Microsoft support for Critical Information Infrastructure Protection
|
|
- Winfred Grant
- 5 years ago
- Views:
Transcription
1 Security and Protection of Information 2009 Univerzita Obrany Microsoft support for Critical Information Infrastructure Protection Robert Kosla, Lt. Col. (Ret.) Public Safety / National Security Defense Industry Manager Central and Eastern European Headquarters (CEE HQ) IDET 09 -Brno Czech Republic May 09
2 Presentation Questions? What are critical infrastructures? The differences between CIP, CIIP (Critical Information Infrastructure Protection) and cyber security What are the CIP (Critical Infrastructure Protection) policy drivers? Resiliency rules IDET'09 - Brno May
3 Topics Securing Critical Infrastructure Commitments to Critical Information Infrastructure Protection Security related programes for Government/Law Enforcement/Defense Security Intelligence Report v6 (2H CY08 review) IDET'09 - Brno May
4 Public Safety / National Security / Defense (PS/NS/DEF) Microsoft focus Police/Fire Justice Homeland/Internal Security Intelligence Defense Public Safety National Security IDET'09 - Brno May
5 Securing Critical Infrastructure IDET'09 - Brno May
6 CIP/CIIP and Cybersecurity - Understanding the Differences Critical Infrastructures Non-essential IT systems Cybersecurity Critical Information Infrastructure Cross-cutting ICT interdependencies among all sectors Those practices and procedures that enable the secure use and operation of cyber tools and technologies IDET'09 - Brno May
7 CIP Policy Drivers Understanding the policy context is key to success Policy Concerns Policy Responses IDET'09 - Brno May
8 Complexity and Critical Infrastructures Policy Decision Maker Source: modified from Guarding Our Future Protecting Our Nation s Infrastructure Toffler Associates 2008 IDET'09 - Brno May
9 Threats Facing Global Operations Exponential Growth of IDs Identity and access management challenging Increasingly Sophisticated Malware Anti-malware alone is not sufficient Number of Digital IDs mainframe client/server B2E B2C B2B mobility Internet Number of variants from over 7,000 malware families (1H07) Pre-1980s 1980s 1990s 2000s Crime On The Rise Largest segment by $ spent on defense Source: Microsoft Security Intelligence Report (January June 2007) Attacks Getting More Sophisticated Traditional defenses are inadequate National Interest Personal Gain Personal Fame Curiosity Largest area by $ lost Vandal Thief Largest area by volume Trespasser Author Spy Fastest growing segment User GUI Applications Drivers O/S Hardware Physical Examples: Spyware Rootkits Application attacks Phishing/Social engineering Script-Kiddy Amateur Expert Specialist IDET'09 - Brno May
10 Increasing reliance on innovative technologies DOS ERA Early Mid 80s GUI ERA Late 80s Mid 90s TECHNOLOGIES Mouse GUI LANs INTERNET ERA Mid 90s XML/SOAP HTTP/HTML SMTP Clients Web Browsers Mobile Telephony Gaming CLIENT+CLOUD Mid 00s - future Parallel Programming Live Platform Natural UI Robotics Search Social Networkin Virtual Worlds Internet Gaming. PC Architecture MS-DOS Spreadsheets Word Processors Work productivity User Empowerment and Creativity EXPERIENCES AND EXPECTATIONS IDET'09 - Brno May
11 Fostering Trustworthy Infrastructures Security Privacy Reliabili ty Busines s Practice s IDET'09 - Brno May
12 Shaping innovative CIP approaches IDET'09 - Brno May
13 Resiliency Rules 7 Steps for Critical Infrastructure Protection IDET'09 - Brno May
14 CIP Goals Establishing Clear Goals is Central to Success Policy Elements Critical Infrastructure Importance Critical Infrastructure Risks CIP Policy Goal/Statement Sample Statement Critical information infrastructures (CII) provide the essential services that support modern information societies and economies. Some CII support critical functions and essential services so vital that the incapacitation, exploitation, or destruction, through natural disaster, technological failure, accidents or intentional attacks could have a debilitating effect on national security and economic well-being. CII exploitation, or destruction, through natural disaster, technological failure, accidents or intentional attacks could have a debilitating effect on national security and economic well-being. Prevent or minimize disruptions to critical information infrastructures, no matter the source, and thereby help to protect the people, the economy, essential human and government services, and the national security. In the event disruptions do occur, they should be infrequent, of minimal duration, and manageable. Public-Private Implementation Implementing the National CIIP framework includes government entities as well as voluntary public-private partnerships involving corporate and nongovernmental organizations. IDET'09 - Brno May
