Getting Cyber Capacity Right

Print

Bio PhotoEarly security incident response teams often feel the need to replicate operations or approaches from other parts of the world instead of looking for homegrown solutions first. 

At the international level, much of information security operations are not standardized. While there are specification standards for technologies such as encryption and some sector specific requirements, cyber security does not have the level of standardization and regulation seen in other sectors yet. Much of the cyber security work today is done differently from organization to organization.

 

The informality of the information security field often contrasts with much of conventional ICT development that fits in much better with standardization efforts. A major reason for this is cyber security, particularly in the government sector, is often a reflection of the national priorities of a country and the outcome of the unique circumstances of each individual country. Therefore conformity among security operations is often very difficult to achieve. For example, if two countries attempt to take a common approach to cyber security while having different national priorities, legal systems, government structures, budgetary processes and security challenges it quite logically would not work. There would be too many underlying differences that would prevent this type of standardization effort from fitting both countries.

This lack of a rulebook often makes cyber security capacity development seem more daunting than it is. In fact, this flexibility to build custom capabilities that fit a countries’ need can be huge positive when looked at from the right perspective. The key is clearly defining and aligning cyber security capabilities to national and government priorities instead of looking to reproduce what another country has. Reproducing capabilities from another country is more likely to solve their cyber security issues instead of yours. This is not to say that there no valuable lessons from professionals in other environments, but rather the key is translating professional insights into environmentally appropriate approaches that suit each country.

There is no one rule book so the best way to begin thinking about capacity development options is simply to focus on opportunities to gain exposure to different tools, ideas, methodologies, and implementations. This exposure reinforces just how differently various countries approach cybersecurity. Also, this organic approach to cyber security is far more sustainable than trying to adopt any cookie cutter model.

This does require a shift in mindset, and in looking at some of the lessons from around the continent, a few things have stood out as helpful for getting new teams off the ground.

About the Author

Wassie Goushe is a Cyber Security engineer with experience in incident response and coordination, computer security investigations, cyber security program development, risk and vulnerability assessment, risk management, security operations, and enterprise security strategy. He has extensive experience assisting both public and private sector organizations develop cyber security capabilities. He hold a Master’s in Information Technology from Virginia Tech and is a certified PMP, CISSP, CCNA, and ITIL practitioner. Prior to cyber security Wassie worked in international development and finance.