{"id":14157,"date":"2016-05-31T18:00:30","date_gmt":"2016-06-01T01:00:30","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14157"},"modified":"2016-08-25T11:21:49","modified_gmt":"2016-08-25T18:21:49","slug":"cso-in-2016-g7-makes-cybersecurity-a-priority-and-paves-the-way-for-track-1-5-multi-stakeholder-discussions","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/05\/cso-in-2016-g7-makes-cybersecurity-a-priority-and-paves-the-way-for-track-1-5-multi-stakeholder-discussions\/","title":{"rendered":"In 2016, G7 Makes Cybersecurity a Priority and Paves the Way for Track 1.5 Multi-Stakeholder Discussions"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\"><i>(This blog post is\u00a0<\/i><a href=\"https:\/\/www.paloaltonetworks.jp\/company\/in-the-news\/2016\/160606_G7_Ise-Shima_Summit.html\" rel=\"nofollow,noopener\"  target=\"_blank\"><span class=\"s2\"><i>also available in Japanese<\/i><\/span><\/a><i>.)<\/i><\/span><\/p>\n<p>Leaders from Japan, Canada, France, Germany, Italy, the UK, and the US, as well as representatives of the European Union, gathered for the G7 Ise-Shima Summit in Japan May 26-27 to address major global economic and political challenges. Notably, for the first time at a G7 Summit, their discussions included cybersecurity. In fact, the \u201c<a href=\"http:\/\/www.mofa.go.jp\/files\/000160266.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">G7 Ise-Shima Leaders\u2019 Declaration<\/a>\u201d released May 27 contains several consensus items regarding cybersecurity, captured as a standalone topic, reflecting the critical importance and geopolitical consequences of this issue in today\u2019s world.<\/p>\n<p><!--more--><\/p>\n<p>Among other things, the Leaders\u2019 Declaration endorses the <a href=\"http:\/\/www.mofa.go.jp\/files\/000160279.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\"><em>G7 Principles and Actions on Cyber<\/em><\/a>, which promote security and stability in cyberspace as well as the digital economy, and commits the leaders \u201cto take decisive action\u201d regarding those Principles. Cybersecurity came up not only in this Summit, but also in an array of related G7 meetings leading up to it this spring: the <a href=\"http:\/\/www.mofa.go.jp\/files\/000147440.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">G7 Foreign Ministers\u2019 Meeting<\/a> April 10-11, the <a href=\"http:\/\/www.soumu.go.jp\/main_content\/000416959.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">G7 ICT Ministers\u2019 Meeting<\/a> April 29-30, the <a href=\"http:\/\/www.wsj.com\/articles\/g-7-nations-race-to-bolster-security-against-cyberattacks-in-finance-1463687620\" rel=\"nofollow,noopener\"  target=\"_blank\">G7 Finance Ministers and Central Bank Governors Meeting May 20-21<\/a>, and the <a href=\"http:\/\/www.mofa.go.jp\/mofaj\/files\/000153468.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">G7 Energy Ministerial Meeting May 1-2<\/a>. This consistent discussion reflects governments\u2019 growing concerns over the malicious use of cyberspace by hackers, criminals, state actors, and terrorists, as well as emerging global trends that challenge an open and interoperable cyberspace\u2014all of which threaten our critical infrastructure, digital economy and economic growth.<\/p>\n<p>Given growing concerns over the current economic downturn in many countries, it makes sense that the Leaders focused on the economic contribution of cyberspace, and confirmed that \u201can accessible, open, interoperable, reliable and secure cyberspace\u201d is an \u201cessential foundation for economic growth and prosperity.\u201d Indeed, cyberspace is a fundamental enabler of our digital lifestyle, although malicious actors can use it to threaten our daily lives, economies, and national or international security.<\/p>\n<p>This vision of cyberspace as a foundation for progress is shared by the G7 host country, Japan, whose <a href=\"http:\/\/www.nisc.go.jp\/eng\/pdf\/cs-strategy-en.pdf\" rel=\"nofollow,noopener\" >Cybersecurity Strategy<\/a> 2015 was the first Japanese national information security <a href=\"http:\/\/blogs.cfr.org\/cyber\/2015\/11\/02\/japans-new-cybersecurity-strategy-security-without-thwarting-economic-growth\/\" rel=\"nofollow,noopener\"  target=\"_blank\">strategy to recognize<\/a> that cyberspace is also a frontier for innovation and sustainable economic growth.<\/p>\n<p>We welcome the G7 Leaders\u2019 decision to launch a new G7 working group on cyber to enhance policy coordination and practical cooperation to promote security and stability in cyberspace. The Declaration does not say who will populate the working group. While we expect the core members to be government officials, it is crucial to adopt a multi-stakeholder or \u201cTrack 1.5\u201d approach to incorporate industry input. Governments and the private sector alike seek greater cybersecurity and resilience, and it is necessary to combine government insights about policy and national strategy with industry knowledge about technical innovation for cyber threat prevention and defense. All players must participate to ensure that the envisioned coordination and cooperation is practical and feasible.<\/p>\n<p>It also is commendable that the G7 is focusing on cybersecurity in critical industry sectors dependent on cyber infrastructure, namely finance and energy. The Declaration highlights the work of the G7 Cyber Experts Group in the financial area to foster cybersecurity and enhance cooperation among G7 countries in this arena. This is important, given the ongoing trend of cybercrimes targeting the financial sector, such as the theft of $81 million from <a href=\"http:\/\/www.reuters.com\/article\/us-cyber-heist-swift-symantec-idUSKCN0YH29J\" rel=\"nofollow,noopener\"  target=\"_blank\">Bangladesh\u2019s central bank<\/a> in February 2016.