{"id":23338,"date":"2024-09-16T09:43:40","date_gmt":"2024-09-16T08:43:40","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/?p=23338"},"modified":"2024-10-11T14:27:05","modified_gmt":"2024-10-11T13:27:05","slug":"cyber-9-12-challenge-week-4-bringing-it-all-together-cyber-resilience-policy-development","status":"publish","type":"post","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2024\/09\/16\/cyber-9-12-challenge-week-4-bringing-it-all-together-cyber-resilience-policy-development\/","title":{"rendered":"Cyber 9\/12 Strategy Challenge WEEK 4: Bringing it all together &#8211; Cyber Resilience Policy Development\u00a0"},"content":{"rendered":"<section id=\"builder-section-text_12\" class=\"builder-section-first builder-section builder-section-text builder-section-next-text builder-text-columns-1\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_12-column-1\">\n<div class=\"builder-text-content\">\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23440\" data-permalink=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2024\/09\/16\/cyber-9-12-challenge-week-4-bringing-it-all-together-cyber-resilience-policy-development\/presentation-4-004-2-2\/\" data-orig-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447.png\" data-orig-size=\"960,141\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Presentation 4.004 2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447-300x44.png\" data-large-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447.png\" class=\"wpa-warning wpa-image-missing-alt aligncenter wp-image-23440 size-full\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447.png\" alt=\"\" width=\"960\" height=\"141\" data-warning=\"Missing alt text\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447.png 960w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447-300x44.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111235\/Presentation-4.004-2-e1726740767447-768x113.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-text_75\" class=\"builder-section-prev-text builder-section builder-section-text builder-section-next-text builder-text-columns-1\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_75-column-1\">\n<div class=\"builder-text-content\">\n<p style=\"text-align: right;\"><a id=\"ttfmake-1726238583\" class=\"ttfmake-button\" style=\"background-color: #171717; color: #ffffff; font-size: 16px; font-weight: bold; padding: 4px 10px; border-radius: 100px;\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2024\/09\/19\/cyber-9-12-challenge\/\" data-hover-background-color=\"#171717\" data-hover-color=\"#ffffff\">go to 9\/12 home page<\/a><\/p>\n<p>\u00a0<\/p>\n<p><span data-contrast=\"auto\">In this final week of the Module, participants will explore how non-technical cyber security considerations form the foundation of national and international policy solutions. Cyber security and cyber resilience cannot be achieved by technical means alone. As weeks 1, 2 and 3 of this Module have shown, there are political, economic, social, legal and increasingly environmental considerations to take into account in addition to the technical (the PESTLE approach to cyber security). Effective policy must, if possible, draw together these elements as they are each important parts of wider solutions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In this unit, students will explore what makes effective policy in the cyber context when dealing with major cyber incidents targeting critical national infrastructure. Crucial to this is the ability to combine and address different thematic areas and create succinct policy recommendations that still achieve particular goals and make states resilient to cyber incidents.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-text_218\" class=\"builder-section-prev-text builder-section builder-section-text builder-section-next-panels builder-text-columns-1\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<h3 class=\"builder-text-section-title\">\n        Learning outcomes    <\/h3>\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_218-column-1\">\n<div class=\"builder-text-content\">\n<p><span data-contrast=\"auto\">By the end of <\/span><b><span data-contrast=\"auto\">Week 4<\/span><\/b><span data-contrast=\"auto\">, students will have:<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Brought together the previous three weeks learning to develop holistic policy solutions.<\/span><\/li>\n<li><span data-contrast=\"auto\">Understood and made aware of how technology, law and (inter)national politics interact.<\/span><\/li>\n<li><span data-contrast=\"auto\">Analysed a major cyber incident from a holistic, non-technical perspective.<\/span><\/li>\n<li><span data-contrast=\"auto\">Confidently provided, recommended and discussed holistic cyber resilience policy solutions which do not solely rely on technical tools.<\/span><\/li>\n<li><span data-contrast=\"auto\">Navigated the complexities of reserved (Westminster) and devolved (Holyrood) areas of policy in relation to cyber issues<\/span><\/li>\n<\/ol><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-panels_266\" class=\"builder-section-prev-text builder-section builder-section-panels builder-section-next-text accordion-mode\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"ttfmp-accordion-container\" data-height-style=\"\"  data-start-collapsed=\"false\">\n<div id=\"ttfmp-panels-item-title-panels-item_274\" class=\"ttfmp-panels-item-title\">\n\t1. Watch this video<\/div>\n<div id=\"ttfmp-panels-item-content-panels-item_274\" class=\"ttfmp-panels-item-content\">\n<p style=\"text-align: center\"><div class=\"epyt-video-wrapper\"><div  id=\"_ytid_20193\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/YWjCWq52heQ?enablejsapi=1&autoplay=0&cc_load_policy=1&cc_lang_pref=en&iv_load_policy=1&loop=0&rel=0&fs=1&playsinline=0&autohide=2&theme=dark&color=red&controls=1&\" class=\"__youtube_prefs__ epyt-facade no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/YWjCWq52heQ\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div><\/div><\/p>\n<p style=\"text-align: center\">\n<\/div>\n<div id=\"ttfmp-panels-item-title-panels-item_280\" class=\"ttfmp-panels-item-title\">\n\t2. Read these<\/div>\n<div