Skip to main content
Publications
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
Blockchain, distributed ledger, strategy, policy, innovation
In its 2018 coalition agreement, the German federal government has set itself the goal of adopting a "Blockchain strategy" in this legislative period. As part of the planned promotion of Distributed Ledger and Blockchain technologies, the government wants to create a framework for the development and application of these technologies and test them in public administration. The Federal Ministry of Economics and Energy and the Federal Ministry of Finance are jointly in charge of developing the strategy. On this occasion, in a workshop on 3 July 2018 at the Digital Society Institute of ESMT Berlin, 35 experts from politics, business and science discussed how a national blockchain strategy can be practically organized. The discussion focused on the questions of what goals such a strategy should have, what the central enablers and appropriate framework conditions for the development and application of Distributed Ledger technologies such as blockchain can be in Germany, and what role the state plays in promoting the technology and managing risks in this technology field. Sarah Basic and André Eid (Federal Ministry for Economic Affairs and Energy), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Federal Office for Security in Information Technology) and Kai Wagner (Jolocom) gave input speeches to the debate. Based on the workshop discussion, this paper outlines requirements for a national blockchain strategy. [Die Bundesregierung hat sich in ihrem Koalitionsvertrag das Ziel gesetzt, in dieser Legislaturperiode eine „Blockchain-Strategie“ zu verabschieden. Im Rahmen der geplanten Förderung von Distributed Ledger und Blockchain Technologien sollen die Rahmenbedingungen für Entwicklung und Einsatz der Technologien verbessert und diese auch in der öffentlichen Verwaltung erprobt werden. Mit der Erarbeitung der Strategie sind federführend das Bundesministerium für Wirtschaft und Energie (BMWi) und das Bundesministerium der Finanzen (BMF) betraut. Aus diesem Anlass erörterten in einem Workshop am 3. Juli 2018 am Digital Society Institute der ESMT Berlin 35 Experten aus Politik, Wirtschaft und Wissenschaft, wie eine nationale Blockchain-Strategie praktisch organisiert sein kann. Im Zentrum der Diskussion standen die Fragen, welche Ziele eine solche Strategie haben sollte, was zentrale Ermöglicher und geeignete Rahmenbedingungen für die Entwicklung und Anwendung von Distributed Ledger Technologien wie Blockchain in Deutschland sein können, und welche Rolle dem Staat bei der Förderung und Bekämpfung von Risiken in diesem Technologiefeld zukommt. Impulsvorträge für die Diskussion hielten Sarah Basic und André Eid (Bundesministerium für Wirtschaft und Energie), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Bundesamt für Sicherheit in der Informationstechnik) und Kai Wagner (Jolocom). Auf der Grundlage der Workshop-Diskussion skizziert dieses Papier Anforderungen an eine nationale Blockchain-Strategie.]
Pages
14
Book
SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Conference Proceeding
IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
As healthcare is increasingly digitized and interconnected, medical systems are exposed to IT security threats that can endanger patient health and safety. This paper examines how the convergence of safety and security risks in connected healthcare challenges the governance of medical systems safety in Europe. The analysis shows that the management of safety and security risks of medical systems requires the extension of existing governance mechanisms, including regulation, standards, and industry best practices, to combine both safety and IT security in healthcare. It puts forward policy and industry recommendations for the improvement of medical systems' cyber security in Europe, including pre-market certification and post-market monitoring and surveillance programs, effective information sharing, vulnerability handling, and patch management. The paper draws comparisons with medical device cyber security guidelines in the United States, and with technical controls, standards, and best practices in the domain of industrial control systems (ICS) security.
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR) 2018 (1)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity
The report gives an overview on the current situation on cybersecurity and the political handling of that topic. It also recaps the goals and failures of the last four years and recommends action areas.
