CESNET-CERTS. Academic CSIRT Meeting 17 Jun 2012 Malta. Andrea Kropáčová,
|
|
- Leo Miller
- 5 years ago
- Views:
Transcription
1 CESNET-CERTS Academic CSIRT Meeting 17 Jun 2012 Malta Andrea Kropáčová, CESNET-CERTS, CESNET, z. s. p. o.,
2 CESNET-CERTS Provided by CESNET CESNET provides Czech NREN CESNET has 26 members and about 300 participants Responsibility: CESNET2 network AS members (not full time) 2 are members of EGI
3 CESNET-CERTS History: established Jan 2004 listed Jan 2008 accredited Apr 2008 we established CSIRT.CZ Dec 2010 CSIRT.CZ was declared as National CSIRT of Czech Republic Jan 2011 transfer of CSIRT.CZ to CZ.NIC started Jun 2011 transfer of CSIRT.CZ finished
4 CESNET-CERTS (Inter) national cooperation: Working group E-CRIME Working group CESNET CSIRT Working group IPv6 Working group CSIRT.CZ Security forces of CZ TERENA, TF-CSIRT, TI ENISA EGI
5 CESNET-CERTS Services: incident handling and incident response for CESNET2 network traffic monitoring in CESNET2 gathering and corelating data public sources Shadowserver, UCEPROTECT, TeamCymru, DShield, NASK Polska CESNET2 forensics laboratory CESNET Audit System IDS (based on LaBrea), honeypots (Kippo, Dionaea), netflows, logs education
6 CESNET IDS Based on LaBrea watches unassigned address range of CESNET2 from /16 results (detected attacks) source of the attack is from CESNET2 --> CESNET-CERTS incident handling source of the attack is from Czech Republic --> CSIRT.CZ the rest... --> DSHIELD (
7 CESNET-CERTS Education: workshops presentation at local conferences education of members of security forces Working group CESNET CSIRT all security topics sharing, cooperation, education feedback for CESNET-CERTS training courses for university students training courses for university employees
8 Course for students University Topics: meeting room CESNET and CESNET-CERTS invitation Law and cybercrime (first presentation) Me anonym? CESNET speakers presentation How to secure workstation The world of Open Source... on-demand > Služby --> Školení pro (nejen) studenty prvních ročníků
9 CESNET-CERTS IH Incident handling and incident response last resort for CESNET2 reports go directly to CESNET2 end networks Environment for effective IH and IR cooperation with in end-networks security incident classification IH and IR work-flow proactive services IDS, SSERV, ORR, UCE transparent administration of AS members of CESNET-CERTS are LIR
10 CESNET-CERTS AS2852: / / / / / / / / / / / / /17
11 CESNET-CERTS AS2852: / / / / / / / / / / / /19 CESNET University of Economics Czech Technical University University of Defence Technical University of Ostrava University of West Bohemia Masaryk University (CSIRT-MU) Palacky University Czech University of Life Scienses Nuclear Research Institute CESNET participants Silesial University /17 CESNET participants
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28 Incident handling Ways and means we use to solve security incidents: AP and AUP :-) positive motivation established cooperation, communication channels existing legislation (as a negotiation motivation) experiences, knowledge of the local environment, contact cooperation with NOC no IH policy no security policy blocking IP address/network filters, QoS
29 Incident handling Why no IH policy? no security policy? Security policy and IH policy designed in members ~= 26 opinions and goals policy should be more severe policy should be softer (frame only) we do not want a policy we want policy, but this one is agains our uni policy we want policy, but...
30 Statistic
31 Statistic
32 Statistic
33 CESNET-CERTS (Inter) national cooperation: Working group E-CRIME Working group CESNET CSIRT Working group IPv6 Working group CSIRT.CZ Security forces of CZ TERENA, TF-CSIRT, TI ENISA EGI
34 CESNET-CERTS Education: workshop presentation at local conferences education of members of security forces Working group CESNET CSIRT all security topics sharing, cooperation, education feedback for CESNET-CERTS workshop for university students workshop for university employees
35 Security forces In the beginning: Who owned IP address a.b.c.d on 12 Apr 2012 between 16:15 20:30? How was the web changed/server hacked...? Who has these informations? Education: How Internet works - IP, domains, services, SI Where are information (about security incidents) logs (network and services) netflows mail headers,...
