MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

Similar documents
NEW TECHNOLOGIES IN CYBER SECURITY - COMPETITIVE ADVANTAGE OR HIDDEN THREAT: MALAYSIA S EXPERIENCE

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Provisional Translation

The UK s National Cyber Security Strategy

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Are Cyber Security Exercises Useful? The Malaysian Case Study. Adli Wahid Head of Malaysia CERT (MyCERT) Twitter: adliwahid

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Cyber Security in Europe

RESOLUTION 130 (REV. BUSAN, 2014)

Implementation Strategy for Cybersecurity Workshop ITU 2016

Infrastructure PA Stephen Lecce

ENISA EU Threat Landscape

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Which Side Are You On?

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

ASEAN s Cyber Confidence Building Measures

WINNING THE WAR FOR CYBER TALENT

STRATEGIC PLAN. USF Emergency Management

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

G7 Bar Associations and Councils

General Framework for Secure IoT Systems

Promoting Global Cybersecurity

Driving Global Resilience

Cybersecurity, safety and resilience - Airline perspective

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Commonwealth Cyber Declaration

JOINT MEDIA STATEMENT

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

RESOLUTION 45 (Rev. Hyderabad, 2010)

The Role of International Cooperation in Cyber Security

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Cybersecurity & Digital Privacy in the Energy sector

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Cyber Security Roadmap

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Horizon 2020 Security

Cyber Security Strategy

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

ASREN Arab States Research and Education Network

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

POSITION DESCRIPTION

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Package of initiatives on Cybersecurity

Itu regional workshop

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

Bradford J. Willke. 19 September 2007

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

1 History of CyberSecurity in the Philippines 2 3

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

MANAGING SECURITY THREATS IN THE NEW CONNECTED WORLD THROUGH FORENSIC READINESS

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Candidate Profile for the Position of Vice President, Education and Certification

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Israel and ICS Cyber Security

About Issues in Building the National Strategy for Cybersecurity in Vietnam

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

University Strategy

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Cybersecurity & Spam after WSIS: How MAAWG can help

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK

Cyber Security Technologies

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

European Union Agency for Network and Information Security

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Cyber Security Congress 2017

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Secure Societies Work Programme Call

RESOLUTION 130 (Rev. Antalya, 2006)

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

Security and resilience in Information Society: the European approach

Cyber Security Strategy

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Legal Foundation and Enforcement: Promoting Cybersecurity

PMP Certification Program

Cyber Security in Smart Commercial Buildings 2017 to 2021

Emerging Technologies The risks they pose to your organisations

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

Japan s Cyber Diplomacy

Executive Insights. Protecting data, securing systems

Transcription:

MALAYSIA S APPROACH IN CAPACITY BUILDING Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017 Copyright 2017 CyberSecurity Malaysia

ASEAN s JOURNEY TOWARDS DIGITAL TRANSFORMATION Widespread adoption of new technologies & we are getting more connected Increased threats are arising from the use of technologies & human weaknesses Copyright 2017 CyberSecurity Malaysia 2

DIGITAL TECHNOLOGY IS A KEY ENABLER FOR ASEAN CONNECTIVITY - A Plan for Smart Cities in 2025 Copyright 2017 CyberSecurity Malaysia 3

DIGITAL TECHNOLOGY BRINGS NEW SECURITY CHALLENGES We are facing emerging threats of cyber crime, hactivism, cyber espionage. More actors hackers, criminals, state and state-sponsored actors with various motives Source: http://www.hackmageddon.com/2017/03/02/january-2017-cyber-attacks-statistics/ Copyright 2017 CyberSecurity Malaysia 4

PEOPLE ARE KEY COMPONENT IN DIGITAL ENVIRONMENT - Cyber attacks become more sophisticated - We are to win against cyber attacks through competent professionals Copyright 2017 CyberSecurity Malaysia 5

THE DEMAND FOR CYBER SECURITY HAS INCREASED - We are shortage of cyber security professionals Paul Curran, Aug 30-2016, https://www.checkmarx.com/2016/08/30/cyber-security-careerpaths-salaries-and-the-most-in-demand-job-titles/ The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million, - Symantec CEO Michael Brown. the demand for cybersecurity will result in over a million job openings in 2016 alone as the growing cyber security market continues to soar with a projected growth from $75 billion in 2015 to a $170 billion by 2020 - Steve Morgan, Editor-In-Chief of the Cybersecurity Market Report, Copyright 2017 CyberSecurity Malaysia 6

CAPACITY BUILDING IS ONE OF THE POLICY THRUSTS IN NATIONAL CYBER SECURITY POLICY NATIONAL CYBER SECURITY VISION: Malaysia s Critical National Information Infrastructure shall be secure, resilient and self-reliant. Infused with a culture of security it will promote stability, social well being and wealth creation. Copyright 2017 CyberSecurity Malaysia 7

NATIONAL STRATEGY FOR CYBER SECURITY ACCULTURATION & CAPACITY BUILDING PROGRAM The study was completed in November 2010 The capacity building programs are targeted towards Critical National Information Infrastructure (CNII) Focusing on efforts to increase the knowledge and skill sets on the information security workforce Aimed at creating a quality and well-equipped information security workforce and promoting recognition of the Information Security profession. Copyright 2017 CyberSecurity Malaysia 8

