Microsoft support for Critical Information Infrastructure Protection

Size: px
Start display at page:

Download "Microsoft support for Critical Information Infrastructure Protection"

Transcription

1 Security and Protection of Information 2009 Univerzita Obrany Microsoft support for Critical Information Infrastructure Protection Robert Kosla, Lt. Col. (Ret.) Public Safety / National Security Defense Industry Manager Central and Eastern European Headquarters (CEE HQ) IDET 09 -Brno Czech Republic May 09

2 Presentation Questions? What are critical infrastructures? The differences between CIP, CIIP (Critical Information Infrastructure Protection) and cyber security What are the CIP (Critical Infrastructure Protection) policy drivers? Resiliency rules IDET'09 - Brno May

3 Topics Securing Critical Infrastructure Commitments to Critical Information Infrastructure Protection Security related programes for Government/Law Enforcement/Defense Security Intelligence Report v6 (2H CY08 review) IDET'09 - Brno May

4 Public Safety / National Security / Defense (PS/NS/DEF) Microsoft focus Police/Fire Justice Homeland/Internal Security Intelligence Defense Public Safety National Security IDET'09 - Brno May

5 Securing Critical Infrastructure IDET'09 - Brno May

6 CIP/CIIP and Cybersecurity - Understanding the Differences Critical Infrastructures Non-essential IT systems Cybersecurity Critical Information Infrastructure Cross-cutting ICT interdependencies among all sectors Those practices and procedures that enable the secure use and operation of cyber tools and technologies IDET'09 - Brno May

7 CIP Policy Drivers Understanding the policy context is key to success Policy Concerns Policy Responses IDET'09 - Brno May

8 Complexity and Critical Infrastructures Policy Decision Maker Source: modified from Guarding Our Future Protecting Our Nation s Infrastructure Toffler Associates 2008 IDET'09 - Brno May

9 Threats Facing Global Operations Exponential Growth of IDs Identity and access management challenging Increasingly Sophisticated Malware Anti-malware alone is not sufficient Number of Digital IDs mainframe client/server B2E B2C B2B mobility Internet Number of variants from over 7,000 malware families (1H07) Pre-1980s 1980s 1990s 2000s Crime On The Rise Largest segment by $ spent on defense Source: Microsoft Security Intelligence Report (January June 2007) Attacks Getting More Sophisticated Traditional defenses are inadequate National Interest Personal Gain Personal Fame Curiosity Largest area by $ lost Vandal Thief Largest area by volume Trespasser Author Spy Fastest growing segment User GUI Applications Drivers O/S Hardware Physical Examples: Spyware Rootkits Application attacks Phishing/Social engineering Script-Kiddy Amateur Expert Specialist IDET'09 - Brno May

10 Increasing reliance on innovative technologies DOS ERA Early Mid 80s GUI ERA Late 80s Mid 90s TECHNOLOGIES Mouse GUI LANs INTERNET ERA Mid 90s XML/SOAP HTTP/HTML SMTP Clients Web Browsers Mobile Telephony Gaming CLIENT+CLOUD Mid 00s - future Parallel Programming Live Platform Natural UI Robotics Search Social Networkin Virtual Worlds Internet Gaming. PC Architecture MS-DOS Spreadsheets Word Processors Work productivity User Empowerment and Creativity EXPERIENCES AND EXPECTATIONS IDET'09 - Brno May