36 Topics to disscuss (1) How is your LIR policy? all IP assigments are in RIPE DB? do you use IRT objects? all IP assigments covered by IRT object?
37 Topics to disscuss (1) How is your LIR policy? all IP assigments are in RIPE DB? do you use IRT objects? all IP assigments covered by IRT object? CESNET: YES CSIRT-MU only ( /16) CSIRT-MU only ( /16)
38 Topics to disscuss (2) Automated IH? handwork?, (semi) automatic? using OTRS, RT, RTIR? tweaking OTRS, RT, RTIR?
39 Topics to disscuss (2) Automated IH? handwork?, (semi) automatic? using OTRS, RT, RTIR? tweaking OTRS, RT, RTIR? CESNET handwork, OTRS monitors and helps with work-flow OTRS OTRS tweaking a lot :-) data harvesting (IP, type of incident,...) creating report automatically statistics
40 Topics to disscuss (3) For NREN CERT/CSIRT teams: how many official CERT/CSIRT teams are in your constituency? how many security teams are in your constituency? do you organizace some working group for them? how you communicate with them?
41 Topics to disscuss (3) For NREN CERT/CSIRT teams: how many official CERT/CSIRT teams are in your constituency? how many security teams are in your constituency? do you organize some working group for them? how you communicate with them? CESNET 1 = CSIRT-MU presumed 26 Working group CESNET CSIRT WG, WWW, ...
42 Topics to disscuss (4) For NREN CERT/CSIRT teams (related to Security policies ): do you have security policies in you NREN? teams within your constitunency have some duty to NREN CERT/CSIRT?
43 Topics to disscuss (4) For NREN CERT/CSIRT teams (related to Security policies ): do you have security policies in you NREN? teams within your constitunency have some duty to NREN CERT/CSIRT? CESNET AP and AUP No
44 Topics to disscuss (5) Do you provide some IDS? What?
45 Topics to disscuss (6) Do you provide education of users, admins and other staff? How do you provide this education?
46 Topics to disscuss (6) Do you provide education of users, admins and other staff? How do you provide this education? CESNET: YES, Monty Python Workshops in CESNET, workshops in place
47 Topics to disscuss (7) Technical and political - do you have technical resources (technical or administrative = mandate) to block IP or part of the network?
48 Topics to disscuss (7) Technical and political - do you have technical resources (technical or administrative = mandate) to block IP or part of the network? CESNET Yes, we have a AP and AUP :-) No, only establised cooperation with NOC
49 Topics to disscuss (8) How do you communicate with your constituency? ? www? blogs? social network? press? (how) are you succesfull? how do you try to achieve be known and respected?
50 Topics to disscuss (8) How do you communicate with your constituency? ? www? blogs? social network? press? (how) are you succesfull? how do you try to achieve be known and respected? CESNET s, www, personally Working group CESNET CSIRT??????
51 Topics to disscuss (9) LEA do you cooperate with them? do you educate them? some good/bad experiences?
52 ?
53 Czech Republic CESNET-CERTS (academic sector) Created 2003, provided by CESNET CSIRT-MU (academic sector) Created 2008, provided by Masaryk University CZ.NIC-CSIRT (internal) Created 2008, Provided by CZ.NIC ACTIVE24-CSIRT (internal) Created 2012, provided by Active24 CSIRT.CZ (National CSIRT of Czech Republic) Created 2008, Provided by CZ.NIC
54 CSIRT.CZ (National CSIRT) Created in 2007 by CESNET-CERTS Started at 3 rd April 2008 as a last resort team operated by CESNET (CESNET-CERTS) Task of grant Cyber Threads... funded by Ministry of Interior Jun 2008 status listed from TI Dec 2010: CSIRT.CZ declared as National CSIRT of The Czech Rep. by Memorandum between MI and CZ.NIC Jan 2011 transfer to CZ.NIC started Oct 2011 accredited by TI
55 Czech Republic Jan 2007 Ministry of Informatics was canceled Feb 2010 Cyber Security Departement at Ministry of Interior Main tasks: To cooperate with other entities in the area of cyber security in accordance with the law on cyber security; To coordinate activities of other institutions leading towards ensuring cyber security; To coordinate Czech Republic s representation in the area of cyber security at various international conference, including attending international organisations (EU, NATO, etc.) meetings; To ensure Governmental CSIRT operation; To cooperate with independent professional entities in the area of cyber security; To draft Czech Republic s cyber security strategy; To prepare a bill on cyber security.
