Cyber Security for National Security «Coordination, Capacity Building and National Solutions»

Size: px
Start display at page:

Download "Cyber Security for National Security «Coordination, Capacity Building and National Solutions»"

Transcription

1 Cyber Security for National Security «Coordination, Capacity Building and National Solutions» Mustafa AFYONLUOĞLU Cyber Security, e-governance and egovernment Chief Expert

2 Cyber Security for National Security National Security: Identification of threats and opportunities by monitoring the regional and global environment in order to take measures against the threats to the national state and security, and the processes to determine the politics appropriate to these issues and to implement the most appropriate policies (National Security Committee)* NATIONAL SECURITY MILITARY POLITICAL DIPLOMATIC ECONOMIC CYBER (?) NATO Summit in Warsaw, : Cyber attacks to NATO ICT System 500 Attacks/month (60% increase w.r.t. 2015) National Cyber Security Budgets France (2014): 1 Billion UK (2016): 2.5 Billion 2030 Cyber UnSecurity Volume: 90 Trillion $ (Denver University Research Report) * **

3 PEOPLE DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR PRIVATE SECTOR CITIZEN UNIVERSITIES D A T A SECURITY MACHINES NGO POWER

4 PEOPLE DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR PRIVATE SECTOR CITIZEN UNIVERSITIES D A T A SECURITY MACHINES NGO POWER

5 PUBLIC SECTOR & PRIVATE SECTOR LIKE TWO WINGS OF A BIRD IN HARMONY!

6 What happens on the internet for 60 seconds? (February 2017)

7 What happens on the internet for 1 Hour? (February 2017)

8 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015

9 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015

10 Internet Connected Devices Internet of Things IoT Güvenlik Sorunları Expected Economical Size in IoT 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015

11 Internet Connected Devices Internet of Things

12 WHAT HAPPENS IN 2 MONTHS? CI: Health October 4th, 2016 J&J: Attack on Diabetic Insulin Pumps CI: Finance October 22th, million bank card information of Indian October 15th, 2016 IoT: DDoS Attack of Mirai BotNET to Dyn DNS 10 Tbps National October 23rd, 2016 Interenet interrruption on 78% of ABD with 14 Million IoT $ 7 Billion loss October 24th, 2016 UK: «Motor Vehicles Cyber Security Guide» published CI: Health November 3rd, 2016 UK National Health System closed down due to malware National November 15th, 2016 Pre-loaded 700,000 phone sends data to China CI: Transport banks stolen November 28th, 2016 Otonomy Systems Cyber attack to San Francisco Municipal Global: İnternet Metro System CI: Communication November 28th, 2016 Cyber attack to routers of Alma Telekom Terrorism November 30th, 2016 Files of 54 terrorist groups leaked from from Europol National December 7th, 2016 The North Korean Operating System «Red Star» was captured by a remote attack October 10th, 2016 Cyber Attack on Germany Nuclear Power Plants CI: Energy October 22nd, 2016 DDoS attack to Singapore Telekom Starhub CI: Communication November 1st, 2016 Cyber attacks on Schneider Electrics ICS Panels CI: Industry November 9th, 2016 Central heating system in Finland closed with DDoS attack Public Service November 25th,2016 Massive DDoS Attack on European Commission servers Institutional November 28th,2016 Data Breach: 26,500 UK National Lottery User Account Taken Public December 3rd, million Android downloads were attacked via AirDroid Mobile December 4th, 2016 Visa cards break in 06 seconds CI: Finance Cyber Security for National Security: «Coordination, CI: Critical Infrastructure Capacity Building and National Solutions" ICS: Industrial Control System IoT: Internet of Things ( IoT: $ - DarkWeb)

13 December 14 th 2015 nic TR Domain Name System DDoS Attack December 24 th, 2015 Finance

14 April 08 th, 2016 National ID Number Data Breach May 18 th, 2016 Health Sector Data Breach

15 December 30 th 2016 Energy Sector July 2016 Institutional Data Breach

16 WEAK LINKS QUALIFIED HUMAN RESOURCE INVALID CONFIGURATION NON-NATIONAL SOLUTIONS

17 WEAK LINKS NİTELİKLİ İNSAN KAYNAĞI HATALI KONFİGÜRASYON MİLLİ OLMAYAN ÇÖZÜMLER

18 February 2016: The Technical Arrangement on cooperation in cyber defense with the European Union was signed. July 2016: Cyber Space is the 5th operational area after Land, Air, Sea and Space. December 2016: Cyber defense is one of NATO's key tasks in the field of collective defense. International law should also be applied to the cyber field. NATO will develop cyber training and exercise skills.