11 Fostering Trustworthy Infrastructures Security Privacy Reliabili ty Busines s Practice s IDET'09 - Brno May

12 Shaping innovative CIP approaches IDET'09 - Brno May

13 Resiliency Rules 7 Steps for Critical Infrastructure Protection IDET'09 - Brno May

14 CIP Goals Establishing Clear Goals is Central to Success Policy Elements Critical Infrastructure Importance Critical Infrastructure Risks CIP Policy Goal/Statement Sample Statement Critical information infrastructures (CII) provide the essential services that support modern information societies and economies. Some CII support critical functions and essential services so vital that the incapacitation, exploitation, or destruction, through natural disaster, technological failure, accidents or intentional attacks could have a debilitating effect on national security and economic well-being. CII exploitation, or destruction, through natural disaster, technological failure, accidents or intentional attacks could have a debilitating effect on national security and economic well-being. Prevent or minimize disruptions to critical information infrastructures, no matter the source, and thereby help to protect the people, the economy, essential human and government services, and the national security. In the event disruptions do occur, they should be infrequent, of minimal duration, and manageable. Public-Private Implementation Implementing the National CIIP framework includes government entities as well as voluntary public-private partnerships involving corporate and nongovernmental organizations. IDET'09 - Brno May

15 Define Roles - understanding roles and objectives promotes trust and efficiency CIIP Coordinator (Executive Sponsor) Public-Private Partnerships Infrastructure Owners and Operators Law Enforcement Sector- Specific Agency Computer Emergency Response Team IT Vendors and Solution Providers Government Shared Private IDET'09 - Brno May

16 Identify and Prioritize Critical Functions Collaborate to understand Interdependencies Critical Function Infrastructure Element Supply Chain Supply Chain Key Resource Critical Function Infrastructure Element Supply Chain Key Resource Critical Function Infrastructure Element Supply Chain Key Resource Supply Chain Supply Chain Establish an open dialogue to understand the critical functions, infrastructure elements, and key resources necessary for: delivering essential services, maintaining the orderly operations of the economy, and helping to ensure public safety. Supply Chain Supply Chain Supply Chain Supply Chain IDET'09 - Brno May

17 Establish and Exercise Emergency plans - Improve Operational Coordination Public- and private-sector organizations alike can benefit from developing joint plans for managing emergencies, including recovering critical functions in the event of significant incidents, including but not limited to: natural disasters terrorist attacks technological failures accidents. Emergency response plans can mitigate damage and promote resiliency. Effective emergency response plans are generally short and highly actionable so they can be readily tested, evaluated, and implemented. Testing and exercising emergency response plans promotes trust, understanding, and greater operational coordination among public- and private-sector organizations. Exercises also provide an important opportunity to identify new risk factors that can be addressed in response plans or controlled through regular risk management functions. IDET'09 - Brno May

18 Create Public-Private Partnerships - Collaboration is key to protecting critical infrastructure Voluntary public-private partnerships Promote trusted relationships needed for information sharing and collaborating on difficult problems Leverage the unique skills of government and private sector organizations Provide the flexibility needed to collaboratively address today s dynamic threat environment IDET'09 - Brno May

19 Build Security & Resiliency into Infrastructure - Security is a continuous process Building security and resiliency into infrastructure operations Critical Functions (Global, National, Local) Security Controls Infrastructure Operations Fosters increased security and resiliency for the critical functions that support safety, security, and commerce at all levels IDET'09 - Brno May

20 Update and Innovate Technology/Processes - Mitigate threats by keeping technology current and practices innovative Cyber threats are constantly evolving Policymakers, enterprise owners, and infrastructure operators can prepare for changes in the threat landscape by: Monitoring trends Keeping systems updated Maintaining the latest versions of software that have been built for the current threat environment IDET'09 - Brno May

21 Microsoft commitments to CIIP protection Click to edit Master text styles Second level Third level Fourth level Fifth level Trustworthy Infrastructure Programs and Policy

22 Microsoft Citizens Safety Architecture - MCSA Government & Citizenship Initiatives Citizen Safety Partner Solution Ecosystem Mission Operations & Support Mission Operations & Support Intelligence Analysis, Collaboration, & Investigative Support Emergency & Event Management Intelligence Framework Microsoft FusionX Microsoft Single View Platform Eagle Incident Response Citizen Safety Architecture Reusable IP & Know How IDET'09 - Brno May

