Multilateral Approaches for Improving Global Security in Cyberspace by Bob Butler and Irving Lachow

Shop the Entire Special Issue- International Engagement on Cyber: 2012  ||  Return to International Engagement on Cyber: 2012 index


Bob Butler is the Vice President of Government Strategies for IO. Prior to assuming his current role he served as the first Deputy Assistant Secretary of Defense for Cyber Policy.

Irving Lachow is a Principal Cyber Security Engineer with the MITRE Corporation.


"Private sector actions should not encroach on the legitimate powers and roles of governments with- out both a clear mandate and legal guidelines..."
 
 "Alliance leaders and member nations must increase their knowledge of the threats they face and the capabilities they need to respond to those threats..."

Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share information and capabilities for mitigating those threats. This is necessary because cyberspace is an intercon- nected environment that provides tremendous benefits to nations, organizations and individuals. Unfortunately, this environment is also a haven for criminals, terrorists, and other actors whose intentions could undermine the value of the cyberspace commons for the majority of its users. If like- minded actors fail to understand and mitigate these risks, they are placing national and economic security in jeopardy.

Global security in cyberspace is predicated on nations coming together with like-minded will, intent, and capa- bilities to defend against common threats. This article will explore how multilateral approaches can be applied to the cyber security challenge.1 It begins by describing the impor- tance of principles and norms for building a common understanding of goals, terms and concepts. The awrticle then identifies the key players that must participate in a mul- tilateral framework. Although nation states are the principal actors in our proposed approach, businesses, political and military alliances, and international organizations must all play a role in securing the international cyber ecosys- tem. Our paper addresses the strengths and challenges that each player brings to the table, and ends with a summary of our findings. (purchase article...)