15 Define Roles - understanding roles and objectives promotes trust and efficiency CIIP Coordinator (Executive Sponsor) Public-Private Partnerships Infrastructure Owners and Operators Law Enforcement Sector- Specific Agency Computer Emergency Response Team IT Vendors and Solution Providers Government Shared Private IDET'09 - Brno May
16 Identify and Prioritize Critical Functions Collaborate to understand Interdependencies Critical Function Infrastructure Element Supply Chain Supply Chain Key Resource Critical Function Infrastructure Element Supply Chain Key Resource Critical Function Infrastructure Element Supply Chain Key Resource Supply Chain Supply Chain Establish an open dialogue to understand the critical functions, infrastructure elements, and key resources necessary for: delivering essential services, maintaining the orderly operations of the economy, and helping to ensure public safety. Supply Chain Supply Chain Supply Chain Supply Chain IDET'09 - Brno May
17 Establish and Exercise Emergency plans - Improve Operational Coordination Public- and private-sector organizations alike can benefit from developing joint plans for managing emergencies, including recovering critical functions in the event of significant incidents, including but not limited to: natural disasters terrorist attacks technological failures accidents. Emergency response plans can mitigate damage and promote resiliency. Effective emergency response plans are generally short and highly actionable so they can be readily tested, evaluated, and implemented. Testing and exercising emergency response plans promotes trust, understanding, and greater operational coordination among public- and private-sector organizations. Exercises also provide an important opportunity to identify new risk factors that can be addressed in response plans or controlled through regular risk management functions. IDET'09 - Brno May
18 Create Public-Private Partnerships - Collaboration is key to protecting critical infrastructure Voluntary public-private partnerships Promote trusted relationships needed for information sharing and collaborating on difficult problems Leverage the unique skills of government and private sector organizations Provide the flexibility needed to collaboratively address today s dynamic threat environment IDET'09 - Brno May
19 Build Security & Resiliency into Infrastructure - Security is a continuous process Building security and resiliency into infrastructure operations Critical Functions (Global, National, Local) Security Controls Infrastructure Operations Fosters increased security and resiliency for the critical functions that support safety, security, and commerce at all levels IDET'09 - Brno May
20 Update and Innovate Technology/Processes - Mitigate threats by keeping technology current and practices innovative Cyber threats are constantly evolving Policymakers, enterprise owners, and infrastructure operators can prepare for changes in the threat landscape by: Monitoring trends Keeping systems updated Maintaining the latest versions of software that have been built for the current threat environment IDET'09 - Brno May
21 Microsoft commitments to CIIP protection Click to edit Master text styles Second level Third level Fourth level Fifth level Trustworthy Infrastructure Programs and Policy
22 Microsoft Citizens Safety Architecture - MCSA Government & Citizenship Initiatives Citizen Safety Partner Solution Ecosystem Mission Operations & Support Mission Operations & Support Intelligence Analysis, Collaboration, & Investigative Support Emergency & Event Management Intelligence Framework Microsoft FusionX Microsoft Single View Platform Eagle Incident Response Citizen Safety Architecture Reusable IP & Know How IDET'09 - Brno May
23 Government Security Program (GSP) Microsoft global initiative to build confidence in the security of the Microsoft platform Provides access to source code for Microsoft products, including Windows and Office Provide technical information Provide access to development staff. Yearly technological workshops in Redmond Allow feedback on current products In-depth Technical information and guidance on security Allows to provide feedback and influence future product design (mainly on security guidance and tools) IDET'09 - Brno May