23 Government Security Program (GSP) Microsoft global initiative to build confidence in the security of the Microsoft platform Provides access to source code for Microsoft products, including Windows and Office Provide technical information Provide access to development staff. Yearly technological workshops in Redmond Allow feedback on current products In-depth Technical information and guidance on security Allows to provide feedback and influence future product design (mainly on security guidance and tools) IDET'09 - Brno May

24 Security Cooperation Program (SCP) A worldwide program providing a structured way for government agencies responsible for computer incident response, protection of critical infrastructure, and computing safety to collaborate with Microsoft in the area of IT security Includes incident response, information exchange, and public outreach components Main benefits Public/private partnership in incident response and information exchange can help decrease risk to national security, economic strength, and social welfare from attacks on the country s IT infrastructure IDET'09 - Brno May

25 Computer Online Forensic Evidence Extractor (COFEE) - support for Law Enforcement On the 15 th of April 2009, Microsoft announced the signing of an agreement with INTERPOL for the rollout and implementation of the Computer Online Forensic Evidence Extractor (COFEE) tool for field use by INTERPOL and its affiliated regional agencies for the purposes of fighting cybercrime. The tool will be provided by Microsoft free of charge and distributed by INTERPOL to 187 countries around the world as part of INTERPOL s Global Security Initiative, with technical support, validation and training to be provided by University College Dublin s School of Computer Science and Informatics. COFEE is a Microsoft-developed application that uses common digital forensics tools to help officers at the scene of a crime, regardless of their technical expertise, in gathering volatile evidence of live computer activity that would otherwise be lost in a traditional offline forensic analysis. That announcement is the latest example of Microsoft s ongoing commitment to helping to create a safer, more trusted Internet experience for everyone, not just Microsoft s customers. IDET'09 - Brno May

26 Microsoft CIP Exercise Participation Cyber Storm I (2006) & Cyber Storm II (2008) LiveWire (2003) TOPOFF series US DoD Silver Links (Canada) Strong Angel III (international) Regional Exercises Purple Crescent series(gulf Coast US) Blue Cascades series (Pacific NW US) Amber Waves (MidWest US) IDET'09 - Brno May

27 Critical Infrastructure Exercises Guide Leverages Microsoft's CIP team experiences in CIP Exercise programs Reinforces Key Principles: Resilience encompasses prevention, response and recovery Exercises develop robust operational response Public/Private Partnerships are essential Interdependencies cannot be ignored Captures a Process for Developing and Conducting CI exercises Provides a resource for: Microsoft field advisors Government elites Public and Private sector practitioners who want to conduct an exercise IDET'09 - Brno May

28 Designing for resilience Co-chaired by Phil Reitinger from Microsoft and Janne Uusilehto from Nokia Consists of six members: EMC, Juniper, Microsoft, Nokia, SAP, and Symantec Dedicated to increasing trust in information and communications technology products and services through the advancement of proven software assurance methods Published two papers to improve software security Software Assurance: An Overview of Current Industry Best Practices Fundamental Practices for Secure Software Design and Development Establishing an International Advisory Board IDET'09 - Brno May

29 Coordinating operational response Industry Consortium for the Advancement of Security on the Internet ICASI enhances the global security landscape by driving excellence and innovation in security response practices; and by enabling its members to proactively collaborate to analyze, mitigate, and resolve multi-vendor, global security challenges Made up of five companies currently: Cisco, IBM, Intel, Juniper, Microsoft Developing operational coordination and thought leadership products The Unified Security Incident Response Plan (USIRP) A new paper on security response planning IDET'09 - Brno May

30 Creating a more trustworthy Internet Core Security Components Identity Claims Authentication Authorization Access Control Mechanisms Audit I+4A Trusted Data Trusted Stack Trusted People Trusted Software Trusted Hardware Secure Foundation SDL and SD3 Integrated Protection Defense in Depth Threat Mitigation IDET'09 - Brno May

