“Premio Ettore Majorana – Erice – Scienza per la Pace”, Pontifical Academy of Sciences, Vatican, 17 December 2008 DR. PLAMEN VATCHKOV Chairman of SAITC.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

Philippine Cybercrime Efforts
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Speaker: Tamar Shapatava
Case of Serbia: Relations between EU integration process and judiciry reform Dušan Brajković Between Transformation and Integration – South-East Europe’s.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
 Road Safety the European Union Policy Carla Hess European Commission, Directorate General for Mobility & Transport Road.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Programming of International Development Assistance Donor Meeting Agency for Human and Minority Rights September 27, 2007.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
A National approach to Cyber security/CIIP: Raising awareness.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
THE REPUBLIC OF SLOVENIA MINISTRY OF HIGHER EDUCATION, SCIENCE AND TECHNOLOGY e: Kotnikova 38, 1000 Ljubljana p:
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
ISACA Ireland Cyber Security Policy 9 February 2016.
Deputy Head of Federal Accreditation Service Sergey V. Migin Approximation of accreditation systems of European Union and Russia.
This Project is funded by the European Union Project implemented by Human Dynamics Consortium ECRAN process Climate vulnerability needs assessment Rob.
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Broadband Challenges 2017 Christopher Tamarin
Cyber Security and Georgia. New Challenges
Building Governance for Risk Management
Johannesburg, South Africa
Strategy for reducing the respondents’ burden
Crisis management related research at
Cybersecurity in the ECOWAS region
Priorities and coordination of capacity building in Azerbaijan
French Port Cybersecurity Initiative
Public-private cooperation
STRESS TESTS and TAIWAN PEER REVIEW PROCESS
About the NIS directive
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
Critical Infrastructure Protection Policy Priorities
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
Cybersecurity in Belarus a general overview of support areas
Programme of the Government of the Republic of Bulgaria (draft)
Cyber Security coordination in Europe CERT-EU’s perspective
eGov Strategy of Kazakhstan
8 Building Blocks of National Cyber Strategies
ITU an Overview Combined International SNO and 8th African SNO
Strengthening Early Warning Systems in Europe
Trust and Security Unit
Economic and social cohesion in the Western Balkans - cybersecurity
AVI AFRIQUE October 2018 Tshepo Peege
Promoting Global Cybersecurity
CYRAIL Final Conference ERA on cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
Good Practices on Disaster Prevention in Europe
The European Union response to cyber threats
Community of Users.
Computer Emergency Response Team
The e-government Conference main issues
Eurostat contribution
European Programme for Critical Infrastructure Protection (EPCIP)
SECURITY IN THE DIGITAL AGE
Presentation transcript:

“Premio Ettore Majorana – Erice – Scienza per la Pace”, Pontifical Academy of Sciences, Vatican, 17 December 2008 DR. PLAMEN VATCHKOV Chairman of SAITC STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

2  Winds of warfare in cyber space: inevitable or predictable;  Statistics impartiality;  General overview;  Wake-up call for Europe;  State of play (Bulgaria);  Our experience  Paving the way;  Efforts and results;  More achievements so far and beyond;  More key elements of the Bulgarian NIS policy;  Our ultimate goal;  The way forward. KEY POINTS: STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

3  New age of uncertainty: cyber warfare and its globalization;  cyber espionage; web vandalism; propaganda; gathering data; disturbed denial of service attacks; equipment disruption; critical infrastructure attacks; compromised counterfeit hardware  Special measures: cybersecurity;  Main priorities: security of network infrastructures and secure government services. WINDS OF WARFARE IN CYBER SPACE: INEVITABLE OR PREDICTABLE STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

4 Source: Internet World Stats, June 2008 INTERNET USERS (% OF POPULATION) STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

5 Source: Point Topic, 2008 July BROADBAND ACCESS WORLDWIDE STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

6 GLOBAL OVERVIEW   More than 80 million hacker attacks take place every day worldwide;   More than viruses are well known;   More than USD 20 billion losses experience private companies worldwide due to hacker attacks (including the anti-virus software);   As of October 2008* the cybercrimes statistics is as follows:   connections per day: 2.5 billion;   spam rate: 69.7 %;   virus rate: 1 in 141.4;   phishing rate: 1 in   malicious websites/per day STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS * Messagelabs

7  Convention against cybercrimes of Council of Europe,  EU Communication on fighting spam, spyware and malicious software, (due to enhanced illegal online activities – further action)  EU Communication “Towards a general policy on the fight against cyber crime”, (improvement of co-operation between authorities and operators)  EU Programme for CIP (EPCIP),  Directive for identification of European critical infrastructures will be adopted soon, taking into account 2 priority sectors – transport and energy. Criteria for identification of critical ICTs infrastructures are currently assessed and will be added to the scope of this directive at a later stage (3 years later)  Proposal for an EU decision on creating a Critical Infrastructure Warning Information Network CALL FOR THE EUROPEAN UNION STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

