{"id":32524,"date":"2017-06-08T05:00:36","date_gmt":"2017-06-08T12:00:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=32524"},"modified":"2019-05-23T12:27:36","modified_gmt":"2019-05-23T19:27:36","slug":"activities-support-deterrence-industrys-role-norms-responsible-behavior-cyberspace","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/06\/activities-support-deterrence-industrys-role-norms-responsible-behavior-cyberspace\/","title":{"rendered":"Activities That Support Deterrence - Industry\u2019s Role in Norms of Responsible Behavior in Cyberspace"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">In my <a href=\"https:\/\/www.securityroundtable.org\/deterrence-cyberspace-greater-role-industry-part-one-three-part-essay-series\/\" rel=\"nofollow,noopener\" ><span class=\"s2\">first essay<\/span><\/a> of this series, I described cyberspace as one of the most unique and complex environments ever to exist. I then argued that deterrence in cyberspace is fundamentally an issue that is distributed among the private and public sectors within and between nations.\u00a0 Therefore, I offered that deterrence solutions must be multi-faceted and include multi-party participation. Since the private sector owns, operates and maintains the vast majority of the cyberspace environment, industry should be one of the most important participants in the deterrence discussion. However, most of the discussion focuses on the role that governments play, while industry\u2019s role is often an afterthought and its participation extremely limited.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This essay series focuses on the role of the private sector and how industry can contribute to governmental efforts in deterring cyberthreats. My first essay in the series discussed the growing role of the private sector in cyberthreat intelligence and information sharing. This second essay discusses the role of industry in the development of norms of responsible behavior in cyberspace and how this supports deterrence.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i><a href=\"https:\/\/www.securityroundtable.org\/deterrence-cyberspace-part-2\" rel=\"nofollow,noopener\" >Read the full article on Security Roundtable<\/a>.<\/i><\/span><\/p>\n<hr \/>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks Federal CSO John Davis on the influence of the private sector in government security efforts.<\/p>\n","protected":false},"author":152,"featured_media":20190,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,484,6769],"tags":[120,123,2052],"coauthors":[1503],"class_list":["post-32524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cso-perspective","category-government","category-public-sector","tag-cybersecurity","tag-government2","tag-john-davis"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/CSO-web-banner-650x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=32524"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32524\/revisions"}],"predecessor-version":[{"id":32533,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32524\/revisions\/32533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20190"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=32524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=32524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=32524"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}