19 GOVERNANCE HOW? Personal Privacy Public Data Trade Secrets

20 Syber Security Governance Model of Netherlands Ministry of Security and Justice National Cyber Security Council (NCSS) ICT Response Board (IRB) Governance Board Directorate of Cyber Security National Coordinator for Counterterrorism and Security Policy Division Incident Response Team Knowledge Services Team Development Team National Cyber Security Centre (NCSC) GOVCERT.NL Security Operation Center (SOC)

21 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution

22 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution

23 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support

24 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support

25 SUGGESTIONS : Coordination & Leadership 1. Cyber Security should be coordinated from top level in ONE CENTERAL ADMINISTRATION 2. In this Center, there should be Public-Private Governance Board 3. National Cyber Security Policy and Prioritized Sectoral Areas should be prepared National Solutions in «Perimeter Security» Layer: National Firewall National Intrusion Detection & Prevention systems National Web Filtering PRIVATE SECTOR PUBLIC National Anti-virus Solutions National Cyber Thread Intelligence Bank (CTIB) National Operating System National National Storage Cloud Secure Public Network

26 SUGGESTIONS : Capacity Building 4. Government should support private sector, while developing Sectoral Capacity * Definitions of Cyber Security, Data Security and e-government Expertizes / Professions * Software Development and Cyber Security Education Programs from Primary School to Universities * Preparation of HR Capacity Developing Programs for private sectotr * Innovation Incentives in prioritized areas 5. The government should be beside the sector in creating the regional and global power of the sector 6. Special incentives for the sector targeted to grow in the region (financial and administrative)

27 SUGGESTIONS : Capacity Building 4. Government should support private sector, while developing Sectoral Capacity * Definitions of Cyber Security, Data Security and e-government Expertizes / Professions * Software Development and Cyber Security Education Programs from Primary School to Universities * Preparation of HR Capacity Developing Programs for private sectotr * Innovation Incentives in prioritized areas 5. The government Software Development should be beside Secure the sector Coding in creating the Advanced regional Codingand global power of the sector Robotics Cyber Security Management Cyber Bullying Management 6. Special incentives for the sector targeted to grow in the region (financial and Screen-time Management Digital Empathy administrative) Privacy Management Digital Citizen ID Digital Footprint Gamification Data Security Critical Thinking Cyber Security Cryptography & Software Security Computer Networks & Telecomm. Digital Media Web Technologies Cyber Law and Ethic Governance & Leadership Cyber Investigation Digital Forensics

28 SUGGESTIONS : National Solutions 7. Use of NATIONAL PRODUCTS without exception as a National Policy in the public sector «WE WILL USE FIRST!» Dissemination Policy in Public Sector: «Company Rating» in public procurement with accreditation and certification Promotion Model: R&D For successful results «Production Support» Pilot Applications Support & Development Infrastructure Positioning in Public Current products in the first layer, National Products in the second layer After transition and maturity, national products in all layers At least two National Solution Policy in each segment Regional Dissemination

29 Cyber Security for National Security «Coordination, Capacity Building and National Solutions» Mustafa AFYONLUOĞLU Cyber Security & e-governance Chief Expert afyonluoglu [at] gmail.com Linkedin: Twitter: Web: afyonluoglu.com

Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert

Digital Life and Cyber Security «Public-Private Governance Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert March 7th 2017 HUMAN DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

National CIRT - Montenegro. Ministry for Information Society and Telecommunications National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:

More information

RUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence

RUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence RUAG Cyber Security Training Range & Attack Simulation Peter Hladký Senior Cyber Security Specialist RUAG Defence What is the current state of affairs? (In Cyber Security) 2 RUAG Defence 02.12.2016 Recent

More information

National Cybersecurity preparation to deal with Cyber Attacks

National Cybersecurity preparation to deal with Cyber Attacks National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

