RIAC Digest - AUGUST, 2015
Cyberthreats and Cybertrends
In our overly interconnected world Internet is the main source of connectivity and information. This issue of RIAC digest will feature various publications on cyber threats, mobile Internet evolution, higher education vs cyber security threats and different comprehensive reports on Internet intelligence and cyber changes with a good deal of statistics within.

Image credit: wallsfx.com
RIAC Digest - August, 2015
Cybertreats and Cybertrends
In our overly interconnected world Internet is the main source of connectivity and information. This issue of RIAC digest will feature various publications on cyber threats, mobile Internet evolution, higher education vs cyber security threats and different comprehensive reports on Internet intelligence and cyber changes with a good deal of statistics within.

Image credit: wallsfx.com

Mobile Evolution and Internet Development in 2015

by Internet Society

To kick off this digest we introduce to our readers a very comprehensive report by Geneva based Internet Society on mobile evolution and Internet development in 2015. Here you will find some good old expertise on the future trends in the area of mobile Internet, challenges which it is facing and a long list of recommendations for the months to come. Starting from the 2G technologies, mobile gadgets are now working on a supersonic speed via 4G in the most of the developed countries. However, such struggling regions as some countries in Africa, South-East Asia are now experiencing a great boom in mobile Internet which is a rising issue for the rest of the international community. Find out more on this exciting topic.

Internet Security Threat Report

by Symantec

Internet generates many facets of insider threats. Too little has been done to deal with them efficiently. Symantec features a long read on Internet Security Threat where you will find all sorts of danger a user is facing when going online. And even offline. A 100-page report will take you into the dark world of online danger. Having read it, it is advisable to proceed with caution with further Internet surfing.

June Edition of Intelligence Report

by Symantec

To follow up, Symantec puts online a June edition of Intelligence report. This is a more targeted paper if compared to the previous one in terms of highlighting business risks brought along by cyber threats. From targeted attacks to botnets and spam – you will find here a full range of potential risks, interactive statistics and tips how to survive online. Do not miss the upcoming summer editions.

2015 Global Cyber Impact Report

by Ponemon Institute LLC and AON

Another risk assessment report on global cyber impact in 2015 issued by AON. The purpose of this research is to understand how organizations qualify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident. This report is slightly less structured than the other two listed above but it has one strong asset – a lot of graphs and diagrams to guide the reader.
by McAfee

Though issued in June 2014, McAfee brought together economic analysis on the global cost of cybercrime which is very up-to-date. The statistics shows how cybercrime can damage business best practices and cut financial profit to nearly a half of the expected. Pay special attention to following two chapters: IP theft and innovation cannibalism and penalty-free financial crime. A thorough reading for those who wish to avoid losing money in cyberspace.
by McAfee

Though issued in June 2014, McAfee brought together economic analysis on the global cost of cybercrime which is very up-to-date. The statistics shows how cybercrime can damage business best practices and cut financial profit to nearly a half of the expected. Pay special attention to following two chapters: IP theft and innovation cannibalism and penalty-free financial crime. A thorough reading for those who wish to avoid losing money in cyberspace.

Managing Cyber Risks in an Interconnected World

by PWC

A very colorful and easily digestible report Managing cyber risks in an interconnected world by PWC is a soft spot for a sore eye of a corporate employee struggling to protect his/her company, though in the report the PWC names the employee the main cyber culprit. This report is even more valuable since it embraces expert and business areas. Just hit the download button on your right.

Effectively Managing Cyber Risk without Joining the Front Lines

by the Center on Law and Security in NYU School of Law

Once the treats and dangers are clear, let's move on to the field of counter measures and legal procedure. Here is a paper by the Center on Law and Security in NYU School of Law on how to manage cyber risks using the right legal toolbox. Thought this paper aims at corporate milieu this can be useful for an ordinary user. How to effectively manage a corporate response to cyber risk? From the War room to the Board room is a very well-managed piece of legal analysis.

New Technologies and Warfare

by ICRC

Moving into humanitarian area of IR, here we introduce an ICRC milestone report on humanitarian debate in cyber warfare and how new technologies affect civilians in conflict. Even though featured in 2012, this report reflects a huge effort made to bring together two very sensible areas – IT progress and warfare – and gives a sold legal forecast for the years to come. Is there a way to cement rules for the cyberspace in the area of constant technological revolution? Find out here.

Cyber Weapons: 4 Defining Characteristics

by Clay Wilson, GCN

A very recent op-ed on defining 4 types of cyber weapons is featured in the Industry Insight. Grounding its analysis on a classical definition of a weapon, the author gives a new turn to the industrial domain putting forward cyber weapons. A short yet to the point, this piece will give the reader necessary basics on the topic with some new ideas coming along. If you are fascinated by the subject, do not miss this link, which widens the scope and gives insight why cyber weapons are a game changer.

China's Great Cannon

by Clay Wilson, GCN

Who are the main black swans in cyber space? No one knows but notoriously their birthplace is in China. And there is a good reason for such a reputation. The Great Chinese Firewall which does not let any malware within Chinese web but lets out dangerous DDoS attacks is under construction. What is known about this? Not much but all we have is gathered here with graphs and subparagraphs for a better and deeper understanding. And a small essay on the new cyber challenges for the West coming from China.

To draw a line to this special digest edition here are three pieces on various cyber related issues.
by EU Commission

In April 2015 the EU Commission has issued a factsheet on the EU data protection reform and big data. Four-page long brief comprises five bullet points on legal framework, best practices and market behavior when using big data. The paper sticks to the point and gives the general understanding of the reform.
by EU Commission

In April 2015 the EU Commission has issued a factsheet on the EU data protection reform and big data. Four-page long brief comprises five bullet points on legal framework, best practices and market behavior when using big data. The paper sticks to the point and gives the general understanding of the reform.

How Higher Education Deals with Security Threats

by Kacy Zurkus, CIO

Higher education grows to be a very sensible domain for the cyber security threats. Universities are more and more prone to fall prey to cybercriminals. The hardest part is how to make education more reachable for the general public without being too vulnerable in the face of cyber attacks. Read this op-ed to find out more.

Countering Islamic State Exploitation of the Internet

by David P. Fidler, CFR

A more heated topic – Daech online. ISIS has proven to be the best extremist group in the web. Their online strategy is robust and hits hard winning hearts and minds all over the world. CFR features a cyber brief to raise awareness and bring up some ideas how to fight the digital devil.
Produced by Maria Gurova
© 2015 Russian International Affairs Council
russiancouncil.ru twitter.com/russian_council facebook.com/russiancouncilen