<\/p>\n<p>In the <a href=\"http:\/\/www.mofa.go.jp\/mofaj\/files\/000153468.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">Joint Statement<\/a> from the G7 Energy Ministerial Meeting earlier in May, the Ministers committed to advancing resilient energy systems including electricity, gas and oil, in order to respond effectively to emerging cyber threats and to maintain critical functions. The usefulness of this commitment is evidenced by the <a href=\"http:\/\/www.reuters.com\/article\/us-ukraine-cybersecurity-idUSKCN0VY30K\" rel=\"nofollow,noopener\"  target=\"_blank\">power outage<\/a>, caused by cyber-attacks, which affected 225,000 people in Ukraine in December 2015. Such cyber sabotage against critical infrastructure can potentially disrupt medical services and other key social services, leading to the loss of lives. These areas of focus demonstrate the G7 countries\u2019 concern about the potential damages to these sectors of critical infrastructure, which can sap competitiveness, cause a loss in business and consumer confidence, and dampen the countries\u2019 economic strength and security.<\/p>\n<p>Finally, it is meaningful that this heavy emphasis on cybersecurity was made at the series of G7 meetings hosted by Japan. We are sure that Japan played an important role in ensuring this emphasis. Japan has its own internal interests, including the security of the electric power industry in the wake of the Great East Japan Earthquake in 2011 (which led to catastrophic consequences with the cascading impacts from the Fukushima Daiichi nuclear power plant accident). As the host of the G7 Summit 2016 and the upcoming Tokyo Summer Olympic Games in 2020, Japan is expected to set an example of cybersecurity and the protection of critical infrastructure. Best practices and new partnerships will be born from the lessons.<\/p>\n<p>The next steps for the G7 leaders and the new G7 cyber working group are to figure out how to overcome silos and facilitate smooth communication across borders, among key players in government and industry. While bureaucratic stove piping is not unique to cybersecurity, the repercussions can be more problematic when cyber attacks or threats affect multiple sectors, governmental agencies, and countries. Given that attackers will always try to exploit the weakest link, the scale of global Internet interconnectivity means that one country\u2019s robust cyber defenses \u2013 or economic prosperity \u2013 may be weakened if its counterparts fail to protect themselves. This could lead to information breaches and compromised systems or networks globally.<\/p>\n<p>The call for a multi-stakeholder approach to cybersecurity across borders is not new, but has been slow to gain solid footing. It could be that we have lacked clear goals or deadlines. The Tokyo Olympic Games 2020 would be a golden opportunity to create a prototype of a Track 1.5 cybersecurity dialogue and information-sharing framework. Only four years away, the event has a wide variety of stakeholders, including the G7 countries. Such a prototype can help pave the way to more efficient global cooperation on cybercrime and critical infrastructure protection.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara.jpg\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-17659 alignleft lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara.jpg\" alt=\"MihokoMatsubara\" width=\"225\" height=\"225\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/MihokoMatsubara-128x128.jpg 128w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/a> <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz.jpg\"><div style=\"max-width:100%\" data-width=\"225\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-17656 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz.jpg\" alt=\"Headshot_Danielle Kriz\" width=\"225\" height=\"225\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Headshot_Danielle-Kriz-128x128.jpg 128w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/span><\/div><\/a><\/p>\n<p><em>This is the second in a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/japans-cybersecurity-efforts\/\" target=\"_blank\">series of blogs co-authored by Mihoko Matsubara and Danielle Kriz<\/a> aimed at introducing Japan\u2019s cybersecurity efforts and their significance to a global audience, including governments, global industry, and other thought leaders. Subsequent blogs are expected to cover additional thoughts on the METI\/IPA Cybersecurity Guidelines, Japan\u2019s role in global cybersecurity capacity-building, cyber threat information-sharing and prospects for Japan, the cybersecurity ramifications of planning for the Tokyo Olympic Games 2020, and other topics. <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(This blog post is\u00a0also available in Japanese.) Leaders from Japan, Canada, France, Germany, Italy, the UK, and the US, as well as representatives of the European Union, gathered for the G7 Ise-Shima &hellip;<\/p>\n","protected":false},"author":182,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,155,484],"tags":[2010,2004,473,2016,2013],"coauthors":[1873,1920],"class_list":["post-14157","post","type-post","status-publish","format-standard","hentry","category-cso-perspective","category-cybersecurity-2","category-government","tag-g7","tag-g7-ise-shima-summit","tag-japan","tag-japans-cybersecurity-efforts","tag-track-1-5"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14157"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14157\/revisions"}],"predecessor-version":[{"id":17677,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14157\/revisions\/17677"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14157"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}