56 Czech Republic Dec 2010 Memorandum between MI and CZ.NIC about CSIRT.CZ becomes National CSIRT of Czech Republic Oct 2011 the government resolution: established NSA authority for area of cyber security APPROVED the establishment of the National cyber security centre within the structures of the National Security Authority (NSA) IMPOSED to launch a full operation of the National cyber security centre by 31 December 2015, including the governmental point of coordination for the immediate response to computer incidents (governmental CERT - Computer Emergency Response Team). Feb 2012 NSA launched "the cyber security substance matter"
22nd TF-CSIRT Meeting, Porto
22 nd TF-CSIRT Meeting Building National CERT of the Czech Republic 20-21 September 2007 Porto Introduction Participants Andrea Kropáčová (CESNET-CERTS), know-how Robert Malý (NESS), start up, professional
More information(D)DoS attacks targeted the www services operated in The Czech Republic
(D)DoS attacks targeted the www services operated in The Czech Republic Andrea Kropáčová andrea@cesnet.cz, CESNET a. l. e. andrea@csirt.cz, CZ.NIC a. l. e. CESNET a. l. e. http://www.cesnet.cz/ Established
More informationCERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria
CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic
More informationCroatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP
Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT (HR-CERT) mission: Promoting and preserving information security of public
More informationCSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security
CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8 European Union Agency for Network and Information Security Capacity and community building for CSIRTs 2005 Start up
More informationCyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB
Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationExecutive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017
Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Petr Jirásek et al Praha 2017 Executive Summary Substantial growth in the use of information technologies
More informationThe Case for National CSIRTs
The Case for National CSIRTs ENOG 12 Yerevan 3-4 Oct 2016 What is a CERT (CSIRT)? A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing,
More informationRecent Advances in Computer Science
(D)DoS attacks targeted web servers operated in Czech Republic ANDREA KROPÁČOVÁ CESNET-CERTS Computer Security Incident Response Team CESNET Zikova 4, Prague CZECH REPUBLIC andrea@cesnet.cz Abstract: At
More informationGARR-CERT. Update. Simona Venuti TF-CSIRT, Rome,
GARR-CERT Update OLD GARR-CERT Presentation... I do not know who was the first to present GARR-CERT... And I do not have that presentation, nor any presentation at all Since my duty is to make an «update»...
More informationHow Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania
How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania 1 Outline of the presentation Introduction and survey. NRA actions
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationImplementing a National Strategy : the case of the Tunisian CERT
Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end
More information1. Document Information
CSIRT description for CSIRT.CZ, National CSIRT of The Czech Republic. ======================================================== 1. Document Information This document contains a description of CSIRT.CZ team
More informationCyber Security Development. Ghana in Perspective
Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review
More informationTHE CYBER SECURITY ENVIRONMENT IN LITHUANIA
Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit
More information1. Document Information
CSIRT description for CSIRT.CZ, National CSIRT of The Czech Republic. ======================================================== 1. Document Information This document contains a description of CSIRT.CZ team
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationIRT-Object in the RIPE Database, "interim" meeting
IRT-Object in the RIPE Database, "interim" meeting Overview Ulrich Kiermayr, Wilfried Wöber: ACOnet-CERT TF-CSIRT, 10th meeting Amsterdam, NL September 26, 2003 1 What does the IRT-Object do?? documents
More informationCybersecurity. The Public-Private Dilemma. POLICY BRIEF May 2017
Cybersecurity The Public-Private Dilemma POLICY BRIEF May 2017 POLICY BRIEF May 2017 Cybersecurity The Public-Private Dilemma Policy Brief Jan Klesla and Kelsey Beckmeyer, May 2017 This is a policy brief
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationCybersecurity Strategy of the Republic of Cyprus
Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of
More informationSecurity and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy
Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and
More informationCybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus
Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,
More informationUlak-CSIRT Murat SOYSAL TUBITAK ULAKBIM Murat Soysal, 31st TF-CSIRT Meeting, Istanbul
Ulak-CSIRT Murat SOYSAL TUBITAK ULAKBIM msoysal@ulakbim.gov.tr 1 Welcome to Istanbul After 30 TF-CSIRT meetings we are pleased to host you in Turkey Enjoy your stay in Istanbul!!! I would like to thank
More informationCERT.be Brussels 2011
What? CERT Computer Emergency Response Team CSIRT : Computer Security Incident Response Team = The Belgian National CERT 3 Our Mission s mission is to help Belgian key resources, critical information providers
More informationEstablishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges
Vietnam Computer Emergency Response Team Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vu Quoc Khanh, Director General of VNCERT Cybersecurity situation
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationNational CIRT - Montenegro. Ministry for Information Society and Telecommunications
National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationMapping of the CVD models in Europe
Mapping of the CVD models in Europe TASK FORCE ON SW VULNERABILITY DISCLOSURE IN EUROPE Brussels, 29/11/2017 Gianluca Varisco Disclaimer This preliminary mapping has been put together by: reaching out
More informationCIRT: Requirements and implementation
CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally
More informationDeveloping The Case for NRENs. (A BIT MORE) revised 08-October-2008
TF-MSP / TF-PR Zürich 30 September 2008 John DYER TERENA John.Dyer@terena.org Developing The Case for NRENs (A BIT MORE) revised 08-October-2008 Where did we get up to since 18 May 2008? DRAFT for DISCUSSION
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationAction Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for
Action Plan the Implementation of the Cyber Security Concept of the Slovak Republic 2015-2020 National Security Authority I Bratislava, Budatínska 30, Post code: 85 106, Slovakia I www.nbusr.sk Table of
More informationENISA Operational security CERT relations. Update January Contact:
ENISA Operational security CERT relations Update January 2013 Contact: opsec@enisa.europa.eu 1 How to navigate on our website? Fast links to 2012 reports: http://www.enisa.europa.eu/media/2012-fast-links
More informationThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)
ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationCybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European
Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning
More informationUCD Centre for Cybersecurity & Cybercrime Investigation
UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder
More information14965/17 MK/ec 1 DG D 2B
Council of the Union Brussels, 4 December 2017 (OR. en) 14965/17 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 14435/17 + COR 1 CYBER 190 TELECOM 320 FOPOL 576 JAI 1116 MI
More informationItalian government CERT: INITIAL RESULTS
Italian government CERT: INITIAL RESULTS ISCOM Conference on Network and Information Security: Political and Technical Challenges Gianluigi Moxedano GovCERT.it National Center for Informatics in Public
More informationThe IRT Object in the RIPE Database
The IRT Object in the RIPE Database The direct link from IP numbers to CSIRTs Don Stikvoort, Elsinore Wilfried Wöber, Vienna University 1 Problem Outline Despite all high tech, wizardry and risk management
More informationAPNIC Update. 20 May Paul Wilson. Revision:
APNIC Update 20 May 2015 Paul Wilson Issue Date: 15 Apr 2015 Revision: APNIC s Vision A global, open, stable, and secure Internet that serves the entire Asia Pacific community 2 APNIC in 2014 Serving Supporting
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationENISA S WORK ON ICS AND SMART GRID SECURITY
AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and
More informationHardware Acceleration in Computer Networks. Jan Kořenek Conference IT4Innovations, Ostrava
Hardware Acceleration in Computer Networks Outline Motivation for hardware acceleration Longest prefix matching using FPGA Hardware acceleration of time critical operations Framework and applications Contracted
More informationKYPO Cyber Range Design and Use Cases
KYPO Cyber Range Design and Use Cases ICSOFT CONFERENCE 24.7.-26.7. 2017 Daniel Tovarňák Masaryk University (ICS) tovarnak@ics.muni.cz Cyber Ranges Cyber Range is a platform for cyber security research
More informationStandards in HEAnet. The great thing about standards is that there are so many to choose from. Rachael Holt & Gareth Eason, HEAnet
Standards in HEAnet The great thing about standards is that there are so many to choose from Rachael Holt & Gareth Eason, HEAnet for TF-NOC, Zürich, 2011-06-28 Agenda Advantages of standards? What standards?
