The Critical Importance of CIIP to Cybersecurity

Similar documents
Spoka Meet Audio Calls Rates Dial-In UK

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

Access Code and Phone Number

iclass SE multiclass SE 125kHz, 13.56MHz 125kHz, 13.56MHz

No Purchase needed

Overcoming the Compliance Challenges of VAT Remittance. 12 April :55 to 16:30 (CEST)

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

EE Pay Monthly Add-Ons & Commitment Packs. Version

Dashboard. Feb 18, Feb 18, 2008 Comparing to: Site. 13,318 Visits 28,414 Pageviews 2.13 Pages/Visit

Digital EAGLEs. Outlook and perspectives

Vodafone Usage Manager R2.0

VOICE/DATA SIMCARD USA UNLIMITED

Dataliner Message Displays Using DL50 Slaves with a DL40 Master

MANUAL VOICE/DATA SIMCARD CANADA

Carrier Services. Intelligent telephony. for over COUNTRIES DID NUMBERS. All IP

Instructions. (For 6180 Industrial Computers) Applications. Overview & Safety

STANDARD BROADBAND & FIBRE BROADBAND PLANS

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction

Improving digital infrastructure for a better connected Thailand

Turquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

Out of Bundle Vodafone

Moving Professionals Forward. World Leader In Competence Based Certification

Payphone Origination Service Charge Rate Per Min. Mobile Origination Service Charge. MLB Switched Rate Per Min. MLB Dedicated Rate Per Min

Collaborative Regulation in the APP Economy

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

Instructions. (For 6180 Industrial Computers) Installing a Processor Upgrade

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

Shell Global Helpline - Telephone Numbers

Patent Portfolio Overview May The data in this presentation is current as of this date.

Purchasing. Operations 3% Marketing 3% HR. Production 1%

ThinkPad carrying cases offer protection and convenience for your mobile requirements

Global entertainment and media outlook Explore the content and tools

Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf

COCAINE (unless otherwise noted) amongst young people (ordered alphabetically by regions)

GW-WN150M 11b/g/n USB Wireless User Manual

ThinkPad carrying cases offer protection and convenience for your mobile requirements

Enterprise price plan guide Vodafone One Net Business

Allen-Bradley 1397 Enhanced Field Supply Card Cat. Nos FS FS1020

DATA APPENDIX. Real Exchange Rate Movements and the Relative Price of Nontraded Goods Caroline M. Betts and Timothy J. Kehoe

3M Volition Network Solutions

PIRLS 2016 INTERNATIONAL RESULTS IN READING

International Roaming Critical Information Summaries JULY 2017

E-Seminar. Voice over IP. Internet Technical Solution Seminar

CRYPTO CLOUD SIM UNLIMITED DATA NO TRACEABILITY NO THIRD-PARTIES

A Guide to our Tariffs

Power Analyzer Firmware Update Utility Version Software Release Notes

CUSTOMER GUIDE Interoute One Bridge Outlook Plugin Meeting Invite Example Guide

IGEL-Briefing March Managed Software and Hardware Thin Clients

Appendix G. Percentiles and Standard Deviations of Science Achievement TIMSS 2011 INTERNATIONAL RESULTS IN SCIENCE APPENDIX G 495

THE POWER OF A STRONG PARTNERSHIP.

AC/DC (120V) Input Module Cat. No IAD Series C

Digital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.

8510 AC Spindle Drive Hardware/Firmware Replacement

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops

Digital Context Pacific Alliance

AdaptaScan Reader to a PLC-5 Using DH-485 Protocol with the 2760 RB Module and the 2760-SFC2 Protocol Cartridge

Sunao SATO Japan Patent Office January 21, 2016

Beckhoff short profile

AdaptaScan Reader to a PLC-5 Using RS-232/ASCII Protocol with the 2760 RB Module and the 2760-SFC1 and -SFC2 Protocol Cartridge

A Guide to our Tariffs

Traffic Offload. Cisco 7200/Cisco 7500 APPLICATION NOTE

Alternative phone number: Credit card/debit card number Expiry date: / / DD MM YYYY

Updates to Plastic Molding and Co-injection Modules (Catalog Numbers 1771-QDC and 1771-QI)

PAY MONTHLY ADDITIONAL SERVICES TERMS AND CONDITIONS

Field Terminal Assembly (FTA)

Electronic access to technical information. Work in progress in Development of. Members. International Standards,

ASSISTING OUR CUSTOMERS IN A WORLD OF CHANGE 2015 AT A GLANCE

NANOELECTRONICS AND DIGITAL TECHNOLOGY ENABLING DISRUPTIVE INNOVATION LUC VAN DEN HOVE - PRESIDENT AND CEO

Cisco HCS Country Dial Plans

The Traveller plans include a monthly Mobile Broadband allowance to be used within all Table 1: Go Europe + USA Destinations.

Cisco CallManager 4.0-PBX Interoperability: Lucent/Avaya Definity G3 MV1.3 PBX using 6608-T1 PRI NI2 with MGCP

Cisco Extensible Provisioning and Operations Manager 4.5

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

Configuring DHCP for ShoreTel IP Phones

OPERATIONS MANUAL Audio Conferencing

Cisco Voice Services Provisioning Tool 2.6(1)

PIRLS 2011 The PIRLS 2011 School Emphasis on Academic Success Teacher Reports Scale

Beckhoff short profi le

VectorPro Lite Force and Torque Data Acquisition Software

Technology Lifecycle Management Assessment. Know your network - achieve business agility

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Application Note. Overview. Hardware Requirements. Software Requirements

Quintiles vdesk Welcome Guide

IS-13 TOPS Special Solicitation Volume Report

Home Resources for Learning Scale

Patent Portfolio Overview July The data in this presentation is current as of this date.

