Scroll Top

CYBER
PUBLIC HEALTH

CYBER
PUBLIC HEALTH

CYBER
PUBLIC HEALTH

The internet is vast, complicated, and infinitely interconnected, but our view of its extensive set of interrelated and interconnected risks is narrow and woefully incomplete.

We don’t have enough consistent, high quality data to evaluate the relative effectiveness of cybersecurity mitigation strategies or predict future outcomes, let alone begin to untangle the wider determinants, impacts, or flows of risk.

To meet the evolving cybersecurity threats of tomorrow, we need a change of perspective. We need a wider view and a more rigorous, data-driven approach.

The internet is vast, complicated, and infinitely interconnected, but our view of its extensive set of interrelated and interconnected risks is narrow and woefully incomplete.

We don’t have enough consistent, high quality data to evaluate the relative effectiveness of cybersecurity mitigation strategies or predict future outcomes, let alone begin to untangle the wider determinants, impacts, or flows of risk.

To meet the evolving cybersecurity threats of tomorrow, we need a change of perspective. We need a wider view and a more rigorous, data-driven approach.

The internet is vast, complicated, and infinitely interconnected, but our view of its extensive set of interrelated and interconnected risks is narrow and woefully incomplete.

We don’t have enough consistent, high quality data to evaluate the relative effectiveness of cybersecurity mitigation strategies or predict future outcomes, let alone begin to untangle the wider determinants, impacts, or flows of risk.

To meet the evolving cybersecurity threats of tomorrow, we need a change of perspective. We need a wider view and a more rigorous, data-driven approach.

WE NEED A SCIENCE OF CYBER PUBLIC HEALTH

Medical professionals faced a similar challenge at the dawn of the 19th century as outbreaks of infectious diseases spiked and health disparities between wealthy and poor communities ballooned.

The early pioneers of public health and its diagnostic discipline – epidemiology – shifted the perspective of medicine over the course of the 19th century, effectively revolutionizing the treatment and mitigation of infectious diseases and beyond.

The core components of this new shift in perspective were:

WE NEED A SCIENCE OF CYBER PUBLIC HEALTH

Medical professionals faced a similar challenge at the dawn of the 19th century as outbreaks of infectious diseases spiked and health disparities between wealthy and poor communities ballooned.

The early pioneers of public health and its diagnostic discipline – epidemiology – shifted the perspective of medicine over the course of the 19th century, effectively revolutionizing the treatment and mitigation of infectious diseases and beyond.

The core components of this new shift in perspective were:

WE NEED A SCIENCE OF CYBER PUBLIC HEALTH

Medical professionals faced a similar challenge at the dawn of the 19th century as outbreaks of infectious diseases spiked and health disparities between wealthy and poor communities ballooned.

The early pioneers of public health and its diagnostic discipline, epidemiology, shifted the perspective of medicine over the course of the 19th century, effectively revolutionizing the treatment and mitigation of infectious diseases and beyond.

The core components of this new shift in perspective were:

DATA-DRIVEN SCIENTIFIC
INVESTIGATION

The adoption of data-driven scientific investigation techniques exposed flaws in the empirical foundations of existing medical knowledge and common treatments that proved to be either ineffective or harmful.

Cyber_Pub_Health_building-illust
DATA-DRIVEN SCIENTIFIC
INVESTIGATION

Embracing data-driven, scientific investigation techniques exposed flaws in the empirical foundations of existing medical knowledge and common treatments that were either ineffective or harmful.

Cyber_Pub_Health_building-illust
DATA-DRIVEN SCIENTIFIC
INVESTIGATION

The adoption of data-driven scientific investigation techniques exposed flaws in the empirical foundations of existing medical knowledge and common treatments that proved to be either ineffective or harmful.