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationRFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0
RFC 2350 YOROI-CSDC Expectations for Computer Security Incident Response Title RFC 2350 YOROI-CSDC Document Type Specification Date 2018/03/26 Version 1.0 Yoroi S.r.l. Parte del gruppo MAM www.yoroi.company
More information2nd ENISA Workshop German CERT-Activities. 5 th October, 2006 Brussels
2nd ENISA Workshop German CERT-Activities 5 th October, 2006 Brussels Overview Hosting Organisation CERT-Bund Background Projects CERT Services German CERT Activities International Cooperation Lessons
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationMETHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS
METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a Yes, No, Partial, or Not Applicable
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationNIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014
NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement
More informationRegional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar
Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department
More informationBetween 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.
Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009
More informationCOMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises
EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION
More informationIf you confirm that the file is coming from a trusted source, you can send the following SHA-256 hash value to your admin for the original file.
This file has been cleaned of potential threats. If you confirm that the file is coming from a trusted source, you can send the following SHA-256 hash value to your admin for the original file. aa53dfd6c9583bc2ea997927c4086a16171249ebbcbda5b36facad551bd994c7
More informationICANN Identifier System SSR Update 1H 2015
ICANN Identifier System SSR Update 1H 2015 Satisfying steady demands for capability building and global stakeholder engagement, supporting trust communities via ICANN s threat intelligence channels, developing
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationGlobal Cybercrime Certification
Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationPresentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT
Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert
More informationNational Communications Authority
National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal
More informationFlows at Masaryk University Brno
Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest
More informationRIPE. Réseaux IP Européens. Rob Blokzijl. RIPE Chairman. Rob Blokzijl. RIPE 57, Dubai, October,
RIPE Réseaux IP Européens Rob Blokzijl RIPE Chairman K13@NIKHEF.nl 1 RIPE History Terms of Reference About RIPE RIPE Working Groups RIPE Meetings Policy Development Process More Information 2 History of
More informationTowards a European Cloud Computing Strategy
Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society
More informationBuilding a Cybersecurity R&D Ecosystem in Singapore
Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored
More informationExecutive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC. The school year 2017 / 2018
Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2017 / 2018 Petr Jirásek a kolektiv Praha 2018 Executive Summary Substantial growth in the use of information
More informationConcept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua
Concept Note: GIDC 1. Title of Proposed Project Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua 2. Organization Nicaraguan Institute for Telecommunications
More informationENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012
ENISA & Cybersecurity Steve Purser Head of Technical Competence Department December 2012 Agenda Protecting Critical Information Infrastructure Input to EU & MS Cyber Security Strategies Assisting Operational
More informationCEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT
2017-2 CEF Telecom Calls: CEF-TC-2017-2: Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT CEF-TC-2017-2: Cyber Security Funding under this call will allow the Member States to limit the economic
More informationAfricaCERT Workshop on CSIRTs in NRENs
AfricaCERT Workshop on CSIRTs in NRENs 3rd WACREN regional workshop Ouagadougou, Burkina Faso 10 15 October 2016 Perpetus Jacques Houngbo Head of Projects Contents Introduction: Participant introductions,
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationCTU in Prague, CIIRC, and the National Centre for Industry 4.0
CTU in Prague, CIIRC, and the National Centre for Industry 4.0 Dr. Roman Holý (lead by Prof. Vladimír Mařík) CIIRC - Czech Institute of Informatics, Robotics, and Cybernetics The 3rd RRI International
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationNATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36)
NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36) Project Manager: Lt Col Paulo Viegas Nunes nunes.pfv@mail.exercito.pt Agenda MN CD E&T Objective Working Plan
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationAn overview of the CERT/CC and CSIRT Community
An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion
More informationExploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know
Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,
More informationCybersecurity and Vulnerability Assessment
Cybersecurity and Vulnerability Assessment Wayne Zeuch Vice Chair: Working Group on Deployment of Technologies and Services ITU /CITEL Regional Cybersecurity Workshop for the Americas Salta, Argentina
More informationRFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350
Έκδοση 1.2-2018.02.14 TLP1: WHITE 1 TLP Sources may use TLP: WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.
More informationCyber Intel within European Cybercrime Center Ops
@EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationThe rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services
The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors
More informationRIR Update. A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC. 17 March 2002 IEPG - Minneapolis
RIR Update A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC Overview Joint Efforts RIR Specific Statistics Questions RIR Co-ordination IPv6 policy development Joint tutorial & presentation at AfNOG
More information