Security and Protection of Information 2009 BUILDING CIRC CAPABILITIES IN THE CZECH ARMY 6/5 2009, BRNO IDET 2009 LtCol. Roman SEKANINA, Cpt. Milan DANĚK.

Slides:



Advertisements
Similar presentations
ASREN Technical Committee Assuming and Building ASREN infrastructure ASREN Launch Meeting, Cairo, 8-9 December 2010 Aouaouche El-Maouhab (CERIST), Algeria.
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
Department of Homeland Security Site Assistance Visit (SAV)
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
The Queen’s University of Belfast JISC BS7799 Pilot The Queen’s University of Belfast Dr. Ricky Rankin.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
Security and Protection of Information Conference April 28 – 30, 2003 Brno, Czech Republic Unification of information security policies towards a NATO-wide.
Community Based Cyber Security Program Technical Assistance Package Nicholas Corea Program Director G&H International Services for Donald Lumpkins, Program.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Federal IT Steering Unit (FITSU) Federal Intelligence Service (FIS) Reporting and Analysis Centre for Information Assurance (IA) MELANI National Strategy.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CPT Aneta COUFALÍKOVÁ, Ph.D. CIRC Centre, 34.zKIS, Czech Army CIRC.
DHS, National Cyber Security Division Overview
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Incident Command System Basic Course
Strategy and Policy Unit: Current Activities and Future Tasks
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
PROTECTION OF NATO INFORMATION AND NATO CIS Col
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
S.ICZ Frantisek Vosejpka The enforcement of NATO INFOSEC requirements into the policy and architecture of CISs CATE 2003 Brno,
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
“When out of ammo, Reload” CYBERSECURITY CHALLENGES AND THREATS Ahmed Husain Managing Director.
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
MITIGATION I PREPAREDNESS I RESPONSE I RECOVERY I STRATEGIC ADVICE Shanti S. Smith Program Director Witt Associates GVF's Disaster Preparedness & Response.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Information Systems Security Operational Control for Information Security.
Experience to create and manage Computer Security Incident Response Team in Latvia Egils Stūrmanis DDIRV (VITA CSIRT) manager State Joint Stock Company.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.
Risk Assessment: Key to a successful risk management program Sixteenth National HIPAA Summit Timothy H Rearick, MBA, PMP August 22, 2008.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Defence Standardization, Codification and Government Quality Assurance Authority Defence Standardization Department TRANSLATIONS + ANALYSES / EXPERT OPINIONS.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
DEFENCE POLICY AND PLANNING DIVISION
ICANN Strategic Initiatives for Security, Stability and Resiliency - DNS CERT Posted for Public Comment at 1.
Defence Standardization, Codification and Government Quality Assurance Authority Defence Standardization Department DEFENCE STANDARDIZATION REGISTRY Defence.
State of Georgia Release Management Training
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Professor Peeter Lorents, CCD COE Chief of the R&D Branch
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
Week 4 Seminar Investigating Significant Injuries and Lessons Learned.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
TRAINING OPTIONS AT CYBER SERVICES PLC Anett Mádi-Nátor, Director of International Operations Ferenc Frész, CEO.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Information from the Safety Advocates for EMT (SAFE)
California Cybersecurity Integration Center (Cal-CSIC)
“The Link” - Continuity of Operations and Emergency Management
8 Building Blocks of National Cyber Strategies
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
گروه پاسخگویی به فوریتهای رایانه ای Computer Emergency Response Team (CERT) سیدمحمدرضا رشتی اسفندماه
MODULE 2 UNIT 2 Incident Command Allow 60 minutes for this section.
Introduction to: National Response Plan (NRP)
The European Union response to cyber threats
Computer Emergency Response Team
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Security and Protection of Information 2009 BUILDING CIRC CAPABILITIES IN THE CZECH ARMY 6/5 2009, BRNO IDET 2009 LtCol. Roman SEKANINA, Cpt. Milan DANĚK

LtCol. Roman SEKANINA (Specialist-CIS security section, CIS Division) Cpt. Milan DANĚK (Head of the CERT Department, CZ MoD CIRC Centre)

CONTENTS 1.Position of the CZ MoD CIRC. LtCol. Roman SEKANINA 2.CZ MoD CIRC Centre, CERT Department, present state and future CIRC. Cpt. Milan DANĚK Questions, discussion. (Demonstration – Exhibition hall „G1“, stand No.33)

CZ MoD approach to CD/CIRC Definitions CYBER DEFENCE (CD) - involves wide scale of security measures (from different areas) to protect cyber environment, especially to protect components of Critical Information Infrastructure (CII) against cyber attacks CIRC (Computer Incident Response Capability) - is the part of the INFOSEC effort that provides the capability to respond to computer security threats rapidly and effectively. It provides a means for handling and reporting incidents and disseminating important incident-related information to system and security management and users. It should be part of the emergency (contingency) planning to restore system after attack. CERT (Computer Emergency Response Team) - comprises the technical staff providing the direct technical assistance as requested or as needed.

Relationship between IA, INFOSEC, CD and CIRC Information Assurance INFOSEC Cyber Defence (program) CIRC (capability)

Structure of the CZ MoD CIRC SKIS MO, OB MO CZ MoD CIRC Coordination centre CZ MoD CIRC Technical Centre CIS Operating Authorities Level 1 Level 2 Level 3 (CERT) NCIRC (CC), CCc,… NCERT, CSIRT, … KEY SKIS MO - CIS section at CIS Div. OB MO – INFOSEC branch at MoD 34.zKIS – CIS base 34.zKIS