24 Security Cooperation Program (SCP) A worldwide program providing a structured way for government agencies responsible for computer incident response, protection of critical infrastructure, and computing safety to collaborate with Microsoft in the area of IT security Includes incident response, information exchange, and public outreach components Main benefits Public/private partnership in incident response and information exchange can help decrease risk to national security, economic strength, and social welfare from attacks on the country s IT infrastructure IDET'09 - Brno May
25 Computer Online Forensic Evidence Extractor (COFEE) - support for Law Enforcement On the 15 th of April 2009, Microsoft announced the signing of an agreement with INTERPOL for the rollout and implementation of the Computer Online Forensic Evidence Extractor (COFEE) tool for field use by INTERPOL and its affiliated regional agencies for the purposes of fighting cybercrime. The tool will be provided by Microsoft free of charge and distributed by INTERPOL to 187 countries around the world as part of INTERPOL s Global Security Initiative, with technical support, validation and training to be provided by University College Dublin s School of Computer Science and Informatics. COFEE is a Microsoft-developed application that uses common digital forensics tools to help officers at the scene of a crime, regardless of their technical expertise, in gathering volatile evidence of live computer activity that would otherwise be lost in a traditional offline forensic analysis. That announcement is the latest example of Microsoft s ongoing commitment to helping to create a safer, more trusted Internet experience for everyone, not just Microsoft s customers. IDET'09 - Brno May
26 Microsoft CIP Exercise Participation Cyber Storm I (2006) & Cyber Storm II (2008) LiveWire (2003) TOPOFF series US DoD Silver Links (Canada) Strong Angel III (international) Regional Exercises Purple Crescent series(gulf Coast US) Blue Cascades series (Pacific NW US) Amber Waves (MidWest US) IDET'09 - Brno May
27 Critical Infrastructure Exercises Guide Leverages Microsoft's CIP team experiences in CIP Exercise programs Reinforces Key Principles: Resilience encompasses prevention, response and recovery Exercises develop robust operational response Public/Private Partnerships are essential Interdependencies cannot be ignored Captures a Process for Developing and Conducting CI exercises Provides a resource for: Microsoft field advisors Government elites Public and Private sector practitioners who want to conduct an exercise IDET'09 - Brno May
28 Designing for resilience Co-chaired by Phil Reitinger from Microsoft and Janne Uusilehto from Nokia Consists of six members: EMC, Juniper, Microsoft, Nokia, SAP, and Symantec Dedicated to increasing trust in information and communications technology products and services through the advancement of proven software assurance methods Published two papers to improve software security Software Assurance: An Overview of Current Industry Best Practices Fundamental Practices for Secure Software Design and Development Establishing an International Advisory Board IDET'09 - Brno May
29 Coordinating operational response Industry Consortium for the Advancement of Security on the Internet ICASI enhances the global security landscape by driving excellence and innovation in security response practices; and by enabling its members to proactively collaborate to analyze, mitigate, and resolve multi-vendor, global security challenges Made up of five companies currently: Cisco, IBM, Intel, Juniper, Microsoft Developing operational coordination and thought leadership products The Unified Security Incident Response Plan (USIRP) A new paper on security response planning IDET'09 - Brno May
30 Creating a more trustworthy Internet Core Security Components Identity Claims Authentication Authorization Access Control Mechanisms Audit I+4A Trusted Data Trusted Stack Trusted People Trusted Software Trusted Hardware Secure Foundation SDL and SD3 Integrated Protection Defense in Depth Threat Mitigation IDET'09 - Brno May
31 How Microsoft protects its own Critical Infrormation Infrastructure Global Security Oparational Centers GSOC s IDET'09 - Brno May
32 Microsoft Global Security Operational Centers (GSOC) Americas EMEA Asia
