Cyber Security for National Security «Coordination, Capacity Building and National Solutions»
|
|
- Alban Pitts
- 5 years ago
- Views:
Transcription
1 Cyber Security for National Security «Coordination, Capacity Building and National Solutions» Mustafa AFYONLUOĞLU Cyber Security, e-governance and egovernment Chief Expert
2 Cyber Security for National Security National Security: Identification of threats and opportunities by monitoring the regional and global environment in order to take measures against the threats to the national state and security, and the processes to determine the politics appropriate to these issues and to implement the most appropriate policies (National Security Committee)* NATIONAL SECURITY MILITARY POLITICAL DIPLOMATIC ECONOMIC CYBER (?) NATO Summit in Warsaw, : Cyber attacks to NATO ICT System 500 Attacks/month (60% increase w.r.t. 2015) National Cyber Security Budgets France (2014): 1 Billion UK (2016): 2.5 Billion 2030 Cyber UnSecurity Volume: 90 Trillion $ (Denver University Research Report) * **
3 PEOPLE DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR PRIVATE SECTOR CITIZEN UNIVERSITIES D A T A SECURITY MACHINES NGO POWER
4 PEOPLE DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR PRIVATE SECTOR CITIZEN UNIVERSITIES D A T A SECURITY MACHINES NGO POWER
5 PUBLIC SECTOR & PRIVATE SECTOR LIKE TWO WINGS OF A BIRD IN HARMONY!
6 What happens on the internet for 60 seconds? (February 2017)
7 What happens on the internet for 1 Hour? (February 2017)
8 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
9 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
10 Internet Connected Devices Internet of Things IoT Güvenlik Sorunları Expected Economical Size in IoT 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
11 Internet Connected Devices Internet of Things
12 WHAT HAPPENS IN 2 MONTHS? CI: Health October 4th, 2016 J&J: Attack on Diabetic Insulin Pumps CI: Finance October 22th, million bank card information of Indian October 15th, 2016 IoT: DDoS Attack of Mirai BotNET to Dyn DNS 10 Tbps National October 23rd, 2016 Interenet interrruption on 78% of ABD with 14 Million IoT $ 7 Billion loss October 24th, 2016 UK: «Motor Vehicles Cyber Security Guide» published CI: Health November 3rd, 2016 UK National Health System closed down due to malware National November 15th, 2016 Pre-loaded 700,000 phone sends data to China CI: Transport banks stolen November 28th, 2016 Otonomy Systems Cyber attack to San Francisco Municipal Global: İnternet Metro System CI: Communication November 28th, 2016 Cyber attack to routers of Alma Telekom Terrorism November 30th, 2016 Files of 54 terrorist groups leaked from from Europol National December 7th, 2016 The North Korean Operating System «Red Star» was captured by a remote attack October 10th, 2016 Cyber Attack on Germany Nuclear Power Plants CI: Energy October 22nd, 2016 DDoS attack to Singapore Telekom Starhub CI: Communication November 1st, 2016 Cyber attacks on Schneider Electrics ICS Panels CI: Industry November 9th, 2016 Central heating system in Finland closed with DDoS attack Public Service November 25th,2016 Massive DDoS Attack on European Commission servers Institutional November 28th,2016 Data Breach: 26,500 UK National Lottery User Account Taken Public December 3rd, million Android downloads were attacked via AirDroid Mobile December 4th, 2016 Visa cards break in 06 seconds CI: Finance Cyber Security for National Security: «Coordination, CI: Critical Infrastructure Capacity Building and National Solutions" ICS: Industrial Control System IoT: Internet of Things ( IoT: $ - DarkWeb)
13 December 14 th 2015 nic TR Domain Name System DDoS Attack December 24 th, 2015 Finance
14 April 08 th, 2016 National ID Number Data Breach May 18 th, 2016 Health Sector Data Breach
15 December 30 th 2016 Energy Sector July 2016 Institutional Data Breach
16 WEAK LINKS QUALIFIED HUMAN RESOURCE INVALID CONFIGURATION NON-NATIONAL SOLUTIONS
17 WEAK LINKS NİTELİKLİ İNSAN KAYNAĞI HATALI KONFİGÜRASYON MİLLİ OLMAYAN ÇÖZÜMLER
18 February 2016: The Technical Arrangement on cooperation in cyber defense with the European Union was signed. July 2016: Cyber Space is the 5th operational area after Land, Air, Sea and Space. December 2016: Cyber defense is one of NATO's key tasks in the field of collective defense. International law should also be applied to the cyber field. NATO will develop cyber training and exercise skills.
