On Mondays we Form Bilateral Cybersecurity Groups

There are certain things in a friendship that you can never forget, like the first time two lifelong best friends first meet. Abbi and Ilana, Michael and Dwight, Matt Damon and Ben Affleck. You know, normal best friends with normal interactions, like when Air Force One landed in Israel and Trump greeted Bibi, “Hello, my friend,” to which Bibi replied “Welcome, my good friend” Because that’s normal. As awkward as Trump was all over Bibi’s country (see the cutesy yearbook note he left at Yad Vashem for reference), apparently he didn’t make it friendship-ruining weird. Where some of us pettier world leaders might’ve kicked him out of our lunch table, it looks like Trump’s still there and paying for Bibi’s chocolate milk.

Ignoring the dystopic betchy high school I’ve forever burned into your minds, this friendship is not all bad. In fact, we found out at Cyber Week that we’re getting a bilateral cybersecurity group out of it. Which is, by most accounts, almost as good as free chocolate milk. The group, led by White House cybersecurity coordinator Rob Joyce, will work to defend critical infrastructure and track down malicious actors. Trump’s assistant for Homeland Security and Counterterrorism announced at Cyber Week that the group would meet for the first time this week to talk “critical infrastructure, advanced R&D, international cooperation and workforce.” And like, has Modi even been asked to prom yet?

The aim of this group has described as using an Iron Dome approach to cyber, which is precisely the defense strategy we need for the decades to come. It’s tempting to think cyberattacks are all 4Chan trolls and Jennifer Lawrence’s nudes, but it’s a whole lot more than that and lives are on the line when an attack goes as planned. Often many, many more lives than a conventional terrorist attack. In general, it would be much appreciated if Trump and Bibi could quit the circle jerk, but as far as cyber’s concerned, let’s hope this group takes us from talking loosely about establishing a set of norms to actually building an internationally cooperative infrastructure for defending against cyberattack. Because terrorists are like, so not fetch.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s