Cybersecurity for Tokyo 2020
|
|
- Gertrude Carroll
- 5 years ago
- Views:
Transcription
1 Cybersecurity for Tokyo 2020 June 2017 Ko IKAI Counsellor National Center of Incident Readiness and Strategy for Cybersecurity Cabinet Secretariat Government of JAPAN
2 Upcoming Major Events Rugby World Cup 2019 September 20 to November 2, 2019 Games of the XXXII Olympiad July 24 to August 9, 2020 XVI Paralympic Games August 25 to September 5, 2020 Tokyo was selected to the host city of the XXXII Olympiad at the 125 th IOC Session in Buenos Aires on September 7, 2013 Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 1
3 Rugby World Cup 2019 Location of the 12 stadia to host rugby matches at the 2019 From WikiPedia Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 2
4 Tokyo 2020 Olympic/Paralympic Games From Olympic Committee Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 3
5 Overview of Tokyo 2020 and its circumstances Asset owners ( prime responsibility holders) People(including audience and foreign tourists) Mission owners ( prime responsible coordinator) National government Critical Infrastructure Operators (Local/National) government Society Infrastructure / Public services Partners Suppliers Contractors (Local/National) government TOCOG / IOC Services / Supplies / Venues The Olympic/ Paralympic Games TOCOG
6 Essential Services vs. Critical Infrastructures Critical Infrastructures (identified in 3 rd Basic Policy for CIIP) Information & Communication Financial Aviation Railroad Electric power supply Gas supply Gov t & Admin services (incl. municipal gov ts) Medical Water Logistics Chemical Industries Credit Card Petroleum industries Essential Services (for operation of Olympic/ Paralympic Games) Telecommunication Broadcasting Financial Aviation Railway Electric power Gas Local Government Water System Logistics Credit Card Sewerage Airport Traffic Control (Air, Vessel, Road) Emergency Call (Police, Ambulance, Fire defense) Weather forecast CIQ Expressway (esp. Shuto expwy) Heat supply About 100 service providers (private companies, public companies, local governments, nat l government) Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 5 5
7 Cybersecurity measures based on RA Estabishment of IR structure Cybersecurity Measures for Tokyo 2020 Olympic/Paralympic Games Government of Japan promotes cybersecurity measures of essential service providers for the Games based on risk assessment 東京都オリンピック パラリンピック競技大会推進本部セキュリティ幹事会の下に and discusses to establish Governmental Olympic/Paralympic NISCが事務局となりサイバーセキュリティワーキングチームを設置 これまでに会合を CSIRT as a core organization of information 7 回開催 sharing し 2020 年東京オリンピック パラリンピック競技大会の among stake holders. ( 以降 東京大会 という ) サイバーセキュリティの確保に資する具体的な施策について精力的に検討を推進 Summary of measures Promotion of cybersecurity measures based on risk assessment(ra) (for appropriate preparation) Establishment of incident response(ir) structure (for quick and precise responses against incidents) Establishment of guidance for self-ra to secure safe and continuous provision of services. Listing-up of essential service providers(esps) that can affect Games operation. Request for ESPs to conduct self-ra to promote their cybersecurity measures. ESPs conducted their self-ra during Oct.-Dec About 70 ESPs reported their result. NISC will request the 2nd self-ra during Aug-Oct Discussion Group for Cybersecurity Structure of Tokyo 2020 discussed details of information sharing and agreed the fundamental policy. Sent liaisons for G7 Ise-Shima Summit and Rio2016 Olympic/Paralympic Games as large-scale test events and conducted trial operation of the information sharing structure. Continuous discussion of building IT systems for more streamlined information sharing among stakeholders FY2015 FY2016 FY2017 FY2018 FY2019 FY2020 Listing-up of essential services coordination Drafting of RA procedure Continuous revision Continuous revision Risk assessment by chosen service providers (repeated assessment until Tokyo 2020) Cybersecurity measure based on RA Discussion of IR supports Discussion of cybersecurity structure Discussion of info-sharing Coordination among stakeholders Establishment of Olympic/Paralympic CSIRT Trial operation Operation in the Game time Trial operation of Info-sharing structure (preliminary exercises) Exercises and trainings G7 Summit Rio2016 today Pyeonchang2018 Rugby World Cup in Japan Tokyo2020 6
8 Cybersecurity Situations in Rio2016 Olympic/Paralympic Games In spite of a lot of cyber-attacks against related sites, there were NO incidents affecting Games operation. NISC s activities during Games time NISC sent two liaisons to Technical Operation Center(TOC) of Rio 2016 Organizing Committee of Olympic/Paralympic Games(ROCOG) HQ. They watched the actual situations with shadowing TOC s information security managers, and provided threat intelligence found by NISC and cybersecurity community of Japan. Rio2016 NISC liaison NISC (Intelligence integration) Inforsharing Inforsharing Cybersecurity Community in Japan Situations in Rio2016 A lot of cyber attacks, such as DDoS and web scan, against official and related websites were identified. Information of some websites was bleached. In official website/mobile app, 40 million cyber threats were identified, 23 million threats were blocked and 223 major DDoS attacks were mitigated, during Olympic Games. Targets moved from Games relates websites to surrounding websites such as federal/local government s ones. Most of identified attacks were noticed and announced in SNS and other media. Just after the opening ceremony, the peak of attacks came, but it didn t affect operations because of good preparation. <Transition of targets during Games time> Organizations related to the Games Rio2016 Official websites BOC/BPC websites <TOC, Rio2016 HQ> Federal/Local government Private companies that worked for the Games Rio2016 portal website of Federal Government The website of Federal Ministry of Sports Websites of Rio State/City government Websites of constructor of Games venue Lessons learned from Rio2016 and Brazilian government will be reflected in the cybersecurity preparations of Tokyo2020 7
9 Meetings Tokyo2020 Risk assessment for Tokyo 2020 Olympic/Paralympic Games Based on London2012 s practices, NISC promotes risk assessment for safe and continuous provision of essential services for Tokyo NISC requested service providers that can affect the Games operation to perform their self assessment. Abstract NISC provided the guideline to identify, analyze and assess security risks to promote risk management. Based on regulators cooperation, NISC identified essential service providers(esps) that can affect Games operation, and requested them to perform the assessment. Several assessments are planned until Expanding of service providers Brushing-up of the procedure and risk scenarios Current state <Risk Assessment #1> ESPs in Tokyo 23 wards performed RA #1. Reports from about 70 ESPs Many ESPs conducted the self-ra in cross-sectional manner under their management. Meetings for explanation and experience sharing Supports from the expert of London2012 <Future plan> Preparation and improvement for RA #2 Revision of the guideline Expansion of ESPs Geographical and sectorial Clarifying the required service level for the Games by close cooperation with TOCOG Continuous discussion with ESPs Cooperation with measures for physical security #1 #2 #3 #4~ FY2016 3Q Tokyo 23 wards 内容 FY2017 2Q Tokyo capital area FY2018 1Q Tokyo and local cities General explanation meeting Meetings with ESPs Fy2018 Q4 Tokyo and local cities Fy2016 FY2017 FY2018 FY2019 FY2020 #1 #2 #3 #4 #5 #6 Measures #1 Measures #2 Risk assessment schedule for Tokyo2020 Schedule of Risk Assessment #1 FY2016 1Q 2Q 3Q 4Q Selection of service providers (NISC, regulating authorities) Drafting of risk assessment procedure (NISC) Risk Assessment (service providers) Risk handlings (service providers) Result report and Preparation of #2(NISC) Sector Based meeting 8
10 Cybersecurity Stakeholders of Tokyo 2020 Games (TBR) CIE Regulators Critical Infrastructure Entities(CIE) Partners Suppliers Tokyo Metropolitan Government CSIRT Cybersecurity Community NISC Governmental Olympic/Paralympic CSIRT Tokyo Organizing Committee for Olympic/Paralympic Games CIRT2020 National government TOCOG Local government Private entities Organizations To be established Security Intelligence Center Law Enforcement Agencies Intelligence Agencies 9
11 Challenges Collaboration with physical security measures/organizations Combined discussion bodies Facilitating the streamlined information sharing among domestic/foreign stakeholders Modernized info-sharing systems Establishment of face-to-face trusty relationship Securing appropriate human resources for preparation and incident response during the Games time Trainings and exercises 10
12 Thank you for your patience Ko IKAI 11
Summary of the Cybersecurity Policy for CIP (4th Edition)
Summary of the Cybersecurity Policy for CIP (4th Edition) April 18, 2017 Published July 25, 2018 Revised 1 Purpose of the Cybersecurity Policy for CIP (4 th Edition) ( this Cybersecurity Policy ) Promotion
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationCybersecurity Strategy in Japan
