Chapter 1 – The Economics of Cybersecurity: Advantage Attackers
Chapter 2 – Dangerous and Effective: China’s Digital Strategy
Chapter 3 – The Solar Winds of Change: The Threat of Systemic Cyber Risk
Chapter 4 – Outdated and Ineffective: Why Our Current Cybersecurity Programs Fail to Keep Us Safe
Chapter 5 – Reinventing Cybersecurity: A Strategic Partnership Approach
Chapter 6 – The Cybersecurity Policy We Need: Incentivize, Modernize, Economize
Chapter 7 – Health: Cybersecurity as a Core Element of Patient Care
Chapter 8 – Defense: Leveraging the Dual Economies of the Defense Industrial Base
Chapter 9 – Financial Services: Regulation Isn’t Enough
Chapter 10 – Energy: Protecting the Smart Grid
Chapter 11 – Retail: Serving Consumers and Keeping Them Secure
Chapter 12 – Telecommunications: Managing International Risk in a Post-COVID-19 World
Chapter 13 – Information Technology: Defining How to Govern IT
In the last three decades China has, in the terms of the World Bank, created the most successful economic development story in human history. The Chinese Government was quick to recognize the strategic opportunities of digital transformation. The Chinese embraced the economics of cybersecurity by utilizing the vulnerabilities in the cyber infrastructure to stimulate their own economy – in large part through the cyber theft of western intellectual property and business models. They have also developed a sophisticated, integrated and financially supported digital strategy known as the Digital Silk road (part of their larger Belt and road Initiative) which essentially implemented a 21st century version of the Marshall Plan to create a strategic advantage over the west. Operating through their own form of “state capitalism” China has provided massive supports to its technology industry through firms like Huawei, China Telcom, Tencent and others allowing them to compete aggressively against western companies who lack equivalent supports. China has then systematically engaged with these firms in a program to integrate their technology, complete with accessible vulnerabilities into systems around the world. This program coupled with impressive innovation such as 5-G technology has given the Chinese enormous access to nation’s information flow which creates substantial economic and military advantages for the Chinese. Despite nearly a decade of high-level policy recommendations the United States has made comparatively little use of its economic strength to promote its long-term cybersecurity and national interests in a similar fashion and now faces a 21st century likely to be dominated by information flow and information systems at a strategic disadvantage to its major world adversary.
Combining Technology, Public Policy and Economics to Create a Sustainable System of Cybersecurity
| 703-907-7090
| admin@isalliance.org
| 2500 Wilson Blvd, #245
Arlington, Virginia 22201
USA
ISA provides cybersecurity expert testimony and thought leadership in government and serves as an expert witness to the press.