31 How Microsoft protects its own Critical Infrormation Infrastructure Global Security Oparational Centers GSOC s IDET'09 - Brno May

32 Microsoft Global Security Operational Centers (GSOC) Americas EMEA Asia

33 GSOC Complex Environment Microsoft s Integrated Security Solution includes the following core infrastructure components: Access Control (ACN) and Alarm Environment 8,400 proximity card readers 180,000 active records 25,000,000 access and security related events/transaction per month Communications 300 end users for RF over IP 1700 Voice over IP capable duress intercoms Video Environment 600 video recorders 8,000 cameras 4,100 Other Devices Duress or intrusion Environmental Biometric Fire Life Safety Systems Regulatory compliance for UL Certified Central Station Business reporting through 330 dedicated panels

34 GSOC Key Design Principles Nine key principles drove the design and development of Microsoft s GSOC Integrated Security Solution: Off-the-shelf applications Use of Microsoft products Remotely managed IP devices Defense in depth Deterrence value Remote monitoring Precision response Forensics/ investigative model Interoperability

35 GSOC Key Functional Components Alarm Monitoring and Access Control Environment Video Environment Fire & Life Safety Systems Radio over IP (RoIP) 911 Monitoring Emergency Alerts Consistent Policies & Procedures Global Event Notification Site-Specific Data Management Geographic Mapping Internal Communications Investigative Case Management Radio over IP Dispatch

36 Microsoft Security Intelligence Report volume 6 July-December 2008 (2H08) IDET'09 - Brno May

37 Social Engineering as a Weapon Rogue security software infections spiked in 2H08 Microsoft products removed rogue security software from more than 10 million computers in 2H08 IDET'09 - Brno May

38 Rogue Security Software Profiting from Fear and Trust Some rogue security software families mimic genuine Windows security warnings Clicking Recommendations initiates a registration and purchase process IDET'09 - Brno May

39 Rogue Security Software Profiting from Fear and Trust Some variants of Win32/FakeXPA display fake blue screen error messages IDET'09 - Brno May

40 Rogue Security Software Profiting from Annoyance Some rogue security software families employ intrusive pop-up messages to persuade the user to purchase IDET'09 - Brno May

41 Social Engineering as a Weapon Microsoft Internet Safety Enforcement Team (ISET) partners with governments, law enforcement, and industry partners worldwide Several legal cases initiated against the creators and distributors of rogue security software For full details of these legal actions please refer to the full Security Intelligence Report volume 6 document IDET'09 - Brno May

42 Malicious and Potentially Unwanted Software Global Infection Counts The 25 locations with the most computers cleaned by Microsoft anti-malware desktop products in 2H08 Country/Region Computers Cleaned in 2H08 United States 13,245,712 China 3,558,033 United Kingdom 2,225,016 France 1,815,639 Brazil 1,654,298 Spain 1,544,623 Korea 1,368,857 Germany 1,209,461 Italy 978,870 Canada 916,263 Mexico 915,605 Turkey 768,939 Country/Region Computers Cleaned in 2H08 Netherlands 641,053 Russia 604,598 Taiwan 466,929 Australia 464,707 Japan 417,269 Poland 409,532 Portugal 337,313 Sweden 287,528 Belgium 267,401 Denmark 224,021 Norway 203,952 Colombia 164,986 Switzerland 163,156 IDET'09 - Brno May

43 Security Vulnerability Disclosures Microsoft vulnerability disclosures Microsoft vulnerability disclosures mirror the industry totals, though on a much smaller scale Vulnerability disclosures for Microsoft and non-microsoft products, 2H03-2H IDET'09 - Brno May H03 1H04 2H04 1H05 2H05 1H06 2H06 1H07 2H07 1H08 2H08 43