Cybersecurity Strategy in Japan April 24, 2017 Tomoo YAMAUCHI Counsellor National center of Incident readiness and Strategy for Cybersecurity (NISC) Cabinet Secretariat, Government of JAPAN 3 Words to
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationIP Strategy of HITACHI
IP Strategy of HITACHI *IP: Intellectual Property April 7, 2005 Hitachi, Ltd. Executive Officer, General Manager of Intellectual Property Group Yasuo Sakuta 1 Contents 1 2 3 4 Basic Policy & Organization
More informationJR SHIKOKU_Wi Fi Connection Guide
JR SHIKOKU_Wi Fi Connection Guide Ver1.0 June, 2018 Procedure to connect JR SHIKOKU_Station_Wi Fi Wireless LAN info SSID :JR SHIKOKU_Station_Wi Fi IP Address: Acquired automatically DNS Address:Acquired
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationConstruction Sector & CALS/EC in Japan. Asian IT Forum for Construction Industry Tokyo 28 Jan Kamoto JACIC
Construction Sector & CALS/EC in Japan Asian IT Forum for Construction Industry Tokyo 28 Jan. 2006 Kamoto JACIC 1. Overview of Japanese Construction sector 2. e-government and CALS/EC in the field of Public
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationU.S. Department of Homeland Security Office of Cybersecurity & Communications
U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure
More information携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones
携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 1. Z-01K の SAR / About SAR of Z-01K ( 本語 ) この機種 Z-01K の携帯電話機は 国が定めた電波の 体吸収に関する技術基準および電波防護の国際ガイドライン に適合しています この携帯電話機は 国が定めた電波の 体吸収に関する技術基準
More informationCSIRT Models in Japanese Large Companies
CSIRT Models in Japanese Large Companies Toshio NAWA Cyber Defense Institute, Inc. 1 Do you know the real Japan? 2 AGENDA 1. Cyber Security Threats in Japan 2. Efforts Against Cyber Security Threats in
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationEmergency Management Response and Recovery. Mark Merritt, President September 2011
Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationThe Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation
The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More information携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones
携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 1. SC-02L の SAR / About SAR of SC-02L ( 本語 ) この機種 SC-02L の携帯電話機は 国が定めた電波の 体吸収に関する技術基準および電波防護の国際ガイドライ ンに適合しています この携帯電話機は 国が定めた電波の 体吸収に関する技術基準
More informationAnalysis on the Multi-stakeholder Structure in the IGF Discussions
Voicemail & FAX +1-650-653-2501 +81-3-4496-6014 m-yokozawa@i.kyoto-u.ac.jp http://yokozawa.mois.asia/ Analysis on the Multi-stakeholder Structure in the IGF 2008-2013 Discussions February 22, 2014 Shinnosuke
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationGPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security
GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection
More informationCo-Creation in the 5G era
Tomorrow s Operator Summit@MWCS2018 2018 NTT DOCOMO, INC. All Rights Reserved. 1 Co-Creation in the 5G era Lan CHEN President and CEO, DOCOMO Beijing Labs 28 th, June, 2018 Transformation ドコモのめざす世界 into
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationFinancial Results for the Three Months Ended June 30, August 4, 2017
Financial Results for the Three Months Ended June 30, 2017 August 4, 2017 The forward-looking statements and projected figures concerning the future performance of NTT and its subsidiaries and affiliates
More informationNIS-Directive and Smart Grids
NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements
More informationFinancial Results for the Three Months Ended June 30, August 4, 2017
Financial Results for the Three Months Ended June 30, 2017 August 4, 2017 The forward-looking statements and projected figures concerning the future performance of NTT and its subsidiaries and affiliates
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationHow to communicate with your government - Lessons from Japan -
How to communicate with your government - Lessons from Japan - Dr. Suguru Yamaguchi JPCERT/CC Japan Summary CSIRT can be a good liaison between government and industries. Cybersecurity is emerging in various
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationDrinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012
Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the
More informationCIIP Guidelines Ver.3.0
CIIP Guidelines Ver.3.0 The 9th ASEAN-Japan Information Security Policy Meeting October 20 th, 2016 Contents Introduction... 4 1. Outline/Overview... 4 1-1 Purpose of the guidelines... 4 1-2 Intended users...