ITU Global Cybersecurity Index

International Business Mail Rate Card

Welcome to Baker McKenzie Stockholm Fifth Annual Trade Day. 7 November 2017

International Packets

Vodafone Business Plus

Safety. Introduction

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

Reducing Risk and Building Capacity

Automation DriveServer

Activity A.1 Agenda Item 16

Home Resources for Learning Scale, Fourth Grade

Reference Guide. (Catalog Number 1785 series) Introduction

Transcription:

The Critical Importance of CIIP to Cybersecurity Without CIIP there is no Cybersecurity Peter Burnett GFCE-Meridian Coordinator

The Global Forum on Cyber Expertise Focus: cyber capacity building (awareness and implementation). Goal: Identify best practices and multiply these on a global level. Connecting relevant organizations.

GFCE Members 54 members: countries (36), private organizations (9), intergovernmental organizations (IGOs) (9) IGOs are for example: AU, EC, OAS, ICC, ITU, Europol

GFCE Inventory at the Oxford Global Cyber Security Capacity Centre

MERIDIAN

The Meridian Process The Meridian Process aims to exchange ideas and initiate actions for the cooperation of governmental bodies on Critical Information Infrastructure Protection (CIIP) issues globally. It explores the benefits and opportunities of cooperation between governments and provides an opportunity to share best practices from around the world. The Meridian Process seeks to create a community of senior government policymakers in CIIP by fostering ongoing collaboration. The Meridian Process recognizes that it is only by working together that we can each advance our national CIIP goals and objectives. Participation in the Meridian Process is open to all countries/economies and is aimed at senior government policymakers involved in CIIP-related issues. Every country/economy is invited to take part in the Meridian Process, and is encouraged to attend the annual Meridian Conference.

Meridian Community International Organisations EU ENISA EEAS ITU WEF WB OAS GFCE International Organisations that have attended Meridian Conferences

Meridian Community Countries

Meridian Community Member Countries Argentina, Australia, Austria, Belgium, Belize, Brazil, Brunei, Cambodia, Canada, Chile, Colombia, Costa Rica, Croatia, Czech Republic, Denmark, Dominican Republic, Ecuador, Egypt, Estonia, Finland, France, Germany, Guatemala, Honduras, Hungary, Indonesia, Ireland, Israel, Italy, Jamaica, Japan, Lithuania, Luxembourg, Malaysia, Malta, Mexico, Morocco, Netherlands, New Zealand, Norway, Oman, Paraguay, Peru, Philippines, Poland, Portugal, Qatar, Republic of Korea, Russia, Singapore, Slovak Republic, South Africa, Spain, Sweden, Switzerland, Taiwan, Trinidad and Tobago, Tunisia, United Arab Emirates, United Kingdom, United States of America, Uruguay, Vietnam 63 Countries; 10 New members in November 2016

The Meridian CIIP Directory

Cybersecurity, CIIP and CIP Sometimes it s hard to see the wood for the trees The Wood = the Forest or the Rainforest Canopy

By Tim35 - Own work, Public Domain, https://commons.wikimedia.org/w/index.php?curid=6853197

Cybersecurity, CIIP and CIP Cybersecurity is like a canopy it covers everything to do with Cyber Now it s hard to see the trees for the wood. CIIP = the trees CIP = the roots

By The original uploader was Adz at English Wikipedia - Transferred from en.wikipedia to Commons., CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2250531

Cyber Security and CIIP Key Drivers for a Culture of Security in Some Countries ƒ Two main drivers which support the development of a culture of security at the national level: 1. Implementation of e-government applications and services 2. Protection of national critical information infrastructures (CII) 27 November 2007 Christine Sund, ITU

Critical Infrastructure Protection Decide what Services and Functions are Critical to your nation Identify how those services are delivered Consider the threats and vulnerabilities What protection and mitigation can you put in place Critical Infrastructure Sectors Criticality Criteria

Criticality Criteria Criticality Scale Cat. 5 Cat. 4 Cat. 3 Cat. 2 Cat. 1 Cat. 0 Description This is infrastructure the loss of which would have a catastrophic impact on the UK. These assets will be of unique national importance whose loss would have national long-term effects and may impact across a number of sectors. Relatively few are expected to meet the Cat 5 criteria. Infrastructure of the highest importance to the sectors should fall within this category. The impact of loss of these assets on essential services would be severe and may impact provision of essential services across the UK or to millions of citizens. Infrastructure of substantial importance to the sectors and the delivery of essential services, the loss of which could affect a large geographic region or many hundreds of thousands of people. Infrastructure whose loss would have a significant impact on the delivery of essential services leading to loss, or disruption, of service to tens of thousands of people or affecting whole counties or equivalents. Infrastructure whose loss could cause moderate disruption to service delivery, most likely on a localised basis and affecting thousands of citizens. Infrastructure the impact of the loss of which would be minor (on national scale).

CIP Guidance https://www.tno.nl/recipereport//

CI and CII

CIIP When you ve Protected your CI Identify your CII ICT components of CI systems Industrial Control Systems (ICS) and SCADA Trans-CI functions and systems Dependencies Dependencies on systems beyond your control Protect or mitigate and Crisis Management Monitor, Review, Improve. continuously Test and Exercise Information Sharing

https://www.meridianprocess.org/

Everybody needs to protect their CI

Cybersecurity When you ve done CIP And you ve done CIIP Now you re ready for Cybersecurity

www.meridianprocess.org www.thegfce.org https://www.sbs.ox.ac.uk/cybersecurity-capacity/explore/gfce enquiries@ meridianciip.net