Cybersecurity for Tokyo 2020

Size: px
Start display at page:

Download "Cybersecurity for Tokyo 2020"

Transcription

1 Cybersecurity for Tokyo 2020 June 2017 Ko IKAI Counsellor National Center of Incident Readiness and Strategy for Cybersecurity Cabinet Secretariat Government of JAPAN

2 Upcoming Major Events Rugby World Cup 2019 September 20 to November 2, 2019 Games of the XXXII Olympiad July 24 to August 9, 2020 XVI Paralympic Games August 25 to September 5, 2020 Tokyo was selected to the host city of the XXXII Olympiad at the 125 th IOC Session in Buenos Aires on September 7, 2013 Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 1

3 Rugby World Cup 2019 Location of the 12 stadia to host rugby matches at the 2019 From WikiPedia Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 2

4 Tokyo 2020 Olympic/Paralympic Games From Olympic Committee Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 3

5 Overview of Tokyo 2020 and its circumstances Asset owners ( prime responsibility holders) People(including audience and foreign tourists) Mission owners ( prime responsible coordinator) National government Critical Infrastructure Operators (Local/National) government Society Infrastructure / Public services Partners Suppliers Contractors (Local/National) government TOCOG / IOC Services / Supplies / Venues The Olympic/ Paralympic Games TOCOG

6 Essential Services vs. Critical Infrastructures Critical Infrastructures (identified in 3 rd Basic Policy for CIIP) Information & Communication Financial Aviation Railroad Electric power supply Gas supply Gov t & Admin services (incl. municipal gov ts) Medical Water Logistics Chemical Industries Credit Card Petroleum industries Essential Services (for operation of Olympic/ Paralympic Games) Telecommunication Broadcasting Financial Aviation Railway Electric power Gas Local Government Water System Logistics Credit Card Sewerage Airport Traffic Control (Air, Vessel, Road) Emergency Call (Police, Ambulance, Fire defense) Weather forecast CIQ Expressway (esp. Shuto expwy) Heat supply About 100 service providers (private companies, public companies, local governments, nat l government) Copyright (c) 2017 National center of Incident readiness and Strategy for Cybersecurity (NISC). All Rights Reserved. 5 5

7 Cybersecurity measures based on RA Estabishment of IR structure Cybersecurity Measures for Tokyo 2020 Olympic/Paralympic Games Government of Japan promotes cybersecurity measures of essential service providers for the Games based on risk assessment 東京都オリンピック パラリンピック競技大会推進本部セキュリティ幹事会の下に and discusses to establish Governmental Olympic/Paralympic NISCが事務局となりサイバーセキュリティワーキングチームを設置 これまでに会合を CSIRT as a core organization of information 7 回開催 sharing し 2020 年東京オリンピック パラリンピック競技大会の among stake holders. ( 以降 東京大会 という ) サイバーセキュリティの確保に資する具体的な施策について精力的に検討を推進 Summary of measures Promotion of cybersecurity measures based on risk assessment(ra) (for appropriate preparation) Establishment of incident response(ir) structure (for quick and precise responses against incidents) Establishment of guidance for self-ra to secure safe and continuous provision of services. Listing-up of essential service providers(esps) that can affect Games operation. Request for ESPs to conduct self-ra to promote their cybersecurity measures. ESPs conducted their self-ra during Oct.-Dec About 70 ESPs reported their result. NISC will request the 2nd self-ra during Aug-Oct Discussion Group for Cybersecurity Structure of Tokyo 2020 discussed details of information sharing and agreed the fundamental policy. Sent liaisons for G7 Ise-Shima Summit and Rio2016 Olympic/Paralympic Games as large-scale test events and conducted trial operation of the information sharing structure. Continuous discussion of building IT systems for more streamlined information sharing among stakeholders FY2015 FY2016 FY2017 FY2018 FY2019 FY2020 Listing-up of essential services coordination Drafting of RA procedure Continuous revision Continuous revision Risk assessment by chosen service providers (repeated assessment until Tokyo 2020) Cybersecurity measure based on RA Discussion of IR supports Discussion of cybersecurity structure Discussion of info-sharing Coordination among stakeholders Establishment of Olympic/Paralympic CSIRT Trial operation Operation in the Game time Trial operation of Info-sharing structure (preliminary exercises) Exercises and trainings G7 Summit Rio2016 today Pyeonchang2018 Rugby World Cup in Japan Tokyo2020 6

