Hybrid Cyber Warfare, dual risks?
|
|
- Maude Henry
- 5 years ago
- Views:
Transcription
1 Hybrid Cyber Warfare, dual risks? Cologne - 26/04/2017 ing. Giuseppe G. Zorzino ERMCP, CISA, CISM, CGEIT, CRISC, LA ISO27001
2 Bio Giuseppe Giovanni Zorzino Teacher and consultant of information security, currently I deal with cyberstrategies, security management systems, governance and organization information security, privacy, compliance and awareness. More than 35 years of experience in the IT industry which more than 15 on IT security. Italian Air Force Academy, Official (ret) of the Air Force Corps of Engineers. Cybersecurity coordinator of CESMA (Military Aeronautical Studies Center) "Giulio Douhet". Member of IT Security Committee of Engineer Council of Rome, as well as ISACA Rome Chapter and ISC2 Italian Chapter. Extensive educational activity at public authorities and SMEs. 2 patents. Active certifications: ERMCP, CISA, CISM, CGEIT, CRISC, Lead Auditor ISO 27001, Security+, CMMI appr, MCSASec 2003, Certificatore etico, IBM Cert Solution Architect, IBM_Cert_Specialist, 26/04/2017 Hybrid Cyber Warfare, dual risks? 2
3 CESMA Acronym of Centro Studi Militari Aeronautici Giulio Douhet, a non profit Think Tank of the Italian Air Force Association. Mission: to contribute to the diffusion of the Aerospace and Defence culture in Aerospace and Defence, both within Italy and internationally; to make studies, exchange ideas and discuss the trends of Defence and Aerospace, making a common space available to all Stakeholders (Air Force, Civil Aviation, Italian Space Agency, Air Component of the other Armed Forces, Industry, Academia, International and European Organizations) Vision: to be widely recognized, at the European and International level, as value providers for all the stakeholders and for the Italian nation. CESMA has organized and organize several workshops and lectures on UAVs, Space, History of the Italian Air Force, Military Ethics, Cyber, etc. 26/04/2017 Hybrid Cyber Warfare, dual risks? 3
4 WG: "Cyber Hybrid Warfare and the aerospatial power: risks and opportunities" AGENDA Hybrid and Strategy Hybrid and Doctrine Hybrid and Satellite systems Hybrid and EW Hybrid and the NATO view Hybrid and Psychology Hybrid and Awareness Hybrid and Legal The work will be published in the next months, please ask to 26/04/2017 Hybrid Cyber Warfare, dual risks? 4
5 Hybrid threats Hybrid is the new "buzzword" in the military field It is not obvious appearance of an asymmetric conflict No established doctrine, so there are no elements that allow a Commander to develop its campaign operations Exploitation of vulnerabilities on the target, using conventional and unconventional methods, to generate ambiguity to hinder decision-making processes generate surprise; seize the initiative; generate deception and ambiguity; avoid attribution of action; maximize deniability of responsibility for aggressive actions. 26/04/2017 Hybrid Cyber Warfare, dual risks? 5
6 Cyber threats Cyber threats resemble threats in the fifth dimension of warfare, as cyber warfare is often termed, and refer to a sustained campaign of concerted cyber operations against the IT (Sacha Bachman) Cyberspace is an enabler correlated with Air and Space, and not only It is an actual and concerning trend the use of cyber capabilities related with military of hybrid operations: the so-called "cyber dimension of Hybrid Warfare" Two perspectives: taking advantage of the opportunities of cyberspace as a domain for free, fast and effective communication use of cyberspace as an attack on warfare domain 26/04/2017 Hybrid Cyber Warfare, dual risks? 6
7 Risks military side Hybrid is the dark reflection of our comprehensive approach. We use a combination of military and non-military means to stabilize countries. Others use it to destabilize them. (Stoltenberg) Hybrid Warfare as integration of tools, techniques, tactics, and procedures, conventional and un-conventional methods, use of regular forces and irregular, in a context of symmetrical and asymmetrical conflict, to gain strategic or tactical advantage, inflict damage and loss to the adversary, at minimal cost Un-conventional warfare = integration of various dimensions, not last the information dimension This is "Unrestricted warfare", "War beyond limits", as Chinese analysts indicate the integrated use of all the strength expressions of a nation 26/04/2017 Hybrid Cyber Warfare, dual risks? 7
8 Risks civilian side In June 2015 the European Council recalled the need to mobilize EU instruments to help counter hybrid threats. EU Commission - "Joint Framework on countering hybrid threats, a European Union response", Brussels, "While definitions of hybrid threats vary and need to remain flexible to respond to their evolving nature, the concept aims to capture the mixture of coercive and subversive activity, conventional and unconventional methods (i.e. diplomatic, military, economic, technological), which can be used in a coordinated manner by state or non-state actors to achieve specific objectives while remaining below the threshold of formally declared warfare." Many EU Member States face common threats, which can also target crossborder networks or infrastructures (SCADA) "How France's TV5 was almost destroyed by " "Cyberattack on a German steel-mill" Air Traffic control.. 26/04/2017 Hybrid Cyber Warfare, dual risks? 8
