CESNET-CERTS. Academic CSIRT Meeting 17 Jun 2012 Malta. Andrea Kropáčová,

Size: px
Start display at page:

Download "CESNET-CERTS. Academic CSIRT Meeting 17 Jun 2012 Malta. Andrea Kropáčová,"

Transcription

1 CESNET-CERTS Academic CSIRT Meeting 17 Jun 2012 Malta Andrea Kropáčová, CESNET-CERTS, CESNET, z. s. p. o.,

2 CESNET-CERTS Provided by CESNET CESNET provides Czech NREN CESNET has 26 members and about 300 participants Responsibility: CESNET2 network AS members (not full time) 2 are members of EGI

3 CESNET-CERTS History: established Jan 2004 listed Jan 2008 accredited Apr 2008 we established CSIRT.CZ Dec 2010 CSIRT.CZ was declared as National CSIRT of Czech Republic Jan 2011 transfer of CSIRT.CZ to CZ.NIC started Jun 2011 transfer of CSIRT.CZ finished

4 CESNET-CERTS (Inter) national cooperation: Working group E-CRIME Working group CESNET CSIRT Working group IPv6 Working group CSIRT.CZ Security forces of CZ TERENA, TF-CSIRT, TI ENISA EGI

5 CESNET-CERTS Services: incident handling and incident response for CESNET2 network traffic monitoring in CESNET2 gathering and corelating data public sources Shadowserver, UCEPROTECT, TeamCymru, DShield, NASK Polska CESNET2 forensics laboratory CESNET Audit System IDS (based on LaBrea), honeypots (Kippo, Dionaea), netflows, logs education

6 CESNET IDS Based on LaBrea watches unassigned address range of CESNET2 from /16 results (detected attacks) source of the attack is from CESNET2 --> CESNET-CERTS incident handling source of the attack is from Czech Republic --> CSIRT.CZ the rest... --> DSHIELD (

7 CESNET-CERTS Education: workshops presentation at local conferences education of members of security forces Working group CESNET CSIRT all security topics sharing, cooperation, education feedback for CESNET-CERTS training courses for university students training courses for university employees

8 Course for students University Topics: meeting room CESNET and CESNET-CERTS invitation Law and cybercrime (first presentation) Me anonym? CESNET speakers presentation How to secure workstation The world of Open Source... on-demand > Služby --> Školení pro (nejen) studenty prvních ročníků

9 CESNET-CERTS IH Incident handling and incident response last resort for CESNET2 reports go directly to CESNET2 end networks Environment for effective IH and IR cooperation with in end-networks security incident classification IH and IR work-flow proactive services IDS, SSERV, ORR, UCE transparent administration of AS members of CESNET-CERTS are LIR

10 CESNET-CERTS AS2852: / / / / / / / / / / / / /17

11 CESNET-CERTS AS2852: / / / / / / / / / / / /19 CESNET University of Economics Czech Technical University University of Defence Technical University of Ostrava University of West Bohemia Masaryk University (CSIRT-MU) Palacky University Czech University of Life Scienses Nuclear Research Institute CESNET participants Silesial University /17 CESNET participants

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28 Incident handling Ways and means we use to solve security incidents: AP and AUP :-) positive motivation established cooperation, communication channels existing legislation (as a negotiation motivation) experiences, knowledge of the local environment, contact cooperation with NOC no IH policy no security policy blocking IP address/network filters, QoS

29 Incident handling Why no IH policy? no security policy? Security policy and IH policy designed in members ~= 26 opinions and goals policy should be more severe policy should be softer (frame only) we do not want a policy we want policy, but this one is agains our uni policy we want policy, but...

30 Statistic

31 Statistic

32 Statistic

33 CESNET-CERTS (Inter) national cooperation: Working group E-CRIME Working group CESNET CSIRT Working group IPv6 Working group CSIRT.CZ Security forces of CZ TERENA, TF-CSIRT, TI ENISA EGI

34 CESNET-CERTS Education: workshop presentation at local conferences education of members of security forces Working group CESNET CSIRT all security topics sharing, cooperation, education feedback for CESNET-CERTS workshop for university students workshop for university employees

35 Security forces In the beginning: Who owned IP address a.b.c.d on 12 Apr 2012 between 16:15 20:30? How was the web changed/server hacked...? Who has these informations? Education: How Internet works - IP, domains, services, SI Where are information (about security incidents) logs (network and services) netflows mail headers,...

36 Topics to disscuss (1) How is your LIR policy? all IP assigments are in RIPE DB? do you use IRT objects? all IP assigments covered by IRT object?