33 GSOC Complex Environment Microsoft s Integrated Security Solution includes the following core infrastructure components: Access Control (ACN) and Alarm Environment 8,400 proximity card readers 180,000 active records 25,000,000 access and security related events/transaction per month Communications 300 end users for RF over IP 1700 Voice over IP capable duress intercoms Video Environment 600 video recorders 8,000 cameras 4,100 Other Devices Duress or intrusion Environmental Biometric Fire Life Safety Systems Regulatory compliance for UL Certified Central Station Business reporting through 330 dedicated panels
34 GSOC Key Design Principles Nine key principles drove the design and development of Microsoft s GSOC Integrated Security Solution: Off-the-shelf applications Use of Microsoft products Remotely managed IP devices Defense in depth Deterrence value Remote monitoring Precision response Forensics/ investigative model Interoperability
35 GSOC Key Functional Components Alarm Monitoring and Access Control Environment Video Environment Fire & Life Safety Systems Radio over IP (RoIP) 911 Monitoring Emergency Alerts Consistent Policies & Procedures Global Event Notification Site-Specific Data Management Geographic Mapping Internal Communications Investigative Case Management Radio over IP Dispatch
36 Microsoft Security Intelligence Report volume 6 July-December 2008 (2H08) IDET'09 - Brno May
37 Social Engineering as a Weapon Rogue security software infections spiked in 2H08 Microsoft products removed rogue security software from more than 10 million computers in 2H08 IDET'09 - Brno May
38 Rogue Security Software Profiting from Fear and Trust Some rogue security software families mimic genuine Windows security warnings Clicking Recommendations initiates a registration and purchase process IDET'09 - Brno May
39 Rogue Security Software Profiting from Fear and Trust Some variants of Win32/FakeXPA display fake blue screen error messages IDET'09 - Brno May
40 Rogue Security Software Profiting from Annoyance Some rogue security software families employ intrusive pop-up messages to persuade the user to purchase IDET'09 - Brno May
41 Social Engineering as a Weapon Microsoft Internet Safety Enforcement Team (ISET) partners with governments, law enforcement, and industry partners worldwide Several legal cases initiated against the creators and distributors of rogue security software For full details of these legal actions please refer to the full Security Intelligence Report volume 6 document IDET'09 - Brno May
42 Malicious and Potentially Unwanted Software Global Infection Counts The 25 locations with the most computers cleaned by Microsoft anti-malware desktop products in 2H08 Country/Region Computers Cleaned in 2H08 United States 13,245,712 China 3,558,033 United Kingdom 2,225,016 France 1,815,639 Brazil 1,654,298 Spain 1,544,623 Korea 1,368,857 Germany 1,209,461 Italy 978,870 Canada 916,263 Mexico 915,605 Turkey 768,939 Country/Region Computers Cleaned in 2H08 Netherlands 641,053 Russia 604,598 Taiwan 466,929 Australia 464,707 Japan 417,269 Poland 409,532 Portugal 337,313 Sweden 287,528 Belgium 267,401 Denmark 224,021 Norway 203,952 Colombia 164,986 Switzerland 163,156 IDET'09 - Brno May
43 Security Vulnerability Disclosures Microsoft vulnerability disclosures Microsoft vulnerability disclosures mirror the industry totals, though on a much smaller scale Vulnerability disclosures for Microsoft and non-microsoft products, 2H03-2H IDET'09 - Brno May H03 1H04 2H04 1H05 2H05 1H06 2H06 1H07 2H07 1H08 2H08 43
44 Malicious And Potentially Unwanted Software Geographic trends by location Significant differences in threat patterns worldwide Threat categories worldwide and in the eight locations with the most infected computers, by incidence, among all computers cleaned by Microsoft desktop anti-malware products, 2H08 60% 50% Misc. Trojans 40% 30% Trojan Downloaders & Droppers Misc. Potentially Unwanted Software Adware Worms 20% 10% Password Stealers & Monitoring Tools Backdoors Malware 0% Exploits WW Spyware IDET'09 - Brno May 2009 United States China United Kingdom France Brazil Spain Korea Germany 44
45 Malicious And Potentially Unwanted Software Infection rates by country/region in 2H08 IDET'09 - Brno May
46 40% 35% 30% 25% 20% 15% 10% 5% Malicious And Potentially Unwanted Software Category Trends Computers cleaned by threat category, in percentages, 2H06-2H08 Misc. Trojans Trojan Downloaders & Droppers Misc. Potentially Unwanted Software Adware Worms Password Stealers & Monitoring Tools Backdoors Malware Exploits 0% Spyware 2H06 1H07 2H07 1H08 2H08 Circular markers denote malicious software, square markers denote potentially unwanted software IDET'09 - Brno May
