Close Menu
Unipath
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Unipath
    • English
      • Русский (Russian)
      • العربية (Arabic)
      • Kurdish
    • Home
    • Features

      Protecting the Red Sea

      May 13, 2025

      Commanding a Naval Coalition

      May 7, 2025

      Securing The Seas

      April 25, 2025

      A Multinational Medical Mission

      April 25, 2025

      A Convoy Across the Arabian Peninsula

      April 10, 2025
    • Departments
      1. Senior Leader Profile
      2. Around the Region
      3. Key Leader’s Message
      4. View All

      A Special Soldier to Command Special Forces

      April 9, 2025

      A Forceful Voice Against Violent Extremists

      October 18, 2024

      Service to the State

      January 24, 2024

      Educating Lebanon’s Future Leaders

      December 4, 2023

      Kuwait, U.S. enhance defense partnership

      April 9, 2025

      Counterterrorism on Turkmenistan-U.S. Agenda

      April 9, 2025

      Jordan Battles Regional Malign Influence

      April 9, 2025

      Kyrgyz Republic Builds Strategic Ties with State of Montana

      April 9, 2025

      Key Leader’s Message

      April 11, 2025

      Key Leader’s Message

      January 13, 2025

      Key Leader’s Message

      August 6, 2024

      Key Leader’s Message

      March 19, 2024

      Key Leader’s Message

      April 11, 2025

      A Special Soldier to Command Special Forces

      April 9, 2025

      Kuwait, U.S. enhance defense partnership

      April 9, 2025

      Counterterrorism on Turkmenistan-U.S. Agenda

      April 9, 2025
    • About Unipath
      • About Us
      • Subscribe
      • Contact
    • Contribute
    • Archive
    • English
      • Русский (Russian)
      • العربية (Arabic)
      • Kurdish
    Unipath
    Home»Features»Cooperative Cyber Defense
    Features

    Cooperative Cyber Defense

    UnipathBy UnipathJanuary 15, 2020Updated:January 17, 2020No Comments6 Mins Read
    Share
    Facebook Twitter Telegram WhatsApp Copy Link

    Middle Eastern leaders work to strengthen cyber security by sharing information

    UNIPATH STAFF

    Cyber security cannot simply depend on highly trained technicians scouring networks for malicious infiltrations. Nor can security be achieved by brilliant software engineers who design virtually impenetrable networks.

    It takes the combined efforts of policy leaders, industry innovators, academic researchers, tradecraft specialists, military officials and regular employees across the full spectrum of government and business to defend against the advanced and persistent threats from hackers, malign state actors and cyber criminals.

    That is why the ninth annual Central Region Cybersecurity Conference (CRCC) — hosted by U.S. Central Command (CENTCOM) — was deemed a critical platform to help build relationships and share information among stakeholders. “None of us can tackle cyber security challenges alone,” CENTCOM Deputy Commander Lt. Gen. Thomas Bergeson said.

    Held in April 2019 near Washington, D.C., this year’s CRCC included participants from Bahrain, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, the United Arab Emirates and the United States. The event also included representation from U.S. Africa Command and military participants from Botswana, Morocco, Rwanda and Tunisia. Co-hosting the event with CENTCOM was the U.S. Department of State.

    The CRCC lets military, academic, government and industry experts examine how to improve information sharing about cyber threats that impact national security. The relationships developed during the conference can help support international stability. Organizations learn to identify incursions to networks, rapidly respond, and recover quickly and with less damage when an incident occurs.

    “U.S. Central Command works closely with our partner nations to promote peace, security and open information sharing, primarily through military-to-military engagements,” Lt. Gen. Bergeson said. “Cyberspace is an increasingly important operational domain and focus of our effort. Protecting these global interests requires cooperation among nations, all branches of government, and our partners in industry and academia, as seen by the representations from each of these groups.”

    Cyber professionals must adapt along with innovations in technology, such as cloud-based computing and the fifth generation of wireless technology, better known as 5G. While these modernizations can bring efficiency and support economic progress, they also bring new vulnerabilities.