37 Topics to disscuss (1) How is your LIR policy? all IP assigments are in RIPE DB? do you use IRT objects? all IP assigments covered by IRT object? CESNET: YES CSIRT-MU only ( /16) CSIRT-MU only ( /16)

38 Topics to disscuss (2) Automated IH? handwork?, (semi) automatic? using OTRS, RT, RTIR? tweaking OTRS, RT, RTIR?

39 Topics to disscuss (2) Automated IH? handwork?, (semi) automatic? using OTRS, RT, RTIR? tweaking OTRS, RT, RTIR? CESNET handwork, OTRS monitors and helps with work-flow OTRS OTRS tweaking a lot :-) data harvesting (IP, type of incident,...) creating report automatically statistics

40 Topics to disscuss (3) For NREN CERT/CSIRT teams: how many official CERT/CSIRT teams are in your constituency? how many security teams are in your constituency? do you organizace some working group for them? how you communicate with them?

41 Topics to disscuss (3) For NREN CERT/CSIRT teams: how many official CERT/CSIRT teams are in your constituency? how many security teams are in your constituency? do you organize some working group for them? how you communicate with them? CESNET 1 = CSIRT-MU presumed 26 Working group CESNET CSIRT WG, WWW, ...

42 Topics to disscuss (4) For NREN CERT/CSIRT teams (related to Security policies ): do you have security policies in you NREN? teams within your constitunency have some duty to NREN CERT/CSIRT?

43 Topics to disscuss (4) For NREN CERT/CSIRT teams (related to Security policies ): do you have security policies in you NREN? teams within your constitunency have some duty to NREN CERT/CSIRT? CESNET AP and AUP No

44 Topics to disscuss (5) Do you provide some IDS? What?

45 Topics to disscuss (6) Do you provide education of users, admins and other staff? How do you provide this education?

46 Topics to disscuss (6) Do you provide education of users, admins and other staff? How do you provide this education? CESNET: YES, Monty Python Workshops in CESNET, workshops in place

47 Topics to disscuss (7) Technical and political - do you have technical resources (technical or administrative = mandate) to block IP or part of the network?

48 Topics to disscuss (7) Technical and political - do you have technical resources (technical or administrative = mandate) to block IP or part of the network? CESNET Yes, we have a AP and AUP :-) No, only establised cooperation with NOC

49 Topics to disscuss (8) How do you communicate with your constituency? ? www? blogs? social network? press? (how) are you succesfull? how do you try to achieve be known and respected?

50 Topics to disscuss (8) How do you communicate with your constituency? ? www? blogs? social network? press? (how) are you succesfull? how do you try to achieve be known and respected? CESNET s, www, personally Working group CESNET CSIRT??????

51 Topics to disscuss (9) LEA do you cooperate with them? do you educate them? some good/bad experiences?

52 ?

53 Czech Republic CESNET-CERTS (academic sector) Created 2003, provided by CESNET CSIRT-MU (academic sector) Created 2008, provided by Masaryk University CZ.NIC-CSIRT (internal) Created 2008, Provided by CZ.NIC ACTIVE24-CSIRT (internal) Created 2012, provided by Active24 CSIRT.CZ (National CSIRT of Czech Republic) Created 2008, Provided by CZ.NIC

54 CSIRT.CZ (National CSIRT) Created in 2007 by CESNET-CERTS Started at 3 rd April 2008 as a last resort team operated by CESNET (CESNET-CERTS) Task of grant Cyber Threads... funded by Ministry of Interior Jun 2008 status listed from TI Dec 2010: CSIRT.CZ declared as National CSIRT of The Czech Rep. by Memorandum between MI and CZ.NIC Jan 2011 transfer to CZ.NIC started Oct 2011 accredited by TI

55 Czech Republic Jan 2007 Ministry of Informatics was canceled Feb 2010 Cyber Security Departement at Ministry of Interior Main tasks: To cooperate with other entities in the area of cyber security in accordance with the law on cyber security; To coordinate activities of other institutions leading towards ensuring cyber security; To coordinate Czech Republic s representation in the area of cyber security at various international conference, including attending international organisations (EU, NATO, etc.) meetings; To ensure Governmental CSIRT operation; To cooperate with independent professional entities in the area of cyber security; To draft Czech Republic s cyber security strategy; To prepare a bill on cyber security.