id=\"ttfmp-panels-item-content-panels-item_280\" class=\"ttfmp-panels-item-content\">\n<ul>\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/16094556\/2-Government-policy-S5-primer.pdf\"><span class=\"TextRun SCXW23453024 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW23453024 BCX8\">S5\/S6 primer on government policy<\/span><\/span><span class=\"EOP SCXW23453024 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/16094557\/3-Government-cyber-policy-S5-primer.pdf\"><span class=\"TextRun SCXW21985295 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW21985295 BCX8\">S5\/S6 primer on writing cyber policy<\/span><\/span><span class=\"EOP SCXW21985295 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><a id=\"ttfmake-1728642355\" class=\"ttfmake-button\" style=\"background-color: #171717;color: #ffffff;font-size: 16px;font-weight: bold;padding: 4px 10px;border-radius: 100px\" href=\"https:\/\/www.research-collection.ethz.ch\/handle\/20.500.11850\/374797\" data-hover-background-color=\"#171717\" data-hover-color=\"#ffffff\"><span data-contrast=\"none\">Government Policy Snapshots. A collection of analyses of national government cyber security strategies conducted by Senior Researchers at ETH Zurich\u2019s Centre for Security Studies<\/span><\/a><\/p>\n<p>\u00a0<\/p>\n<p><a class=\"ttfmake-button\" href=\"https:\/\/www.gcsp.ch\/publications\/impact-regulatory-frameworks-global-digital-communications-industry\"><span data-contrast=\"none\">Dr R Dewar and E. Templeton, The Impact of Regulatory Frameworks on the global Digital Communications Industry, 2020, Geneva Centre for Security Policy<\/span><\/a><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span>An academic login may be required to access these.<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/16094559\/6-research-report-cyber-resilience-scottish-third-sector.pdf\"><span data-contrast=\"none\">Dr R Dewar, <\/span><i><span data-contrast=\"none\">Cyber Resilience and the Scottish Third Sector<\/span><\/i><span data-contrast=\"none\">, 2023, Scottish Government Policy Report<\/span><\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<\/div>\n<div id=\"ttfmp-panels-item-title-panels-item_286\" class=\"ttfmp-panels-item-title\">\n\t3. Group activities<\/div>\n<div id=\"ttfmp-panels-item-content-panels-item_286\" class=\"ttfmp-panels-item-content\">\n<p>In your groups, discuss how to develop holistic policy solutions incorporating, or at least acknowledging and addressing, the political, economic, social, technical, legal and environmental aspects of cyber security<\/p>\n<p>\u00a0<\/p>\n<p>In your groups, prepare a 10minute presentation addressing the unit\u2019s three questions:<\/p>\n<p>Provide 3 policy recommendations to help Scotland be more resilient against Stuxnet-style operations. Think about:<\/p>\n<ol>\n<li>The way Stuxnet entered the target system.<\/li>\n<li>The impact of the operation if successful.<\/li>\n<li>Explain and support your choices.<\/li>\n<li>Set out the cross-government (UK and Scotland) policy relationships that need to be considered?<\/li>\n<\/ol>\n<\/div>\n<div id=\"ttfmp-panels-item-title-panels-item_292\" class=\"ttfmp-panels-item-title\">\n\t4. Assessment<\/div>\n<div id=\"ttfmp-panels-item-content-panels-item_292\" class=\"ttfmp-panels-item-content\">\n<p><span class=\"TextRun SCXW224742692 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW224742692 BCX8\">10-minute<\/span><span class=\"NormalTextRun SCXW224742692 BCX8\"> oral presentation and feedback from module leader<\/span><\/span><span class=\"EOP SCXW224742692 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-text_90\" class=\"builder-section-prev-panels builder-section builder-section-text builder-section-last builder-text-columns-1\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_90-column-1\">\n<div class=\"builder-text-content\">\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23758\" data-permalink=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2024\/09\/19\/cyber-9-12-challenge\/presentation-4-001-6-2\/\" data-orig-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393.png\" data-orig-size=\"960,72\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Presentation 4.001 6\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393-300x23.png\" data-large-file=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393.png\" class=\"wpa-warning wpa-image-missing-alt aligncenter wp-image-23758 size-full\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393.png\" alt=\"\" width=\"960\" height=\"72\" data-warning=\"Missing alt text\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393.png 960w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393-300x23.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/11113648\/Presentation-4.001-6-1-e1728643041393-768x58.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>go to 9\/12 home page \u00a0 In this final week of the Module, participants will explore how non-technical cyber security considerations form the foundation of national and international policy solutions. Cyber security and cyber resilience cannot be achieved by technical means alone. As weeks 1, 2 and 3 of this Module have shown, there are &hellip;<\/p>\n","protected":false},"author":61927,"featured_media":23441,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2201],"tags":[],"class_list":["post-23338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberfirst-9-12-project"],"jetpack_featured_media_url":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearn\/uploads\/sites\/6913\/2024\/09\/19111328\/Presentation-4.004-2-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/posts\/23338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/users\/61927"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/comments?post=23338"}],"version-history":[{"count":17,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/posts\/23338\/revisions"}],"predecessor-version":[{"id":23768,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/posts\/23338\/revisions\/23768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/media\/23441"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/media?parent=23338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/categories?post=23338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/wp-json\/wp\/v2\/tags?post=23338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}