Volume
2018
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR) 2017 (6)
Subject(s)
Health and environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity, e-health, IoT, safety, medical devices
The healthcare industry is undergoing great technological transformations. Hospitals are going digital and medical devices – whether implanted in patients’ bodies or stationed in hospitals – are equipped with increasing computing power and wireless connectivity. Connected healthcare can offer safer, more efficient, and timely medical service delivery. It also presents great economic opportunities – according to a Roland Berger consultancy firm study, the digital healthcare market is set to grow at average annual growth rates of 21 percent until 2020. Yet, the integration of computing and communication technologies in safety-critical medical systems will expose them to the same network and information security (cyber security) threats as other information technology (IT) systems. Research and real-world incidents have shown that IT security risks in healthcare are systemic. Cyber attacks’ impact on the privacy of patient data has already been established. More recently, their potential impact on patient health and safety has been raising concerns for healthcare organizations, regulators, and medical device manufacturers alike. The management and governance of related risks requires comprehensive standardization, regulation, and best practices to encompass both IT security and safety. DSI has analyzed the convergence of safety and security risks in healthcare and the Internet of Things through a review of the relevant literature, as well as expert interviews and a workshop with representatives from health organizations, medical device manufacturers, IT security experts, safety engineers, regulators, and certification bodies. On this basis, DSI has developed recommendations for policy and industry, which are presented by this paper after a short analysis of the current status of security in connected healthcare.
Volume
2017
Report
In Digitalpolitik: Eine Einführung, edited by Lorena Jaume-Palasí, Julia Pohle, Matthias Spielkamp, 19–26. Berlin: Wikimedia.
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, National Security, Human Rights, Conflicts
Die Durchsetzung nationaler Sicherheitsinteressen im digitalen Raum kann IT-Sicherheit und Menschenrechte beeinträchtigen. Cybersecurity ist deshalb international nicht nur ein Thema für die technische Community, sondern auch für die Zivilgesellschaft.
Secondary Title
Digitalpolitik: Eine Einführung
Journal Pages
19–26
Conference Magazine
CyFy Journal Digital Debates 2016 3 (2016)
Subject(s)
Information technology and systems
Keyword(s)
Cyber command, cyber war, espionage, Germany, sabotage, Ursula von der Leyen
The German government has in recent years launched a range of digital security initiatives, including a law regulating the protection of critical infrastructure. This article focuses on one of the latest and most controversial initiative: plans to form a new cyber command in the German military. The debate around the plans and the nascent efforts to implement are emblematic of the broader political and institutional tensions in Germany at the intersection of information security and national security.
Volume
3
Book Review

Krieg der Knöpfe [War of the buttons]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
cyber security, electronic warfare
Vor mehr als 50 Jahren, im Jahre 1961, warnte der scheidende US-Präsident Eisenhower in seiner Abschiedsrede vor der Herausbildung eines „militärisch-industriellen Komplexes“, der die Freiheit bedrohe. Haben wir es heute mit einem weiterführenden, einem militärisch-industriellen-internetbasierten Komplex zu tun? Zwei Neuerscheinungen.
Review of: @War – The Rise of the Military-Internet Complex by Shane Harris, Digitale Diktatur. Totalüberwachung, Datenmissbrauch, Cyberkrieg by Stefan Aust and Thomas Ammann.
Journal Pages
134–138
Report
New America Foundation and Global Public Policy Institute
Robert Morgus, Isabel Skierka, Mirko Hohmann, Tim Maurer (2015)
Subject(s)
Information technology and systems
Keyword(s)
Cyber security, incident response, critical infrastructures
This report is the second in a series of papers on Computer Security Incident Response Teams (CSIRTs). The first publication, CSIRT Basics for Policy-Makers, offers a general examination of the history, types and culture of CSIRTs. This second report focuses on national CSIRTs (nCSIRTs) and their relevance for cybersecurity and examines how and when the principles of the CSIRT community coincide or conflict with policy objectives of other government actors. The third publication will focus on the international landscape and on how to increase the cooperation and effectiveness of the global network of CSIRTs.
Book Chapter
In Handwörterbuch Internationale Politik, 13th ed., edited by Wichard Woyke, Johannes Varwick, 45–49. Leverkusen: Verlag Barbara Budrich.
