Hybrid Cyber Warfare, dual risks?

Size: px
Start display at page:

Download "Hybrid Cyber Warfare, dual risks?"

Transcription

1 Hybrid Cyber Warfare, dual risks? Cologne - 26/04/2017 ing. Giuseppe G. Zorzino ERMCP, CISA, CISM, CGEIT, CRISC, LA ISO27001

2 Bio Giuseppe Giovanni Zorzino Teacher and consultant of information security, currently I deal with cyberstrategies, security management systems, governance and organization information security, privacy, compliance and awareness. More than 35 years of experience in the IT industry which more than 15 on IT security. Italian Air Force Academy, Official (ret) of the Air Force Corps of Engineers. Cybersecurity coordinator of CESMA (Military Aeronautical Studies Center) "Giulio Douhet". Member of IT Security Committee of Engineer Council of Rome, as well as ISACA Rome Chapter and ISC2 Italian Chapter. Extensive educational activity at public authorities and SMEs. 2 patents. Active certifications: ERMCP, CISA, CISM, CGEIT, CRISC, Lead Auditor ISO 27001, Security+, CMMI appr, MCSASec 2003, Certificatore etico, IBM Cert Solution Architect, IBM_Cert_Specialist, 26/04/2017 Hybrid Cyber Warfare, dual risks? 2

3 CESMA Acronym of Centro Studi Militari Aeronautici Giulio Douhet, a non profit Think Tank of the Italian Air Force Association. Mission: to contribute to the diffusion of the Aerospace and Defence culture in Aerospace and Defence, both within Italy and internationally; to make studies, exchange ideas and discuss the trends of Defence and Aerospace, making a common space available to all Stakeholders (Air Force, Civil Aviation, Italian Space Agency, Air Component of the other Armed Forces, Industry, Academia, International and European Organizations) Vision: to be widely recognized, at the European and International level, as value providers for all the stakeholders and for the Italian nation. CESMA has organized and organize several workshops and lectures on UAVs, Space, History of the Italian Air Force, Military Ethics, Cyber, etc. 26/04/2017 Hybrid Cyber Warfare, dual risks? 3

4 WG: "Cyber Hybrid Warfare and the aerospatial power: risks and opportunities" AGENDA Hybrid and Strategy Hybrid and Doctrine Hybrid and Satellite systems Hybrid and EW Hybrid and the NATO view Hybrid and Psychology Hybrid and Awareness Hybrid and Legal The work will be published in the next months, please ask to 26/04/2017 Hybrid Cyber Warfare, dual risks? 4

5 Hybrid threats Hybrid is the new "buzzword" in the military field It is not obvious appearance of an asymmetric conflict No established doctrine, so there are no elements that allow a Commander to develop its campaign operations Exploitation of vulnerabilities on the target, using conventional and unconventional methods, to generate ambiguity to hinder decision-making processes generate surprise; seize the initiative; generate deception and ambiguity; avoid attribution of action; maximize deniability of responsibility for aggressive actions. 26/04/2017 Hybrid Cyber Warfare, dual risks? 5

6 Cyber threats Cyber threats resemble threats in the fifth dimension of warfare, as cyber warfare is often termed, and refer to a sustained campaign of concerted cyber operations against the IT (Sacha Bachman) Cyberspace is an enabler correlated with Air and Space, and not only It is an actual and concerning trend the use of cyber capabilities related with military of hybrid operations: the so-called "cyber dimension of Hybrid Warfare" Two perspectives: taking advantage of the opportunities of cyberspace as a domain for free, fast and effective communication use of cyberspace as an attack on warfare domain 26/04/2017 Hybrid Cyber Warfare, dual risks? 6

7 Risks military side Hybrid is the dark reflection of our comprehensive approach. We use a combination of military and non-military means to stabilize countries. Others use it to destabilize them. (Stoltenberg) Hybrid Warfare as integration of tools, techniques, tactics, and procedures, conventional and un-conventional methods, use of regular forces and irregular, in a context of symmetrical and asymmetrical conflict, to gain strategic or tactical advantage, inflict damage and loss to the adversary, at minimal cost Un-conventional warfare = integration of various dimensions, not last the information dimension This is "Unrestricted warfare", "War beyond limits", as Chinese analysts indicate the integrated use of all the strength expressions of a nation 26/04/2017 Hybrid Cyber Warfare, dual risks? 7

8 Risks civilian side In June 2015 the European Council recalled the need to mobilize EU instruments to help counter hybrid threats. EU Commission - "Joint Framework on countering hybrid threats, a European Union response", Brussels, "While definitions of hybrid threats vary and need to remain flexible to respond to their evolving nature, the concept aims to capture the mixture of coercive and subversive activity, conventional and unconventional methods (i.e. diplomatic, military, economic, technological), which can be used in a coordinated manner by state or non-state actors to achieve specific objectives while remaining below the threshold of formally declared warfare." Many EU Member States face common threats, which can also target crossborder networks or infrastructures (SCADA) "How France's TV5 was almost destroyed by " "Cyberattack on a German steel-mill" Air Traffic control.. 26/04/2017 Hybrid Cyber Warfare, dual risks? 8