Cyber_Pub_Health_building-illust

Using clinical records to test treatments

The proliferation of public hospitals created the first significant collections of clinical records. French doctor Pierre Charles Alexandre Louis used early statistical analysis techniques to discredit the use of leeches in bloodletting in 1828, and many credit his approach as inspiration for modern evidence-based medicine techniques including clinical trials and differential diagnosis techniques.

Using clinical records to test treatments

The proliferation of public hospitals created the first large collections of clinical records. French doctor Pierre- Charles-Alexandre Louis used early statistical analysis techniques to discredit the use of leeches in bloodletting in 1828, an approach that led to modern evidence-based medicine techniques including clinical trials and differential diagnosis techniques.

Using clinical records
to test treatments

The proliferation of public hospitals created the first significant collections of clinical records. French doctor Pierre Charles Alexandre Louis used early statistical analysis techniques to discredit the use of leeches in bloodletting in 1828, and many credit his approach as inspiration for modern evidence-based medicine techniques including clinical trials and differential diagnosis techniques.

Cyber_Pub_Health_building-illust2
POPULATION-LEVEL
APPROACH

While traditional medicine focused its analysis and interventions on individuals, these new disciplines centered on populations and the concept of collective risk.

Cyber_Pub_Health_building-illust2
POPULATION-LEVEL
APPROACH

While traditional medicine focused its analysis and interventions on individuals, these new disciplines centered their analysis and intervention on populations and the concept of collective risk.

POPULATION-LEVEL
APPROACH

While traditional medicine focused its analysis and interventions on individuals, these new disciplines centered on populations and the concept of collective risk.

Cyber_Pub_Health_building-illust2

Tracking Cholera Outbreaks to Water

John Snow is often credited as the father of epidemiology for his use of city records and statistics derived from the Bills of Mortality to map cholera outbreaks in London in the mid-1800s. He found that cholera was likely transmitted through the water supply, undermining the dominant “miasma” theory of the time.

Tracking Cholera Outbreaks to Water

John Snow is often credited as the father of epidemiology for mapping cholera outbreaks in London in the mid 1800’s using data using city records and statistics derived from the Bills of Mortality. He found that cholera was likely transmitted through the water supply, undermining the dominant “miasma” theory of the time.

Tracking Cholera Outbreaks
to Water

John Snow is often credited as the father of epidemiology for mapping cholera outbreaks in London in the mid 1800’s using data using city records and statistics derived from the Bills of Mortality. He found that cholera was likely transmitted through the water supply, undermining the dominant “miasma” theory of the time.

PREVENTATIVE INTERVENTIONS &
MITIGATION STRATEGIES

Instead of focusing on the treatment of infected individuals, these new disciplines enabled physicians, scientists and public officials to develop and test preventative interventions and mitigation strategies.

Great Sanitary Awakening.leeds-map.001-2
PREVENTATIVE INTERVENTIONS &
MITIGATION STRATEGIES

These new disciplines opened up new opportunities to develop and test preventative interventions and mitigation strategies instead of focusing solely on post-infection interventions and treatments.

Great Sanitary Awakening.leeds-map.001-2
PREVENTATIVE INTERVENTIONS & MITIGATION STRATEGIES

These new disciplines opened up new opportunities to develop and test preventative interventions and mitigation strategies instead of focusing solely on post-infection interventions and treatments.

Great Sanitary Awakening.leeds-map.001-2

From Inoculation to Vaccination

One of the deadliest diseases known to humans, smallpox spread throughout the world in the 18th century. Communities around the world increasingly turned to science in search of methods to prevent or limit the severity of infections. In the early part of the century, physicians and advocates worked to convince a wary public of the benefits of variolation (inoculation) treatments that drastically reduced mortality, but it was the invention of a smallpox vaccine by Edward Jenner in 1796 that revolutionized the way we approach infectious diseases today.