19 GOVERNANCE HOW? Personal Privacy Public Data Trade Secrets
20 Syber Security Governance Model of Netherlands Ministry of Security and Justice National Cyber Security Council (NCSS) ICT Response Board (IRB) Governance Board Directorate of Cyber Security National Coordinator for Counterterrorism and Security Policy Division Incident Response Team Knowledge Services Team Development Team National Cyber Security Centre (NCSC) GOVCERT.NL Security Operation Center (SOC)
21 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution
22 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution
23 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support
24 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support
25 SUGGESTIONS : Coordination & Leadership 1. Cyber Security should be coordinated from top level in ONE CENTERAL ADMINISTRATION 2. In this Center, there should be Public-Private Governance Board 3. National Cyber Security Policy and Prioritized Sectoral Areas should be prepared National Solutions in «Perimeter Security» Layer: National Firewall National Intrusion Detection & Prevention systems National Web Filtering PRIVATE SECTOR PUBLIC National Anti-virus Solutions National Cyber Thread Intelligence Bank (CTIB) National Operating System National National Storage Cloud Secure Public Network
26 SUGGESTIONS : Capacity Building 4. Government should support private sector, while developing Sectoral Capacity * Definitions of Cyber Security, Data Security and e-government Expertizes / Professions * Software Development and Cyber Security Education Programs from Primary School to Universities * Preparation of HR Capacity Developing Programs for private sectotr * Innovation Incentives in prioritized areas 5. The government should be beside the sector in creating the regional and global power of the sector 6. Special incentives for the sector targeted to grow in the region (financial and administrative)
27 SUGGESTIONS : Capacity Building 4. Government should support private sector, while developing Sectoral Capacity * Definitions of Cyber Security, Data Security and e-government Expertizes / Professions * Software Development and Cyber Security Education Programs from Primary School to Universities * Preparation of HR Capacity Developing Programs for private sectotr * Innovation Incentives in prioritized areas 5. The government Software Development should be beside Secure the sector Coding in creating the Advanced regional Codingand global power of the sector Robotics Cyber Security Management Cyber Bullying Management 6. Special incentives for the sector targeted to grow in the region (financial and Screen-time Management Digital Empathy administrative) Privacy Management Digital Citizen ID Digital Footprint Gamification Data Security Critical Thinking Cyber Security Cryptography & Software Security Computer Networks & Telecomm. Digital Media Web Technologies Cyber Law and Ethic Governance & Leadership Cyber Investigation Digital Forensics
28 SUGGESTIONS : National Solutions 7. Use of NATIONAL PRODUCTS without exception as a National Policy in the public sector «WE WILL USE FIRST!» Dissemination Policy in Public Sector: «Company Rating» in public procurement with accreditation and certification Promotion Model: R&D For successful results «Production Support» Pilot Applications Support & Development Infrastructure Positioning in Public Current products in the first layer, National Products in the second layer After transition and maturity, national products in all layers At least two National Solution Policy in each segment Regional Dissemination
29 Cyber Security for National Security «Coordination, Capacity Building and National Solutions» Mustafa AFYONLUOĞLU Cyber Security & e-governance Chief Expert afyonluoglu [at] gmail.com Linkedin: Twitter: Web: afyonluoglu.com
Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert
Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert March 7th 2017 HUMAN DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationNational CIRT - Montenegro. Ministry for Information Society and Telecommunications
National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:
More informationRUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence
RUAG Cyber Security Training Range & Attack Simulation Peter Hladký Senior Cyber Security Specialist RUAG Defence What is the current state of affairs? (In Cyber Security) 2 RUAG Defence 02.12.2016 Recent
More informationNational Cybersecurity preparation to deal with Cyber Attacks
National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationWelcome to Korea Accreditation System
Welcome to Korea Accreditation System Korean Agency for Technology and Standards 1 2 3 4 5 Organization of Government President Prime Minister Education, Science & Technology Unification National Defense
More informationRomania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security
Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationHow UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations
How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationH2020 & THE FRENCH SECURITY RESEARCH
H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for
More informationFINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION
FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION Katri Liekkilä, M.M.Sc., M.Sc. (Econ) Special Adviser IMPROVER Operators workshop, Lisbon 2018 NATIONAL DOCUMENTS RELATED TO CIP SECURITY STRATEGY
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO
European Cybersecurity PPP European Cyber Security Organisation - ECSO Luigi Rebuffi CEO, EOS Secretary General, ECSO European Cyber Security Organisation Objectives of the cppp Gather industrial and public
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationCERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria
CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationState Planning Organization Information Society Department
Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationCybersecurity Fundamentals
Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing
More informationTowards a European Cloud Computing Strategy
Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationGovernance Approaches to National Sustainable Development Strategy in Asia and the Pacific. UNEP, Bangkok. Background
Governance Approaches to National Sustainable Development Strategy in Asia and the Pacific UNEP, Bangkok Background Global Milestone MILESTONE Brundland Commission, 1987 UNCED, 1992 Rio + 5, 1997 International
More informationCritical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews
Critical Infrastructure Protection & Resilience Europe / Asia Conference Discussion Reviews Torch Marketing / KNM Media Delivering strategic routes to critical markets Why Critical Infrastructure Protection
More informationMONA ICT Policy Centre
MONA ICT Policy Centre 3rd National Cyber Security Conference Cyber Threats and Challenges Dr Louis Shallal, P.Eng. CIO GoJ Nov 17/18, 2015 Technology is Evolving Rapidly! A Few Stats 1,000,000 People
More informationShaping the Cyber Security R&D Agenda in Europe, Horizon 2020
Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationNational program of digital transformation
National program of digital transformation Omuraliev Mirlan Deputy Chairman State Committee of Information Technologies and Communications of the Kyrgyz Republic Global Infrastructure Cooperation Conference
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationFACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008
FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationChallenges and Opportunities in Cyber Physical System Research
Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy
More informationCOMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises
EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationEMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS
Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationFostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014
e-skills Fostering Competitiveness, Growth and Jobs Wrocław, Poland, 15 October 2014 The e-skills Pyramid e-leaders e-leadership skills): these correspond to the capabilities needed to exploit opportunities
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationCOUNTER-TERRORISM. Future-oriented policing projects
COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationEffective Partnerships: Security and Privacy in Smart Cities
SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation
More informationBetween 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.
Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationThales Cyber Assurance Webinar Your first step to Cyber Security
www.thalesgroup.com Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd. 2 / Edward Wolton Edward has been working in what is
More informationAction Plan to enhance preparedness against CBRN security risks
Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting
More informatione-government Software Framework and Impacts on Public Sector
e-government Software Framework and Impacts on Public Sector MUSTAFA AFYONLUOĞLU İ. GÖKHAN ÖZBİLGİN October 17th, 2014 Information Society & Software World Efficient & Effective Software Development e-government
More informationJapanese Space Policy - Basic Space Law -
Japanese Space Policy - Basic Space Law - Yasuyoshi KOMIZO Ambassador Permanent Mission of Japan to the International Organizations in Vienna 1 Contents of this Presentation Based on the Basic Space law
More informationCase study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit
Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit The views expressed in this presentation are those of the authors and do not necessarily reflect the
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationPromoting Quality Infrastructure Investment in Africa
Promoting Quality Infrastructure Investment in Africa Yuji SUDO Assistant Vice-Minister, Minister's Secretariat Ministry of Land, Infrastructure, Transport and Tourism (MLIT) 25 July, 2017 Tokyo, Japan
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationMeeting minutes of NLO annual meeting of 8 June 2016
Meeting minutes of NLO annual meeting of 8 June 2016 1.1 NIS Directive and its implications for ENISA The Head of ENISA s Core Operations Department, Steve Purser, presented the NIS Directive and its implications
More informationASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT
ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT Adelina Kamal, Head of Disaster Management & Humanitarian Assistance Division, ASEAN Socio Cultural Community Department, ASEAN Secretariat 11 th ASEAN
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationMinsk, Belarus
NEW OPPORTUNITIES FOR COMMUNICATIONS 14 18.05. 2018 Minsk, Belarus XXV Anniversary International Forum on Information and Telecommunication Technologies ABOUT THE FORUM Salutatory address by Mr. Alexander
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationPresented by: - Anselm Charles ICT Manager CARICOM IMPACS
Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)
More informationChina IoT New Developments and EU- China Cooperation
China IoT New Developments and EU- China Cooperation June 2014, London Shirley Zhang China Academy of Telecommunication Research(CATR), Ministry of Industry and Information Technology(MIIT),China Email:zhangxueli@catr.cn
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationProtecting Critical Information Infrastructure in times of increasing cyber conflict
Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under
More informationWorld Summit on the Information Society (WSIS) and the Digital Divide
World Summit on the Information Society (WSIS) and the Digital Divide Dr Tim Kelly, Head, Strategy and Policy Unit International Telecommunication Union KADO/APWINC Digital Opportunity Conference, Seoul,
More informationKhoen LIEM. Industrial Policy. A systematic approach for Civil Security: From EU Security- Research Policy
A systematic approach for Civil Security: From EU Security- Research Policy to Industrial Policy When the budgets get smaller, we need a more systematic approach Khoen LIEM DG Enterprise and Industry Bonn,
More informationRegional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America
Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America CLT 217 - Cartagena, 21 June 217 Elena Scaramuzzi - Cullen International 216 comparison digital strategies
More informationPROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK
PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK 23.11.2015 DEFINITION OF CRITICAL INFRASTRUCTURE US EU The nation's
More informationThe EuroHPC strategic initiative
Amsterdam, 12 December 2017 The EuroHPC strategic initiative Thomas Skordas Director, DG CONNECT-C, European Commission The European HPC strategy in Horizon 2020 Infrastructure Capacity of acquiring leadership-class
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationEUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity
EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context
More informationCurrent skills gap for capable CTI analysts: Training for forensics & analysis
Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi
More informationData Protection System of Georgia. Nina Sarishvili Head of International Relations Department
Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-
More informationJapan s Common Vocabulary Policy. Takashi Wada Ministry of Economy, Trade and Industry May 2015
Japan s Common Vocabulary Policy Takashi Wada Ministry of Economy, Trade and Industry May 2015 WHY 1 Fragmentation of Japan s government IT system 26 thousand Administrative procedures 42.8% FTTH user
More informationRecovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004.
Recovery and Reconstruction towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004 Tadashi HARADA Deputy Director General for Disaster Management Cabinet Office, Government
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationBRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access
More informationResilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate
Resilience at JRC Naouma Kourti Dep. Head of Unit Technology Innovation in security Security, Space and Migration Directorate The Joint Research Centre at a glance 3000 staff Almost 75% are scientists
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More information1 History of CyberSecurity in the Philippines 2 3
CONTENTS 1 History of CyberSecurity in the Philippines 2 3 The National CyberSecurity Governance Framework The National CyberSecurity Plan Strategic Drivers Focal Areas Critical Infostructure, Government,
More information