Mr. Mario Beccia – Cyber Defence Project Officer November 2018

Slides:



Advertisements
Similar presentations
Being Proactive and Less Reactive in Security Operations and Cyber Attack Response Christina Raftery, MCSE, CISSP FBI Los Angeles Field Office.
Advertisements

Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Application Threat Modeling Workshop
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Threat context TLP WHITE Cyber security panel
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Incident Response… Be prepared for “not if” but “when” it happens.
USACE Flood Risk Management and Silver Jackets Workshop Sandra K. Knight, PhD, PE, D.WRE Deputy Associate Administrator for Mitigation, FEMA August.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
1 Simulation Needs for Cyber Analytics October PNNL-SA
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Coast Guard Cyber Command
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Md. Nurul Alam. ◦ What is Disaster? ◦ Idea regarding various terminology used in Disaster Management.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Headquarters U.S. Air Force
Proactive Incident Response
for Election Infrastructure
Hurricanes, Earthquakes, and Threat Intelligence
Team 1 – Incident Response
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
DoD Cyberspace Workforce Definitions
Cyber Security: State of the Nation
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Critical Infrastructure Protection Policy Priorities
Cyber Security coordination in Europe CERT-EU’s perspective
Cybersecurity EXERCISE (CE) ATD Scenario intro
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
United States Coast Guard
ATD session 2: compliancy versus mission assurance
Cyber defense management
8 Building Blocks of National Cyber Strategies
DoD Cyberspace Workforce Definitions
Cybersecurity at PJM Jonathon Monken
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
An Urgent National Imperative
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
Operations Security (OPSEC)
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Cybersecurity ATD technical
Societal resilience analysis
IS Risk Management Framework Overview
Cybersecurity Threat Assessment
Strategic threat assessment
Cybersecurity EXERCISE (CE) ATD Scenario questions
Cyber Security in a Risk Management Framework
Prevention, Intelligence
Yves Goulet Director, National Fisheries Intelligence Service
Cybersecurity at PJM Jonathon Monken
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Chapter 1 Key Security Terms.
What You Should Know About Driving Down MTTD and MTTR
Presentation transcript:

Mr. Mario Beccia – Cyber Defence Project Officer November 2018 Cyberspace threats Mr. Mario Beccia – Cyber Defence Project Officer November 2018

Cyberspace For the purpose of this session, cyberspace can be described with the following properties: Bilateral Human and network engagement Hyper connectivity and networking No geographical boundaries Owned by commercial entities (not owned or controlled by governments)

Cyber weapon A cyber weapon: Is sponsored or employed by a state or non-state actor Meets an objective which would otherwise require espionage or the use of force Is employed against specific targets Its effects vary greatly with usage and time Unlike for instance CBR agents, cyber ‘weapons’ are neither banned nor controlled internationally.

Who do we defend from? Counter measures (incremental) Resources Actor Diplomatic / Political measures Commercial Cybersecurity measures Cyber Hygiene Tier I Inject new vulnerabilities, create game-changing tools Resources (infinite) 100000s of EUR 100s of EUR Actor State Actors Cybercriminals Hacktivists, casual hackers Tier II Find new vulnerabilities, exploit them with new tools Tier III Use existing tools & vulnerabilities

Our mission in cyberspace Achieve Better Cybersecurity Resilience Cyber Resilience = Cybersecurity + Business Resilience* Risk Management, as opposed to Risk Avoidance Manage the “unknown” (known and unknown unknowns), as opposed to manage the “known” People, Process, Technology Source: adapted from the ISO27001 definition of Cyber Resilience

Cyber Resilience: Goals Anticipate  Maintain a state of informed preparedness in order to forestall compromises of mission/business functions from adversary attacks Withstand  Continue essential mission/business functions despite successful execution of an attack by an adversary Recover  Restore mission/business functions to the maximum extent possible subsequent to successful execution of an attack by an adversary Evolve  To change missions/business functions, so as to minimize adverse impacts from actual or predicted adversary attacks

Achieve better Cybersecurity Resilience Better cybersecurity resilience implies: Better preparedness (people) Better organization of assets (process) Better assets (technology) A mixture of cybersecurity capabilities (in the DOTMLPFI sense, including materiel, personnel, organization, etc…) Once in place, appropriate capabilities ensure the ability to execute processes across the entire scope of cybersecurity, such as: Preparedness Incident analysis and response Deterrence Information sharing

EDA Cyber defence projects Anticipate People Process Technology Withstand Recover Evolve CDTEX-P (training course management) Senior Decision Makers Seminar (training&education) Cyber Ranges Federation (training&education) CySAP (cyber situational awareness) MASFAD II (APT detection) DCEC2 (forensics)

Thank you For More information Follow us on Twitter www.eda.europa.eu @EUDefenceAgency