47 Threats Spam Trends and Statistics Inbound messages blocked by Forefront Online Security for Exchange content filters, by category, during the last six weeks of 2H08 Malware ; 1,8% 419 Scam; 1,9% Fraudulent Diplomas; 2,8% Financial ; 3,1% Phishing ; 1,6% Get Gambling ; Rich 1,1% Quick ; 1,7% Stock ; 0,6% Software ; 0,5% Dating/Sexually Explicit Material; 5,2% Image only; 7,3% Pharmacy - sexual; 10,0% Pharmacy - non sexual; 38,6% Non-pharmacy product ads; 23,6% IDET'09 - Brno May
48 Malicious Site Analysis Phishing sites by coutry/region by percentage of all phishing sites worldwide in 2H08 IDET'09 - Brno May
49 Malicious Site Analysis Malware hosting sites by coutry/region by percentage of all malware hosting sites worldwide in 2H08 IDET'09 - Brno May
50 Analysis of Drive-By Download Pages Example of a Drive-By Download Attack IDET'09 - Brno May
51 Analysis of Drive-By Download Pages Geographic Distribution of Drive-by Download Pages IDET'09 - Brno May
52 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (1/3) Use an up-to-date anti-malware product from a known, trusted source Keep your operating system up to date Consider upgrading to the most recent versions of software you use Consider disabling autorun functionality Consider using a user account which does not have administrator privileges for your daily work Use passwords for any network share you configure Avoid opening attachments or clicking links in or instant messages that are received unexpectedly IDET'09 - Brno May
53 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (3/3) Download and use the Malicious Software Removal Tool (MSRT) Support new legislation to help take legal action against criminals Use the Microsoft Security Assessment Tool Keep yourself up to date about emerging threats IDET'09 - Brno May
54 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (2/3) Use a mail client that suppresses active content and blocks unintentional of executable attachments Use a robust spam filter to guard against fraudulent and dangerous If you receive an from a bank or commerce site, visit their site using a pre-bookmarked link or by typing in the link from your monthly statement Deploy inbound and outbound authentication to protect against spoofing and forgery Online gamers are at risk from malware that tries to steal their game assets or credentials IDET'09 - Brno May
55 Software Vulnerability Disclosures Adjust risk management processes to ensure that operating systems and applications are protected Security Risk Management Guide for IT professionals is available complianceandpolicies/secrisk/default.mspx Free prescriptive guides for IT professionals default.mspx Participate in IT security communities Example: The Microsoft IT Pro Security Zone community Subscribe to the Microsoft Security Newsletter default.mspx IDET'09 - Brno May
56 Time for Summary... IDET'09 - Brno May
57 Summary Microsoft is not just a desktop software provider We actively participate in Critical Information Infrastructure Protection efforts Government/Law Enforcement/Defense bodies may use Government Security Program and Security Cooperation Program Microsoft Internet Safety Enforcement Team (ISET) partners with governments, law enforcement, and industry partners worldwide Main Microsoft focus: Trusworthy Computing (TwC), Citizens Safety Architecture (Intelligence Framework, Single View Platform, Eagle) IDET'09 - Brno May
58 Quiz questions What is a name of Microsoft forensic package that will be avaible free of charge for 187 INTERPOL member countries? What Microsoft programes are used by Government/Law Enforcement/Defense bodies to assess applications corectness (via source code analysis) and information assurance/security incident response cooperation? What is a name of Microsoft bi-annual report covering internet safety based on analysis information collected globally from Malware Software Removal Tool and ForeFront? IDET'09 - Brno May
59 Microsoft support for Critical Information Infrastructure Protection Services Edge Microsoft Innovations Drive - Comprehensive CIIP Approach Server Applications Information Protection Client and Server OS Identity Management Systems Management Active Directory Federation Services (ADFS) Guidance IDET'09 - Brno May 2009 Developer Tools 59
60 Thank you Questions? Contact: Phone: IDET'09 - Brno May
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationGovernment-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection
Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection L. Laile Di Silvestro Senior Strategist Worldwide Public Sector Microsoft Government Industry Collaboration