Isabel Skierka, Thorsten Benner (2015)
Subject(s)
Economics, politics and business environment
Keyword(s)
Digital sovereignty, industrial policy, digitalization, cyber security
Dieser Artikel gibt einen Überblick über die Verwendung und den Verwendungskontext des Begriffs "Digitale Souveränität". Im Zuge der Digitalisierung fast aller Lebensbereiche haben Staaten die Bedeutung des Internets für alle Kernfunktionen politischer Kontrolle und ökonomischer Wertschöp- fung erkannt. Aufgrund der grenzüberschreitenden und dezentralen Beschaffenheit des Internets sowie des großen technologischen Vorsprungs der USA (Militär, Geheim- dienste, Silicon Valley-Unternehmen) sorgen sich demokratische wie autoritäre Staaten vermehrt um die Rückgewinnung oder den Erhalt ihrer ‚digitalen Souveränität‘ (oft ist mit ähnlicher Bedeutung von ‚technologischer Souveränität‘ die Rede). Insbesondere nach den Enthüllungen über die Überwachungs- und Spionagefähigkeiten der US- Geheimdienste im Sommer 2013 (→ transatlantische Beziehungen) hat der Begriff ei- ne starke Konjunktur erfahren. Er wird vor allem politisch verwandt ohne eindeutig de- finierten rechtlichen und analytischen Kern. Je nach Verwendungskontext nimmt der Begriff verschiedene Bedeutungen an (mit jeweils unterschiedlichen politischen Hand- lungsempfehlungen). Eine Analyse der Verwendungskontexte kann dabei helfen, zent- rale Aspekte der sich immer weiter verschärfenden Debatte um die Rolle von Staat, Unternehmen und Individuen im digitalen Raum zu beleuchten.
Secondary Title
Handwörterbuch Internationale Politik
Edition
13th ed.,
Journal Pages
45–49
ISBN
978-3825245184
Report
New America Foundation and Global Public Policy Institute
Isabel Skierka, Robert Morgus, Mirko Hohmann, Tim Maurer (2015)
Keyword(s)
Cyber security, incident response, critical infrastructures
In this paper, we examine the history, types and culture of Computer Security Incident Response Teams (CSIRTs). Some CSIRT practitioners and policymakers have differing views of what a national CSIRT should be, how it should operate, where it should be situated and how it should relate to the rest of the computer security incident response network within its country. This brief is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding. This lays the foundation for subsequent publications, which will examine some of the critical issues in greater depth. This paper is the first in a series examining the role of CSIRTs in cybersecurity and is part of a joint project of New America and the Global Public Policy Institute (GPPi), called “Transatlantic Dialogues on Security and Freedom in the Digital Age.”
Book Review

Amerika abwickeln [Unwinding America]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
American decline, US politics
Die neue Wirtschaftsweltmacht heißt China. Geht es nun auch politisch bergab mit den USA – wieder einmal? Josef Joffes Anti-Kassandraruf, Alexander Emmerichs und Philipp Gasserts Studie zu „Amerikas Kriegen“ und George Packers Reportage-Mosaik zeigen eines: Das Thema ist zu komplex für eine simple Aufstiegs- und Niedergangsrhetorik.
Review of: The Unwinding: An Inner History of the New America by George Packer, The Myth of America’s Decline - Economics, and a Half Century of False Prophecies by Josef Joffe, and Amerikas Kriege by Alexander Emmerich and Philipp Gassert.
Journal Pages
138–141
Book Review

Die Illusion vom „sauberen Krieg“ [The illusion of "clean" war]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
electronic warfare, revolution in military affairs, cyber security
Ist ein Krieg, der auf Geheimdienstinformationen und Drohneneinsätzen beruht, „intelligenter“ oder „sauberer“ als einer mit Bodentruppen? Wer das Buch des New York Times-Journalisten David E. Sanger liest, mag diese Frage bejahen. Wer dagegen auf das Urteil von Jeremy Scahill (The Nation) oder Mark Mazzetti (NYT) vertraut, dürfte sie verneinen.
Review of: Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger, Dirty Wars: The World Is A Battlefield by Jeremy Scahill, and The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth by Mark Mazzetti.
Journal Pages
134–137