Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Similar documents
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Panel 1 National CSIRT Experience

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Bradford J. Willke. 19 September 2007

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

National Policy and Guiding Principles

Inter-American Port Security Cooperation Plan

MELANI: Information exchange a story of success

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Department of Homeland Security Updates

Promoting Global Cybersecurity

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Cyber Security Technologies

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Smart Cities and Security. Security - 1

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Republic of Indonesia. ARF Defense Officials Dialogue Seoul, April 2009

Examining Cooperative Strategies through Cyber Exercises

Homeland Security and Geographic Information Systems

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Cyber Security in Europe

Commonwealth Cyber Declaration

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

California Cybersecurity Integration Center (Cal-CSIC)

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

A practical guide to IT security

Statement for the Record

Information Sharing and Cooperation

Strengthening Disaster Readiness. Moving from capacity to capability

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Mississippi Emergency Management Agency. Shawn Wise. Office Of Preparedness

Florida Regional Domestic Security Task Forces

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

G7 Bar Associations and Councils

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

EU policy on Network and Information Security & Critical Information Infrastructures Protection

The Case for National CSIRTs

Cyber Intel within European Cybercrime Center Ops

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Overview of the Federal Interagency Operational Plans

ENISA Cooperation in the EU / NIS Directive

Centre for cybersecurity Belgium : Role, Missions et future capacities

Critical Infrastructure

Caribbean Cyber Security: Not Only Government s Responsibility

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Securing Europe's Information Society

Itu regional workshop

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

NGA Governor s Energy Advisors Energy Policy Institute Resiliency Panel

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Cyber Resilience. Think18. Felicity March IBM Corporation

Global Wildlife Cybercrime Action Plan1

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data

Cybersecurity and Hospitals: A Board Perspective

Critical Information Infrastructure Protection Law

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Cybersecurity & Digital Privacy in the Energy sector

PIPELINE SECURITY An Overview of TSA Programs

The Office of Infrastructure Protection

Michael Rühle, Head, Energy Security Section, NATO ENERGY SECURITY AND NATO: EMERGING CHALLENGES TO CRITICAL ENERGY INFRASTRUCTURE

National Cyber Security Strategy 2016

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Valérie Andrianavaly European Commission DG INFSO-A3

Society, the economy and the state depend on information and communications technology (ICT).

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Implementation Strategy for Cybersecurity Workshop ITU 2016

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

June 5, 2018 Independence, Ohio

Transcription:

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Threat of Cyber- Terrorism to Critical Infrastructures Presented by Iyke Ezeugo Cyber-warfare Strategist

Definitions of key terms Cyber-Terrorism Cyber-Terrorism is a premeditated politically motivated use of computers and information technology to cause severe disruption to the people, or inflict widespread fear or violence against non-combatant targets by terrorists.

Definitions of key terms Critical infrastructures Critical infrastructures are those physical and cyberbased systems essential to the minimum operations of the economy and government of a nation; these include telecom services, energy supply, banking and financial institutions, transportation, water systems and emergency services, whether governmental and private.

Objectives of highlighting threats of cyberterrorism to critical infrastructures To effectively identify threats and rightly classify them. To stimulate concerted efforts in taking logical steps towards preventing attacks Have reliable quick recovery in the event of an attack.

Do we really have threats in Nigeria What kind of infrastructures do we consider national critical infrastructures in Nigeria Are they truly subject to cyber-terrorism threats and why? What impact does degradation of Boko-haram traditional operations have on cyber-terrorism?

Do we really have threats in Nigeria? Do we have genuine reasons to have concerns. Which infrastructure is most vulnerable and on which will a successful attack be most disastrous - telecom network, financial services, etc.

Important Facts The cyber-terrorism threat is real and we need to prepare for its prevention through a coordinated response. An impact on one organization affects others and the nation socioeconomic activates. We need to apply effective techniques to prevent attacks We need to devise reliable mechanisms to recover quickly in the event of an attack.

Important Facts Cont d Around September 2012 MTN and Airtel reported that their mobile phone masts are coming under attack from gunmen in northern Nigeria who may be trying to elude police trackers through their phones. In 2013, the Nigerian military, as part of its counterinsurgency operations against Boko Haram insurgents, shut down GSM mobile telephony in three northeast states Adamawa, Borno and Yobe.

Is there a way out? We can only prevent attacks on our critical infrastructures by: Proactively building an intelligence base, Critically analysing the gathered intelligence, Providing timely, actionable threat-related products to the nations public and private sector partners. Strategic improving information sharing is key. Our cybersecurity effort shouldn t just be a reactive endeavour

Why is this subject important This conference is meant to stimulate and strengthen our commitment to improving the security of our Nation's critical infrastructures. not a very strange experience to Nigerian - we have seen how a single attack can have immediate simultaneous impact on several interdependent socioeconomic systems We need a national focal point for gathering information on threats to the infrastructures To accomplish this mission, we need to build a strong coalition of trust amongst all government agencies, between the government and the private sector,

Our peculiar challenges in dealing with cyber-terrorism threats? Up-to-date formal security policies in place, and how are they implemented More creative thinking about information systems security, The most likely perpetrators of cyber-attacks on critical infrastructures are terrorists and criminal groups rather than nation-states. Our attitude in reporting detected computer security breaches

Our peculiar challenges in dealing with cyber-terrorism threats? Of what relevance is the reporting? Reasons why we don t often report The assumption that competitors would use the information against them. Lack of awareness of the need for reporting intrusions to law enforcement. Lack of identifiable channel of reporting and the information can be used for Avoiding negative publicity

Solutions - Best Practices One source of best practices for cybersecurity can be found at the Computer Emergency Response Team's (CERT) web site at http://www.cert.org/securityimprovement. CERT has very useful five areas of practices divided into: 1. Harden and secure your systems by establishing secure configurations 2. Prepare for intrusions by getting ready for detection and response 3. Detect intrusions quickly 4. Respond to intrusions to minimize damage 5. Improve your security to help protect against future attacks

Conclusion We have serious need for national cybersecurity threats Information Sharing and Analysis Centre one with a clear purpose of enhancing private sector cooperation and the mandate to strengthen two-way information sharing and increased security for the nation's critical infrastructures in the information age.