NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide April.
Security and Protection of Information 2009 BUILDING CIRC CAPABILITIES IN THE CZECH ARMY 6/5 2009, BRNO IDET 2009 LtCol. Roman SEKANINA, Cpt. Milan DANĚK.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Cyber Crime in the Digital Age
DHS, National Cyber Security Division Overview
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
NCHRP (48) 2014 TRB ANNUAL MEETING Effective Practices for the Protection of Transportation Infrastructure from Cyber Incidents Dave Fletcher, Co-PI.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Introduction to Indian Cyber Army. About Us Indian Cyber Army was founded with a mission to fight against Cyber Crime and with sole aim is to research,
ICT Innovation and Economic Wellbeing James Shaw General Manager, Strategy Branch.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
3 RD AFI GLOBAL POLICY FORUM 29 SEPTEMBER 2011 Flora Lugangira Rutabanzibwa Bank of Tanzania A BRIEF TANZANIA'S EXPERIENCE IN FINANCIAL EDUCATION.
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
HSGP Funding for Security Efforts Presented by Michele Robinson.
APCERT : APNIC Meeting 2014’ International Collaboration for Regional Cybersecurity Risk Reduction - APCERT Collaboration with Stakeholders Yurie Ito Chair,
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
ICT Action Plan Refresh
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Commonwealth Internet Governance Forum CTO Forum, Colombo, Sri-Lanka 13 September 2010 Malcolm Johnson Director of ITU-TSB.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
UK Cyber Security Caley Robertson
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
World Health Day. World Health Day is celebrated every year on 7 April, under the sponsorship of the World Health Organization (WHO). In 1948, the World.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Hurdles in implementation of cyber security in India.
Technology for Social Justice Enhancing community sector service delivery Stefanie Kechayas – Senior Consultant 17 November 2015 SharePoint Connect and.
Created by: Ashley Spivey For Department of Homeland Security All information from:
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute
ISACA Ireland Cyber Security Policy 9 February 2016.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
OFFICIAL Horizon 2020 Secure Societies Home Office Perspective Tim Cook
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
© 2009 IBM Corporation IBM Software Group, Federal Strategy Concept of Operations - Dynamic Defense of the GIG, enabled by a smarter infrastructure Herb.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Scottish Policing 2011 – Risks To Communities & Information-Sharing Russell Scott Visiting Academic Edinburgh Napier University Serious Organised Crime.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Surveillance and Security Systems Cyber Security Integration.
Educause/Internet 2 Computer and Network Security Task Force
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Information Technology Sector
California Cybersecurity Integration Center (Cal-CSIC)
About the NIS directive
Organisation Model Assistant Director: IT & Digital
Protective Security Advisor Program Brief
National-level ICT training strategy
Refreshing New Zealand’s Cyber Security Strategy 2018
The European Union response to cyber threats
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB

Today’s Presentation Introductions and scene setting – John Harvey, DIA Cyber Security Strategy – Alan Bell, MED Key Initiatives – Grant Fletcher, GCSB Questions

Context Increasing use of internet and digital systems Cyber threats increasing and more sophisticated – no international borders Threats to: - individuals - government-held information - businesses and intellectual property - critical national infrastructure

Government’s Role Protecting personal and sensitive government- held information and systems Assisting critical national infrastructure providers Helping to provide a safe online environment for individuals and businesses

New Zealand’s Response…

Cyber Security Strategy Approach taken: Consultative – over 70 different organisations and groups consulted Partnership – key stakeholders

Cyber Security Strategy Priority areas: Increasing awareness and online security Protecting government information and systems Incident response and planning

Awareness and Online Security Key initiatives: Centralised cyber security information online Co-ordinated awareness raising programme

Incident Response and Planning Key initiatives: Working with industry Incident response plan NZ Computer Emergency Response Team

Government Systems and Information Key initiatives: National Cyber Security Centre Improved government security practices

Questions?