9 Opportunities Hybrid warfare strategy cooperation NATO with EU (Warsaw 2016) Threats reconnaissance National resilience of Critical Infrastructure and (Air) Defence Systems Rapid assessment and decision making National capabilities Fill the technology gaps with the industrial cooperation Improve application of IT standards (ISO27001, NIST Framework, ISO31000) Governance Threats management Consequence management No practical legal framework just to Tallinn Manual 2.0 Action 12: The Commission, in coordination with Member States, will work together with industry within the context of a contractual Public Private Partnership for cybersecurity, to develop and test technologies to better protect users and infrastructures against cyber aspects of hybrid threats. 26/04/2017 Hybrid Cyber Warfare, dual risks? 9

10 Questions? 26/04/2017 Hybrid Cyber Warfare, dual risks? 10

Hybrid cyber warfare and the evolution of aerospace power: risks and opportunities 1

Hybrid cyber warfare and the evolution of aerospace power: risks and opportunities 1 Hybrid cyber warfare and the evolution of aerospace power: risks and opportunities 1 GRUPPO DI LAVORO CESMA HYBRID CYBER WARFARE With the support of Hybrid cyber warfare and the evolution of aerospace

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Training + Information Sharing: Pillars of enhancing cybersecurity posture Training + Information Sharing: Pillars of enhancing cybersecurity posture Welland Chu VP, Professional Development & Secretary ISACA China Hong Kong Chapter June 2018 www.isaca.org Reported cyber incidents

More information

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce Contact: Yoann Viaouet Position Paper of the ASD Civil Aviation Cybersecurity Taskforce April 2017 Content Executive Summary... 2 The need for a global cybersecurity framework: the role of ICAO... 3 The

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

Enhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence

Enhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence Enhancing Cooperative Energy Security NATO Energy Security Centre of Excellence NATO Hub on Energy Security Expertise The NATO Energy Security Centre of Excellence is an international hub on energy security

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Horizon 2020 Security

Horizon 2020 Security Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON

More information

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017 French-American Foundation Conference on cyber issues Opening remarks 25 October 2017 Général d armée aérienne Denis MERCIER 1 Ladies and gentlemen, It is a great honour and a personal pleasure for me

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

Role of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency

Role of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency Role of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency 4 December 2017, Ramat Gan, Israel 15th International Energy

More information

Emerging Security Challenges November 22, 2012, Baku

Emerging Security Challenges November 22, 2012, Baku Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

Towards a Theory of Cyberpower

Towards a Theory of Cyberpower Towards a Theory of Cyberpower Franklin Kramer, Stuart Starr, Larry Wentz, Eli Zimet CTNSP, NDU Dan Kuehl IRMC, NDU June, 2007 Agenda Context Goal, Objectives Framework Selected Observations Summary For

More information

Society, the economy and the state depend on information and communications technology (ICT).

Society, the economy and the state depend on information and communications technology (ICT). Society, the economy and the state depend on information and communications technology (ICT). We have witnessed the accelerated development of an information society and the growing dependency on ICT in

More information

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010 PROFESSOR ABU BAKAR MUNIR FACULTY OF LAW UNIVERSITY OF MALAYA & ASSOCIATE PROFESSOR SITI HAJAR MOHD YASIN FACULTY OF LAW UNIVERSITI TEKNOLOGI MARA CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE 26-27 OCTOBER

More information

10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM)

10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM) European Council on Defence 2013 Priorities and Perspectives Brigadier General Walter Huhn walter.huhn@eeas.europa.eu 10 years of CSDP achievements CSDP missions & operations 10 years young Total: 28 missions,

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)] United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence

CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence Dr. Artūras Petkus Head of Strategic Analysis and Research Division NATO Energy Security Centre of Excellence Framework

More information

Cyberspace Security Threats Evaluation System of the Republic of Poland

Cyberspace Security Threats Evaluation System of the Republic of Poland Cyberspace Security Threats Evaluation System of the Republic of Poland Joanna Śliwa, Przemysław Bereziński, Rafał Piotrowski Ul. Warszawska 22A 05-130 Zegrze POLAND {j.sliwa, p.berezinski, r.piotrowski}@wil.waw.pl

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

CORPORATE PRESENTATION

CORPORATE PRESENTATION CORPORATE PRESENTATION SUMMARY Our mission and vision 4 Our values Our figures 4 5 Organisation chart Areas of Activity Defence and Security Space Transport Public Administration ICT Energy 6 8 Ingeniería

