Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert
|
|
- Raymond Greer
- 5 years ago
- Views:
Transcription
1 Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert March 7th 2017
2 HUMAN DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR PRIVATE SECTOR CITIZEN UNIVERSITIES D A T A SECURITY NGO POWER DEVICES
3 İNSANLAR DİJİTAL YAŞAM KAMU KURUMLARI HİZMET SAĞLAYAN HİZMET ALAN ÖZEL SEKTÖR VATANDAŞLAR ÜNİVERSİTELER V E R İ SECURITY STK POWER CİHAZLAR
4 İNSANLAR DİJİTAL YAŞAM KAMU KURUMLARI HİZMET SAĞLAYAN HİZMET ALAN ÖZEL SEKTÖR VATANDAŞLAR ÜNİVERSİTELER V E R İ SECURITY STK POWER CİHAZLAR
5 PUBLIC SECTOR & PRIVATE SECTOR LIKE TWO WINGS OF A BIRD IN HARMONY!
6 What happens on the internet for 60 seconds? (February 2017)
7 What happens on the internet for 1 Hour? (February 2017)
8 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
9 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
10 Internet Connected Devices Internet of Things IoT Güvenlik Sorunları Expected Economical Size in IoT 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
11 Internet Connected Devices Internet of Things 2016 Symantec Internet Security Thread Report,, Gartner IoT Report 10 Kasım 2015
12 WHAT HAPPENS IN 2 MONTHS? CI: Health October 4th, 2016 J&J: Attack on Diabetic Insulin Pumps CI: Finance October 22th, million bank card information of Indian banks stolen Global: İnternet October 15th, 2016 IoT: DDoS Attack of Mirai BotNET to Dyn DNS 10 Tbps National October 23rd, 2016 Interenet interrruption on 78% of ABD with 14 Million IoT $ 7 Billion loss Otonomy Systems October 24th, 2016 UK: «Motor Vehicles Cyber Security Guide» published CI: Health November 3rd, 2016 UK National Health System closed down due to malware National November 15th, 2016 Pre-loaded 700,000 phone sends data to China CI: Transport November 28th, 2016 Cyber attack to San Francisco Municipal Metro System CI: Communication November 28th, 2016 Cyber attack to routers of Alma Telekom Terrorism November 30th, 2016 Files of 54 terrorist groups leaked from from Europol National December 7th, 2016 The North Korean Operating System «Red Star» was captured by a remote attack October 10th, 2016 Cyber Attack on Germany Nuclear Power Plants CI: Energy October 22nd, 2016 DDoS attack to Singapore Telekom Starhub CI: Communication November 1st, 2016 Cyber attacks on Schneider Electrics ICS Panels CI: Industry November 9th, 2016 Central heating system in Finland closed with DDoS attack Public Service November 25th,2016 Massive DDoS Attack on European Commission servers Institutional November 28th,2016 Data Breach: 26,500 UK National Lottery User Account Taken Public December 3rd, million Android downloads were attacked via AirDroid Mobile December 4th, 2016 Visa cards break in 06 seconds CI: Finance CI: Critical Infrastructure ICS: Industrial Control System IoT: Internet of Things ( IoT: $ - DarkWeb)
13 February 2016: The Technical Arrangement on cooperation in cyber defense with the European Union was signed. July 2016: Cyber Space is the 5th operational area after Land, Air, Sea and Space. December 2016: Cyber defense is one of NATO's key tasks in the field of collective defense. International law should also be applied to the cyber field. NATO will develop cyber training and exercise skills.