56 Czech Republic Dec 2010 Memorandum between MI and CZ.NIC about CSIRT.CZ becomes National CSIRT of Czech Republic Oct 2011 the government resolution: established NSA authority for area of cyber security APPROVED the establishment of the National cyber security centre within the structures of the National Security Authority (NSA) IMPOSED to launch a full operation of the National cyber security centre by 31 December 2015, including the governmental point of coordination for the immediate response to computer incidents (governmental CERT - Computer Emergency Response Team). Feb 2012 NSA launched "the cyber security substance matter"

22nd TF-CSIRT Meeting, Porto

22nd TF-CSIRT Meeting, Porto 22 nd TF-CSIRT Meeting Building National CERT of the Czech Republic 20-21 September 2007 Porto Introduction Participants Andrea Kropáčová (CESNET-CERTS), know-how Robert Malý (NESS), start up, professional

More information

(D)DoS attacks targeted the www services operated in The Czech Republic

(D)DoS attacks targeted the www services operated in The Czech Republic (D)DoS attacks targeted the www services operated in The Czech Republic Andrea Kropáčová andrea@cesnet.cz, CESNET a. l. e. andrea@csirt.cz, CZ.NIC a. l. e. CESNET a. l. e. http://www.cesnet.cz/ Established

More information

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic

More information

Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP

Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT (HR-CERT) mission: Promoting and preserving information security of public

More information

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8 European Union Agency for Network and Information Security Capacity and community building for CSIRTs 2005 Start up

More information

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008

More information

Way to new challenges

Way to new challenges Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law

More information

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Petr Jirásek et al Praha 2017 Executive Summary Substantial growth in the use of information technologies

More information

The Case for National CSIRTs

The Case for National CSIRTs The Case for National CSIRTs ENOG 12 Yerevan 3-4 Oct 2016 What is a CERT (CSIRT)? A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing,

More information

Recent Advances in Computer Science

Recent Advances in Computer Science (D)DoS attacks targeted web servers operated in Czech Republic ANDREA KROPÁČOVÁ CESNET-CERTS Computer Security Incident Response Team CESNET Zikova 4, Prague CZECH REPUBLIC andrea@cesnet.cz Abstract: At

More information

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome,

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome, GARR-CERT Update OLD GARR-CERT Presentation... I do not know who was the first to present GARR-CERT... And I do not have that presentation, nor any presentation at all Since my duty is to make an «update»...

More information

How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania

How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania 1 Outline of the presentation Introduction and survey. NRA actions

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Implementing a National Strategy : the case of the Tunisian CERT

Implementing a National Strategy : the case of the Tunisian CERT Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end

More information

1. Document Information

1. Document Information CSIRT description for CSIRT.CZ, National CSIRT of The Czech Republic. ======================================================== 1. Document Information This document contains a description of CSIRT.CZ team

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

1. Document Information

1. Document Information CSIRT description for CSIRT.CZ, National CSIRT of The Czech Republic. ======================================================== 1. Document Information This document contains a description of CSIRT.CZ team

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

IRT-Object in the RIPE Database, "interim" meeting

IRT-Object in the RIPE Database, interim meeting IRT-Object in the RIPE Database, "interim" meeting Overview Ulrich Kiermayr, Wilfried Wöber: ACOnet-CERT TF-CSIRT, 10th meeting Amsterdam, NL September 26, 2003 1 What does the IRT-Object do?? documents

More information

Cybersecurity. The Public-Private Dilemma. POLICY BRIEF May 2017

Cybersecurity. The Public-Private Dilemma. POLICY BRIEF May 2017 Cybersecurity The Public-Private Dilemma POLICY BRIEF May 2017 POLICY BRIEF May 2017 Cybersecurity The Public-Private Dilemma Policy Brief Jan Klesla and Kelsey Beckmeyer, May 2017 This is a policy brief

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

Ulak-CSIRT Murat SOYSAL TUBITAK ULAKBIM Murat Soysal, 31st TF-CSIRT Meeting, Istanbul

Ulak-CSIRT Murat SOYSAL TUBITAK ULAKBIM Murat Soysal, 31st TF-CSIRT Meeting, Istanbul Ulak-CSIRT Murat SOYSAL TUBITAK ULAKBIM msoysal@ulakbim.gov.tr 1 Welcome to Istanbul After 30 TF-CSIRT meetings we are pleased to host you in Turkey Enjoy your stay in Istanbul!!! I would like to thank

More information

CERT.be Brussels 2011

CERT.be Brussels 2011 What? CERT Computer Emergency Response Team CSIRT : Computer Security Incident Response Team = The Belgian National CERT 3 Our Mission s mission is to help Belgian key resources, critical information providers

More information

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vietnam Computer Emergency Response Team Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vu Quoc Khanh, Director General of VNCERT Cybersecurity situation