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

Dr. Stephanie Carter CISM, CISSP, CISA

Dr. Stephanie Carter CISM, CISSP, CISA Dr. Stephanie Carter CISM, CISSP, CISA Learning Objectives (LO) LO1 Will learn the theological and practitioner definition of cybersecurity LO2 Will learn the dependency between physical and cyber security

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), General appreciation of the issues of information security The

More information

Rethinking Information Security Risk Management CRM002

Rethinking Information Security Risk Management CRM002 Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design

More information

Defence, Safety and Security

Defence, Safety and Security Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts

More information

5972/17 GT/cb 1 DG G 3 C

5972/17 GT/cb 1 DG G 3 C Council of the European Union Brussels, 9 February 2017 (OR. en) 5972/17 ESPACE 7 RECH 31 COMPET 75 IND 28 EU-GNSS 6 TRANS 46 TELECOM 30 MI 103 EMPL 49 CSDP/PSDC 57 CFSP/PESC 93 NOTE From: To: Subject:

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Perspectives on Cyber Operations

Perspectives on Cyber Operations ITA JOINT OPERATIONAL CYBER COMMAND (JOCC) Perspectives on Cyber Operations Rome, 25 th March 2019 BG (AF) Francesco VESTITO JOCC Commander SITUATION DPCM 17 th Feb. 2017 National strategy for cyber security

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

H2020 WP Cybersecurity PPP topics

H2020 WP Cybersecurity PPP topics Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Cooperation has been established between the EU and NATO staffs with regard to strategic communication. Between now and mid-2017, they will:

Cooperation has been established between the EU and NATO staffs with regard to strategic communication. Between now and mid-2017, they will: Common set of proposals for the implementation of the Joint Declaration by the President of the European Council, the President of the European Commission and the Secretary General of the North Atlantic

More information

Delegations will find in an Annex a non-paper of the Presidency.

Delegations will find in an Annex a non-paper of the Presidency. Council of the European Union Brussels, 9 February 2016 (OR. en) 5797/16 CYBER 9 RELEX 78 JAIEX 12 TELECOM 12 COPS 35 NOTE From: To: Subject: Presidency Delegations Non-paper: Developing a joint EU diplomatic

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Cybersecurity Package

Cybersecurity Package Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT

More information

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3 Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and

More information

SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES

SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES 10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016 SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel Interdisciplinary Cyber Research Center, Tel Aviv University

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Risk-Based Cyber Security for the 21 st Century

Risk-Based Cyber Security for the 21 st Century Risk-Based Cyber Security for the 21 st Century 7 th Securing the E-Campus Dartmouth College July 16, 2013 Dr. Ron Ross Computer Security Division Information Technology Laboratory NATIONAL INSTITUTE OF

More information

Understanding the Changing Cybersecurity Problem

Understanding the Changing Cybersecurity Problem Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1 About About me - Specialise in information security strategy, architecture, and

More information

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

European Directives and reglements for Information security

European Directives and reglements for Information security Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,

More information

Developments in the field of information and

Developments in the field of information and United Nations General Assembly Distr.: General 3 July 2001 English Original: English/Spanish A/56/164 Fifty-sixth session Item 81 of the preliminary list* Developments in the field of information and

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

RUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence

RUAG Cyber Security Training Range & Attack Simulation. Peter Hladký Senior Cyber Security Specialist RUAG Defence RUAG Cyber Security Training Range & Attack Simulation Peter Hladký Senior Cyber Security Specialist RUAG Defence What is the current state of affairs? (In Cyber Security) 2 RUAG Defence 02.12.2016 Recent

More information

Committee on Foreign Affairs. on space capabilities for European security and defence (2015/2276(INI))

Committee on Foreign Affairs. on space capabilities for European security and defence (2015/2276(INI)) European Parliament 2014-2019 Committee on Foreign Affairs 2015/2276(INI) 25.1.2016 DRAFT REPORT on space capabilities for European security and defence (2015/2276(INI)) Committee on Foreign Affairs Rapporteur:

More information

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Introduction and Bio CyberSecurity Defined CyberSecurity Risks NIST CyberSecurity Framework References *** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Chapter 3. Framework Implementation Relationship

More information

Dual use Actions at EU level in support of SMEs, clusters & regions

Dual use Actions at EU level in support of SMEs, clusters & regions Dual use Actions at EU level in support of SMEs, clusters & regions 68 th Dual-use co-ordination Group (DUCG) Meeting Brussels 9 November 2017 Paul Anciaux European Commission, DG GROW ENTR GROW Fi.4 Structure

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

CONE 2019 Project Proposal on Cybersecurity

CONE 2019 Project Proposal on Cybersecurity CONE 2019 Project Proposal on Cybersecurity Project title: Comprehensive Cybersecurity Platform for Bangladesh and its Corporate Environments Sector or area: Cybersecurity for IT, Communications, Transportation,

More information

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group The role of COP/ITU on international level Dr Ibrahim Al dabal chair of child on line council working group I nformation & I nternational C ommunication T elecommunication T echnologies U nion WHO WE

More information