National cyber crisis management: Different European approaches
Sergei Boeke
Universiteit Leiden Faculteit Campus Den Haag, Institute of Security and Global Affairs (ISGA)
Search for more papers by this authorSergei Boeke
Universiteit Leiden Faculteit Campus Den Haag, Institute of Security and Global Affairs (ISGA)
Search for more papers by this authorFunding information: Municipality of The Hague; Netherlands Ministry of Defence; Ministry of Security and Justice
Abstract
Cyber crises, as new forms of transboundary crises, pose serious risks to societies. This article investigates how different models of public–private partnerships shape cyber crisis management in four European countries: the Netherlands, Denmark, Estonia, and the Czech Republic. Using Provan and Kenis's modes of network governance, an initial taxonomy of cyber governance structures is provided. The Netherlands have created a participant-governed network, characterized by trust and equality. The Czech and Estonian models resemble a network administrative organization, with an enforcement role for their national cyber security centers. Denmark has adopted a lead-agency model. The article concludes that countries face two binary choices when organizing cyber defense and crisis management. First, national computer emergency response teams/computer security incident response teams can be embedded inside or outside the intelligence community. Second, cyber capacity can be centralized in one unit or spread across different sectors. These decisions fundamentally shape information-sharing arrangements and potential roles during cyber crises.
REFERENCES
- Andrš, J. (2014). Czech cyber security: Finally ahead of Europe? SVAT Cyber Security.
- Boeke, S. (2016). First responder or last resort? The role of the Ministry of Defence in national cyber crisis management in four European countries. Universiteit Leiden, the Netherlands.
- Boeke, S., Heinl, C. H., & Veenendaal, M. A. (2015). Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe. Presented at the Cyber Conflict: Architectures in Cyberspace (CyCon), Seventh International Conference on, IEEE, Tallinn, pp. 69–80. https://doi.org/10.1109/CYCON.2015.7158469
- Boin, A., Busuioc, M., & Groenleer, M. (2014). Building European Union capacity to manage transboundary crises: Network or lead-agency model? Regulation & Governance, 8, 418–436.
- Boin, A., & Bynander, F. (2015). Explaining success and failure in crisis coordination. Geografiska Annaler: Series A, Physical Geography, 97, 123–135.
-
Boin, A., &
McConnell, A. (2007). Preparing for critical infrastructure breakdowns: The limits of crisis management and the need for resilience. Journal of Contingencies and Crisis Management, 15, 50–59.
10.1111/j.1468-5973.2007.00504.x Google Scholar
- Britz, M. (2007, May). Translating EU civil protection in the Nordic states—Towards a theoretical understanding of the creation of European crisis management capacities. Presented at the European Union Studies Association's Tenth Biennial International Conference, Montreal, Canada. Retrieved from http://aei.pitt.edu/7714/1/britz-m-11d.pdf
- Broeders, D. (2014). Investigating the place and role of the armed forces in Dutch cyber security governance. https://doi.org/10.13140/RG.2.1.3974.3849
- Cardash, S. L., Cilluffo, F. J., & Ottis, R. (2013). Estonia's cyber defence league: A model for the United States? Studies in Conflict & Terrorism, 36, 777–787.
- Carey, C., III. (2013, March 27). The international community must hold Russia accountable for its cyber militias. Small Wars Journal. Retrieved from http://insct.syr.edu/the-international-community-must-hold-russia-accountable-for-its-cyber-militias/
- Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92, 43–62.
- Centre for Cyber Security. (2015). The Danish cyber and information security strategy. Retrieved from http://www.fmn.dk/eng/news/Documents/Danish-Cyber-and-Information-Security-Strategy-EN-vers.PDF
- Choucri, N., Madnick, S., & Ferwerda, J. (2014). Institutions for cyber security: International Responses and global imperatives. Information Technology for Development, 20, 96–121.
-
Clough, C. (2004). Quid pro quo: The challenges of international strategic intelligence cooperation. International Journal of Intelligence and Counter Intelligence, 17, 601–613.
