Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)

Slides:



Advertisements
Similar presentations
Maryse Robert, Director Department of Economic and Social Development Executive Secretariat for Integral Development San Pedro Sula, Honduras, September.
Advertisements

Cross-cutting Aid-for- Trade Issues Regional Planning Mechanisms & Financial Instruments.
E-Strategies and ICT Infrastructure Policies and Regulations ITU-WTO Workshop Geneva Dec Mostafa Terrab, infoDev.
Profitable Partnership Opportunities
Excellence with Impact Declan Mulkeen January 2011.
Cyber Security & Critical Controls Chris Few Industry Enabling Services CESG February 2011 © Crown Copyright. All rights reserved.
New to Social Housing and the customer ‘journey’ Marc Slack Head of ICT.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Funding Collaborative Research—ARC Perspective 19 February 2015 Denise Meredyth Australian Research Council.
Mark Anderson Director of The Europe Office LAUNCH OF THE EUROPE OFFICE.
National Intellectual Property Strategies, Some Examples and Their Significance June, 2005 Maputo, Mozambique WIPO Intellectual Property and New Technologies.
Criminal Organizations and Drugs Sub-Directorate
Public engagement and lifelong learning: old wine in a new bottle, or a blended malt? Paul Manners Director, National Co-ordinating Centre for Public Engagement.
Current issues and trends in bibliographic control Overview of the Division’s interests and activities Bibliography Section Bohdana Stoklasova, Chair Talbott.
Initiatives to develop Brands among SMEs
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
Strategy and Policy Unit: Current Activities and Future Tasks
AusIndustry Martin Cebis AusIndustry – Entrepreneur Development Facilitator.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Employment NTO Who is Tony Green? - Chief Executive of the Employment NTO Previous job - Regional Commercial Director, Central Opencast 20 years experience.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
LAUNCH OF THE AFRICA PLATFORM for DEVELOPMENT EFFECTIVENESS (APDEv) Enhancing Capacities for Development Results 27 March 2011, Addis Ababa, Ethiopia Taking.
SMEs Division National IP Action Plan for Entrepreneurs and SMEs March 2008 Small and Medium-Sized Enterprises Division World Intellectual Property Organization.
Information Day on Irish International Education Strategy
Information Security Management – Management System Requirements, Code of Practice for Controls, and Risk Management supervision Assistant Professor Dr.
Why fund a research ‘Chair’ Christoph Schmocker Stellenbosch University 7 September 2012Copyright Advancement Academy1.
DOL Grants October 3, 2011 Vincent Accardi National Instruments.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
European Federation of Geologists Christian Boissavy, member of EFG Expert Panel on Geothermal Energy, France Herald Ligtenberg, EFG EU Delegate, the Netherlands.
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
International Flow of Funds 2 2 Chapter South-Western/Thomson Learning © 2006.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
KINGDOM OF CAMBODIA NATIONAL - RELATION - KING COUNTRY REPORT OF CAMBODIA THE INTERNATIONAL TRAINNING COURSE ON REGIONAL DEVELOPMENT STRATERGY JULY 17,2005.
Public Participation and the Advisory Committee Process A Collaborative Partnership For Water Resources Toni M. Johnson, Chief Water Information Coordination.
The Global Centre for Information and Communication Technologies in Parliament 14 June 2006 V Legislative XML Workshop Towards European Standards for Legislative.
CHAPTER 2 Information Systems and the Modern Organization.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
The Bulgarian ICT Cluster The European Day Of The Entrepreneur – Sofia, 2005.
Teresa Bennett, Director IUPUI Solution Center 719 Indiana Avenue Indianapolis, IN IUPUI.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Introduction to GeSCI Meeting with Ministry of Education in Bolivia 26 April 2006.
Canada’s Asia-Pacific Gateway and Corridor Initiative 2006.
Denise Gregory South-South and Triangular Cooperation Partnerships for Innovation Support Interregional Expert Meeting South-South and Triangular Cooperation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
DEVELOPMENT COOPERATION FRAMEWORK Presentation by Ministry of Finance 10 December 2013.
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
University/Industry Partnerships for Excellence in Education and Research.
1 FAO REGIONAL WORKSHOP ON RICE AND AQUACULTURE FOR PRODUCTIVITY INCREASE AND MARKET DEVELOPMENT IN EAST AFRICA, KAMPALA,UGANDA, APRIL 2009 AQUACULTURE.
INTERNATIONAL FINANCE Lecture 6. Balance of Payment (Accounting of transactions) – Current Account – Capital Account Current Account (Purchase Summary)
Business Arts Partnerships Australia Business Arts Foundation.
Kaj KostianderKemi-Tornio University of Applied Sciences Public Sector Intermediaries as Stimulators of Private Sector Innovation.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
25-September-2005 Manjit Dosanjh Welcome to CERN International Workshop on African Research & Education Networking September ITU, UNU and CERN.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Mobility Centres Theo Keulen Sr.Advisor UWV WERKbedrijf.
Platform for knowledge sharing & networking in Finland TIEKE Jari Salo Adviser Case: TIEKE - Finnish Information Society Development Centre.
Launch Event 13 October 2016 Motorpoint Arena, Cardiff.
IoT Strategic Initiatives in Brazil
Cyber Security and Georgia. New Challenges
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Cybersecurity in the ECOWAS region
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Cybersecurity Involves systems and practices to prevent and mitigate cyber attacks and cyber crimes aimed at global, national, organizational, or personal.
Forth International Forum
Presentation transcript:

Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)

We're Only in it for the Money (Frank Zappa & Mothers of Invention 1967)

Defensive Protect our own business against Cyber espionage and Cyber crime -> to secure future earnings for the company

Offensive Sell products and services that can assist others in their Cyber Defense activities -> generate income for the company

How to monetize Cyber Defense

1.Join a law firm (The term «cyber warfare lawyer» returned 1,95 million hits on Google this morning)

How to monetize Cyber Defense 2. Start an Internet Service Provider (ISP) (ISPs are mentioned as key players in most of the 15 «National Strategies for Cyber Security» linked on the web-page of CCDCOE. Example from Australian strategy: “… recognises that ISPs, in particular, occupy a unique position at the gateway to Australians’ access to the Internet and therefore need to be a key partner in the Australian Government’s efforts to maximise the cyber security of all Australians”

How to monetize Cyber Defense 3. Become a world leading COTS software or hardware supplier

How to monetize Cyber Defense 4. Qualify for «the golden role» Become part of the «inner circle», governments’ clandestine professional network, to supply advice, products and bespoke solutions, a front runner in Cyber Defense.

«The Golden Role» “Very few organizations offer our holistic portfolio of cyber security products, support and managed services. None combine this breadth with our unique 50-year heritage of acting as strategic advisor to the UK Government at critical national security levels.” … our world-class intrusion and IT experts have invented a portfolio of intrusion products called FinFisher. The FinFisher product portfolio is solely offered to Law Enforce- ment and Intelligence Agencies. ….provides advanced technical surveillance and monitoring solutions and international consultancy to National and State Intelligence Departments and Law Enforcement Agencies.

Many nations have developed and published a cyber defense strategy The cooperation between government and industry is often highlighted: Canada: «We will collaborate with our private sector and academic partners to enhance information sharing activities.» Australia: «… facilitating access for industry representatives, including those working with critical systems…» United Kingdom: «This strategy outlines how we will cement a real and meaningful partnership between the Government and private sector in the fight against cyber attacks.»

France: «…the possibility of creating a cyber defense research center in collaboration with industrial partners is currently being examined. Industrial strengthening will be promoted using the various resources of the State, in particular through strategic investment funds (e.g. to invest in SMEs)» Czech Republic: «…highly desirable to network all initiatives, be they of the state or of commercial or academic sectors» Germany: «The public and the private sector must create an enhanced strategic and organizational basis for closer coordination based on intensified information sharing. … has set up a task force on IT security in industry».

The Netherlands: «The Government wants to consult with ICT vendors to seek ways of improving the security of hardware and software.» Poland: «The development of the information society in Poland requires co-ordinated efforts and the harmonious co- operation of the public and private sectors…». South Africa: «…foster cooperation and coordination between government, private sector and citizens».

In summary – 4 different roles Industry as a target for cyber attacks Industry as a supplier of commercial products and services for cyber defense Industry as a national resource, (somewhat vaguely defined) Industry in «the golden role»