14 GOVERNANCE HOW? Personal Privacy Public Data Trade Secrets
15 Syber Security Governance Model of Netherlands Ministry of Security and Justice National Cyber Security Council (NCSS) ICT Response Board (IRB) Governance Board Directorate of Cyber Security National Coordinator for Counterterrorism and Security Policy Division Incident Response Team Knowledge Services Team Development Team National Cyber Security Centre (NCSC) GOVCERT.NL Security Operation Center (SOC)
16 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution
17 South Korea E-Government Governance Model Expert Committee Strategy Ownership / Top Level Responsibility Program Efficiency Administrative Authority President Prime Ministry Information Society Council Administrative Board e-government Expert Board Co-Chairman: Prime Minister and Private Sector Representative Members: Repr. from Ministries + Private Sector Managers Co-Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Chairman: MoI Vice President and Private Sector Representative Members:Senior bureaucrats and experts Execution / Support MoI (MOSPA) Planning / Evaluation Technology / Project Support NIA MOSPA / MoI: Ministry of Security & Public Administration NIA: National Information Society Agency Administration, Technology Support Local Government Ministry Project Execution Ministry Project Execution
18 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support
19 Japan E-Government Governance Model Efficiency of Programs IT Strategies Headquarters Chairman: Prime Minister Members: Representatives from All Ministries and Private Sector Representatives Strategy Ownership / Top Level Responsibility Planning Board Chairman: Minister of Science & Technology Policies Members: Deputy Minister Public Programs Management Office (E-Government Incentive and Management Office, Cabinet Secretariat) Planning & Evaluation Administrative Authority CIO Council Chairman: Deputy Secretary of Cabinet Members: Ministry CIO s Strategy / Technology Consultancy Technology / Project Consultancy Advisory CIO Council (Members: Ministry s Consultant CIO s (Private) 2003 te kuruldu. CIO Council Technical Management Board (Members: Ministry s ICT Managers) Program Management Office Members: CIO, Advisory CIO, Strategic Planning Departments Ministry A Ministry B Ministry C Technology / Project Support
20 SUGGESTIONS 1. Cyber Security and e-government should be coordinated from top level in ONE CENTER 2. In this Center, there should be Public-Private Governance Board 3. National Cyber Security Policy and Prioritized Sectoral Areas should be prepared National Solutions in «Perimeter Security» Layer: National Firewall National Intrusion Detection & Prevention systems National Web Filtering National Anti-virus Solutions National Cyber Thread Intelligence Bank
21 SUGGESTIONS 4. Government should Support private sector, while developing Sectoral Capacity * Definitions of Cyber Security, Data Security and e-government Expertizes / Professions * Software Development and Cyber Security Education Programs from Primary School to Universities * Preparation of HR Capacity Developing Programs for private sectotr * Innovation Incentives in prioritized areas 5. The government should be beside the sector in creating the regional and global power of the sector 6. Special incentives for the sector targeted to grow in the region (financial and administrative)
22 SUGGESTIONS 7. Use of NATIONAL PRODUCTS without exception as a National Policy in the public sector «WE WILL USE FIRST!» Dissemination Policy in Public Sector: «Company Rating» in public procurement with accreditation and certification Promotion Model: R&D For successful results «Production Support» Pilot Applications Support & Development Infrastructure Positioning in Public Current products in the first layer, National Products in the second layer After transition and maturity, national products in all layers At least two National Solution Policy in each segment Regional Dissemination
23 Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOĞLU Cyber Security & e-governance Chief Expert afyonluoglu [at] gmail.com Linkedin: Twitter: Web: afyonluoglu.com
Cyber Security for National Security «Coordination, Capacity Building and National Solutions»
Cyber Security for National Security «Coordination, Capacity Building and National Solutions» Mustafa AFYONLUOĞLU Cyber Security, e-governance and egovernment Chief Expert 25.04.2017 Cyber Security for
More informationNational Cybersecurity preparation to deal with Cyber Attacks
National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand
More informationWelcome to Korea Accreditation System
Welcome to Korea Accreditation System Korean Agency for Technology and Standards 1 2 3 4 5 Organization of Government President Prime Minister Education, Science & Technology Unification National Defense
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationNational CIRT - Montenegro. Ministry for Information Society and Telecommunications
National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:
More informationRUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence
RUAG Cyber Security Training Range & Attack Simulation Peter Hladký Senior Cyber Security Specialist RUAG Defence What is the current state of affairs? (In Cyber Security) 2 RUAG Defence 02.12.2016 Recent
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationRomania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security
Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationCERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria
CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationNational program of digital transformation
National program of digital transformation Omuraliev Mirlan Deputy Chairman State Committee of Information Technologies and Communications of the Kyrgyz Republic Global Infrastructure Cooperation Conference
More informationCritical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews
Critical Infrastructure Protection & Resilience Europe / Asia Conference Discussion Reviews Torch Marketing / KNM Media Delivering strategic routes to critical markets Why Critical Infrastructure Protection
More informationState Planning Organization Information Society Department
Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationPromoting Quality Infrastructure Investment in Africa
Promoting Quality Infrastructure Investment in Africa Yuji SUDO Assistant Vice-Minister, Minister's Secretariat Ministry of Land, Infrastructure, Transport and Tourism (MLIT) 25 July, 2017 Tokyo, Japan
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationAction Plan to enhance preparedness against CBRN security risks
Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationHow UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations
How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationGreenS DEPARTMENT OF ENVIRONMENT MINISTRY OF AGRICULTURE, RURAL DEVELOPMENT & ENVIRONMENT NATALIA GEORGIOU
GreenS Green public procurement supporters for innovative and sustainable institutional change 1st International Webinar about the GPP implementation challenges and solutions DEPARTMENT OF ENVIRONMENT
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationGovernance Approaches to National Sustainable Development Strategy in Asia and the Pacific. UNEP, Bangkok. Background
Governance Approaches to National Sustainable Development Strategy in Asia and the Pacific UNEP, Bangkok Background Global Milestone MILESTONE Brundland Commission, 1987 UNCED, 1992 Rio + 5, 1997 International
More informationDIGITAL FINANCIAL INCLUSION FOR MONGOLIA
DIGITAL FINANCIAL INCLUSION FOR MONGOLIA ITU-TRAI Asia-Pacific Regulators Roundtable, 21-22 August 2017 D.SEREEDORJ Vice Chairman Communications Regulatory Commission of Mongolia 1. Country profile 2.