10.1080/08850600490446736 Google Scholar
- Cyber Security Act, 181. (2014). Retrieved from https://www.govcert.cz/download/legislation/container-nodeid-1122/actoncybersecuritypopsp.pdf
- Danish Defence Commission. (2009). Danish defence—Global engagement. Copenhagen, the Netherlands: Danish Ministry of Defence.
- Danish Emergency Management Agency. (2015). Crisis management in Denmark. Birkerød, Denmark: Danish Emergency Management Agency.
- Dijk, A. D., Meulendijks, J. M. G., & Absil, F. G. J. (2016). Lessons learned from NATO's cyber defence exercise locked shields 2015. Militaire Spectator, 185(2), 65–74. Retrieved from http://www.militairespectator.nl/sites/default/files/teksten/bestanden/Militaire%20Spectator%202-2016%20Dijk.pdf
- Dunn Cavelty, M., & Suter, M. (2009). Public–private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection, 2, 179–187.
- Dynes, R. R., & Aguirre, B. E. (2008). Organizational adaptation to crises: Mechanisms of coordination and structural change. In A. Boin (Ed.), Crisis management (pp. 320–325). Los Angeles, CA: SAGE.
- European Union Agency for Network and Information Security. (2016). Report on cyber security information sharing in the energy sector. Retrieved from https://www.enisa.europa.eu/publications/information-sharing-in-the-energy-sector
- Gewijzigde motie (nader) Hernandez en Knops over een visie over de aanpak van cybercrime/cyberwarfare (t.v.v. 32500 X, nr. 24) (2010). Retrieved from https://www.parlementairemonitor.nl/9353000/1/j9tvgajcor7dxyk_j9vvij5epmj1ey
- P. A. Hall, & D. Soskice (Eds.). (2001). Varieties of capitalism: The institutional foundations of comparative advantage. Oxford, NY: Oxford University Press.
10.1093/0199247757.001.0001 Google Scholar
- Hellenberg, T., & Visuri, P. (2013). Analysis of Civil Security Systems in Europe Country Study Estonia, Anvil project. Retrieved from http://anvil-project.net/wp-content/uploads/2013/12/Estonia_v1.0.pdf
- Inspectie Veiligheid en Justitie. (2012). Rapport: Evaluatie van de rijkscrisisorganisatie tijdens de DigiNotar-crisis. Den Haag.
- ISACs. (2017). Retrieved from https://www.ncsc.nl/english/Cooperation/isacs.html
- Järvinen, H. (2014). Danish government plans to create a Center for Cybersecurity with privacy-invasive powers. EDRi. Retrieved from https://edri.org/danish-government-plans-create-center-cybersecurity-privacy-invasive-powers/
- Karsten, L., van Veen, K., & van Wulfften Palthe, A. (2008). What happened to the popularity of the polder model? Emergence and disappearance of a political fashion. International Sociology, 23, 35–65.
- Kaska, K. (2015). National cyber security organisation: The Netherlands. Tallinn, Estonia: NATO CCD COE.
- Kaska, K., Osula, A.-M., & Stinissen, J. (2013). The Cyber Defence Unit of the Estonian Defence League: Legal, policy and organisational analysis. Tallinn, Estonia: NATO CCD COE.
- A. Klimburg (Ed.). (2012). National cyber security framework manual. Tallinn, Estonia: NATO CCD COE.
-
Kostyuk, N. (2014). International and domestic challenges to comprehensive national cybersecurity: A case study of the Czech Republic. Journal of Strategic Security, 7, 68–82.
10.5038/1944-0472.7.1.6 Google Scholar
- Kouremetis, M. (2015). An analysis of Estonia's cyber security strategy, policy and capabilities. In Proceedings of the 14th European Conference on Cyber Warfare and Security 2015 (pp. 404–412). Presented at the European Conference on Cyber Warfare and Security. Reading, UK: Academic Conferences and Publishing International.
-
Kovoor-Misra, S., &
Misra, M. (2007). Understanding and managing crises in an “online world.” In C. M. Pearson, C. Roux-Dufort, & J. A. Clair (Eds.), International handbook of organizational crisis management (pp. 85–104). London, UK: Sage.
10.4135/9781412982757.n3 Google Scholar
- Mansfield-Devine, S. (2012). Estonia: What doesn't kill you makes you stronger. Network Security, 2012, 12–20.
- Member Cyber Defence Unit. (2014, November 18–19). RSIS-Leiden University Centre for Terrorism and Counterterrorism (CTC) Roundtable on Civil-Military Relations in Cyberspace, Singapore.
- Minárik, T. (2016). National cyber security organisation: Czech Republic ( 2nd ed.). Tallinn, Estonia: NATO CCD COE.
- Ministerie van Veiligheid en Justitie. (2013). Nationale Cybersecurity Strategie 2: Van bewust naar bekwaam. The Hague, the Netherlands: Nationaal Coördinator Terrorismebestrijding en Veiligheid.
- Nationaal Coördinator Terrorismebestrijding en Veiligheid. (2012). Nationaal Crisisplan ICT. Den Haag, the Netherlands: Ministerie van Veiligheid en Justitie.
- National Cyber Security Centre. (2015). National Cyber Security Strategy of the Czech Republic for the period from 2015–2020. National Security Authority. Retrieved from https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/CzechRepublic_Cyber_Security_Strategy.pdf
- Nordic banks collaborate on fighting cybercrime. (2017). Retrieved from https://www.nordea.com/en/press-and-news/news-and-press-releases/press-releases/2017/04-10-08h00-nordic-banks-collaborate-on-fighting-cybercrime.html
- Osula, A.-M. (2015). National Cyber Security Organisation: Estonia. Tallinn, Estonia: NATO CCD COE.
- Pearson, C. M., & Clair, J. A. (2008). Reframing crisis management. In A. Boin (Ed.), Crisis management (pp. 1–24). Los Angeles, CA: SAGE.
- President Toomas Hendrik Ilves's opening speech at CyCon in Tallinn on June 1. (2016). Retrieved from https://president.ee/en/official-duties/speeches/12281-president-toomas-hendrik-ilvess-opening-speech-at-cycon-in-tallinn-on-june-1-2016/index.html
- Provan, K. G., & Kenis, P. (2008). Modes of network governance: Structure, management, and effectiveness. Journal of Public Administration Research and Theory, 18, 229–252.
-
Roux-Dufort, C. (2007). A passion for imperfections: Revisiting crisis management. In C. M. Pearson, C. Roux-Dufort, & J. A. Clair (Eds.), International handbook of organizational crisis management (pp. 221–252). Thousand Oaks, CA: SAGE.
10.4135/9781412982757.n8 Google Scholar
- Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154–176.
- Stone, B., & Riley, M. (2013). Mandiant, the go-to security firm for cyber-espionage attacks. Retrieved from http://www.Bloomberg.com.
- 't Hart, P., Rosenthal, U., & Kouzmin, A. (1993). Crisis decision making: The centralization thesis revisited. Administration & Society, 25, 12–45.
- Threat Assessment CFCS: The Cyber Threat against Denmark. (2016). Retrieved from https://fe-ddis.dk/cfcs/CFCSDocuments/Threat%20Assessment%20-%20The%20cyber%20threat%20against%20Denmark.pdf
- Woollaston, V. (2017, May 15). The NHS trusts and hospitals affected by the Wannacry cyberattack. WIRED. Retrieved from http://www.wired.co.uk/article/nhs-trusts-affected-by-cyber-attack
- Wyman, J. S. (2011). Emergency management in Denmark: Lessons learned at home and abroad. In D. McEntire (Ed.), Comparative emergency management: Understanding disaster policies, organizations, and initiatives from around the world. Retrieved from https://www.training.fema.gov/hiedu/aemrc/booksdownload/compemmgmtbookproject/
- Zetter, K. (2016, March 3). Inside the cunning, unprecedented hack of Ukraine's power grid. WIRED. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/