44 Malicious And Potentially Unwanted Software Geographic trends by location Significant differences in threat patterns worldwide Threat categories worldwide and in the eight locations with the most infected computers, by incidence, among all computers cleaned by Microsoft desktop anti-malware products, 2H08 60% 50% Misc. Trojans 40% 30% Trojan Downloaders & Droppers Misc. Potentially Unwanted Software Adware Worms 20% 10% Password Stealers & Monitoring Tools Backdoors Malware 0% Exploits WW Spyware IDET'09 - Brno May 2009 United States China United Kingdom France Brazil Spain Korea Germany 44

45 Malicious And Potentially Unwanted Software Infection rates by country/region in 2H08 IDET'09 - Brno May

46 40% 35% 30% 25% 20% 15% 10% 5% Malicious And Potentially Unwanted Software Category Trends Computers cleaned by threat category, in percentages, 2H06-2H08 Misc. Trojans Trojan Downloaders & Droppers Misc. Potentially Unwanted Software Adware Worms Password Stealers & Monitoring Tools Backdoors Malware Exploits 0% Spyware 2H06 1H07 2H07 1H08 2H08 Circular markers denote malicious software, square markers denote potentially unwanted software IDET'09 - Brno May

47 Threats Spam Trends and Statistics Inbound messages blocked by Forefront Online Security for Exchange content filters, by category, during the last six weeks of 2H08 Malware ; 1,8% 419 Scam; 1,9% Fraudulent Diplomas; 2,8% Financial ; 3,1% Phishing ; 1,6% Get Gambling ; Rich 1,1% Quick ; 1,7% Stock ; 0,6% Software ; 0,5% Dating/Sexually Explicit Material; 5,2% Image only; 7,3% Pharmacy - sexual; 10,0% Pharmacy - non sexual; 38,6% Non-pharmacy product ads; 23,6% IDET'09 - Brno May

48 Malicious Site Analysis Phishing sites by coutry/region by percentage of all phishing sites worldwide in 2H08 IDET'09 - Brno May

49 Malicious Site Analysis Malware hosting sites by coutry/region by percentage of all malware hosting sites worldwide in 2H08 IDET'09 - Brno May

50 Analysis of Drive-By Download Pages Example of a Drive-By Download Attack IDET'09 - Brno May

51 Analysis of Drive-By Download Pages Geographic Distribution of Drive-by Download Pages IDET'09 - Brno May

52 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (1/3) Use an up-to-date anti-malware product from a known, trusted source Keep your operating system up to date Consider upgrading to the most recent versions of software you use Consider disabling autorun functionality Consider using a user account which does not have administrator privileges for your daily work Use passwords for any network share you configure Avoid opening attachments or clicking links in or instant messages that are received unexpectedly IDET'09 - Brno May

53 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (3/3) Download and use the Malicious Software Removal Tool (MSRT) Support new legislation to help take legal action against criminals Use the Microsoft Security Assessment Tool Keep yourself up to date about emerging threats IDET'09 - Brno May

54 Malicious and Potentially Unwanted Software Strategies, mitigations, and countermeasures (2/3) Use a mail client that suppresses active content and blocks unintentional of executable attachments Use a robust spam filter to guard against fraudulent and dangerous If you receive an from a bank or commerce site, visit their site using a pre-bookmarked link or by typing in the link from your monthly statement Deploy inbound and outbound authentication to protect against spoofing and forgery Online gamers are at risk from malware that tries to steal their game assets or credentials IDET'09 - Brno May

55 Software Vulnerability Disclosures Adjust risk management processes to ensure that operating systems and applications are protected Security Risk Management Guide for IT professionals is available complianceandpolicies/secrisk/default.mspx Free prescriptive guides for IT professionals default.mspx Participate in IT security communities Example: The Microsoft IT Pro Security Zone community Subscribe to the Microsoft Security Newsletter default.mspx IDET'09 - Brno May