OUR CONCEPT OF OUTREACH & CAPACITY BUILDING Competency Training Developing Competent cyber security work-force and practitioners for the nation Professional Development Building & accrediting competent cyber security professionals through the Global ACE Scheme CyberSAFE An end-user focused training Programs aimed at combating cyber-attacks designed for non-technical and end-users Nurture and certify cyber security workforce with the required Knowledge, Skills & Attitude (KSA): 1. Enabling secured usage of technology to minimize digital risk; 2. Equipping necessary skillsets; and 3. Upskilling work-force awareness & capabilities in lights of the ever-changing cyber security landscape. Strategic collaborations with reputable International organizations Copyright 2017 CyberSecurity Malaysia

Our Vision & Mandates in Capacity Building To be the Cyber Security Training Provider in the ASEAN region and OIC countries that delivers relevance, competitive and resilience Cyber Security capacity building programs in today s fast moving landscape. To increase the number of cyber security professionals to cater for the increasing number of internet users in Malaysia Estimated about 6300 (as of Jan 2017) internationally certified professionals in Malaysia Target to achieve 10000 security professionals by 2020 Copyright 2017 CyberSecurity Malaysia 10

Cyber Security Capacity Building Framework Our training programmes are structured according to below framework: Objectives: 1. To nurture cyber security knowledge groups and/or individuals that are resilient to cyber security incidents; 2. To nurture cyber security practitioners that are technically capable and proficient in the operation; 3. To nurture cyber security professionals that are capable in strategizing, planning and executing cyber security initiatives Copyright 2017 CyberSecurity Malaysia

Our Own Competency Training Programs Copyright 2017 CyberSecurity Malaysia 12

PRODUCING LOCAL TALENTS via Partnerships with Intl Recognized Training Providers Copyright 2017 CyberSecurity Malaysia 13 13

PRODUCING LOCAL TALENTS THROUGH PARTNERSHIP WITH LOCAL UNIVERSITIES - via Educational / Academic Programs Ministry of Education Department of Polytechnic Education Department Of Community College Education The National University of Malaysia International Islamic University Malaysia (IIUM) University Tunku Abdul Rahman (UTAR) University of Kuala Lumpur (UniKL) University Putra Malaysia (UPM) Multimedia University (MMU) University Teknikal Malaysia Melaka (UTeM) etc Copyright 2017 CyberSecurity Malaysia 14

ENHANCING NATIONAL COMPETENCIES CYBER READINESS VIA NATIONAL CYBER CRISIS EXERCISES X-MAYA - National Cyber Crisis Exercise (Cyber Drill) conducted by CyberSecurity Malaysia in collaboration with the National Security Council. The X-MAYA - to assess and improve the National Cyber Crisis Management Plan together with CNII's readiness against the threat of cyber attacks. Copyright 2017 CyberSecurity Malaysia 15

ENHANCING NATIONAL TECHNICAL SKILLS & KNOWLEDGE - via Collaboration With Multi National Companies MoU between BAE & CSM in Cyber Security Framework for technical collaboration and in capacity building Dec 2014 MoU between Huawei & CSM to outline Cyber Security collaboration Copyright 2017 CyberSecurity Malaysia 16

ENHANCING MALAYSIA s CAPACITY BUILDING - With CERT Partners (MULTI-LATERAL) Copyright 2017 CyberSecurity Malaysia 17

ENHANCING MALAYSIA s CAPACITY BUILDING - With CERT Partners (BILATERAL) Copyright 2017 CyberSecurity Malaysia 18

ENHANCING NATIONAL CAPACITY BUILDING VIA COLLABORATION Multi-stakeholders partnership in cyber security capacity building to formulate a framework for the creation of a competent cyber security workforce both at national and regional levels ASEAN CERT WITH MULTI LATERAL PLATFORMS ITU CSCAP ARF OIC CERT FIRST APCERT Industry professionals are required to constantly train and re-train to upgrade their skills and knowledge while keeping abreast with the latest changes in the global information vectors SOVEREIGN STATES VIA BILATERAL/MULTILATE RAL ENGAGEMENT INTERNATIONAL SECURITY Protecting Common Interests Confidence Building Measures DOMESTIC SECURITY Protecting National Security, Prosperity and Public Safety Regional and Global Cyber Security Cooperation Public Private Partnership Copyright 2017 CyberSecurity Malaysia Legal and Policy Framework

CONCLUSION & WAY FORWARD Today, the world is witnessing widespread adoption of digital technologies and constant evolving of cyber threats; To stay ahead, we need sufficient and competent cyber security people; Malaysia continues to adopt evolutionary and innovative approach in capacity building programs As part of regional community, Malaysia s efforts in capacity building are also to strengthen regional cyber security Regional community to collaborate and combine ideas to stay ahead of rapidly changing cyber threats Industry professionals are required to constantly train and re-train to upgrade their skills and knowledge while keeping abreast with the latest changes in the global information vectors hence requiring multi-stakeholders partnership Copyright 2017 CyberSecurity Malaysia 20

Copyright 2017 CyberSecurity Malaysia 21