8  Identifying the necessity at a national level:  Brief overview of the Bulgarian ICT market *: 2008: more than 3mln. Internet users compared to 1,8mln. in 2005 as of 2007 broadband access by households continued its growth and reached 22.6% as of June 2008 the number of broadband access lines increased by approximately 26%  Vulnerabilities and most common cyber incidents for ICT resources: public and private sectors  Emerging Cyber Threats for 2009: national and international *Alpha research STATE OF PLAY (BULGARIA) STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

9 Source: NSI INTERACTION BETWEEN BUSINESS AND PUBLIC AUTHORITIES IN 2005 AND 2007 STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

10 THE BULGARIAN NIS EXPERIENCE 1. 1.ELABORATION OF CYBERSECURITY CULTURE; 2. 2.LEGAL FRAMEWORKS; 3. 3.OVERALL INCIDENT CO-ORDINATION AND CRISIS RESPONSE; 4. 4.INTERNATIONAL CO-OPERATION. STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

ELABORATION OF CYBER SECURITY CULTURE - RAISING THE AWARENESS OF ALL STAKEHOLDERS:   National Electronic Communication Network (NECN): responsibility of the State Agency for Information Technology and Communications PAVING THE WAY STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

12 2. LEGAL FRAMEWORKS 2.1 Preventive measures:   basic legislative texts (Electronic Governance Act/Gov- CERT) 2.2 Remedial measures:   investigation and prosecution (Bulgarian Penal Code) 3. OVERALL INCIDENT CO-ORDINATION AND CRISIS RESPONSE   Bulgarian hi-tech security services (24/7 High Tech Crime Network) EFFORTS CONTINUE… STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

13 …AND LITTLE BY LITTLE MORE RESULTS 4.1 Existing (ENISA, CERT-Hungary and a Bulgarian private company, CEENET)   Establishment of a Government CERT in Bulgaria   Recruitment, retention and training security professionals for the government (already started) 4. INTERNATIONAL CO-OPERATION STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

14 Notification and Publications Co-operation Signalizing and Warning Technical Support; Co-ordination Consultancy Strategic Recommendations Risk Analysis Incidents Handling Dissemination of Information MAIN FUNCTIONS AND SERVICES OF THE BULGARIAN GOVERNMENT CERT FUNCTIONS SERVICE STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

15 Unified Environment for Exchange of Electronic Documents Disaster Recovery Centers Register of Standards Polygon Environment for Tests and Trials Monitoring Unit Register of Certified Systems Information Security Database Portal Standards Council Information Security Council Gov- PKI INTERACTION OF GOV-CERT WITH THE OTHER UNITS IN THE FIELD OF INFORMATION SECURITY STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

16 Expert-advisory Activity: elaboration of normative acts ; selection of standards ; analyses, recommendations, etc. Administrative Unit: carrying out of state policy ; administering; organisation of events; contacts with other administrations. Operational Unit: operation of information systems; data administering, etc. ALLOCATION OF SAITC ACTIVITIES RELATED TO THE INFORMATION SECURITY STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

Existing co-operation (ITU):   ITU National cybersecurity/CIIP Self-Assessment Toolkit (main results)   ITU Regional cybersecurity Forum for Europe and CIS, 7-9 Oct, Sofia 4.3 Anticipated co-operation (IMPACT Initiative) MORE ACHIEVEMENTS SO FAR AND BEYOND… STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

18  The information security measures can be realized at two levels: 1)Central Body Level (NECN, Gov-CERT):  establishment of Unified Environment for Secure Exchange of Electronic Documents (SEED)  Implementation of a National e-Governance Data Model for public administration through centrally managed registers for unified primary metadata  establishment of Central Unit for Monitoring of Network and Information Security 2)Administrative Body Level  specific certification of administrative information systems and networks MORE KEY ELEMENTS OF THE BULGARIAN GOVERNMENT NIS POLICY STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

19 NATIONAL ADMINISTRATIVE DATA MODEL Register of the Registers and Data Register of the Information Objects Register of the Electronic Services Register of Accredited Persons and Certified Systems Register of the Unified Definitions of the Services National Nomenclature of Documents National Nomenclature of Records Register of Standards NORMATIVE TEXTS STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

20  International Information Infrastructure Protection:  Bulgaria could be designated as an ITU Cybersecurity Centre (part of IMPACT Initiative) to promote cyber security principles and culture, both nationally and in the South-East European region (grounds for its establishment);  The Centre could foster co-ordination and training activities in the field of cyber crime and provide experts for consulting governments on the last trends and potential threats, cyber security technology, policies and strategies.  Development of a National Cybersecurity Strategy:  Prevention=Public;  Protection=Private;  Prosecution=Partnership;  Response=Relationship. OUR ULTIMATE GOAL STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

21 “There are some things where the government is absolutely inevitable, which we can not get along without comprehensive state action. But there are many things – producing consumer goods, producing a wide range of entertainment, producing a wide level of cultural activity – where the market system, which independent activity is also important, so I react pragmatically. Where the market works, I am for that. Where the government is necessary, I am for that. I’m in favour of whatever works in the particular case”. by John Kenneth Galbraith THE WAY FORWARD STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS

22 THANK YOU FOR YOUR ATTENTION! STATE AGENCY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS