Belfer Center Home > Experts > Melissa Hathaway

« Back to Melissa Hathaway

Melissa Hathaway

Melissa Hathaway

Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

Contact:
Email: HathawayGlobalStrategies@verizon.net

 

 

By Publication Type

 

February 2014

Best Practices in Computer Network Defense: Incident Detection and Response

Book

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against malicious cyber activity. This book presents 10 papers and 21 specific findings from the NATO Advanced Research Workshop (ARW) "Best Practices in Computer Network Defense (CND): Incident Detection and Response", held in Geneva, Switzerland, in September 2013.

 

February 2014

"Advanced Research Workshop Findings"

Book Chapter

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

This chapter informs NATO cyber defense policy and presents operators and decision-makers with genuine tools and expert advice for computer network defense, incident detection, and incident response.

 

 

December 2012

"Preliminary Considerations: On National Cyber Security"

Book Chapter

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age and Alexander Klimburg, Associate, Science, Technology, and Public Policy Program/Project on Technology, Security, and Conflict in the Cyber Age

In this chapter, Melissa Hathaway and Alexander Klimburg introduce three conceptual tools to help focus the strategic context and debate. These are termed the "three dimensions," the "five mandates," and the "five dilemmas" of national cyber security. Each dimension, mandate and dilemma will play a varying role in each nation's attempt to formulate and execute a national cyber security strategy according to their specific conditions.

 

 

February 2012

"Falling Prey to Cybercrime: Implications for Business and the Economy"

Book Chapter

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

As American businesses, inventors, and artists market, sell, and distribute their products worldwide via the Internet, the threat from criminals and criminal organizations who want to profit illegally from their hard work grows. The threat from other nations wanting to jump start their industries without making the intellectual investment is even more disturbing. This fleecing of America must stop. We can no longer afford complacency and silence—we must find and use as many market levers as possible to change the path we are on.

 

AP Photo

October 2009

"Strategic Advantage: Why America Should Care About Cybersecurity"

Discussion Paper

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

The internet is an interconnected series of networks--where it is difficult to determine where private security threats end and public ones begin.  These networks deliver power and water to our households and businesses, enable us to access our bank accounts from almost any city in the world, and transform the way our doctors provide healthcare.  For all of these reasons, we need a safe Internet with a strong network infrastructure.

 

Wikimedia CC

July 25, 2014

"Taking Control of Our Cyber Future"

Journal Article, Georgetown Journal of International Affairs

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age and John Stewart

In our current state of cybersecurity, breach, crime, disruption, and destruction are growing in unacceptable ways. Key indicators suggest that we are not making enough progress and in fact, are possibly going backwards. This paper proposed four actions to start taking right now.

 

 

2012

"Leadership and Responsibility for Cybersecurity"

Journal Article, Georgetown Journal of International Affairs, Special Issue

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

"Policy makers, legislators, and businessmen should assess the gap between the current defense posture and our needed front line defense in the face of an increasingly sophisticated range of actors. This paper describes a series of case studies that highlight the lack of attention being paid to this serious problem and the subsequent policy and technology solutions that are being brought to bear to close the gap."

 

 

2011

"Creating the Demand Curve for Cybersecurity"

Journal Article, Georgetown Journal of International Affairs, Special Issue

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

The Executive Branch faces numerous complex challenges in a variety of domestic and international arenas. Strengthening our information security posture is certainly one of them, and the Administration must take a bold approach to accomplishing this end. The author presents a unique strategy for strengthening cybersecurity, recommending that the Executive Branch should call upon three independent regulatory agencies — the SEC, FCC, and FTC — to support our information infrastructure and protect American enterprise.

 

 

November 18, 2010

"Toward a Closer Digital Alliance"

Journal Article, SAIS Review, issue 2, volume XXX

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

Countries will need to reconcile the facts that their Internet infrastructures are vulnerable and less resilient to attack and that their economic dependence on the Internet makes cooperation between countries on cybersecurity issues essential. Disparate and uncoordinated cyber defense schemes could adversely affect individual and collective security, privacy, usability, transparency, speed, and interoperability. Much tighter alignment and better integration of European and NATO initiatives with national laws, policies, and funding priorities is necessary to counteract threats against national networks and infrastructure. Only through international cooperation and private-public partnerships can cyber defense measures succeed.

 

 

Fall 2008

"Cyber Security: An Economic and National Security Crisis"

Journal Article, INTELLIGENCER, issue 2, volume 16

By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age

"It is no longer sufficient for the U.S. government to discover cyber intrusions in its networks, clean up the damage, and take legal or political steps to deter further intrusions. The U.S. must take action to protect the critical components upon which our economy, government, and national security are based from potential exploitation, disruption or destruction."

 

SUBSCRIBE

Receive email updates on the most pressing topics in science and int'l affairs.

Events Calendar

We host a busy schedule of events throughout the fall, winter and spring. Past guests include: UN Secretary-General Ban Ki-moon, former Vice President Al Gore, and former Russian President Mikhail Gorbachev.