9 Opportunities Hybrid warfare strategy cooperation NATO with EU (Warsaw 2016) Threats reconnaissance National resilience of Critical Infrastructure and (Air) Defence Systems Rapid assessment and decision making National capabilities Fill the technology gaps with the industrial cooperation Improve application of IT standards (ISO27001, NIST Framework, ISO31000) Governance Threats management Consequence management No practical legal framework just to Tallinn Manual 2.0 Action 12: The Commission, in coordination with Member States, will work together with industry within the context of a contractual Public Private Partnership for cybersecurity, to develop and test technologies to better protect users and infrastructures against cyber aspects of hybrid threats. 26/04/2017 Hybrid Cyber Warfare, dual risks? 9
10 Questions? 26/04/2017 Hybrid Cyber Warfare, dual risks? 10
Hybrid cyber warfare and the evolution of aerospace power: risks and opportunities 1
Hybrid cyber warfare and the evolution of aerospace power: risks and opportunities 1 GRUPPO DI LAVORO CESMA HYBRID CYBER WARFARE With the support of Hybrid cyber warfare and the evolution of aerospace
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationTraining + Information Sharing: Pillars of enhancing cybersecurity posture
Training + Information Sharing: Pillars of enhancing cybersecurity posture Welland Chu VP, Professional Development & Secretary ISACA China Hong Kong Chapter June 2018 www.isaca.org Reported cyber incidents
More informationPosition Paper of the ASD Civil Aviation Cybersecurity Taskforce
Contact: Yoann Viaouet Position Paper of the ASD Civil Aviation Cybersecurity Taskforce April 2017 Content Executive Summary... 2 The need for a global cybersecurity framework: the role of ICAO... 3 The
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationEnhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence
Enhancing Cooperative Energy Security NATO Energy Security Centre of Excellence NATO Hub on Energy Security Expertise The NATO Energy Security Centre of Excellence is an international hub on energy security
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationHorizon 2020 Security
Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON
More informationFrench-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017
French-American Foundation Conference on cyber issues Opening remarks 25 October 2017 Général d armée aérienne Denis MERCIER 1 Ladies and gentlemen, It is a great honour and a personal pleasure for me
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationRole of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency
Role of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency 4 December 2017, Ramat Gan, Israel 15th International Energy
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593
COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationGENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION
GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly
More informationCOMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises
EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION
More informationTowards a Theory of Cyberpower
Towards a Theory of Cyberpower Franklin Kramer, Stuart Starr, Larry Wentz, Eli Zimet CTNSP, NDU Dan Kuehl IRMC, NDU June, 2007 Agenda Context Goal, Objectives Framework Selected Observations Summary For
More informationSociety, the economy and the state depend on information and communications technology (ICT).
Society, the economy and the state depend on information and communications technology (ICT). We have witnessed the accelerated development of an information society and the growing dependency on ICT in
More informationCSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010
PROFESSOR ABU BAKAR MUNIR FACULTY OF LAW UNIVERSITY OF MALAYA & ASSOCIATE PROFESSOR SITI HAJAR MOHD YASIN FACULTY OF LAW UNIVERSITI TEKNOLOGI MARA CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE 26-27 OCTOBER
More information10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM)
European Council on Defence 2013 Priorities and Perspectives Brigadier General Walter Huhn walter.huhn@eeas.europa.eu 10 years of CSDP achievements CSDP missions & operations 10 years young Total: 28 missions,
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationResolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]
United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30
More informationValérie Andrianavaly European Commission DG INFSO-A3
Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationCEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence
CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence Dr. Artūras Petkus Head of Strategic Analysis and Research Division NATO Energy Security Centre of Excellence Framework
More informationCyberspace Security Threats Evaluation System of the Republic of Poland
Cyberspace Security Threats Evaluation System of the Republic of Poland Joanna Śliwa, Przemysław Bereziński, Rafał Piotrowski Ul. Warszawska 22A 05-130 Zegrze POLAND {j.sliwa, p.berezinski, r.piotrowski}@wil.waw.pl
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationProtecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition
VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationCORPORATE PRESENTATION
CORPORATE PRESENTATION SUMMARY Our mission and vision 4 Our values Our figures 4 5 Organisation chart Areas of Activity Defence and Security Space Transport Public Administration ICT Energy 6 8 Ingeniería
More informationCyber Security Beyond 2020
Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.
