The Time has come for Public/Private Cybersecurity Action!

Security threats to government and the private sector are pervasive and increasingly sophisticated.

On February 12, 2013 the president issued an Executive Order titled “Improving Critical Infrastructure Cybersecurity” which calls for and outlines a strategy to protect the Nation’s critical infrastructure and to maintain a cyber-environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. Additionally he defined critical infrastructure as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters”.

According to Steve Bucci of the Heritage Foundation, “…we need collaboration between the private sector, who owns most of the infrastructure, and government. But how much can we tell them?” This is a recurring theme and concern, but also an opportunity for action since during discussions between all involved; concerns, policy and best practices can be developed. The Stephenson Disaster Management Institute (SDMI) at Louisiana State University (LSU) is working closely with Symantec and Dell to develop Blue Ocean models[9] for collaboration, models that enhance “win-win” coordination between the public and private sector.

SDMI completed through a public/private partnership between Louisiana State University, the Louisiana Governor’s Office of Homeland Security and Emergency Preparedness (GOHSEP), and the donations from Entergy and Dell a state of the art Disaster Lab that can be used as a decision theater to facilitate decision making during incidents, a technology integration laboratory for the design of new technologies, and as an environment to facilitate the collaboration and coordination of the public and private sectors. In particular, the work between SDMI, Symantec, and Dell is shaping the collaboration among the critical infrastructure key resources (CIKR) across Louisiana, which is heavily weighted toward oil and gas, energy, chemical, transportation, telecommunications, and many other critical sectors.

At the SDMI Disaster Lab common doctrines and network protocols for sharing and co-producing of meaningful and actionable intelligence that meets national needs and provides local context, for both the public and private sector, are currently being developed. This unique public/private collaborative that made the Disaster Lab possible continues to fuel the development of “win-win” collaborative models that undoubtedly result in a more robust and synergistic infrastructure tapestry, that is resilient, adaptable, and capable of facing the next generation challenges. Attacking the cybersecurity challenge on a multi front collaborative approach with an all-hands-on deck approach, with access to the latest in technological advances, will not only optimize our abilities, but also enhance the overall effectiveness of the Louisiana lead effort. This ability to have a true “win-win” public/private collaborative with the participation of LSU, state government leaders, and industry pioneers such as Symantec, Dell, and Amazon provide us with a unique platform to influence global cybersecurity policy and best practices.


[1] Staff Symantec, Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually, Study (Mountain View: Symantec, 2011).

[2] ibid

[3] Whitehouse, Cyber Space Policy review, Report (Whitehouse).

[4] Michael Riley and Ashlee Vance, "Cyber Weapons: The New Arms Race," Bloomberg Business Week, July 20, 2011.

[5] ibid

[6] Whitehouse, International Strategy for Cyberspace, Policy (Washington, DC: Whitehouse, 2011).

[7] Whitehouse, The Comprehensive National Cybersecurity Initiative, Policy (Washington, DC: Whitehouse, 2008).

[8] Whitehouse, International Strategy for Cyberspace

[9] W. Chan Kim and Renee Mauborgne, Blue Ocean Strategy (Boston: Harvard Business Review, 2005).



  • Enhance your experience.

    Thank you for your regular readership of and visits to To continue viewing content on this site, please take a few moments to fill out the form below and register on this website.

    Registration is required to help ensure your access to featured content, and to maintain control of access to content that may be sensitive in nature to law enforcement.