More informationTowards a European Cloud Computing Strategy
Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO
European Cybersecurity PPP European Cyber Security Organisation - ECSO Luigi Rebuffi CEO, EOS Secretary General, ECSO European Cyber Security Organisation Objectives of the cppp Gather industrial and public
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationRecovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004.
Recovery and Reconstruction towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004 Tadashi HARADA Deputy Director General for Disaster Management Cabinet Office, Government
More informationChina IoT New Developments and EU- China Cooperation
China IoT New Developments and EU- China Cooperation June 2014, London Shirley Zhang China Academy of Telecommunication Research(CATR), Ministry of Industry and Information Technology(MIIT),China Email:zhangxueli@catr.cn
More informationThe commission communication "towards a general policy on the fight against cyber crime"
MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition
More information1 History of CyberSecurity in the Philippines 2 3
CONTENTS 1 History of CyberSecurity in the Philippines 2 3 The National CyberSecurity Governance Framework The National CyberSecurity Plan Strategic Drivers Focal Areas Critical Infostructure, Government,
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationData Protection System of Georgia. Nina Sarishvili Head of International Relations Department
Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationBANGLADESH. Next ICT Destination. April 2016
BANGLADESH Next ICT Destination April 2016 How it began? On 12 th December 2008, the Government conceptualized the revolutionary Vision 2021: Digital Bangladesh 2018 2021 Middle Income Country Accelerate
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationResilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate
Resilience at JRC Naouma Kourti Dep. Head of Unit Technology Innovation in security Security, Space and Migration Directorate The Joint Research Centre at a glance 3000 staff Almost 75% are scientists
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationJapanese Space Policy - Basic Space Law -
Japanese Space Policy - Basic Space Law - Yasuyoshi KOMIZO Ambassador Permanent Mission of Japan to the International Organizations in Vienna 1 Contents of this Presentation Based on the Basic Space law
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationH2020 & THE FRENCH SECURITY RESEARCH
H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationGlobal Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019
Global Infrastructure Hub Update G20 Infrastructure Working Group, January 2019 IWG Update Introduction Dear IWG members, After a successful 2018, we start 2019 with great enthusiasm, ready to deliver
More informatione-government Software Framework and Impacts on Public Sector
e-government Software Framework and Impacts on Public Sector MUSTAFA AFYONLUOĞLU İ. GÖKHAN ÖZBİLGİN October 17th, 2014 Information Society & Software World Efficient & Effective Software Development e-government
More informationMONA ICT Policy Centre
MONA ICT Policy Centre 3rd National Cyber Security Conference Cyber Threats and Challenges Dr Louis Shallal, P.Eng. CIO GoJ Nov 17/18, 2015 Technology is Evolving Rapidly! A Few Stats 1,000,000 People
More informationISO Energy Management System Standard
ISO 50001 Energy Management System Standard Michael Burke Director, Industrial Programs Division, Natural Resources Canada #psf11 Introduction to ISO 50001 Purpose: Enable organizations to establish systems
More informationCONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES. Defence Themes Officially supported by:
CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES Defence Themes 2018 Officially supported by: Official media partners for: Defence Online Themes for 2018 January 2018 Clothing
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT
ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT Adelina Kamal, Head of Disaster Management & Humanitarian Assistance Division, ASEAN Socio Cultural Community Department, ASEAN Secretariat 11 th ASEAN
More informationIPv6 Deployment Overview & Policy Update
IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationIssues in Info-communications
7 7 Issues Issues in Info-communications 1. Developing the Global Info-communications Infrastructure 1.1 Internet Governance and Domain Names Domain names are a key element of Internet communications,
More informationCybersecurity Fundamentals
Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing
More informationTASK FORCE ON SERVICES STATISTICS
Workshop on Improving Statistics of International Trade in Services Durban, South Africa, 15-16 June 2009 TASK FORCE ON SERVICES STATISTICS Kang Lay Kim Director, Information Management & Statistics Division
More informationPROGRAMME. - Mr. Nikolay Pomoshchnikov Head Subregional Office for North and Central Asia ESCAP
Economic and Social Commission for Asia and the Pacific Expert Consultation on the Asian Information Superhighway and Regional Connectivity Fifth session of the SPECA Project Working Group on Knowledge-based
More informationThe Development of. ICT in Thailand. by Thaweesak Koanantakool, Ph.D.
