Way to new challenges

Similar documents
Cybercrime Capacity Building a cooperative process

Global Cybercrime Certification

2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison

15412/16 RR/dk 1 DGD 1C

Octopus Programme From April 2011

Education and Training on Internet Investigations. Joe Carthy. Director UCD Centre for Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation

Cyber Intel within European Cybercrime Center Ops

10025/16 MP/mj 1 DG D 2B

Cyber Security Development. Ghana in Perspective

Strategic and operational threat analysis at Europol's EC3

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator

CONTINUING EDUCATION PROVIDER GUIDE

Current skills gap for capable CTI analysts: Training for forensics & analysis

Designing Robustness and Resilience in Digital Investigation Laboratories

Guiding principles on the Global Alliance against child sexual abuse online

Introduction. January 1, 2015

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

UCD Centre for Cybersecurity & Cybercrime Investigation. University College Dublin School of Computer Science

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Vademecum of Speakers

The ACFE Law Enforcement and Government Alliance

10496/18 MC/sl 1 DGD 2

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development

Council of the European Union Brussels, 23 November 2016 (OR. en)

THE SUSTAINABLE NUCLEAR ENERGY TECHNOLOGY PLATFORM. Presented on behalf of SNE-TP by Vere Smyth, University of Pavia

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde

Minutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Cyber Security Strategy

Standard Setting and Revision Procedure

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Council of the European Union Brussels, 16 March 2015 (OR. en)

13268/16 EB/dk 1 DGD 1C

ESSA Q INTEGRITY REPORT

The commission communication "towards a general policy on the fight against cyber crime"

Revised November EFESC Handbook

Valérie Andrianavaly European Commission DG INFSO-A3

PADOR HELP GUIDE FOR CO-APPLICANTS

ANZPAA National Institute of Forensic Science BUSINESS PLAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

The Scottish Credit and Qualifications Framework and Chartered Banker Institute

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

University Diploma. GLACY Global Action on Cybercrime. Eastern Partnership region

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Donor Countries Security. Date

INTERNATIONAL TELECOMMUNICATION UNION

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings

EISAS Enhanced Roadmap 2012

Docker Business Partner Program Guide

Global Wildlife Cybercrime Action Plan1

CEdMA Certification SIG

Global Alliance against Child Sexual Abuse Online 2014 Reporting Form

CONNECT ARAB STATES SUMMIT

Cybersecurity for ALL

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.

OAS Cybersecurity Capacity Building Efforts

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach

List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2014

Sustainable Consumption and Production

Regional Cyber security Forum for Africa and Arab States, Tunis, Tunisia 4 th -5 th June 2009

ICANN Identifier System SSR Update 1H 2015

10007/16 MP/mj 1 DG D 2B

PROJECT RESULTS Summary

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

ECSC Brief Razvan GAVRILA NIS Expert. European Union Agency for Network and Information Security

Overview of ITU capacity building activities

ENISA EU Threat Landscape

H2020 & THE FRENCH SECURITY RESEARCH

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

EXPERT GROUP MEETING ON CYBERCRIME

Cyber Security Roadmap

NIS Directive : Call for Proposals

Léargas PIC Guide for Schools 2016

Package of initiatives on Cybersecurity

Call for Expressions of Interest

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

F4E Industry & Associations Portal User Guide

Council of the European Union Brussels, 14 July 2017 (OR. en)

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

Continuous Professional Development (CPD) Manual

preparation of National Action Plans on youth employment the process of developing the NAP

Digital government toolkit

A Multi-Stakeholder Approach in the Fight Against Cybercrime

Big Data Value cppp Big Data Value Association Big Data Value ecosystem

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

Media Kit. California Cybersecurity Institute

The need for developing a cyber security ecosystem of professionals

Achieving Global Cyber Security Through Collaboration

The UK s National Cyber Security Strategy

Commonwealth Cyber Declaration

ISTQB in a Nutshell. ISTQB Marketing Working Group. February 2012 v10

ENISA s Position on the NIS Directive

Transcription:

Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@

When? Since 2001, informal working group starting with a few members from EU Law Enforcement Since 2009, renamed in European Cybercrime Training and Education Group Since Nov 2016, became officially International Non Profit Association

Why? Need for a more sustainable model Quality improvement Need for flexibility Avoiding competition Addressing tasks and responsibilities into training governance model

What? International non-profit organisation Support law enforcement and judicial authorities efforts in the fight against cybercrime and any form of crime facilitated by new technologies; Improve the technical capabilities by making available high-quality training material, developed by law enforcement experts, in partnership with academia and the private sector. In pursuing these goals, the association maintains an international experts network to contribute to the training development and to assist in their deployment by national and international authorities.

Activities. coordination, prioritization and funding, to create and update training identified by partners at European level with the quality standards;

Activities.. Implementation and management of an IT system to provide access and distribute developed training courses, gather statistical data and allow communication among members; Ensuring quality control, coherence and complementarity at European level of training courses during their development and in their implementation at national and international level;

Activities Consultation with national and international actors involved in the fight against cybercrime, the establishment of standards and procedures; Encourage the sharing of specific expertise developed by the members, through the promotion of available training materials and workshops for the development of learning methods in the cyber domain;

Structure Board : 1 chair 1 secretary 1 treasurer Europol CEPOL Group P : Police Police Academy Europol CEPOL Interpol Eurojust Group A : University High School Group M : General Assembly Organisations Centre of Excellence Industry

Membership: A law enforcement agency from an EU member state or member of Europol or from the European Economic Area, including Norway and Switzerland. An university or high school, delivering academic titles and engaged in training in new technologies of interest for one or more law enforcement agencies of the European Union or the European Economic Area. The application with letter of support from a law enforcement agency, which benefited from the training.

Membership: On member proposal : A commercial company active in the field of information technology. An individual, because of its particular expertise in the fight against cybercrime and its contribution to the training of specialized law enforcement services. Board will establish the group to which the candidate is to be assigned prior to the submission to the vote of the General Assembly.

Membership: On member proposal : An international organization, active in the domain of training against crime linked to new technologies. A national organisation, a national of a member of the European Union or member of Europol or the European Economic Area countries, including Norway and Switzerland, which shares the objective of fighting against cybercrime and which runs training activities.

Core Documents Statutes of the association (24-11-2016) Standards of ECTEG training package development Specify criteria to be eligible as ECTEG sub-project Quality Integration and synergy with existing projects Involvement of experts from members ECTEG values Responsibilities and financial management Co-funding and partnership rules Standards of application to get ECTEG materials Specify criteria to be granted when applying to get ECTEG materials Quality of the delivery Trust between ECTEG members and applicants What s mandatory in terms of feedback

ECTEG course packages Full courses packages available for free LEA only trainer manual trainer presentations student manual practicals / fake suspect artefacts.. (including virtual machines) exams

ECTEG course packages

ECTEG course development standards Integration in the ECTEG framework Synergy with other projects (education, R&D) Modularity Education instead training only Knowledge and practical No tool dependant Exercises using open source tools International experts on topics English, localised whenever needed and possible Pilot courses

How to become ECTEG member? Formal request from the authority of the candidate member Identification of the entity (address, logo) Signed Describing request to be member of ECTEG Agreeing to send a representative to the 2 meetings / year In case of identified unit, specify it too In case required, provide letter of support from one existing member Scan into a PDF document and sent to contact@

Membership approval by the board Depending of the statutes Will inform candidate when candidature is accepted and require to provide the name of who will be the delegate attending meetings Will inform candidate about the group where he/she will be inserted Will inform delegate about next general assembly date and location Will inform members about the candidature

Approval by the general assembly Next meeting (26-27 Oct 2017 @ Lisbon) Candidate member representative attend the meeting Candidature submitted to General Assembly vote

Contact contact@ Twitter : @ecteg Facebook page Website : www.