Skip to main content

Public-Private Partnership: The Missing Factor in the Resilience Equation. The French Experience on CIIP

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8985))

Abstract

Critical information infrastructure protection is a complex and multifaceted problem domain and continues to become more so. Because it is impossible to prevent the occurrence of all incidents, the CIIP should be approached in terms of resilience. However, governments are facing a key challenge in the implementation of resilience: the need of cooperation with the private sector. How to organize the public-private cooperation is arduous but geopolitics provides the tools to under-stand this kind of complex relationship. In analyzing the French case, this paper aims to see PPP through a new pathos: as a risk-mitigating factor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Military Program Act 2014–2019 article 22, Defence Code Article L1332-6 and following. The measures include: mandatory cartography of the critical information systems, mandatory audits of information systems and networks by certified third parties; mandatory declaration of cyber incidents; implementation of certified sensors; more power to State authorities in order to take exceptional measures in case of a serious crisis.

References

  1. Lacoste, Y.: La géographie ça sert d’abord à faire la guerre. La découverte, Paris (2014)

    Google Scholar 

  2. Dunn Cavelty, M., Suter, M.: The art of CIIP strategy: tacking stock of content and processes. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds.) Critical Infrastructure Protection. LNCS, vol. 7130, pp. 15–38. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Douzet, F., Héon, S.: L’analyse du risque cyber, emblématique d’un dialogue nécessaire. Sécurité & Stratégie no. 14, La Document. Francaise, Paris, February (2014)

    Google Scholar 

  4. Meynet, S., et al.: SCADA/ICS security ANSSI Working Group. In: CESAR Conference (2013)

    Google Scholar 

  5. Omand, D.: Securing the State. Hurst, London (2010)

    Google Scholar 

  6. Schneier, B.: A fraying of the public/private surveillance partnership. www.schneier.com/blog/archives/11/a_fraying_of_th.html. Accessed 30 November 2013

Download references

Acknowledgments

This work is funded by Airbus Defense and Space-CyberSecurity and supported by the Chaire Castex de Cyberstratégie. Any opinions expressed in this publication are those of the author and do not necessarily reflect the views of Airbus.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Danilo D’ Elia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

D’ Elia, D. (2016). Public-Private Partnership: The Missing Factor in the Resilience Equation. The French Experience on CIIP. In: Panayiotou, C., Ellinas, G., Kyriakides, E., Polycarpou, M. (eds) Critical Information Infrastructures Security. CRITIS 2014. Lecture Notes in Computer Science(), vol 8985. Springer, Cham. https://doi.org/10.1007/978-3-319-31664-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31664-2_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31663-5

  • Online ISBN: 978-3-319-31664-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics