WISE 2017 Collaborating Communities

Slides:



Advertisements
Similar presentations
© 2004 APCERT APCERT Activity Update Yurie Ito JPCERT/CC (On behalf of the APCERT Secretariat)
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
David A. Brown Chief Information Security Officer State of Ohio
Speaker: Tamar Shapatava
JOHN CHAPMAN Chair, Internet2 Middle East Regional Interest Group DECEMBER 11, 2014 Moving Towards a GLOBAL NETWORK ARCHITECTURE.
JPCERT/CC May Fixed-Point Auto Data Collecting System Getting more accurate Scan and Prove data to provide more accurate network traffic analysis.
APCERT : APNIC Meeting 2014’ International Collaboration for Regional Cybersecurity Risk Reduction - APCERT Collaboration with Stakeholders Yurie Ito Chair,
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
1 Growth Centres Commission Corruption Prevention Network – Annual Forum 11 September 2008 Corruption Prevention Network Annual Forum.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Recent Cyber Attacks and Countermeasures September 2006.
Networks ∙ Services ∙ People Alessandra Scicchitano TF-CSIRT meeting – Tallinn, Estonia SIG-ISM Update 24 th September 2015 SIG-ISM Secretary.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
TERENA update Karel Vietsch TERENA CEO Internet2 Fall Meeting, Atlanta 30 October 2000.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Connect. Communicate. Collaborate The Security Model of GÉANT2: A Co-operative Approach Christoph Graf, SWITCH TNC’07, Lyngby, 22 May 2007.
Networks ∙ Services ∙ People Laura Durnford TF-CPR, Cambridge What are other working groups up to? 29 October 2015 GÉANT.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Issue Date: Revision: APNIC Outreach Activities in Cyber Security Adli Wahid Security Specialist
Who doesn’t need to be WISE? Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
APCERT Dr. Suguru Yamaguchi JPCERT/CC. What’s APCERT? “Asia Pacific Computer Emergency Response Team” –Regional forum of CSIRT in Asia Pacific –Established.
Networks ∙ Services ∙ People TF-CPR, GÉANT Cambridge Minimizing Threats & Maximising Opportunities TRAINING 29 October 2015 Ian Barker, Training.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Security and resilience for Smart Hospitals Key findings
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
WISE Information Security for Collaborating E-Infrastructures
Mastering the Art of Collaboration for WISEr Global Security
Welcome and Introduction January 11, 2017
Security Management Geant SIG-SIM – Alf Moens
WISE 2016 WISE: a global trust community where security experts share information and work together, creating collaboration among different e- infrastructures.
Information Security Program
David Kelsey STFC-RAL 4th WISE workshop, Nikhef 27 March 2017
The Case for National CSIRTs ENOG 12 | Yerevan | 3-4 Oct 2016
WISE WG STAA Awareness and Training
Cybersecurity - What’s Next? June 2017
EGI – Round table discussion
Dublin, february th SIG ISM Workshop.
Directory/Inventory – info sharing for security people
Cyber-crisis exercises
Defining the challenges of international education
Workstream 4: Tools, toolkits and resources
About the NIS directive
Security challenges in the Balkans
CSIRT collaboration in Europe
Joe, Larry, Josh, Susan, Mary, & Ken
Cyber Security coordination in Europe CERT-EU’s perspective
6th SIG-ISM Workshop February 2018, Madrid
The Forum of Incident Response and Security Teams (FIRST)
“The Link” - Continuity of Operations and Emergency Management
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Be WISE! Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
AVI AFRIQUE October 2018 Tshepo Peege
PARIMA is the Pan-Asia Risk and Insurance Management Association.
Role & Relevance of Cochrane UK to trainees
Climate Action Regional Offices (CARO)
Strategy
Computer Security Cooperation in Europe
DSC Contract Management Committee Meeting
Nancy Y. McGovern Digital Preservation Officer, ICPSR IASSIST 2007
CSIRT collaboration in Europe
Tom Barton (WG Chair) University of Chicago and Internet2
DSC Contract Management Committee Meeting
Federated Incident Response
Presentation transcript:

WISE 2017 Collaborating Communities WISE: a global trust community where security experts share information and work together, creating collaboration among different e-infrastructures Update on workgroup Security Training and Awareness Alf Moens WISE conference March 2017, Amsterdam

CEO Forum Security Group national communities International communities Géant SIG-ISM WISE TF-CSIRT CEO Forum Security Group Describe how these communities reinforce each other PRACE security group Human Brain Project NREN CERT ????

Competing or collaborating? Organisation, governance, roles and responsibilities, policy SIG-ISM / WISE / CEO Forum Incident detection, prevention and respons Monitoring of infrastructure and suppliers Risk management, security measures Awareness and training TF-CSIRT Describe how these communities reinforce each other NREN-CERT national communities Assessments, Audit

TF-CSIRT Computer Security Incident Response teams: Building mutual trust between security teams “owns” trusted Introducer program and TRANSIT training program Helps to get in contact with other NERNs for operational matters, security incidents Enables trusted communication between CSIRTs Target audience are CSIRT teams From NREN & e-infradstrcutures, public sector and industry/banking/ISP Trusted Introducers program, “trust levels” Listed member (155) Accredited member (150) Certified member (20) TF-CSIRT is one of the regional ”members” of FIRST 3 yearly meetings, january meeting co-organised with FIRST regional meeting

Géant SIG-ISM SIG-ISM offers CISOs (Chief Information Security Officers) of national research and education network (NREN) organisations the opportunity to share best practices and learn from each others' experience, to safeguard their NREN against security incidents and threats. Strategic collaboration Whitepapers Security management, risk management Working on: Inventory: Who-is-who fro NRENs, reference to public information, possible extended with (mildly) confidential information Miinimal set: What are the basic security needs for an NREN? Risk inventory Encouraging small-scale regional collaboration: Nordic, UK-Ireland, Benelux Go into confidential details of local security organidation and details in small groups of trusted people

Global NREN CEO forum – security working group CISO’s of AARnet, SANren, Internet2, Esnet, Canary, Nordunet, JISC, SURFnet, DFN Executive sponsors: AARnet, Internet2, Géant TOP 4 priorities (from list of 11 initiatives) Establishing a security baseline for NREN’s Development of advanced tools for Filtering and DDOS scrubbing Work to develop an automated threat information system Develop and rehearse global cyber crisis exercises. Process to respond to a global major security incident – Incident Response Plan [IRP], Emergency Contact Lists etc Each priority has a sponsoring CISO Meet-and-greet (BoF) session at TNC17, may 30th

CURRENT SECURITY POSITION Gartner Maturity model Global NREN CEO Forum