From Inoculation to Vaccination

One of the deadliest diseases known to humans, smallpox spread throughout the world in the 18th century. To combat the threat, physicians, scientists, and communities increasingly turned to science in search of methods to preemptively treat patients to prevent or limit the severity of infections. In the early part of the century, physicians and advocates worked to convince wary publics of the benefits of variolation (inoculation) treatments that drastically reduced mortality, but it was the invention of a smallpox vaccine by Edward Jenner in 1796 that revolutionized the way we approach infectious diseases today.

From Inoculation to Vaccination

One of the deadliest diseases known to humans, smallpox spread throughout the world in the 18th century. Communities around the world increasingly turned to science in search of methods to prevent or limit the severity of infections. In the early part of the century, physicians and advocates worked to convince a wary public of the benefits of variolation (inoculation) treatments that drastically reduced mortality, but it was the invention of a smallpox vaccine by Edward Jenner in 1796 that revolutionized the way we approach infectious diseases today.

Jenner vaccine
NON-MEDICAL INTERVENTIONS

Using data-driven investigation techniques, population thinking, and a newfound focus on prevention strategies, experts identified very effective non-medical interventions and mitigation strategies for infectious diseases and other causes of early mortality.

Jenner vaccine
NON-MEDICAL INTERVENTIONS

Using data-driven investigation techniques, population thinking, and a newfound focus on prevention strategies, these new disciplines helped identify effective policy-based, non-medical interventions and mitigation strategies.

NON-MEDICAL INTERVENTIONS

Using data-driven investigation techniques, population thinking, and a newfound focus on prevention strategies, these new disciplines helped identify effective policy-based, non-medical interventions and mitigation strategies.

Jenner vaccine

The Great Sanitary Awakening

The application of statistical analysis techniques to the spread of disease and the causes of early mortality led to “The Great Sanitary Awakening.” The 1842 “Report on the Sanitary Condition of the Labouring Population of Great Britain” used statistical evidence to disprove classist theories about life expectancy variations and led to Britain’s first Public Health Act, which included investments in improving sanitation throughout the country. As the links between overcrowding and poor sanitation were increasingly publicized, governments around the world followed suit and enhanced exploration of non-medical interventions to mitigate and prevent disease.

The Great Sanitary Awakening

The application of statistical analysis techniques to the spread of diseases and the causes of early mortality led to “The Great Sanitary Awakening.” The 1842 “Report on the Sanitary Condition of the Labouring Population of Great Britain” used statistical evidence to disprove classist theories on life expectancy variations and led to Britain’s first Public Health Act and investments in improving sanitation throughout the country. As the links between overcrowding and poor sanitation were increasingly publicized, governments around the world began to take action and it opened up a new focus on non-medical interventions to mitigate and prevent disease.

The Great Sanitary Awakening

The application of statistical analysis techniques to the spread of diseases and the causes of early mortality led to “The Great Sanitary Awakening.” The 1842 “Report on the Sanitary Condition of the Labouring Population of Great Britain” used statistical evidence to disprove classist theories on life expectancy variations and led to Britain’s first Public Health Act and investments in improving sanitation throughout the country. As the links between overcrowding and poor sanitation were increasingly publicized, governments around the world began to take action and it opened up a new focus on non-medical interventions to mitigate and prevent disease.

APPLYING PUBLIC HEALTH THINKING TO CYBERSECURITY

Adopting a public health-style perspective that embraces data-driven investigation, population thinking, and preventative approaches to shared risks would be transformative for the practice of cybersecurity. Experts could systematically test associations between risk factors and cyber threats, measure and compare the effectiveness of interventions, and adopt preventative measures that reduce both local and systemic risks to make the internet more secure and resilient for all.

In addition to reducing shared systemic risks, a Cyber Public Health approach would directly benefit enterprise security teams as well. One of the core lessons of public health models is that an individual (person or company) only has control over a small percentage of the risks they face. For example, identifying and addressing flaws in the DNS, routing, or other aspects of internet infrastructure require coordinated international action. Moreover, the data and analytical techniques developed through Cyber Public Health research will enable enterprise security teams to better evaluate existing practices, test alternatives, and better predict future threats.

