Cyber security policy in an evolving landscape

Slides:



Advertisements
Similar presentations
Cyber Security & Critical Controls Chris Few Industry Enabling Services CESG February 2011 © Crown Copyright. All rights reserved.
Advertisements

Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Technology and Online Spaces Claro Parlade Director for Software Policy Asia-Pacific.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Exercise 3 What is Necessary to build a Framework NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and.
Improving security? CYBER SECURITY: THE SME PERSPECTIVE KELVIN JONES MANAGING DIRECTOR, ACCELERO DIGITAL © Accelero Digital Solutions Ltd
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Describe the potential of IT to improve internal and external communications By Jim Green.
Understanding the Potential of IT
CMG Events 2016 Cybersecurity Briefing 24 February 2016 John Magee William Fry.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Amina Maknoon Senior Director, Investigation & Enforcement Financial Services Commission.
Information Security tools for records managers Frank Rankin.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Protecting Data, Sharing Information Graham Wakerley: Director
Cyber in Financial Services
A policy framework for an open and trusted Internet
CompSci 280 S Introduction to Software Development
Hurricanes, Earthquakes, and Threat Intelligence
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Towards SME Digital Resilience Unpacking the APEC Guidebook
Data protection headaches: GDPR, brexit AND perimeter risk
General Data Protection Regulations and the IoT
GDPR Awareness and Training Workshop
The Security of Network and Information Systems Directive
National Cyber Security Programme Local : Building Resilience Together
The session will commence at Please mute your microphone
©2015 NETSCOUT ° CONFIDENTIAL & PROPRIETARY
8 Building Blocks of National Cyber Strategies
Cyber Security in Ports Business as Usual?
Organisation Model Assistant Director: IT & Digital
The session will commence at Please mute your microphone
How to approach a top-down call topic in Horizon 2020?
EU GDPR a Cyber Security Perspective
Review of the Telecom Framework – Security rules Security rules in the proposed European Electronic Communications Code (EECC) Lisbon, 8 March 2017.
Joining Records Management and Cyber Security
The session will commence at Please mute your microphone
Information Security – June 18
The session will commence at Please mute your microphone
Trust and Security Unit
Understand Risks to IT Security
Cyber Security Culture
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
GDSP Global Digital Service Platform
Prepared by: Yazan Metwalli(148371) Moyad Habiballah(137535)
Ofcom’s role in cyber security
Refreshing New Zealand’s Cyber Security Strategy 2018
Neil Kirton and Zoë Newman
The session will commence at Please mute your microphone
Community of Users.
Security week 1 Introductions Class website Syllabus review
Finland’s Cyber Security Strategy
The CYBERWISER.eu project
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
LO1 - Know about aspects of cyber security
Successfully build your GDPR offer – and how Microsoft can help
Awareness and Auditor training kit
Presentation transcript:

Cyber security policy in an evolving landscape Rowena Schoo Senior Policy & Communications Advisor Incentives & Regulations Team Cyber Security and Data Protection Directorate

Introduction Overview Current challenges Future policy direction Practical tips Questions

Defend against cyber threats Deter our adversaries Develop our skills and capabilities & more...

Every organisation in the UK is cyber secure and resilient to support a prosperous digital economy

Organisations know what to do to be secure and resilient

Organisations have access to the products and services they need

Organisations have access to the cyber security skills they need

Organisations take appropriate action to protect themselves and their customers

Strong justification for regulation to secure personal data Implement NIS

GDPR personal data must be processed securely using appropriate technical and organisational measures

‘appropriate’ action In other words you need to manage risk NCSC & ICO

Operators of Essential Service Implement security measures to manage risks to the network and information systems Report incidents affecting the continuity of services

We know there is more to do

Only 50% of organisations are taking the most basic measures

EXAMPLE Despite being patched a year ago... 80% of user companies are downloading the pre-patch version of the software that took down Equifax

We need to change how we make things secure in a digital world

HM Government can’t do this alone

Regulator/ Legislator Steward Government Funder Leader Provider Customer

No one is saying this will be easy

The cyber security and resilience of the UK supports growth

A digital economy secure by design

A digital economy secure by design

Some practical tips

GDPR opens the conversation on cyber security Good practice

Bring people on the journey

Take policy into everyday practice until it’s comfortable and familiar

A digital economy secure by design

Thanks! Rowena Schoo rowena.schoo@culture.gov.uk