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

National CIRT - Montenegro. Ministry for Information Society and Telecommunications National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Mapping of the CVD models in Europe

Mapping of the CVD models in Europe Mapping of the CVD models in Europe TASK FORCE ON SW VULNERABILITY DISCLOSURE IN EUROPE Brussels, 29/11/2017 Gianluca Varisco Disclaimer This preliminary mapping has been put together by: reaching out

More information

CIRT: Requirements and implementation

CIRT: Requirements and implementation CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally

More information

Developing The Case for NRENs. (A BIT MORE) revised 08-October-2008

Developing The Case for NRENs. (A BIT MORE) revised 08-October-2008 TF-MSP / TF-PR Zürich 30 September 2008 John DYER TERENA John.Dyer@terena.org Developing The Case for NRENs (A BIT MORE) revised 08-October-2008 Where did we get up to since 18 May 2008? DRAFT for DISCUSSION

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Action Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for

Action Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for Action Plan the Implementation of the Cyber Security Concept of the Slovak Republic 2015-2020 National Security Authority I Bratislava, Budatínska 30, Post code: 85 106, Slovakia I www.nbusr.sk Table of

More information

ENISA Operational security CERT relations. Update January Contact:

ENISA Operational security CERT relations. Update January Contact: ENISA Operational security CERT relations Update January 2013 Contact: opsec@enisa.europa.eu 1 How to navigate on our website? Fast links to 2012 reports: http://www.enisa.europa.eu/media/2012-fast-links

More information

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning

More information

UCD Centre for Cybersecurity & Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder

More information

14965/17 MK/ec 1 DG D 2B

14965/17 MK/ec 1 DG D 2B Council of the Union Brussels, 4 December 2017 (OR. en) 14965/17 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 14435/17 + COR 1 CYBER 190 TELECOM 320 FOPOL 576 JAI 1116 MI

More information

Italian government CERT: INITIAL RESULTS

Italian government CERT: INITIAL RESULTS Italian government CERT: INITIAL RESULTS ISCOM Conference on Network and Information Security: Political and Technical Challenges Gianluigi Moxedano GovCERT.it National Center for Informatics in Public

More information

The IRT Object in the RIPE Database

The IRT Object in the RIPE Database The IRT Object in the RIPE Database The direct link from IP numbers to CSIRTs Don Stikvoort, Elsinore Wilfried Wöber, Vienna University 1 Problem Outline Despite all high tech, wizardry and risk management

More information

APNIC Update. 20 May Paul Wilson. Revision:

APNIC Update. 20 May Paul Wilson. Revision: APNIC Update 20 May 2015 Paul Wilson Issue Date: 15 Apr 2015 Revision: APNIC s Vision A global, open, stable, and secure Internet that serves the entire Asia Pacific community 2 APNIC in 2014 Serving Supporting

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

ENISA S WORK ON ICS AND SMART GRID SECURITY

ENISA S WORK ON ICS AND SMART GRID SECURITY AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and

More information

Hardware Acceleration in Computer Networks. Jan Kořenek Conference IT4Innovations, Ostrava

Hardware Acceleration in Computer Networks. Jan Kořenek Conference IT4Innovations, Ostrava Hardware Acceleration in Computer Networks Outline Motivation for hardware acceleration Longest prefix matching using FPGA Hardware acceleration of time critical operations Framework and applications Contracted

More information

KYPO Cyber Range Design and Use Cases

KYPO Cyber Range Design and Use Cases KYPO Cyber Range Design and Use Cases ICSOFT CONFERENCE 24.7.-26.7. 2017 Daniel Tovarňák Masaryk University (ICS) tovarnak@ics.muni.cz Cyber Ranges Cyber Range is a platform for cyber security research

More information

Standards in HEAnet. The great thing about standards is that there are so many to choose from. Rachael Holt & Gareth Eason, HEAnet

Standards in HEAnet. The great thing about standards is that there are so many to choose from. Rachael Holt & Gareth Eason, HEAnet Standards in HEAnet The great thing about standards is that there are so many to choose from Rachael Holt & Gareth Eason, HEAnet for TF-NOC, Zürich, 2011-06-28 Agenda Advantages of standards? What standards?

