Close Menu
Unipath
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Unipath
    • English
      • Русский (Russian)
      • العربية (Arabic)
      • Kurdish
    Subscribe
    • Home
    • Features

      Cooperation in a Crisis

      August 15, 2025

      Lebanese Armed Forces Protects Southern Region of Country

      August 15, 2025

      Saudis Seek Regional Security

      August 15, 2025

      Molding Modern Warriors

      August 15, 2025

      Lions of the Iraqi National Intelligence Service

      August 15, 2025
    • Departments
      1. Senior Leader Profile
      2. Around the Region
      3. Key Leader’s Message
      4. View All

      Professionalism in the Service of Counter-Terrorism

      August 11, 2025

      A Special Soldier to Command Special Forces

      April 9, 2025

      A Forceful Voice Against Violent Extremists

      October 18, 2024

      Service to the State

      January 24, 2024

      Egypt Plays Pivotal Role in Stabilizing the Middle East

      August 11, 2025

      Pakistan’s Air Force Supports Iraqi Counterparts

      August 11, 2025

      Arabian Gulf States Uphold Kuwaiti Sovereignty Over Offshore Gas Field

      August 11, 2025

      Tajikistan Strengthens Security Partnership with Kuwait

      August 11, 2025

      Key Leader’s Message

      August 15, 2025

      Key Leader’s Message

      April 11, 2025

      Key Leader’s Message

      January 13, 2025

      Key Leader’s Message

      August 6, 2024

      Key Leader’s Message

      August 15, 2025

      Professionalism in the Service of Counter-Terrorism

      August 11, 2025

      Egypt Plays Pivotal Role in Stabilizing the Middle East

      August 11, 2025

      Pakistan’s Air Force Supports Iraqi Counterparts

      August 11, 2025
    • About Unipath
      • About Us
      • Subscribe
      • Contact
    • Contribute
    • Archive
    • English
      • Русский (Russian)
      • العربية (Arabic)
      • Kurdish
    Unipath
    Home»Building a Regional Cyber Partnership

    Building a Regional Cyber Partnership

    UnipathBy UnipathAugust 20, 2015No Comments7 Mins Read
    Share
    Facebook Twitter Telegram WhatsApp Copy Link

    USCENTCOM expands the Central Region Communications Conference

    The fifth Central Region Communications Conference (CRCC) concluded with a multinational commitment that will expand the depth and scope of what has been U.S. Central Command’s premier cyber security event.

    With the concurrence of CRCC attendees from nine partner nations, U.S. Brig. Gen. Peter Gallagher, head of USCENTCOM J-6 and director of the Joint Cyber Center, promised to hold quarterly workshops in which conference participants and interested newcomers could develop joint strategies to deal with threats in cyberspace.

    “We’ve got to take action. This just can’t be the great get-along and a bunch of briefings. And then we wait till next year to come back together to rehit some of the same lessons,” the general said on the final day of the conference that ran May 12-14, 2015, in Washington, D.C.

    “We want to use the umbrella of the CRCC to conduct quarterly workshops in cyberspace. We can do these in a collaborative fashion, using what we call APAN, the All Partner Access Network. We would establish a website with access, and within the next three months, we would like to bring this collective team together. And we could also open it up to partners who weren’t able to make it.”

    The announcement capped a busy three-day conference attended by senior cyber security leaders from Afghanistan, Bahrain, Egypt, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia and the United Arab Emirates. Delegates from Afghanistan, Egypt and Qatar gave formal presentations of the progress their domestic cyber security agencies have made defending computer networks. They were joined at the podium by senior U.S. government officials and industry experts from companies such as Google and AT&T.

    DSC_1162
    Central Region Communications Conference participants gather in May 2015 in Washington, D.C. [USCENTCOM]

    A common refrain was the need for cyber partnerships, not just between nations, but between governments and the private businesses that are making most of the technological breakthroughs. Such partnerships are needed to share vital knowledge about how to repel criminals, hostile governments and terrorists lurking online.

    Staff Brig. Gen. Dr. Mubarak Al Jaberi, Head of Communications and IT Department at the UAE Armed Forces, suggested building a joint “road map for the whole region” that could be “presented by our friends in Washington, D.C.” Five years ago, the UAE set up the National Electronic Security Authority (NESA) to help defend cyberspace. It was the first agency of its kind in the region.

    “We need to start thinking of creating and building a task force. We need to go for rapid deployment,” Gen. Al-Jaberi said. “We need to be connected. We shouldn’t be disconnected. We don’t need terrorists or any party to take advantage of the disconnectedness.”

    The need for cooperation was affirmed by Saudi military officers in attendance, who made a plea for a cyber alliance with countries that had learned from hard experience how best to protect computer networks from threats online. “We don’t want to start the way they started years ago,” said Brig. Gen. Dr. Abdullah Al-Mogbil, chairman of the E-Transactions Subcommittee in the Royal Saudi Land Forces. “We would like to start from where they stopped.”

    Cyber resilience — hardening network defenses against hostile penetration — occupied much of the discussion at the CRCC. Dr. Edward Amoroso, chief security officer at AT&T, told attendees that surrounding a company’s or a nation’s systems with general-purpose firewalls and other security software — what he termed “sandbags” — represents a less-than-ideal approach. Each of these defenses can be easily breached with proper motivation on the part of a nation’s enemies. The best solution is to create a virtual cyber architecture that isolates various branches of information technology, such as email and websites, into separate, more easily defensible strongholds, he said. That way, a firewall failure won’t compromise every system at once.

    “It’s hard to build and very easy to destroy,” Vice Adm. Mark Fox, deputy commander of USCENTCOM, told conference attendees. “So part of our challenge is to find ways to work together to create resilience and strength.”

    Lebanese retired Brig. Gen. Joseph  Nassar, whose national delegation was attending the CRCC for the first time, picked up that theme in a plea for more cooperation.

    “We cannot protect ourselves from all intruders. But we can minimize and mitigate the security risk by defining where it’s coming from, whether it’s terrorist organizations or from hackers,” he said. “Then we can decide on the prevention and measures to be taken.”

    The message of public-private cooperation corresponded to Kuwait’s approach. The country recently set up its first national cyber security agency and began by reaching out to technological leaders in the cyber field. “We don’t have much experience in cyber security,” Kuwaiti Col. Mohammed Al-Enizi announced. “That’s why now we are working with the big companies and partners such as Cisco, Microsoft and HP to just establish a secure environment.”

    In December 2014, Egypt established a High Council for Cyber Security. Its 24 members come from various sectors of government and industry. The formation of such a body is helping the country unite around an issue that hasn’t always been at the top of the agenda, said Dr. Sherif Hashem, vice president for cyber security at the National Telecom Regulatory Authority.

    “People agree that security is important. But when it comes to deploying resources, developing the skills and supporting infrastructure development, that’s when budgetary concerns limit participation,” Dr. Hashem said.

    Starting with much less than many of its partners in the region, Afghanistan has made huge strides in adopting information technology over the past 13 years, particularly in the spread of mobile phone use to a majority of the population. Zmarialai Wafa, one of the country’s top cyber security officials, outlined the process by which Afghanistan has tried to defeat attacks on its fledgling networks, culminating in 2014 with passage of the National Cybersecurity Strategy of Afghanistan.

    Afghanistan’s efforts earned praise from Khalid Al-Hashimi, Qatar’s assistant undersecretary for cyber security. Qatar’s Computer Emergency Response Team has led most of the region in conducting national cyber defense drills. “I was very impressed about the activities and initiatives in the Islamic Republic of Afghanistan. Very impressive,” Al-Hashimi said. “You were able to pass laws that took other nations years to do. I applaud you for that.”

    The work of CRCC 2015 will continue through quarterly workshops to which delegates from countries such as Jordan, Iraq and Yemen will also be invited. The moderated workshop sessions will likely occur in an interactive online format. The exact date and location of Central Region Communications Conference 2016 had yet to be determined.

    Vice Adm. Fox called on his military and civilian colleagues to apply themselves to what has become one of the biggest security challenges of the 21st century.

    “If we don’t find a way to do this efficiently, both as nations and as partners, there are people who will do our citizens harm. They will steal, they will destroy,” the admiral said at the conference’s conclusion. “It is our job as stewards and as public servants to find a way to protect our citizens and ensure our national interests are protected. That’s why we’re here.”  


    Key takeaways from CRCC 2015

    • Cyber risk is a global phenomenon shared among governments, businesses and individuals.
    • The world needs a common understanding and measurable metrics of what success looks like in cyberspace. If you can measure it, you can manage it.
    • The cyber world requires redesigned architecture to plug vulnerabilities in cyber security defenses.
    • Nations and industries must train and educate a certified pool of cyber experts to protect information systems.
    • Balance security of networks with individual’s privacy concerns.
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Articleیک رویکرد چند-ملیتی به امنیت سایبری
    Next Article Central Asian Border Commanders Pledge Cooperation

    Comments are closed.

    V13N2

    Subscribe Today

    Subscribe to our mailing list to get the latest edition of Unipath.

    Unipath
    Facebook X (Twitter) Instagram
    © 2025 Unipath. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.