Welcome to Korea Accreditation System

Welcome to Korea Accreditation System Welcome to Korea Accreditation System Korean Agency for Technology and Standards 1 2 3 4 5 Organization of Government President Prime Minister Education, Science & Technology Unification National Defense

More information

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

H2020 & THE FRENCH SECURITY RESEARCH

H2020 & THE FRENCH SECURITY RESEARCH H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for

More information

FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION

FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION Katri Liekkilä, M.M.Sc., M.Sc. (Econ) Special Adviser IMPROVER Operators workshop, Lisbon 2018 NATIONAL DOCUMENTS RELATED TO CIP SECURITY STRATEGY

More information

European Cybersecurity PPP European Cyber Security Organisation - ECSO

European Cybersecurity PPP European Cyber Security Organisation - ECSO European Cybersecurity PPP European Cyber Security Organisation - ECSO Luigi Rebuffi CEO, EOS Secretary General, ECSO European Cyber Security Organisation Objectives of the cppp Gather industrial and public

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

State Planning Organization Information Society Department

State Planning Organization Information Society Department Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

Cybersecurity Fundamentals

Cybersecurity Fundamentals Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

Governance Approaches to National Sustainable Development Strategy in Asia and the Pacific. UNEP, Bangkok. Background

Governance Approaches to National Sustainable Development Strategy in Asia and the Pacific. UNEP, Bangkok. Background Governance Approaches to National Sustainable Development Strategy in Asia and the Pacific UNEP, Bangkok Background Global Milestone MILESTONE Brundland Commission, 1987 UNCED, 1992 Rio + 5, 1997 International

More information

Critical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews

Critical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews Critical Infrastructure Protection & Resilience Europe / Asia Conference Discussion Reviews Torch Marketing / KNM Media Delivering strategic routes to critical markets Why Critical Infrastructure Protection

More information

MONA ICT Policy Centre

MONA ICT Policy Centre MONA ICT Policy Centre 3rd National Cyber Security Conference Cyber Threats and Challenges Dr Louis Shallal, P.Eng. CIO GoJ Nov 17/18, 2015 Technology is Evolving Rapidly! A Few Stats 1,000,000 People

More information

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

National program of digital transformation

National program of digital transformation National program of digital transformation Omuraliev Mirlan Deputy Chairman State Committee of Information Technologies and Communications of the Kyrgyz Republic Global Infrastructure Cooperation Conference

More information

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore 6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Challenges and Opportunities in Cyber Physical System Research

Challenges and Opportunities in Cyber Physical System Research Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

International Policy Division, Global ICT Strategy Bureau

International Policy Division, Global ICT Strategy Bureau MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Fostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014

Fostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014 e-skills Fostering Competitiveness, Growth and Jobs Wrocław, Poland, 15 October 2014 The e-skills Pyramid e-leaders e-leadership skills): these correspond to the capabilities needed to exploit opportunities

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Effective Partnerships: Security and Privacy in Smart Cities

Effective Partnerships: Security and Privacy in Smart Cities SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Thales Cyber Assurance Webinar Your first step to Cyber Security

Thales Cyber Assurance Webinar Your first step to Cyber Security www.thalesgroup.com Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd. 2 / Edward Wolton Edward has been working in what is

More information

Action Plan to enhance preparedness against CBRN security risks

Action Plan to enhance preparedness against CBRN security risks Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting

More information

e-government Software Framework and Impacts on Public Sector

e-government Software Framework and Impacts on Public Sector e-government Software Framework and Impacts on Public Sector MUSTAFA AFYONLUOĞLU İ. GÖKHAN ÖZBİLGİN October 17th, 2014 Information Society & Software World Efficient & Effective Software Development e-government

More information

Japanese Space Policy - Basic Space Law -

Japanese Space Policy - Basic Space Law - Japanese Space Policy - Basic Space Law - Yasuyoshi KOMIZO Ambassador Permanent Mission of Japan to the International Organizations in Vienna 1 Contents of this Presentation Based on the Basic Space law

More information

Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit

Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit The views expressed in this presentation are those of the authors and do not necessarily reflect the

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

Promoting Quality Infrastructure Investment in Africa

Promoting Quality Infrastructure Investment in Africa Promoting Quality Infrastructure Investment in Africa Yuji SUDO Assistant Vice-Minister, Minister's Secretariat Ministry of Land, Infrastructure, Transport and Tourism (MLIT) 25 July, 2017 Tokyo, Japan

