CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide 16-17 April.

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

Botswana Policy Statement at the WSIS+10 Honourable Nonofo E. Molefhi Minister of Transport and Communications.
OUR CYBER FUTURE Learning from our EW past 16 April 2012© BAE Systems Australia 2012 BAE Systems Kim Scott, Director - Land & Integrated Systems Presentation.
The Bali Process: a model for regional cooperation in the fight against human trafficking Mr Michael Potts Australian Ambassador for People Smuggling Presentation.
“First hand story: How we raised awareness on information security in Slovenia” Jasmina Mešić AR programme coordinator Slovenian CERT.
Little cloud – big difference Matt Healy – Chairman, OzHub April 2012.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing.
Cyber Security Audit and Network Monitoring P.D. Mynatt Doug Brown March 19 th 2015.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Click to edit Sub-heading Plant Health Australia Blueberry Industry Biosecurity Plan Alison Saunders Program Manager – Biosecurity Planning and Implementation.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Towards defining priorities for cybersecurity research in Horzon 2020's work programme Secure ICT Landscape Deliverable Mari Kert, Javier Lopez.
Operational Security PCC. VII-F.1.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
U.S. Coast Guard Intelligence & Criminal Investigations
Cybersecurity : Optimal Approach for PSAPs
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Internet Dangers Technology Communication Tools E-Literate.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Assuring Reliable and Secure IT Services Chapter 6.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Cyber Insurance Collecting and Storing Cyber attack data using a Cyber Security Surveillance System (CS3) Presenter: Kasturi Balakrishnan.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
CMGT 411 Week 1 DQ 1 What makes a successful information security awareness program and how a security awareness program can be one of an organization’s.
WP2: Security aware low power IoT Processor
Information Security Program
Center of Excellence in Cyber Security
Information Technology Sector
Cyber Security: State of the Nation
Panel Discussion: C4I Solutions for Combating
Teaching Internet Safety
Align Strategy & Culture
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
COLOMBO DEFENCE SEMINAR 2018
Chapter 1: Introduction
Chapter 21:Security Beyond Computer Networks: Information Assurance
Perspectives on Defense Cyber Issues
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
A.P.T. wehackpeople.com.
Final Conference 18 Set 2018.

THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Warm-Up If you could tell a story about the importance of protecting our resources, or something else you learned this unit, what would the story be like?
Learning Strategies: Daily Literacy Activity
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Align Strategy & Culture
Presentation transcript:

CYBER AND INFORMATION SECURITY Cyber Security Operations Centre The Australian Chapter of the Association of Old Crows The Hilton, Adelaide April 2012

CYBER AND INFORMATION SECURITY This presentation is UNCLASSIFIED

CYBER AND INFORMATION SECURITY Introduction – Remember when?

CYBER AND INFORMATION SECURITY What is the Internet?

CYBER AND INFORMATION SECURITY What is Cyber? “The Internet and everything connected to it.”

CYBER AND INFORMATION SECURITY Cyber Warfare and Australia The Cyber Security Operations Centre - DSD The CSOC was established to: –Detect sophisticated threats –Provide an understanding of the national cyber threat environment for Government –Coordinate whole-of-government response. Part of the Australian Government Cyber Security Strategy to improve cyber threat awareness and response. DSD’s mission is ‘Reveal their secrets, protect our own.’

CYBER AND INFORMATION SECURITY Working collaboratively…

CYBER AND INFORMATION SECURITY What/Who is the cyber threat?

CYBER AND INFORMATION SECURITY DSD’s top 4. DSD’s top 4 strategies to mitigate targeted cyber intrusions

CYBER AND INFORMATION SECURITY The future of Cyber - Conclusion

CYBER AND INFORMATION SECURITY Questions?