National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,

Slides:



Advertisements
Similar presentations
ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
Advertisements

Its a new digital world with new digital dangers….
Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
DHS, National Cyber Security Division Overview
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
International Telecommunication Union ICTs and Climate Change Adaptation Angelica V Ospina, University of Manchester, UK Cristina Bueti, International.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
Workshop on RISKS AND IMPACTS ON FLOOD FROM EXTREME EVENTS IN ASEAN COUNTRIES Bali, August 5 th 2015.
Qualifications a Bachelor’s degree in Science or Engineering with GPA at least 3.25, or a Masters’ degree in Science or Engineering having GPA no less.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Cyber Security and Georgia. New Challenges
Cyber Security – An Existential Threat? (IIC, Singapore)
SECURITY INCIDENT MANAGEMENT CHALLENGES AND BEST PRACTICES
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
IIASA Governance Review
French Port Cybersecurity Initiative
Public-private cooperation
International Energy Agency
NIST Cybersecurity Framework
Internet Governance: An Analysis from Developing country’s perspective
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Internet Governance in Middle East
IS4550 Security Policies and Implementation
Implementation of the UN DA 10 project “The African context”
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
An Urgent National Imperative
A Multinational study on copyright literacy of specialists from libraries and other cultural institutions Prof. PhD Tania Todorova University of Library.
Trust and Security Unit
CYBERSPACE: CAN FRAGMENTATION BE STOPPED
ETNO & RIPE Cooperation
Cyber Security Ecosystem of Georgia. Experience and Challenges
Cybersecurity ATD technical
The European Union response to cyber threats
Community of Users.
Institution and Capacity- Building
THE ROLE OF CYBERSECURITY IN THE ROMANIAN DEFENCE EDUCATIONAL SYSTEM
5th PASET Forum Kigali, Rwanda| May 22, 2019
Draft Charter Community of Practice for Direct Access Entities
Presentation transcript:

National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon, Ph.D. Candidate Internet Interdisciplinary Institute (IN3) Ph.D. in Network and Information Technologies, Open University of Catalonia, Spain AU – School of Computing & Information Systems/ Faculty of Business Instructor

Overview This paper is part of the ongoing research for my dissertation “Digital Forensics: Cyberlaw review, Cybercrime analysis and cyberforensics assessment to enforce Cybersecurity” The paper analyzes comparatively national cybersecurity strategies in ten countries from five different continents, study policy-making considerations from five global intergovernmental organizations and describe the most current cybersecurity frameworks.

Overview Lead Author: Regner Sabillon Co-authors: Jeimy Cano and Victor Cavaller International Journal of Computer Science and Software Engineering (IJCSSE), Volume 5, Issue 5, May 2016 ISSN (Online): Page: /issue5/p1-V5I5.pdf /issue5/p1-V5I5.pdf

Paper’s structure Introduction Important concepts and insight are introduced regarding the creation of NCCS for cyberspace protection and defense Part I discusses national cybersecurity strategies in Australia, Canada, Israel, Japan, Malaysia, Norway, South Africa, The Netherlands, The United Kingdom and The United States of America Part II examines the national security strategy perspectives from intergovernmental organizations like UN, ITU, EU, OECD and NATO Part III highlights eleven cybersecurity frameworks that are in use globally Part IV introduces a proposal of the National Cybersecurity Strategy Model (NCSSM) and all its components. Part V reviews the international cooperation and knowledge transfer of the existing national strategies

Abstract Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a national strategy. This approach aims to develop international cybersecurity strategies, alliances and cooperation. Our research is focused on a comparative analysis of ten leading countries and five intergovernmental organizations cybersecurity strategies. It includes eleven cybersecurity frameworks aligned with cyber governance and cyber law.

Keywords National cybersecurity strategy, cybersecurity, cyber law, cyber governance, international cybersecurity strategy, cyber policy.

National Cybersecurity Strategies: Countries 1.Australia 2.Canada 3.Israel 4.Japan 5.Malaysia 6.Norway 7.South Africa 8.The Netherlands 9.UK 10.USA

National Cybersecurity Strategies: Global Intergovernmental Organizations 1.UN 2.ITU 3.OECD 4.EU 5.NATO

National Cybersecurity Strategies: Global Intergovernmental Organizations (EU) Coordination between EU and National Agencies

Cybersecurity Frameworks 1.(ISC)2 CBK 2.ISO 27032: NIST SP NIST Cybersecurity Framework (2014) 5.DHS Cyber Resilience Review (CRR) 6.Council on Cybersecurity Critical Security Controls 7.Australian Defense Signals Directorate (DSD) to mitigate targeted cyber intrusions 8.PCI DSS 9.HIPAA Security Rule 10.HITRUST Common Security Framework (CSF) 11.NERC CIP Cybersecurity Version 5

The National CyberSecurity Strategy Model (NCSSM) Sabillon, Cavaller and Cano (2016)

Conclusion This paper has focused on analyzing leading countries and intergovernmental institutions perspectives regarding the creation, policy making, structure, implementation and sustaining national cybersecurity strategies. The content of the national strategies varies widely and each country structures the strategy based on their needs related to fight cybercrime, critical infrastructure protection, stakeholders engagement, cybersecurity awareness, cyber resilience, cyber intelligence gathering, cyber attacks alertness and eradication, cyber incident response, cybersecurity research and development, cyber police organization, communication, military involvement, law and judiciary collaboration, cyber governance and international cooperation. As a result of our research, we present ‘The National CyberSecurity Strategy Model (NCSSM)’ that contains eight pillars: Cybersecurity Culture, Stakeholders definition and engagement; Capacity Building; International Cooperation; Cybersecurity; Legal Measures; Organizational Architecture; and Defense. The Model requires specific input features and the outcome is measured in terms of cyber defense, cyber awareness, cyber resilience and national cybersecurity.

Conclusion We also included an overview of the major cybersecurity frameworks that are instrumental to support national cybersecurity strategies. Some countries have a higher level of maturity than others when dealing with cyberspace, cybersecurity and national cybersecurity strategy policy-making. These leading countries have to recognize the importance of international cooperation, alliance development to fight cybercrime, rule cyberspace and knowledge transfer of cybersecurity strategy matters. Future research will need to focus on the development of international standards and regulations to tackle cybercrime, to expand international cooperation in cybersecurity and national strategies. The challenges to overcome are to secure nations and global cyberspace while creating dynamic cybersecurity strategies.

Reference R Sabillon, V Cavaller, J Cano. "National Cyber Security Strategies: Global Trends in Cyberspace." International Journal of Computer Science and Software Engineering 5, no. 5 (2016): Available at

Questions