    Organizations must have a strategic outlook, analyzing their assets and how they interact with computer systems and the internet. Another critical component from a strategic perspective is ensuring compliance with cyber policy and procedures. Khalid Sadiq Al-Hashmi, assistant undersecretary for Qatar’s Cyber Security Sector, spoke in detail about Qatar’s cyber security compliance framework.

    “We are all using technology, trying to protect systems. But compliance is an area we are all struggling with,” Al-Hashmi said during a presentation.

    The 2019 Central Region Cybersecurity Conference included participants and observers from the Middle East, Africa and the United States. U.S. CENTRAL COMMAND

    For example, years ago armored vehicles were simply maintained mechanically. Today, these military vehicles have built-in advanced systems and technologies that must be maintained. When the technology must be patched or updated by its manufacturer, what procedures are in place to ensure that a technician using a laptop in the field to update programs has a “clean” laptop and is not introducing inadvertent bugs or malware?

    Qatar has implemented legislation and policies to address cyber security compliance. One innovation is the accreditation and certification process that Qatar awards government agencies based on their compliance records and data protection plans. This is a critical step, because many of Qatar’s government services are accessed electronically.

    Presenters from Saudi Arabia, Lebanon, the U.S. Department of Defense and the U.S. Department of State also shared their expertise during presentations. Academic and industry partners offered opportunities for increased collaboration.

    Col. Clinton Mixon, commandant of the U.S. Air Force Cyber College, said clearly defining terms will help leaders better understand the magnitude of a threat and how to respond.

    “If we don’t understand each other, if we aren’t using the same lexicon, we will not be able to successfully overcome the threat,” Col. Mixon said.

    For instance, he believes the term “cyber attack” is often misused, creating confusion about the severity or intent of an incident. He believes people should use the term only when talking about a cyber operation meant to cause injury or death or damage to property. Some dire examples would be cyber incidents that led to the meltdown of a nuclear plant or breached a dam and drowned civilians. Terms such as cyber espionage, cyber disruption or cyber crime are often better descriptions of what is actually happening.

    For the second year in a row, the CRCC included a tabletop exercise. It required participants to consider how to share information in real time with regional and international partners, as well as internally, so they could address and overcome security threats. Participants were divided into groups representing fictional countries so they could work through response scenarios to a regional cyber incident.

    Brig. Gen. Mohammad Al-Enezi, chief of information technology in the Kuwait Armed Forces Directorate of Communications, vouched for the usefulness of the tabletop exercise. “We still face many challenges,” Brig. Gen. Mohammad said. “One of the most important challenges is that of human resources.”

    Recruiting and retaining talented cyber security professionals to tackle threats was an important topic throughout the conference. Cyber security professionals are in demand worldwide, and private industry generally pays higher salaries than governments and militaries.

    Military and governmental leaders should be creative in attracting talent and offer attractive compensation packages that include perks such as free continuing education. Recruitment campaigns can also appeal to patriotism and portray individuals as protecting their families and communities.

    In the U.S., some government and military organizations have developed partnerships with corporations so their workforce can gain direct experience from innovative businesses such as Microsoft or Google.

    During the 2019 CRCC, participants were given the U.S. Department of Defense Cybersecurity Reference and Resource Guide. The publication was designed to help develop cyber security programs by sharing best practices, policies and standards adopted in the U.S.

    Cyber security leaders need to work harder to overcome barriers to sharing information, said U.S. Maj. Gen. Mitchell Kilgo, then director of CENTCOM’s Command, Control, Communications and Computer Systems Directorate. One way to improve such communication is through regular multilateral cyber exercises.

    Said Maj. Gen. Kilgo: “A vulnerability to one is a vulnerability to us all.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleLessons Learned
    Next Article Political Reconciliation in Tajikistan

    Related Posts

    Protecting the Red Sea

    May 13, 2025

    Commanding a Naval Coalition

    May 7, 2025

    Securing The Seas

    April 25, 2025

    Comments are closed.

    V13N1

    Subscribe Today

    Subscribe to our mailing list to get the latest edition of Unipath.

    Unipath
    Facebook X (Twitter) Instagram
    © 2025 Unipath. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.