APPLYING PUBLIC HEALTH THINKING TO CYBERSECURITY

Adopting a public health-style perspective that embraces data-driven investigation, population thinking, and preventative approaches to shared risks would be transformative for cybersecurity. It would allow experts to systematically test associations between risk factors and cyber threats, measure and compare the effectiveness of interventions, and adopt preventative measures that reduce both local and systemic risks to make the internet more secure and resilient for all.

In addition to reducing shared systemic risks, a Cyber Public Health approach would directly benefit enterprise security teams as well. One of the core lessons of public health models is that an individual (person or company) only has control over a small percentage of the risks they face. For example, identifying and addressing flaws in the DNS, routing or other aspects of internet infrastructure require coordinated international action. Moreover, the data and analytical techniques developed through Cyber Public Health research will enable enterprise security teams to better evaluate existing practices, test alternatives and better predict future threats.

APPLYING PUBLIC HEALTH THINKING TO CYBERSECURITY

Adopting a public health-style perspective that embraces data-driven investigation, population thinking, and preventative approaches to shared risks would be transformative for cybersecurity. It would allow experts to systematically test associations between risk factors and cyber threats, measure and compare the effectiveness of interventions, and adopt preventative measures that reduce both local and systemic risks to make the internet more secure and resilient for all.

In addition to reducing shared systemic risks, a Cyber Public Health approach would directly benefit enterprise security teams as well. One of the core lessons of public health models is that an individual (person or company) only has control over a small percentage of the risks they face. For example, identifying and addressing flaws in the DNS, routing or other aspects of internet infrastructure require coordinated international action. Moreover, the data and analytical techniques developed through Cyber Public Health research will enable enterprise security teams to better evaluate existing practices, test alternatives and better predict future threats.

THE PATH TOWARD A SCIENCE OF
CYBER PUBLIC HEALTH

Establishing a science of Cyber Public Health will require overcoming some significant challenges. The biggest challenge is data. We need to build the foundations of Cyber Public Health on vast quantities of high quality data, but we have precious little of it. Arguably, Florence Nightingale and John Smith had access to more relevant, large scale data than cybersecurity professionals today. For example, without reliable data on the number of internet-connected devices, we will struggle to answer even basic questions like, “Is malware increasing?”

CyberGreen is taking a two-pronged approach to meet this challenge. First, we are working on discrete “proof of concept” data collection and measurement projects like our “Internet Infrastructure Health Metrics Framework.” Second, we are mobilizing a global community of experts, business leaders, and policymakers to work together on proposals to unlock other critical datasets 

and establish standards for the collection and reporting of key data.

The second big challenge is building the infrastructure and institutions to support a mature practice of Cyber Public Health. For example, today’s public health infrastructure includes institutions at every level of government, international NGOs, academic institutions, and private organizations that play a role.

This is another area where coordination and collaboration among businesses, NGO’s, academic institutions, and governments will be critical to navigating a path forward. The challenges are significant, but the opportunities are immense. Please join our community and help us make Cyber Public Health a critical part of making the internet safe and resilient for everyone.

 

THE PATH TOWARD A SCIENCE OF
CYBER PUBLIC HEALTH

Establishing a science of Cyber Public Health will require overcoming some significant challenges. The biggest challenge is data. We need to build the foundations of Cyber Public Health on vast quantities of high quality data, but we have precious little of it. Arguably, Florence Nightingale and John Smith had access to more relevant, large scale data than cybersecurity professionals today. For example, without reliable data on the number of internet-connected devices, we will struggle to answer even basic questions like, “Is malware increasing?”

CyberGreen is taking a two-pronged approach to meet this challenge. First, we are working on discrete “proof of concept” data collection and measurement projects like our “Internet Infrastructure Health Metrics Framework.” Second, we are mobilizing a global community of experts, business leaders, and policymakers to work together on proposals to unlock other critical datasets 

and establish standards for the collection and reporting of key data.