8 Cybersecurity Situations in Rio2016 Olympic/Paralympic Games In spite of a lot of cyber-attacks against related sites, there were NO incidents affecting Games operation. NISC s activities during Games time NISC sent two liaisons to Technical Operation Center(TOC) of Rio 2016 Organizing Committee of Olympic/Paralympic Games(ROCOG) HQ. They watched the actual situations with shadowing TOC s information security managers, and provided threat intelligence found by NISC and cybersecurity community of Japan. Rio2016 NISC liaison NISC (Intelligence integration) Inforsharing Inforsharing Cybersecurity Community in Japan Situations in Rio2016 A lot of cyber attacks, such as DDoS and web scan, against official and related websites were identified. Information of some websites was bleached. In official website/mobile app, 40 million cyber threats were identified, 23 million threats were blocked and 223 major DDoS attacks were mitigated, during Olympic Games. Targets moved from Games relates websites to surrounding websites such as federal/local government s ones. Most of identified attacks were noticed and announced in SNS and other media. Just after the opening ceremony, the peak of attacks came, but it didn t affect operations because of good preparation. <Transition of targets during Games time> Organizations related to the Games Rio2016 Official websites BOC/BPC websites <TOC, Rio2016 HQ> Federal/Local government Private companies that worked for the Games Rio2016 portal website of Federal Government The website of Federal Ministry of Sports Websites of Rio State/City government Websites of constructor of Games venue Lessons learned from Rio2016 and Brazilian government will be reflected in the cybersecurity preparations of Tokyo2020 7

9 Meetings Tokyo2020 Risk assessment for Tokyo 2020 Olympic/Paralympic Games Based on London2012 s practices, NISC promotes risk assessment for safe and continuous provision of essential services for Tokyo NISC requested service providers that can affect the Games operation to perform their self assessment. Abstract NISC provided the guideline to identify, analyze and assess security risks to promote risk management. Based on regulators cooperation, NISC identified essential service providers(esps) that can affect Games operation, and requested them to perform the assessment. Several assessments are planned until Expanding of service providers Brushing-up of the procedure and risk scenarios Current state <Risk Assessment #1> ESPs in Tokyo 23 wards performed RA #1. Reports from about 70 ESPs Many ESPs conducted the self-ra in cross-sectional manner under their management. Meetings for explanation and experience sharing Supports from the expert of London2012 <Future plan> Preparation and improvement for RA #2 Revision of the guideline Expansion of ESPs Geographical and sectorial Clarifying the required service level for the Games by close cooperation with TOCOG Continuous discussion with ESPs Cooperation with measures for physical security #1 #2 #3 #4~ FY2016 3Q Tokyo 23 wards 内容 FY2017 2Q Tokyo capital area FY2018 1Q Tokyo and local cities General explanation meeting Meetings with ESPs Fy2018 Q4 Tokyo and local cities Fy2016 FY2017 FY2018 FY2019 FY2020 #1 #2 #3 #4 #5 #6 Measures #1 Measures #2 Risk assessment schedule for Tokyo2020 Schedule of Risk Assessment #1 FY2016 1Q 2Q 3Q 4Q Selection of service providers (NISC, regulating authorities) Drafting of risk assessment procedure (NISC) Risk Assessment (service providers) Risk handlings (service providers) Result report and Preparation of #2(NISC) Sector Based meeting 8

10 Cybersecurity Stakeholders of Tokyo 2020 Games (TBR) CIE Regulators Critical Infrastructure Entities(CIE) Partners Suppliers Tokyo Metropolitan Government CSIRT Cybersecurity Community NISC Governmental Olympic/Paralympic CSIRT Tokyo Organizing Committee for Olympic/Paralympic Games CIRT2020 National government TOCOG Local government Private entities Organizations To be established Security Intelligence Center Law Enforcement Agencies Intelligence Agencies 9

11 Challenges Collaboration with physical security measures/organizations Combined discussion bodies Facilitating the streamlined information sharing among domestic/foreign stakeholders Modernized info-sharing systems Establishment of face-to-face trusty relationship Securing appropriate human resources for preparation and incident response during the Games time Trainings and exercises 10

12 Thank you for your patience Ko IKAI 11

Summary of the Cybersecurity Policy for CIP (4th Edition)

Summary of the Cybersecurity Policy for CIP (4th Edition) Summary of the Cybersecurity Policy for CIP (4th Edition) April 18, 2017 Published July 25, 2018 Revised 1 Purpose of the Cybersecurity Policy for CIP (4 th Edition) ( this Cybersecurity Policy ) Promotion