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationKaspersky Security Network
The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationLegal Foundation and Enforcement: Promoting Cybersecurity
Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More informationInformation sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3
Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationMedia Kit. California Cybersecurity Institute
Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationRomania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security
Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationCritical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016
Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security
More informationSystemic Analyser in Network Threats
Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationPhishing Activity Trends Report January, 2005
Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationChallenges and Opportunities in Cyber Physical System Research
Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy
More informationSECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust
SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationThe European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3
The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationThe Challenge of Spam An Internet Society Public Policy Briefing
The Challenge of Spam An Internet Society Public Policy Briefing 30 October 2015 Introduction Spam email, those unsolicited email messages we find cluttering our inboxes, are a challenge for Internet users,
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationEU funded research is keeping up trust in digital society
EU funded research is keeping up trust in digital society Rafael Tesoro Trust and Security Unit DG Communica5ons Networks, Content and Technology European Commission Cybersecurity Strategy of the EU: An
More informationSECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS
SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS PROTECT YOUR DAILY OPERATIONS FROM BEING COMPROMISED In today s data-driven society, connectivity comes with a cost.
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationAmerican Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment
American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment July 20, 2017 DECIDEPLATFORM.COM The new Reality of Cyber Security
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationState of Israel Prime Minister's Office National Cyber Bureau. Unclassified
- 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationSecond International Barometer of Security in SMBs
1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationBackground. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2
9/30/2009 TRAI 1 Background Threats Present Status Challenges and Strategies 9/30/2009 TRAI 2 Critical infrastructure means the computers, computer systems, and/or networks, whether physical or virtual,
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationPhishing Activity Trends Report March, 2005
Phishing Activity Trends Report March, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging
More informationChallenges in Developing National Cyber Security Policy Frameworks
Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General
More informationITU Regional Cybersecurity Forum for Asia-Pacific
ITU Regional Cybersecurity Forum for Asia-Pacific Incident Management Capabilities Australia Country Case Study Graham Ingram General Manager AusCERT July 2008 Copyright 2008 AusCERT Not for further distribution
More informationThe Critical Importance of CIIP to Cybersecurity
The Critical Importance of CIIP to Cybersecurity Without CIIP there is no Cybersecurity Peter Burnett GFCE-Meridian Coordinator The Global Forum on Cyber Expertise Focus: cyber capacity building (awareness
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationTHE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE
THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationCyber Defense Operations Center
Cyber Defense Operations Center Providing world-class security protection, detection, and response Marek Jedrzejewicz Principal Security Engineering Manager Microsoft Corporation 1 Cybersecurity. In the
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationCurrent procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH
Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More information