More informationPromoting Quality Infrastructure Investment in Africa
Promoting Quality Infrastructure Investment in Africa Yuji SUDO Assistant Vice-Minister, Minister's Secretariat Ministry of Land, Infrastructure, Transport and Tourism (MLIT) 25 July, 2017 Tokyo, Japan
More informationStakeholders Analysis
Stakeholders Analysis Introduction National Stakeholders ISP citizens CNIIP Media National CIRT Academia ONG, Public And Private Institutions sectoral CSIRTs Law enforcement 2 2 CIRT ISP A specialized
More informationInformation Security Policies in Japan
Information Security Policies in Japan Towards a safe and secure network infrastructure Fumiaki TAKAHASHI Director, ICT Security Office, Information and Communications Policy Bureau, Ministry of Internal
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationIntroduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps
Introduction to Global Inter-Cloud Technology Forum () and its Roadmaps Dec. 10, 2009 Hiroshi Sakai, secretariat (NTT Information Sharing Platform Laboratories) 1 : A technology forum for the Inter-cloud
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationDisaster Management (DM) Program Overview
Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationPeering 101. August 2017 TPF. Walt Wollny, Director Interconnection Strategy Hurricane Electric AS6939
Peering 101 August 2017 TPF Walt Wollny, Director Interconnection Strategy Hurricane Electric AS6939 Who is Walt Wollny? Hurricane Electric AS6939 3 years Director Interconnection Strategy supporting the
More informationYamaha Steinberg USB Driver V for Mac Release Notes
Yamaha Steinberg USB Driver V1.10.2 for Mac Release Notes Contents System Requirements for Software Main Revisions and Enhancements Legacy Updates System Requirements for Software - Note that the system
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationJapan s Cyber Diplomacy
Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure
More informationUpdates to the NIST Cybersecurity Framework
Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationEnhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert
Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information
More informationEmergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:
Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationHomeland Security Perspective on Modeling and Simulation (M&S)
Homeland Security Perspective on Modeling and Simulation (M&S) From Science.Security From Technology.Trust George R. Ryan Director T&E / Standards 2 How is M&S used for Homeland Security? Current Capabilities
More informationCreating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular
Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationUnited States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS
United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS UTILITY CYBER SECURITY INITIATIVE (UCSI) CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2) ASSESSMENT FOR THE
More informationThe Next Frontier in Medical Device Security
The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA
More information1. Advice, coordination, and other assistance
The information and communications services network and environment are bringing about changes in industry structure and every aspect of people s lives, as seen in the enhancement of the broadband communications
More informationHitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers
302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationFundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More informationDHS Election Task Force Updates. Geoff Hale, Elections Task Force
1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationPromoting Quality Infrastructure Investment
Promoting Quality Infrastructure Investment - Japan s contribution to infrastructure development - Mitsutoshi Kajikawa Director, Development Policy Division Ministry of Finance, Japan 1 Quality Infrastructure
More informationAY2018 New Edition (Released on September 1, 2018) Research Integrity e-learning Course Manual
AY2018 New Edition (Released on September 1, 2018) Research Integrity e-learning Course Manual For Faculty/Staff Members, Graduate Students, and JSPS Research Fellows 1 Login Open the login page below.
More informationCyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB
Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationIntegrated Consortium of Laboratory Networks (ICLN)
Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps
More informationEnergy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials
+ NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National
More informationISA99 - Industrial Automation and Controls Systems Security
ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationTransportation Security Planning in British Columbia David Morhart, Deputy Solicitor General
Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s
More information