56 Time for Summary... IDET'09 - Brno May

57 Summary Microsoft is not just a desktop software provider We actively participate in Critical Information Infrastructure Protection efforts Government/Law Enforcement/Defense bodies may use Government Security Program and Security Cooperation Program Microsoft Internet Safety Enforcement Team (ISET) partners with governments, law enforcement, and industry partners worldwide Main Microsoft focus: Trusworthy Computing (TwC), Citizens Safety Architecture (Intelligence Framework, Single View Platform, Eagle) IDET'09 - Brno May

58 Quiz questions What is a name of Microsoft forensic package that will be avaible free of charge for 187 INTERPOL member countries? What Microsoft programes are used by Government/Law Enforcement/Defense bodies to assess applications corectness (via source code analysis) and information assurance/security incident response cooperation? What is a name of Microsoft bi-annual report covering internet safety based on analysis information collected globally from Malware Software Removal Tool and ForeFront? IDET'09 - Brno May

59 Microsoft support for Critical Information Infrastructure Protection Services Edge Microsoft Innovations Drive - Comprehensive CIIP Approach Server Applications Information Protection Client and Server OS Identity Management Systems Management Active Directory Federation Services (ADFS) Guidance IDET'09 - Brno May 2009 Developer Tools 59

60 Thank you Questions? Contact: Phone: IDET'09 - Brno May

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection L. Laile Di Silvestro Senior Strategist Worldwide Public Sector Microsoft Government Industry Collaboration

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Kaspersky Security Network

Kaspersky Security Network The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal Foundation and Enforcement: Promoting Cybersecurity Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3 Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Media Kit. California Cybersecurity Institute

Media Kit. California Cybersecurity Institute Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

HOSTED SECURITY SERVICES

HOSTED SECURITY SERVICES HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016 Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report January, 2005 Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Challenges and Opportunities in Cyber Physical System Research

Challenges and Opportunities in Cyber Physical System Research Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

The Challenge of Spam An Internet Society Public Policy Briefing

The Challenge of Spam An Internet Society Public Policy Briefing The Challenge of Spam An Internet Society Public Policy Briefing 30 October 2015 Introduction Spam email, those unsolicited email messages we find cluttering our inboxes, are a challenge for Internet users,

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

EU funded research is keeping up trust in digital society

EU funded research is keeping up trust in digital society EU funded research is keeping up trust in digital society Rafael Tesoro Trust and Security Unit DG Communica5ons Networks, Content and Technology European Commission Cybersecurity Strategy of the EU: An

More information

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS PROTECT YOUR DAILY OPERATIONS FROM BEING COMPROMISED In today s data-driven society, connectivity comes with a cost.

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment July 20, 2017 DECIDEPLATFORM.COM The new Reality of Cyber Security

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified - 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2 9/30/2009 TRAI 1 Background Threats Present Status Challenges and Strategies 9/30/2009 TRAI 2 Critical infrastructure means the computers, computer systems, and/or networks, whether physical or virtual,

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report March, 2005 Phishing Activity Trends Report March, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

Challenges in Developing National Cyber Security Policy Frameworks

Challenges in Developing National Cyber Security Policy Frameworks Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General

More information

ITU Regional Cybersecurity Forum for Asia-Pacific

ITU Regional Cybersecurity Forum for Asia-Pacific ITU Regional Cybersecurity Forum for Asia-Pacific Incident Management Capabilities Australia Country Case Study Graham Ingram General Manager AusCERT July 2008 Copyright 2008 AusCERT Not for further distribution

More information

The Critical Importance of CIIP to Cybersecurity

The Critical Importance of CIIP to Cybersecurity The Critical Importance of CIIP to Cybersecurity Without CIIP there is no Cybersecurity Peter Burnett GFCE-Meridian Coordinator The Global Forum on Cyber Expertise Focus: cyber capacity building (awareness

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

Cyber Defense Operations Center

Cyber Defense Operations Center Cyber Defense Operations Center Providing world-class security protection, detection, and response Marek Jedrzejewicz Principal Security Engineering Manager Microsoft Corporation 1 Cybersecurity. In the

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information