The second big challenge is building the infrastructure and institutions to support a mature practice of Cyber Public Health. For example, today’s public health infrastructure includes institutions at every level of government, international NGOs, academic institutions, and private organizations that play a role.

This is another area where coordination and collaboration among businesses, NGO’s, academic institutions, and governments will be critical to navigating a path forward. The challenges are significant, but the opportunities are immense. Please join our community and help us make Cyber Public Health a critical part of making the internet safe and resilient for everyone.

 

THE PATH TOWARD A SCIENCE OF CYBER PUBLIC HEALTH

Establishing a science of Cyber Public Health will require overcoming some significant challenges. The biggest challenge is data. We need to build the foundations of Cyber Public Health on vast quantities of high quality data, but we have precious little of it. Arguably, Florence Nightingale and John Smith had access to more relevant, large scale data than cybersecurity professionals today. For example, without reliable data on the number of internet-connected devices, we will struggle to answer even basic questions like, “Is malware increasing?”

CyberGreen is taking a two-pronged approach to meet this challenge. First, we are working on discrete “proof of concept” data collection and measurement projects like our “Internet Infrastructure Health Metrics Framework.” Second, we are mobilizing a global community of experts, business leaders, and policymakers to work together on proposals to unlock other critical datasets

and establish standards for the collection and reporting of key data.

The second big challenge is building the infrastructure and institutions to support a mature practice of Cyber Public Health. For example, today’s public health infrastructure includes institutions at every level of government, international NGOs, academic institutions, and private organizations that play a role.

This is another area where coordination and collaboration among businesses, NGO’s, academic institutions, and governments will be critical to navigating a path forward. The challenges are significant, but the opportunities are immense. Please join our community and help us make Cyber Public Health a critical part of making the internet safe and resilient for everyone.

 

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.

PRIVACY POLICY

CyberGreen (“us”, “we”, or “our”) operates the CyberGreen website (the “Website Service”).

This page informs you of our policies regarding the collection, use and disclosure of Personal Information when you use our Website Service.

We will not use or share your information with anyone except as described in this Privacy Policy.

We use your Personal Information for providing and improving the Website Service. By using the Website Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms of Use, accessible at https://www.cybergreen.net.

MANUAL INFORMATION COLLECTION AND USE

While using our Website Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information (“Personal Information”) may include, but is not limited to:

  • Name
  • Email address
  • Affiliation
  • Internet Protocol (“IP”) address/range (if requesting opt out from CyberGreen scans)

BROWSER INFORMATION (LOG DATA)

We collect information that your browser sends whenever you visit our Website Service (“Log Data”). This Log Data may include information such as your computer’s IP address, browser type, browser version, the pages of our Website Service that you visit, the time and date of your visit, the time spent on those pages and other statistics.

COOKIES

Cookies are files with small amounts of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

We use cookies to collect, store, and/or correlate information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Website Service.

SERVICE PROVIDERS

We may employ third-party companies and individuals to facilitate our Website Service, to provide the Website Service on our behalf, to perform Website Service-related services or to assist us in analyzing how our Website Service is used.

These third parties have access to your Personal Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

SECURITY

The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

LINKS TO OTHER SITES

Our Website Service may contain links to other sites that are not operated by us. If you click on a third-party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over, and assume no responsibility for the content, privacy policies or practices of any third-party sites or services.

CHILDREN’S PRIVACY

Our Website Service does not address anyone under the age of 18 (“Children”).

We do not knowingly collect personally identifiable information from children under 18. If you are a parent or guardian and you are aware that your child has provided us with Personal Information, please contact us. If we discover that a child under 18 has provided us with Personal Information, we will delete such information from our servers immediately.

COMPLIANCE WITH LAWS

We will disclose your Personal Information where required to do so by law or subpoena.

CHANGES TO THIS PRIVACY POLICY

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

CONTACT US

If you have any questions about this Privacy Policy, please contact us.

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).