Final Conference 18 Set 2018.

Slides:



Advertisements
Similar presentations
CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide April.
Advertisements

Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
CIRAS PROJECT OVERVIEW
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
The Common Criteria for Information Technology Security Evaluation
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Maritime Security Risk Analysis Model
“Mitigating Offshoring Risks in a Global Business Environment“
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
UK Cyber Security Caley Robertson
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
IT Controls Global Technology Auditing Guide 1.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
DARSHANA RAGHU MANAGEMENT. Risk Management Risk management is the identification, assessment, and prioritization of risks followed by coordinated and.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
2016 THIRA & State Homeland Security Grant. Threat & Hazard Identification & Risk Assessment (THIRA) National Preparedness Goal driven Annual Assessment.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
IAEA International Atomic Energy Agency IAEA Training Course on Conducting Computer Security Assessments Presented by: Donald D. Dudenhoeffer.
Security and resilience for Smart Hospitals Key findings
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
The Common Criteria for Information Technology Security Evaluation
Barriers in using Open Source in a High Assurance Environment
and Security Management: ISO 28000
Information Technology Controls
Information Technology Sector
Creating a common understanding on Adverse events information requirements I. Bejar Alonso.
Instantiation of the Concept in GAMMA Prototypes
Analyzing internal environment (internal capabilities, resources)
Emerging Cyber Tech for Evolving Cyber Threats Chris Hankin
Cyber defense management
Threat Systems Management Office (TSMO)
General information Targeted topics
Strategy: If you don’t know where you’re going, you’ll never get there
SCSC April 2018 A model for including cyber threat in safety cases
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Mitigation Strategy “The long-term blueprint for reducing the potential losses identified in the risk assessment. The mitigation strategy includes the.
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
An Urgent National Imperative
Final Conference in Paris Exploitation plan
Specification of Countermeasures for CYRAIL
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
How to assess the risks? Irene Arsuaga CYRAIL Final Conference
How to Mitigate the Consequences What are the Countermeasures?
How to Detect Attacks and Supervise Rail Systems?
Final Conference in Paris WP6 – Protection Profiles Specification
CYRAIL Final Conference ERA on cybersecurity
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Cybersecurity ATD technical
Enhanced alerting and collaborative incident management
Community of Users.
General information Targeted topics SU-INFRA
Autonomous Network Alerting Systems and Programmable Networks
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Albeado - Enabling Smart Energy
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
General information Targeted topics SU-INFRA
ITF/UIC/UNECE Workshop on Rail Security, 23 May 2018, Leipzig
And now the Framework WP4.
Presentation transcript:

Final Conference 18 Set 2018

CYRail Consortium

CYRail Goal To select security analysis frameworks capable of assessing the most critical railway services, zones and communications to perform an cyber security assessment of the Railway systems; To deliver a taxonomy of threats targeting rail management and control systems capable of classifying, describing and analyze cyber- attack threats; To assess and select innovative rail management systems attack detection techniques; To specify Countermeasures and Mitigation strategies for improved quality levels; To describe Resilience Mechanisms for Operational Safety; To achieve Security by Design, by selecting a development framework and specifying Protection Profiles with Evaluation of Assurance Levels.

CYRAIL Structure

CYRAIL Deliverables