The Development of ICT in Thailand by Thaweesak Koanantakool, Ph.D. Director National Electronics and Computer Technology Center (NECTEC) National Science and Technology Development Agency (NSTDA) Ministry
More informationCyber Security Management System of NIRS in Korea
Cyber Security Management System of NIRS in Korea October 29, 2018 (Mon) * NIRS : National Information Resources Service Contents 1 2 3 Data Communication Infrastructure Cyber Crisis Response System NIRS
More informationNATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post
Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal
More informationInfrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA
Security and resilience for ehealth Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA European Union Agency For Network And Information Security Securing Europe
More informationConcept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua
Concept Note: GIDC 1. Title of Proposed Project Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua 2. Organization Nicaraguan Institute for Telecommunications
More informationCase study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit
Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit The views expressed in this presentation are those of the authors and do not necessarily reflect the
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationProtecting Critical Information Infrastructure in times of increasing cyber conflict
Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under
More informationFINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION
FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION Katri Liekkilä, M.M.Sc., M.Sc. (Econ) Special Adviser IMPROVER Operators workshop, Lisbon 2018 NATIONAL DOCUMENTS RELATED TO CIP SECURITY STRATEGY
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationKISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016
Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations
More informationCOUNTER-TERRORISM. Future-oriented policing projects
COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationHitachi Announces Executive Changes
FOR IMMEDIATE RELEASE Hitachi Announces Executive Changes Tokyo, February 3, 2016 --- Hitachi, Ltd. (TSE:6501) today announced the following executive changes in accordance with a resolution passed by
More informationThailand Country Report 2008
Thailand Country Report 2008 Part 1: Natural Disaster Situation in Thailand 1.1 Geographical Characteristics of Thailand Thailand is located between 5º and 21º N latitude and between 97º and 106º E longitude,
More informationDr Ntsane Moleleki Contribution of Research Capacities to National Objectives: NACI Perspective AfricaLics 15 Date: November 2015
National Advisory Council on Innovation (NACI) Presentation Dr Ntsane Moleleki Contribution of Research Capacities to National Objectives: NACI Perspective AfricaLics 15 Date: 17 19 November 2015 Background
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationBRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access
More informationPROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK
PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK 23.11.2015 DEFINITION OF CRITICAL INFRASTRUCTURE US EU The nation's
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationIoT and Privacy by Design
IoT and Privacy by Design A recap on previous presentation More recent work on GDPR, NIS Cyber Security, and the Human Right to Privacy The design process for consumer goods and services 2 current examples
More informationDigital Revolution in India
Digital Revolution in India Can the Indian government declare 20102020 as the Digital Decade and achieve fresh broadband targets? Considering the mobile phone surge in India, which boasts around 8-9 percent
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationThe Global Security Threat How are Customs responding
The Global Security Threat How are Customs responding Ana Hinojosa Director-Compliance & Facilitation World Customs Organization Global Security Conference: Punta Cana Resolution 3 Years on Punta Cana
More informationCognitive Security in the Era of Always Online. Yiannis Giokas VP R&D
Cognitive Security in the Era of Always Online Yiannis Giokas VP R&D Our Parent Company: HKT PCCW Global is an international operating division of HKT, Hong Kong s premier telecommunications service provider,
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More informationHitachi Announces Executive Changes
FOR IMMEDIATE RELEASE Contacts: Japan: Masanao Sato U.S.: Dash Hisanaga Hitachi, Ltd. Hitachi America, Ltd. +81-3-5208-9324 +1-914-333-2987 masanao.sato.sz@hitachi.com tadashi.hisanaga@hal.hitachi.com
More informationCybersecurity Strategy of the Republic of Cyprus
Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of
More information