More informationDr. Stephanie Carter CISM, CISSP, CISA
Dr. Stephanie Carter CISM, CISSP, CISA Learning Objectives (LO) LO1 Will learn the theological and practitioner definition of cybersecurity LO2 Will learn the dependency between physical and cyber security
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), General appreciation of the issues of information security The
More informationRethinking Information Security Risk Management CRM002
Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design
More informationDefence, Safety and Security
Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts
More information5972/17 GT/cb 1 DG G 3 C
Council of the European Union Brussels, 9 February 2017 (OR. en) 5972/17 ESPACE 7 RECH 31 COMPET 75 IND 28 EU-GNSS 6 TRANS 46 TELECOM 30 MI 103 EMPL 49 CSDP/PSDC 57 CFSP/PESC 93 NOTE From: To: Subject:
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationPerspectives on Cyber Operations
ITA JOINT OPERATIONAL CYBER COMMAND (JOCC) Perspectives on Cyber Operations Rome, 25 th March 2019 BG (AF) Francesco VESTITO JOCC Commander SITUATION DPCM 17 th Feb. 2017 National strategy for cyber security
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationA New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO
A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information
More informationPanelists. Moderator: Dr. John H. Saunders, MITRE Corporation
SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationCyber Security Incident Response Fighting Fire with Fire
Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationThe Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation
The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationCooperation has been established between the EU and NATO staffs with regard to strategic communication. Between now and mid-2017, they will:
Common set of proposals for the implementation of the Joint Declaration by the President of the European Council, the President of the European Commission and the Secretary General of the North Atlantic
More informationDelegations will find in an Annex a non-paper of the Presidency.
Council of the European Union Brussels, 9 February 2016 (OR. en) 5797/16 CYBER 9 RELEX 78 JAIEX 12 TELECOM 12 COPS 35 NOTE From: To: Subject: Presidency Delegations Non-paper: Developing a joint EU diplomatic
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationCybersecurity Package
Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT
More informationEUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity
EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context
More informationEISAS Enhanced Roadmap 2012
[Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationInformation sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3
Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and
More informationSPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES
10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016 SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel Interdisciplinary Cyber Research Center, Tel Aviv University
More informationBetween 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.
Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009
More informationWorkshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support
Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationRisk-Based Cyber Security for the 21 st Century
Risk-Based Cyber Security for the 21 st Century 7 th Securing the E-Campus Dartmouth College July 16, 2013 Dr. Ron Ross Computer Security Division Information Technology Laboratory NATIONAL INSTITUTE OF
More informationUnderstanding the Changing Cybersecurity Problem
Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1 About About me - Specialise in information security strategy, architecture, and
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationEuropean Directives and reglements for Information security
Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,
More informationDevelopments in the field of information and
United Nations General Assembly Distr.: General 3 July 2001 English Original: English/Spanish A/56/164 Fifty-sixth session Item 81 of the preliminary list* Developments in the field of information and
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationRUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence
RUAG Cyber Security Training Range & Attack Simulation Peter Hladký Senior Cyber Security Specialist RUAG Defence What is the current state of affairs? (In Cyber Security) 2 RUAG Defence 02.12.2016 Recent
More informationCommittee on Foreign Affairs. on space capabilities for European security and defence (2015/2276(INI))
European Parliament 2014-2019 Committee on Foreign Affairs 2015/2276(INI) 25.1.2016 DRAFT REPORT on space capabilities for European security and defence (2015/2276(INI)) Committee on Foreign Affairs Rapporteur:
More information*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***
Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship
More informationDual use Actions at EU level in support of SMEs, clusters & regions
Dual use Actions at EU level in support of SMEs, clusters & regions 68 th Dual-use co-ordination Group (DUCG) Meeting Brussels 9 November 2017 Paul Anciaux European Commission, DG GROW ENTR GROW Fi.4 Structure
More informationTHE CYBER SECURITY ENVIRONMENT IN LITHUANIA
Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit
More informationCONE 2019 Project Proposal on Cybersecurity
CONE 2019 Project Proposal on Cybersecurity Project title: Comprehensive Cybersecurity Platform for Bangladesh and its Corporate Environments Sector or area: Cybersecurity for IT, Communications, Transportation,
More informationMs. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations
Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationThe role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group
The role of COP/ITU on international level Dr Ibrahim Al dabal chair of child on line council working group I nformation & I nternational C ommunication T elecommunication T echnologies U nion WHO WE
More information