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

Cybersecurity Strategy in Japan

Cybersecurity Strategy in Japan Cybersecurity Strategy in Japan April 24, 2017 Tomoo YAMAUCHI Counsellor National center of Incident readiness and Strategy for Cybersecurity (NISC) Cabinet Secretariat, Government of JAPAN 3 Words to

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

IP Strategy of HITACHI

IP Strategy of HITACHI IP Strategy of HITACHI *IP: Intellectual Property April 7, 2005 Hitachi, Ltd. Executive Officer, General Manager of Intellectual Property Group Yasuo Sakuta 1 Contents 1 2 3 4 Basic Policy & Organization

More information

JR SHIKOKU_Wi Fi Connection Guide

JR SHIKOKU_Wi Fi Connection Guide JR SHIKOKU_Wi Fi Connection Guide Ver1.0 June, 2018 Procedure to connect JR SHIKOKU_Station_Wi Fi Wireless LAN info SSID :JR SHIKOKU_Station_Wi Fi IP Address: Acquired automatically DNS Address:Acquired

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

Construction Sector & CALS/EC in Japan. Asian IT Forum for Construction Industry Tokyo 28 Jan Kamoto JACIC

Construction Sector & CALS/EC in Japan. Asian IT Forum for Construction Industry Tokyo 28 Jan Kamoto JACIC Construction Sector & CALS/EC in Japan Asian IT Forum for Construction Industry Tokyo 28 Jan. 2006 Kamoto JACIC 1. Overview of Japanese Construction sector 2. e-government and CALS/EC in the field of Public

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones

携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 1. Z-01K の SAR / About SAR of Z-01K ( 本語 ) この機種 Z-01K の携帯電話機は 国が定めた電波の 体吸収に関する技術基準および電波防護の国際ガイドライン に適合しています この携帯電話機は 国が定めた電波の 体吸収に関する技術基準

More information

CSIRT Models in Japanese Large Companies

CSIRT Models in Japanese Large Companies CSIRT Models in Japanese Large Companies Toshio NAWA Cyber Defense Institute, Inc. 1 Do you know the real Japan? 2 AGENDA 1. Cyber Security Threats in Japan 2. Efforts Against Cyber Security Threats in

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Emergency Management Response and Recovery. Mark Merritt, President September 2011 Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones

携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 携帯電話の 吸収率 (SAR) について / Specific Absorption Rate (SAR) of Mobile Phones 1. SC-02L の SAR / About SAR of SC-02L ( 本語 ) この機種 SC-02L の携帯電話機は 国が定めた電波の 体吸収に関する技術基準および電波防護の国際ガイドライ ンに適合しています この携帯電話機は 国が定めた電波の 体吸収に関する技術基準

More information

Analysis on the Multi-stakeholder Structure in the IGF Discussions

Analysis on the Multi-stakeholder Structure in the IGF Discussions Voicemail & FAX +1-650-653-2501 +81-3-4496-6014 m-yokozawa@i.kyoto-u.ac.jp http://yokozawa.mois.asia/ Analysis on the Multi-stakeholder Structure in the IGF 2008-2013 Discussions February 22, 2014 Shinnosuke

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection

More information

Co-Creation in the 5G era

Co-Creation in the 5G era Tomorrow s Operator Summit@MWCS2018 2018 NTT DOCOMO, INC. All Rights Reserved. 1 Co-Creation in the 5G era Lan CHEN President and CEO, DOCOMO Beijing Labs 28 th, June, 2018 Transformation ドコモのめざす世界 into

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

Financial Results for the Three Months Ended June 30, August 4, 2017

Financial Results for the Three Months Ended June 30, August 4, 2017 Financial Results for the Three Months Ended June 30, 2017 August 4, 2017 The forward-looking statements and projected figures concerning the future performance of NTT and its subsidiaries and affiliates

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

Financial Results for the Three Months Ended June 30, August 4, 2017

Financial Results for the Three Months Ended June 30, August 4, 2017 Financial Results for the Three Months Ended June 30, 2017 August 4, 2017 The forward-looking statements and projected figures concerning the future performance of NTT and its subsidiaries and affiliates

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

How to communicate with your government - Lessons from Japan -

How to communicate with your government - Lessons from Japan - How to communicate with your government - Lessons from Japan - Dr. Suguru Yamaguchi JPCERT/CC Japan Summary CSIRT can be a good liaison between government and industries. Cybersecurity is emerging in various

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the

More information

CIIP Guidelines Ver.3.0

CIIP Guidelines Ver.3.0 CIIP Guidelines Ver.3.0 The 9th ASEAN-Japan Information Security Policy Meeting October 20 th, 2016 Contents Introduction... 4 1. Outline/Overview... 4 1-1 Purpose of the guidelines... 4 1-2 Intended users...

More information

Promoting Quality Infrastructure Investment in Africa

Promoting Quality Infrastructure Investment in Africa Promoting Quality Infrastructure Investment in Africa Yuji SUDO Assistant Vice-Minister, Minister's Secretariat Ministry of Land, Infrastructure, Transport and Tourism (MLIT) 25 July, 2017 Tokyo, Japan

More information

Stakeholders Analysis

Stakeholders Analysis Stakeholders Analysis Introduction National Stakeholders ISP citizens CNIIP Media National CIRT Academia ONG, Public And Private Institutions sectoral CSIRTs Law enforcement 2 2 CIRT ISP A specialized

More information

Information Security Policies in Japan

Information Security Policies in Japan Information Security Policies in Japan Towards a safe and secure network infrastructure Fumiaki TAKAHASHI Director, ICT Security Office, Information and Communications Policy Bureau, Ministry of Internal

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Introduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps

Introduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps Introduction to Global Inter-Cloud Technology Forum () and its Roadmaps Dec. 10, 2009 Hiroshi Sakai, secretariat (NTT Information Sharing Platform Laboratories) 1 : A technology forum for the Inter-cloud

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Disaster Management (DM) Program Overview

Disaster Management (DM) Program Overview Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information

Peering 101. August 2017 TPF. Walt Wollny, Director Interconnection Strategy Hurricane Electric AS6939

Peering 101. August 2017 TPF. Walt Wollny, Director Interconnection Strategy Hurricane Electric AS6939 Peering 101 August 2017 TPF Walt Wollny, Director Interconnection Strategy Hurricane Electric AS6939 Who is Walt Wollny? Hurricane Electric AS6939 3 years Director Interconnection Strategy supporting the

More information

Yamaha Steinberg USB Driver V for Mac Release Notes

Yamaha Steinberg USB Driver V for Mac Release Notes Yamaha Steinberg USB Driver V1.10.2 for Mac Release Notes Contents System Requirements for Software Main Revisions and Enhancements Legacy Updates System Requirements for Software - Note that the system

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Japan s Cyber Diplomacy

Japan s Cyber Diplomacy Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure

More information

Updates to the NIST Cybersecurity Framework

Updates to the NIST Cybersecurity Framework Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber

More information

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information

More information

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies: Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Homeland Security Perspective on Modeling and Simulation (M&S)

Homeland Security Perspective on Modeling and Simulation (M&S) Homeland Security Perspective on Modeling and Simulation (M&S) From Science.Security From Technology.Trust George R. Ryan Director T&E / Standards 2 How is M&S used for Homeland Security? Current Capabilities

More information

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS

United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS UTILITY CYBER SECURITY INITIATIVE (UCSI) CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2) ASSESSMENT FOR THE

More information

The Next Frontier in Medical Device Security

The Next Frontier in Medical Device Security The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA

More information

1. Advice, coordination, and other assistance

1. Advice, coordination, and other assistance The information and communications services network and environment are bringing about changes in industry structure and every aspect of people s lives, as seen in the enhancement of the broadband communications

More information

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers 302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

DHS Election Task Force Updates. Geoff Hale, Elections Task Force

DHS Election Task Force Updates. Geoff Hale, Elections Task Force 1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

Promoting Quality Infrastructure Investment

Promoting Quality Infrastructure Investment Promoting Quality Infrastructure Investment - Japan s contribution to infrastructure development - Mitsutoshi Kajikawa Director, Development Policy Division Ministry of Finance, Japan 1 Quality Infrastructure

More information

AY2018 New Edition (Released on September 1, 2018) Research Integrity e-learning Course Manual

AY2018 New Edition (Released on September 1, 2018) Research Integrity e-learning Course Manual AY2018 New Edition (Released on September 1, 2018) Research Integrity e-learning Course Manual For Faculty/Staff Members, Graduate Students, and JSPS Research Fellows 1 Login Open the login page below.

More information

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Integrated Consortium of Laboratory Networks (ICLN)

Integrated Consortium of Laboratory Networks (ICLN) Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps

More information

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials + NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s

More information