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information

Meeting minutes of NLO annual meeting of 8 June 2016

Meeting minutes of NLO annual meeting of 8 June 2016 Meeting minutes of NLO annual meeting of 8 June 2016 1.1 NIS Directive and its implications for ENISA The Head of ENISA s Core Operations Department, Steve Purser, presented the NIS Directive and its implications

More information

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT Adelina Kamal, Head of Disaster Management & Humanitarian Assistance Division, ASEAN Socio Cultural Community Department, ASEAN Secretariat 11 th ASEAN

More information

Emerging Security Challenges November 22, 2012, Baku

Emerging Security Challenges November 22, 2012, Baku Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Minsk, Belarus

Minsk, Belarus NEW OPPORTUNITIES FOR COMMUNICATIONS 14 18.05. 2018 Minsk, Belarus XXV Anniversary International Forum on Information and Telecommunication Technologies ABOUT THE FORUM Salutatory address by Mr. Alexander

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)

More information

China IoT New Developments and EU- China Cooperation

China IoT New Developments and EU- China Cooperation China IoT New Developments and EU- China Cooperation June 2014, London Shirley Zhang China Academy of Telecommunication Research(CATR), Ministry of Industry and Information Technology(MIIT),China Email:zhangxueli@catr.cn

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Protecting Critical Information Infrastructure in times of increasing cyber conflict

Protecting Critical Information Infrastructure in times of increasing cyber conflict Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under

More information

World Summit on the Information Society (WSIS) and the Digital Divide

World Summit on the Information Society (WSIS) and the Digital Divide World Summit on the Information Society (WSIS) and the Digital Divide Dr Tim Kelly, Head, Strategy and Policy Unit International Telecommunication Union KADO/APWINC Digital Opportunity Conference, Seoul,

More information

Khoen LIEM. Industrial Policy. A systematic approach for Civil Security: From EU Security- Research Policy

Khoen LIEM. Industrial Policy. A systematic approach for Civil Security: From EU Security- Research Policy A systematic approach for Civil Security: From EU Security- Research Policy to Industrial Policy When the budgets get smaller, we need a more systematic approach Khoen LIEM DG Enterprise and Industry Bonn,

More information

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America CLT 217 - Cartagena, 21 June 217 Elena Scaramuzzi - Cullen International 216 comparison digital strategies

More information

PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK

PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK 23.11.2015 DEFINITION OF CRITICAL INFRASTRUCTURE US EU The nation's

More information

The EuroHPC strategic initiative

The EuroHPC strategic initiative Amsterdam, 12 December 2017 The EuroHPC strategic initiative Thomas Skordas Director, DG CONNECT-C, European Commission The European HPC strategy in Horizon 2020 Infrastructure Capacity of acquiring leadership-class

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context

More information

Current skills gap for capable CTI analysts: Training for forensics & analysis

Current skills gap for capable CTI analysts: Training for forensics & analysis Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi

More information

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-

More information

Japan s Common Vocabulary Policy. Takashi Wada Ministry of Economy, Trade and Industry May 2015

Japan s Common Vocabulary Policy. Takashi Wada Ministry of Economy, Trade and Industry May 2015 Japan s Common Vocabulary Policy Takashi Wada Ministry of Economy, Trade and Industry May 2015 WHY 1 Fragmentation of Japan s government IT system 26 thousand Administrative procedures 42.8% FTTH user

More information

Recovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004.

Recovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004. Recovery and Reconstruction towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004 Tadashi HARADA Deputy Director General for Disaster Management Cabinet Office, Government

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

Resilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate

Resilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate Resilience at JRC Naouma Kourti Dep. Head of Unit Technology Innovation in security Security, Space and Migration Directorate The Joint Research Centre at a glance 3000 staff Almost 75% are scientists

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

1 History of CyberSecurity in the Philippines 2 3

1 History of CyberSecurity in the Philippines 2 3 CONTENTS 1 History of CyberSecurity in the Philippines 2 3 The National CyberSecurity Governance Framework The National CyberSecurity Plan Strategic Drivers Focal Areas Critical Infostructure, Government,

More information