Securing Critical Networks

A new infographic featuring interviews with notable experts aims to help users make sense of emerging cybersecurity proposals.

It seems every day we learn about a new intrusion into government or civilian networks. Likewise, the plans and proposals to thwart such threats are multiplying. The White House released two strategies earlier this year -- one civilian and one international -- that attempt to carve a path forward in the lawless domain of cyberspace. On Thursday, Deputy Defense Secretary William J. Lynn III unveiled an unclassified version of a new cyber operations strategy. The Pentagon's approach focuses on defensive protections to stem the ever increasing number of military network intrusions.

To help readers navigate the thicket of emerging cybersecurity strategies and proposals, the Government Business Council, the research arm of Nextgov and sister publication Government Executive, has created an interactive map that aims to guide federal, corporate and personal Internet users through the rules of the road under development. Each icon on the graphic directs visitors to a video featuring academic and policy experts who explain how the government should partner with the public and private sectors immediately and over the long haul to defend cyberspace.

Throughout July, the Governing Security in a Networked World infographic will launch new episodes every two weeks on this website, according to Erin Dian Dumbacher, associate director of research at the Government Business Council.

In upcoming segments, experts will share their views of emerging cyber policies. For example, Richard Weitz, a political-military analyst at the nonprofit Hudson Institute, says the various departmental agendas likely will not be set in stone, but rather will be living frameworks that agencies revisit periodically.

Frank J. Cilluffo, a former White House official and director of The George Washington University's Homeland Security Policy Institute, notes that the White House's international strategy says loud and clear that grave attacks in cyberspace are akin to physical attacks. "It put some important markers in the sand that they are going to maintain strategic ambiguity in terms of how they will respond, but it did make clear they will respond and they may do so through instruments beyond cyber. In other words, military instruments could be part of that strategic deterrent," he says.

But "time will tell as to whether it can be implemented as forcefully it is put into words right now," Cilluffo adds.

John Sheldon, a researcher at the George C. Marshall Institute, a public policy think tank, says the White House's defense strategy "does not mean that the next time China interferes with Google that we're going to see B-2 bombers flying over Beijing. There is not going to be anything as simplistic as that, thankfully."

The strategy instead "gives us the impetus to engage with who we think are the perpetrators of the attack -- and holds them accountable. That doesn't have to be through military means," he notes. "It can be done through economic sanctions. It can be diplomatically, such as with a demarche or a protest. It could also be done in an international organization -- such as the World Trade Organization, which covers issues such as intellectual property rights, which is a big issue in cybersecurity."

The Pentagon's strategy underscores the nation's economic interests in blocking cyber intruders by emphasizing the protection of the intellectual property that gives the military its battlefield edge.

U.S. startup companies also may gain more government business opportunities under the plan. "We have added half a billion dollars in research and development funds for cybersecurity, launched our 'cyber accelerator' initiative to provide seed capital for defensive technologies, continued developing a 'cyber training range' to test new technologies, and partnered with the national labs and leading research institutions," Lynn says.

Watch for more Nextgov video clips this month from interviews with Estonian President Toomas Hendrik Ilves and Sen. Sheldon Whitehouse, D-R.I. They will address the balancing act public-private partnerships must pull off to successfully guard against attacks.

The last series, to be released Aug. 1, will cover future challenges. Hear Cilluffo talk about the role of every gadget-user in fending off intruders. In addition, the experts will discuss cyber staffing needs at agencies, and the work that remains to be done in the international sphere.