than 1%
of cyber attackers are successfully prosecuted.
Although private sector investment in cyber security has more than doubled in
the past 5 years ---now approaching $100 billion annually (1)---multiple large-
scale empirical global studies show that the single biggest obstacle to deploying
effective security is cost. (2)
3
Further complicating the economic balance between cyber-attack and defence is
the fact that private entities must now defend themselves from attack from
nation states or nation state affiliated proxies. No private entity can reasonably
be expected to match the resources of a major nation state, its military or its
sponsored proxies. Yet state-sponsored attacks have already been documented
and may well be growing.
This commercial risk-based level of security may often fall below what a
government - with its broader responsibility to protect the state and its citizens –
will find acceptable. Governments must consider not just economic but also non-
economic requirements (e.g. national security), and these may require a higher
level of security than businesses need using their commercial criteria.
Therefore, while private enterprise and governments use the same networks,
they may quite legitimately have different views of what counts as “adequate”
security. Finding a way to bridge the gap between commercial and government
security is a unique cyber security problem.
4
One of the most important and least understood aspects of the cyber security
equation is the growing trade-off between business competitiveness and digital
security.
It has often been suggested that business efficiency and productivity would
generate adequate security investments to resolve cyber security issues without
government intervention.
The last decade has seen a vast global array of technological innovations for
businesses. These are often necessary for businesses to remain competitive, yet
they undermine digital security. To list just a few examples:
- Supply Chain Security. Virtually all manufacturing is now done through the
use of long international supply chains. While these supply chains create
enormous cost effectiveness they are virtually impossible to fully secure.
- BYOD (Bring Your Own Device). The near ubiquitous diffusion of smart
phones and tablets has created a generation of people who come to work
expecting to use their own devices to conduct company business.
Permitting such behaviour is often an important factor in attracting top-
5
flight younger employees, it can create substantial business savings, and
yet the security issues are obviously multiplied tremendously.
Of course, businesses do take steps to mitigate the risks of these and other
insecure practices. However, virtually all these steps will inflict financial costs on
a business. The bottom-line is that economics must be an intrinsic part of any
public policy for cyber security.
The digital world in general is different, and the cyber security landscape is
particularly different. Digital technology tends not to fit well into traditional
regulated categories, which makes compliance and enforcement difficult:
6
- Attack methods vary widely and change almost constantly, so that it is
difficult to keep the regulations responsive to current threats.
How does current EU policy on cyber security policy line up with these
arguments?
Unfortunately, in its draft NIS Directive, the EU Commission seems to follow the
outdated notion that cyber security is primarily a technical issue. Moreover, it
seems to have little appreciation of the complicated economics that underline the
cyber environment. In fact, the EU policy proposals would apply a largely
7
inappropriate traditional regulatory structure, which is likely to be ineffective in
managing the quickly evolving and dynamic threat we face from cyber-attacks.
To take some specific examples, the draft NIS Directive requires that:
8
- MS should adopt “effective, proportionate and dissuasive” sanctions for
non-compliance. Exactly what this means and how such sanctions will be
reconciled between MS are unclear.
9
AN ALTERNATIVE – A ‘SOCIAL CONTRACT’ MODEL
The Internet Security Alliance and the Cyber Security Council Germany proposes
that the EU Commission should consider an alternative model, based on a social
contract, a partnership between industry, government and science. In this
approach, government provides economic incentives for private companies to go
beyond what they regard as a commercially appropriate level of security, thus
providing enhanced security for both governments and individuals.
This operating model recognizes that the private sector possesses resources and
expertise for cyber-security, which outstrip those available to governments. It
aims to incentivize private companies to constant innovation in security
standards, practices and technologies, including techniques that may well be
uneconomic to deploy on a strictly commercial basis.
10
private insurance market and reward good actors with regulatory forbearance
and streamlined processes.
The United States government is already moving down this path. In 2012, it
abandoned its centralized government regulatory approach, one very similar to
that now under discussion in the EU presently. Instead, it has opted for an
enhanced version of the partnership model.
11
- All international companies will be required in practice to accommodate
both the US and EU systems. This will increase costs and divert resources
that would be better devoted to innovation and job creation - without
actually enhancing cyber security.
12