Former US defence chief calls for public and private sector cyber taskforce

Non-state actors must be let in on cyber security discussions or our biggest public institutions will fall behind

Former US secretary of state Madeleine Albright

Despite myriad benefits businesses have accrued from technological leaps, bad actors are finding it easier and cheaper than ever before to abuse the internet by stealing trade secrets and spread disinformation.

Collaboration between the institutions we rely on and private sector organisations is critical, according to former US secretary of state Dr Madeleine Albright, because non-state actors now own swathes of the physical infrastructure the internet is built on.

If private sector tech firms and non-governmental organisations (NGOs) aren't let in on conversations around how to combat emerging cyber threats at a state-to-state level, they will begin to crumble as cyber threats continue to evolve, she argued.

"Of course the technological revolution has been an incredible gift in several ways," Albright told delegates during a special address at this year's Citrix Synergy, "but we still don't know whether information technology is simply the latest in a line of advances that have helped to modernise the world without doing much to civilise it.

"I hardly need to describe for this audience how bad actors, whether governments or criminal groups, have taken advantage of the internet to pilfer trade secrets, surveille critical infrastructure and cause economic or even physical damage."

As a means of showing how quickly the world has changed in a short space of time, Albright revealed that she didn't even have a computer on her desk, let alone an email address, when in office.

Emerging cyber threats, like state-sponsored disinformation campaigns, were quite simply not something Albright had to concern herself in her role as secretary of state.

"The cyber threat that has continued to evolve is something we need to keep looking at," she continued.

"For all the warnings that were issued for a cyber Pearl Harbour, it appears now that the most immediate threat are attacks that are harder to deter because they stop short of what we would consider an act of war."

In recent years, enemies have become skilled at abusing social media platforms to pollute users' feeds with rumours and disinformation, as well as anti-democratic propaganda. She also cited Russian television adverts that warn viewers that 5G wireless technology could kill you.

This form of cyber warfare is running rampant among forces not just within Russia, but the likes of China, North Korea, Venezuela and Turkey, as well as extremist groups littered across the world.

To fight this global issue, which is akin to "assembling an airplane while already in the air", businesses must follow the lead of firms like Microsoft, which has spearheaded joint-efforts with NGOs and other companies to create 'rules of the road' to protect digital society.

"Of course I'm not saying that we should put non-state actors at every decision table," she added. "But the international system needs to adjust to the impact of these agents of change and they need to be there at the beginning of decision-making and not just to pick up the pieces."

Any such efforts to engage in discussions and share best practice, led by businesses in the international interest, would be crucial to preventing a cyber arms race between nations.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021
What is cyber warfare?
Security

What is cyber warfare?

23 Mar 2021
Cisco to acquire threat intelligence provider Kenna Security
Acquisition

Cisco to acquire threat intelligence provider Kenna Security

14 May 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

14 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell XPS 17 (2021) review: A big laptop for big jobs
Laptops

Dell XPS 17 (2021) review: A big laptop for big jobs

10 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021