Former US defence chief calls for public and private sector cyber taskforce

Non-state actors must be let in on cyber security discussions or our biggest public institutions will fall behind

Former US secretary of state Madeleine Albright

Despite myriad benefits businesses have accrued from technological leaps, bad actors are finding it easier and cheaper than ever before to abuse the internet by stealing trade secrets and spread disinformation.

Collaboration between the institutions we rely on and private sector organisations is critical, according to former US secretary of state Dr Madeleine Albright, because non-state actors now own swathes of the physical infrastructure the internet is built on.

If private sector tech firms and non-governmental organisations (NGOs) aren't let in on conversations around how to combat emerging cyber threats at a state-to-state level, they will begin to crumble as cyber threats continue to evolve, she argued.

"Of course the technological revolution has been an incredible gift in several ways," Albright told delegates during a special address at this year's Citrix Synergy, "but we still don't know whether information technology is simply the latest in a line of advances that have helped to modernise the world without doing much to civilise it.

"I hardly need to describe for this audience how bad actors, whether governments or criminal groups, have taken advantage of the internet to pilfer trade secrets, surveille critical infrastructure and cause economic or even physical damage."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

As a means of showing how quickly the world has changed in a short space of time, Albright revealed that she didn't even have a computer on her desk, let alone an email address, when in office.

Emerging cyber threats, like state-sponsored disinformation campaigns, were quite simply not something Albright had to concern herself in her role as secretary of state.

"The cyber threat that has continued to evolve is something we need to keep looking at," she continued.

"For all the warnings that were issued for a cyber Pearl Harbour, it appears now that the most immediate threat are attacks that are harder to deter because they stop short of what we would consider an act of war."

In recent years, enemies have become skilled at abusing social media platforms to pollute users' feeds with rumours and disinformation, as well as anti-democratic propaganda. She also cited Russian television adverts that warn viewers that 5G wireless technology could kill you.

Advertisement - Article continues below

This form of cyber warfare is running rampant among forces not just within Russia, but the likes of China, North Korea, Venezuela and Turkey, as well as extremist groups littered across the world.

To fight this global issue, which is akin to "assembling an airplane while already in the air", businesses must follow the lead of firms like Microsoft, which has spearheaded joint-efforts with NGOs and other companies to create 'rules of the road' to protect digital society.

"Of course I'm not saying that we should put non-state actors at every decision table," she added. "But the international system needs to adjust to the impact of these agents of change and they need to be there at the beginning of decision-making and not just to pick up the pieces."

Any such efforts to engage in discussions and share best practice, led by businesses in the international interest, would be crucial to preventing a cyber arms race between nations.

Featured Resources

Transform the operator experience with enhanced automation & analytics

Bring networking into the digital era

Download now

Artificially intelligent data centres

How the C-Suite is embracing continuous change to drive value

Download now

Deliver secure automated multicloud for containers with Red Hat and Juniper

Learn how to get started with the multicloud enabler from Red Hat and Juniper

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now
Advertisement

Recommended

Visit/security/28170/what-is-cyber-warfare
Security

What is cyber warfare?

20 Sep 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/hardware/354193/buy-it-to-grow-not-slow-your-business
Sponsored

Buy IT to grow, not slow, your business

25 Nov 2019