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

RFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0

RFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0 RFC 2350 YOROI-CSDC Expectations for Computer Security Incident Response Title RFC 2350 YOROI-CSDC Document Type Specification Date 2018/03/26 Version 1.0 Yoroi S.r.l. Parte del gruppo MAM www.yoroi.company

More information

2nd ENISA Workshop German CERT-Activities. 5 th October, 2006 Brussels

2nd ENISA Workshop German CERT-Activities. 5 th October, 2006 Brussels 2nd ENISA Workshop German CERT-Activities 5 th October, 2006 Brussels Overview Hosting Organisation CERT-Bund Background Projects CERT Services German CERT Activities International Cooperation Lessons

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a Yes, No, Partial, or Not Applicable

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement

More information

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

If you confirm that the file is coming from a trusted source, you can send the following SHA-256 hash value to your admin for the original file.

If you confirm that the file is coming from a trusted source, you can send the following SHA-256 hash value to your admin for the original file. This file has been cleaned of potential threats. If you confirm that the file is coming from a trusted source, you can send the following SHA-256 hash value to your admin for the original file. aa53dfd6c9583bc2ea997927c4086a16171249ebbcbda5b36facad551bd994c7

More information

ICANN Identifier System SSR Update 1H 2015

ICANN Identifier System SSR Update 1H 2015 ICANN Identifier System SSR Update 1H 2015 Satisfying steady demands for capability building and global stakeholder engagement, supporting trust communities via ICANN s threat intelligence channels, developing

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Global Cybercrime Certification

Global Cybercrime Certification Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert

More information

National Communications Authority

National Communications Authority National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal

More information

Flows at Masaryk University Brno

Flows at Masaryk University Brno Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest

More information

RIPE. Réseaux IP Européens. Rob Blokzijl. RIPE Chairman. Rob Blokzijl. RIPE 57, Dubai, October,

RIPE. Réseaux IP Européens. Rob Blokzijl. RIPE Chairman. Rob Blokzijl. RIPE 57, Dubai, October, RIPE Réseaux IP Européens Rob Blokzijl RIPE Chairman K13@NIKHEF.nl 1 RIPE History Terms of Reference About RIPE RIPE Working Groups RIPE Meetings Policy Development Process More Information 2 History of

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

Building a Cybersecurity R&D Ecosystem in Singapore

Building a Cybersecurity R&D Ecosystem in Singapore Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored

More information

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC. The school year 2017 / 2018

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC. The school year 2017 / 2018 Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2017 / 2018 Petr Jirásek a kolektiv Praha 2018 Executive Summary Substantial growth in the use of information

More information

Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua

Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua Concept Note: GIDC 1. Title of Proposed Project Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua 2. Organization Nicaraguan Institute for Telecommunications

More information

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012 ENISA & Cybersecurity Steve Purser Head of Technical Competence Department December 2012 Agenda Protecting Critical Information Infrastructure Input to EU & MS Cyber Security Strategies Assisting Operational

More information

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT 2017-2 CEF Telecom Calls: CEF-TC-2017-2: Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT CEF-TC-2017-2: Cyber Security Funding under this call will allow the Member States to limit the economic

More information

AfricaCERT Workshop on CSIRTs in NRENs

AfricaCERT Workshop on CSIRTs in NRENs AfricaCERT Workshop on CSIRTs in NRENs 3rd WACREN regional workshop Ouagadougou, Burkina Faso 10 15 October 2016 Perpetus Jacques Houngbo Head of Projects Contents Introduction: Participant introductions,

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

CTU in Prague, CIIRC, and the National Centre for Industry 4.0

CTU in Prague, CIIRC, and the National Centre for Industry 4.0 CTU in Prague, CIIRC, and the National Centre for Industry 4.0 Dr. Roman Holý (lead by Prof. Vladimír Mařík) CIIRC - Czech Institute of Informatics, Robotics, and Cybernetics The 3rd RRI International

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36)

NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36) NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36) Project Manager: Lt Col Paulo Viegas Nunes nunes.pfv@mail.exercito.pt Agenda MN CD E&T Objective Working Plan

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

An overview of the CERT/CC and CSIRT Community

An overview of the CERT/CC and CSIRT Community An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion

More information

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,

More information

Cybersecurity and Vulnerability Assessment

Cybersecurity and Vulnerability Assessment Cybersecurity and Vulnerability Assessment Wayne Zeuch Vice Chair: Working Group on Deployment of Technologies and Services ITU /CITEL Regional Cybersecurity Workshop for the Americas Salta, Argentina

More information

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350 Έκδοση 1.2-2018.02.14 TLP1: WHITE 1 TLP Sources may use TLP: WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors

More information

RIR Update. A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC. 17 March 2002 IEPG - Minneapolis

RIR Update. A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC. 17 March 2002 IEPG - Minneapolis RIR Update A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC Overview Joint Efforts RIR Specific Statistics Questions RIR Co-ordination IPv6 policy development Joint tutorial & presentation at AfNOG

More information